background image

3Com Corporation 

 

       Page 58 

 

If you add one host address in this list, the device will send out SNMP Trap 
information to this host. To add a host into this list, specify the SNMP manager IP 
address. And then click the 

Add

 button. 

To delete a host from the SNMP Trap Host list, select the host IP address that 
should be deleted, and then click the 

Delete

 button. 

 

Figure 40 – SNMP Trap Settings

 

 

 

 

Summary of Contents for 3CRWE920G73

Page 1: ...3Com 802 11g 54Mbps Wireless LAN Building to Building Bridge User s Guide Version 2 0 Outdoor 3CRWEASYG73 Indoor 3CRWE920G73 Part No DUA ASYG73 AAA02 Published January 2005 ...

Page 2: ......

Page 3: ...ntation contained in or delivered to you in conjunction with this User Guide Unless otherwise indicated 3Com registered trademarks are registered in the United States and may or may not be registered in other countries 3Com and the 3Com logo are registered trademarks of 3Com Corporation XRN is a trademark of 3Com Corporation IEEE and 802 are registered trademarks of the Institute of Electrical and...

Page 4: ...idge 14 Installing the 3CRWEASYG73 3CRWE920G73 Antenna 16 Antenna Specification 17 Connect to the Power Source and the Local Network 18 LED Indicators 19 Software Installation 20 Find your New Wireless Bridge 21 Using the Diagnostic Utility 23 Contents of CD 28 3 WIRELESS BRIDGE CONFIGURATION 29 Initialization 29 The first login 29 Accessing the Web Manager Interface 30 Setup Wizard 31 Wireless Se...

Page 5: ...68 System Status 69 Statics 69 STP 71 STP Statics 71 STP Port 72 4 TROUBLESHOOTING 73 Reset to Factory Default procedure 73 Setting IP Address Using 3Com Wireless Infrastructure Device Manager 73 Hardware and software requirements 73 Discover the wireless bridge 73 Initializing the IP Address using 3Com Wireless Infrastructure Device Manager 74 5 SPECIFICATIONS 75 Regulatory domains 75 Hardware Sp...

Page 6: ...tworking LAN concepts and wireless Internet access infrastructures In addition you should be familiar with the following Hardware installers should have a working knowledge of basic electronics and mechanical assembly and should understand related local building codes Network administrators should have a solid understanding of software installation procedures for network operating systems under Mi...

Page 7: ...mands The word command means that you must enter the command exactly as shown and then press Return or Enter Commands appear in bold Example To display IP information enter the following command get ipaddr The words enter and type When you see the word enter in this guide you must type something and then press Return or Enter Do not press Return or Enter when an instruction simply says type Keyboa...

Page 8: ...on rate up to 54Mbps which is faster than any 802 11b Bridge Wireless Access Security The 3Com Corporation 802 11g Wireless Bridge provides high level security with full 128 bit RC4 data encryption or 64 bit WEP encryption The Wireless Bridge supports WPA PSK and VPN pass through which provide a more advanced data protection during wireless transmission Install and Maintain With an external antenn...

Page 9: ...ks in different buildings with no wired connections You will need a 3Com 802 11g 54Mbps Building to Building Bridge on both sides of the connection In this case the Wireless Bridge acts as a network bridge between wireless and wired networks In bridge mode the Wireless Bridge can connect up to seven remote networks Point to Point Bridge Link Point to Multi Point Star Configuration Point to Multi P...

Page 10: ...owing information Package content Hardware installation Software installation Scope of Delivery Please ensure that the package is complete before beginning with the installation The package should include the following 3Com 802 11g Wireless Bridge Mounting kit for wall or mast mount indoor outdoor respectively CD ROM containing software and documentation Power over Ethernet Power Injector Lightnin...

Page 11: ...s apart on the wall Use the vertical line on the template to ensure that the placement of the marks is plumb to the wall 2 Drill holes at the marks Use a 5 mm 3 16 inch drill bit if using the provided screw anchors use a 3 mm 1 8 inich drill bit if using the screws only 3 Install the two flathead screws at the marks on the wall Leave the screw heads protruding 6 mm 1 4 inch from the surface of the...

Page 12: ...mber 6 panhead screws 2 Align the T rail grips with the ceiling T rail and adjust them so that they grip the T rails securely 3 Tighten the screws on each T rail grip After installation there may be some play in the fit of the T rail grips if the T rails are very narrow If necessary add a shim to achieve a secure grip ...

Page 13: ...nting hardware provided with the antenna Outdoor placement is especially important if the building is of metal construction or has metal siding If necessary you can mount an antenna inside a building however indoor placement reduces the antenna s effective range For indoor antenna use try to mount antenna near a window with line of sight to opposite bridge To ensure the physical safety of anyone n...

Page 14: ...ssary such an arrangement helps to ensure a strong signal Ensure that access is available for routing the antenna cable from the antenna to the bridge Make certain that the antenna and antenna mast are appropriately grounded Proper grounding prevents injury or damage from lightning strikes To minimize risk of damage to your network equipment install and properly ground the included lightning arres...

Page 15: ...ective range To ensure the physical safety of anyone near the antenna and to prevent damage to the bridge follow the building codes for antenna installations in your area This is another good reason to make sure that only a professional performs the installation Keep in mind that in order to comply with FCC radio frequency radiation exposure guidelines a minimum body to antenna distance of 2 meter...

Page 16: ... helps to ensure a strong signal As mentioned earlier this is not always possible in long distance configurations Any two bridge units that are to communicate with each other must be set for the same polarization either horizontally or vertically If cross polarization occurs the link with either work poorly or not at all Please refer to the Polarization section of the User Guide for further detail...

Page 17: ...pose restrictions on the use of specific combinations of Low loss antenna cables and indoor antennas Radio channels selected at the radios that are connected to specific indoor antennas Note A basic rule for selecting a combination of cables and antennas is that no combination is allowed unless explicitly approved in the 3Com wireless bridge User Guide for your product Therefore always use 3Com re...

Page 18: ...E497 4dBi bi directional Antenna Cables NOTE Because of power level restrictions use of the 3CWE495 13dBi and 3CWE496 18dBi antennas is not allowed in some countries The highest allowable power level is set automatically when you configure antenna selection after installing the bridge To comply with power restrictions identical antennas using 6 foot cable must be separated by at lease the minimum ...

Page 19: ...ource and the Local Network Connect a twisted pair CAT5 Ethernet cable from the To Hub Switch port of the PoE Adapter to a free port on the hub or switch within the local network 3CRWE920G73 Indoor Wireless Bridge 3CRWEASYG73 Outdoor Wireless Bridge ...

Page 20: ...ld light up On the front of the Wireless Bridge you will find three LEDs POWER WIRELESS ETHERNET 1 POWER LED Off Power supply connection not available or broken On Power supply connection OK 2 WIRELESS activity LED Off No activity Blinking Sending and receiving data 3 ETHERNET LAN link LED Off No LAN connection available On LAN connection OK ...

Page 21: ...aemon Server Tool a firmware upgrade tool that can act in four different capacities As a TFTP Server necessary for firmware upgrades and backup and restore functions Use this option if you do not have a TFTP server set up As a SysLog Server which is necessary to view SysLog messages As an optional TFTP Client As an optional FTP Server NOTE It is recommended that you install the 3CDaemon Server too...

Page 22: ...Wireless Bridge in the list box and then click the Configure button If 3Com Wireless Infrastructure Device Manager WIDMAN finds that your PC cannot connect to the Wireless Bridge by IP it would pop up a dialog requesting that you change the IP address of the device Then the utility will prompt you to enter the password of the bridge Note default password is blank NOTE It can take up to 60 seconds ...

Page 23: ...ill setup the username password for administrator access And you will select Country antenna and cable Settings on this page as well NOTE 1 Default USERNAME and PASSWORD are both admin 2 Antenna and Cable settings only apply to indoor bridge After changing these settings you will be redirected to the Login page Please input the username and password that you setup on the initial page and then you ...

Page 24: ...nected to power Wired to the network associating with the wireless network or in some cases with the bridge connected directly to the computer Before you connect to the device using the Diagnostic Utility make sure the device IP address is in the same subnet with your computer To use the Diagnostic Utility launch it by selecting Start Programs Diagnostic Utility Diagnostic Utility The Diagnostic U...

Page 25: ...3Com Corporation Page 24 Figure 2 Diagnostic Utility Main Page On the SysInfo page you will see the system uptime bridge MAC address and the Firmware version number ...

Page 26: ...3Com Corporation Page 25 To check the system performance information click the Performance tab Figure 3 System Performances The Performance tab displays the CPU and memory usage information ...

Page 27: ... WDS link information click the WDS Info tab Figure 4 WDS Information On the WDS Info tab select a WDS link from the drop down menu to see statistics for that link If there is no WDS link for the wireless bridge the list box will be empty ...

Page 28: ...ation Page 27 To check the interface statistics click the Interface Info tab Figure 5 Interfaces Information The Interface Info page displays the Ethernet and Wireless interface information of the wireless bridge ...

Page 29: ...ng is required to do scanning This can be input in the pop up dialog Figure 6 Site Survey The Site Survey page displays all other wireless sites Contents of CD The CD ROM which is enclosed in the package should include the following contents 3Com 802 11g 54Mbps Wireless LAN Building to Building Bridge User Guide MIB Directory Includes 3Com MIBs for Network Management usage Diagnostic Utility 3Com ...

Page 30: ...ble 2 Open a Web browser on the computer 3 In the Address or Location field enter the IP address of a Bridge on the network For example if the IP address is 192 168 1 1 type http 192 168 1 1 to access the Web Manager 4 Press the Enter key the First Welcome Screen appears Figure 7 Welcome Page 5 Set the administrator name password Country and for the indoor bridge Antenna and Cable selection Next p...

Page 31: ...nch your browser and enter the IP address of your Wireless Bridge in the address field The network identification dialogue appears Figure 8 Login Page Enter the administrator name and password and then press the Login button The Web Manager User interface Device Summary will be displayed as follows Figure 9 Device Summary ...

Page 32: ...K or AES PSK Wireless Setup You can now enter the SSID and choose the radio channel Figure 10 Wireless Settings Wireless Network name SSID specify the unique name for your wireless bridge Radio Channel select the channel that the bridge will use to transmit and receive information Back click return to the previous wizard page Next click to continue the bridge setup process Cancel click to cancel t...

Page 33: ...connection You can select WEP WPA PSK TKIP WPA PSK AES or No security for your device If no security is needed simply choose the None radio button Figure 11 Security Settings Back return to the previous wizard page Next continue the bridge setup process Cancel cancel the bridge setup process ...

Page 34: ... F and a f pairs e g 00 11 22 33 44 55 66 77 88 99 AA BB CC for the 128 bits WEP encryption To continue the setup wizard click the Next button and the Confirm Settings page will appear WPA PSK TKIP If you want to choose TKIP PSK encryption select the WPA PSK TKIP radio button in the Security Setup page and click the Next button to configure the TKIP PSK Phrase Figure 13 WPA PSK TKIP Settings Phras...

Page 35: ...Settings Select the bridges whose channel is the same as your bridge and then click Next button Back return to the previous wizard page Next continue the bridge setup process Cancel cancel the bridge setup process NOTE All WDS links use the same security settings ...

Page 36: ...ompleted click the Finish button to complete the Setup Wizard Figure 16 Confirm Settings This Page shows the settings summary of Setup Wizard configuration Back return to the previous wizard page Finished to complete the setup wizard Cancel cancel the bridge setup process ...

Page 37: ...aracters Location Password specify new password value used for user authentication in the system 1 60 characters Contact specify the name of the person company responsible for the wireless bridge 1 60 characters 3C number 3C number of this bridge It cannot be changed Firmware version The version of current firmware Hardware Version displays the version number of the software firmware that controls...

Page 38: ...is bridge LAN Subnet Mask Show subnet mask of the IP address LAN Default Gateway Show the gateway IP address of this bridge DHCP Server Show if the DHCP server is enabled DHCP Range Show the IP address range in the DHCP Server IP pool Lease Time Show the period over which a network address is allocated to a DHCP client Verify Address Probes the network for conflicting IP addresses before giving a ...

Page 39: ...bridges devices If you wish to operate more than one bridge in overlapping coverage areas we recommend a distance of at least four channels between the chosen channels For example for three bridges in close proximity choose channels 1 6 and 11 Broadcast SSID when selected your bridge s SSID is visible in the networks list while scanning the available networks for wireless client When unselected th...

Page 40: ...n threshold are fragmented i e split into smaller units suitable for the circuit size Packets smaller than the specified fragmentation threshold value are not fragmented 256 2346 default 2346 2346 means that fragmentation is disabled Security Security summary displays the general information about wireless security Figure 20 Security Information Security Type Displays which security type this brid...

Page 41: ...s the changes you have made and loads them to the bridge so they are active If you do not use the Save Configuration operation and direct reboot device All the changes you have done will be lost and no changes will be applied to the bridge Figure 21 Save Configuration ...

Page 42: ...e s subnet mask digit and dots Default Gateway specify the IP address of the bridge s gateway digit and dots If you change the IP address manually make sure that the chosen IP address is free and belongs to the same IP subnet as the wired network otherwise you will lose the connection to the Wireless Bridge from your current PC If you enable the DHCP client via a Web browser the browser will loose...

Page 43: ...utton On to enable the DHCP server IP Pool Start Address the first IP address in the range of addresses that you want to assign IP Pool Start Address the last IP address in the range of addresses that you want to assign Lease Time the timeframe in which DHCP client can use the IP address When lease time is expired the client must request a DHCP IP address again Verify Address probes the network fo...

Page 44: ...ory setting and cannot be changed Wireless network name SSID is a unique name for your wireless network 1 32 characters The default SSID is 3Com you should change this to a personal wireless network name The SSID is important to identify bridge to bridge connections when choosing TKIP PSK or AES PSK as the security type All client bridges must have their client SSID settings configured and must us...

Page 45: ...Wireless Setup Advanced Basic Rate Set Mbps select the checkbox to set the Basic data rates at which the station may transmit and receive data Beacon Period milliseconds this setting specifies the amount of time between beacons in milliseconds A beacon is a packet broadcast by the bridge to synchronize the wireless network DTIM Period count this attribute specifies the number of beacon intervals t...

Page 46: ...kets smaller than the specified fragmentation threshold value are not fragmented 256 2346 default 2346 2346 means that fragmentation is disabled Cancel restore all previous values Apply save changed configuration Security The Wireless Security Settings Page shows the summary of wireless security settings which includes Wired Equivalent Privacy WEP WPA PSK TKIP and WPA PSK AES Click each for detail...

Page 47: ...red key as 26 Hex characters or 13 ASCII bytes Key Format choose the Key Format from the drop down menu Hex ASCII Pre shared Key Setting the WEP key for encrypting data 64bits and 128bits encryption are supported This value must be the same as on the host local and remote bridge s WPA PSK TKIP The Temporal Key Integrity Protocol TKIP pronounced tee kip is part of the IEEE 802 11i encryption standa...

Page 48: ...symmetric 128 bit block data encryption technique AES works at multiple network layers simultaneously Figure 30 WPA PSK AES Settings Phrase Setting the WPA PSK AES key for encrypting data 8 to 63 characters support This value must be the same as the one on remote bridge ...

Page 49: ... link between the remote and local bridges Cancel restore all previous values Apply save changed configuration The WDS mode is configured by selecting the WDS link peer bridges MAC address in each other s bridge configuration e g Web interface The radio channel and the operational rates in all WDS link peer bridges must be the same Bridges participating in a WDS network DO NOT have to be configure...

Page 50: ...plays the SSID of the bridge Data Rates displays the data rates that the bridge transmits data RSSI displays indicator for the signal strength of the link between the remote and local bridges Note usually 0 40 are perfect the worst is around 90 The value of RSSI changes depends on different antenna and environments Cancel restore all previous values Apply save changed configuration Note All WDS li...

Page 51: ... two wired networks BRIDGE1 can be configured to forward all data to BRIDGE2 BRIDGE1 and BRIDGE2 need to be changed to Bridge1 and Bridge2 Illustration figures need to be changed to reflect this as well Indoor Outdoor Choose the wireless MAC address of Bridge2 in the web configuration interface of Bridge1 menu WDS Links Choose the wireless MAC address of Bridge1 in the web configuration interface ...

Page 52: ...r between Bridge2 and Bridge3 Choose the Wireless MAC address Bridge2 and Bridge3 in the Bridge1 Web interface WDS Links menu under the Configuration Choose the Wireless MAC address Bridge1 in the Bridge2 web interface WDS Links menu under the Configuration Choose the Wireless MAC address Bridge1 in the Bridge3 Web interface WDS Links menu under the Configuration Select the same radio channel for ...

Page 53: ...e information of this bridge Device Name specify new name value used for user authentication in the system 1 60 characters Location Password specify new password value used for user authentication in the system 1 60 characters Contact specify the name of the person company responsible for the wireless bridge 1 60 characters Confirm Password re enter the new password to verify its accuracy Apply Ap...

Page 54: ...ration changes Figure 34 Change Administrator s Name and Password Name specify new name value used for user authentication in the system 3 16 characters New Password specify new password value used for user authentication in the system 3 16 characters Confirm Password re enter the new password to verify its accuracy Apply Apply administrator s password ...

Page 55: ...ion in the system 3 16 characters New Password specify new password value used for user authentication in the system 3 16 characters Confirm Password re enter the new password to verify its accuracy Apply Apply administrator s password Keep in mind that the Reset button will set the username and password back to default ...

Page 56: ...rward Delay is the time intervals in seconds in which all devices transmit a configuration message when this device becomes the root Hello Time is the time interval in seconds in which this device transmits a configuration message Max Age is the maximum time in seconds this device can wait without receiving a configuration message before attempting to reconfigure Priority is the priority of this d...

Page 57: ...able setting Wireless Bridge time manually The format of the setting time is year month day hourminute second such as 2000 01 01 20 01 30 Get Local Time Click button Get Local Time the time of the PC which the web client is running in can be pulled into input box automatically Figure 38 Set Time Automatically None deny setting Wireless Bridge time manually System Time Zone Specify the Time Zone th...

Page 58: ...r more SNMP managers We provide two versions SNMP Management way SNMP V1 and SNMP V3 SNMP V3 is more security than V1 Figure 39 SNMP Settings SNMP V1 PARAMETERS Read only Community is a community string used to access the device by SNMP with only get operation Read Write Community is a community string used to access the bridge by SNMP with get and set operations SNMP V3 PARAMETERS In this version...

Page 59: ...ut SNMP Trap information to this host To add a host into this list specify the SNMP manager IP address And then click the Add button To delete a host from the SNMP Trap Host list select the host IP address that should be deleted and then click the Delete button Figure 40 SNMP Trap Settings ...

Page 60: ...iguration via HTTP Figure 41 Backup Restore configuration via HTTP Click the Browser button to select a configuration file and then click the Restore button to upload it to the device by HTTP protocol Or click the backup button to download the configuration file from device ...

Page 61: ...gned is in service first If it is not the backup or restore will not be successful and could damage the bridge Figure 42 Backup Restore configuration via TFTP TFTP Server IP Address The TFTP Server s IP Address File Name The configure file s name you backup or restore Apply Apply the TFTP Server Settings Backup Backup system configuration Restore Restore system configuration ...

Page 62: ... the backup or restore will not be successful and may damage the bridge Figure 43 Backup Restore configuration via FTP FTP Server IP Address The FTP Server s IP Address File Name The configure file s name you backup or restore User Name This user point to the ftp server account Password User s password Apply Apply the FTP Server Settings Backup Backup system configuration Restore Restore system co...

Page 63: ...Firmware via HTTP Figure 44 Firmware Upgrade via HTTP Click Browse Button and select the firmware file Then the Upgrade button will be active automatically and click it After you confirm upgrade Firmware Upgrade will begin and this page will jump to the page shown below which will show the upgrade process Figure 45 Firmware Upgrade Process ...

Page 64: ...ver which you assigned is in service first If it is not the upgrade will not be successful and may damage the bridge Figure 46 Firmware Upgrade via TFTP TFTP Server IP Address The TFTP Server s IP Address File Name The configure file s name you backup or restore Apply Apply the TFTP Server Settings Upgrade Upgrade System software ...

Page 65: ...ess The FTP Server s IP Address File Name The configure file s name you backup or restore User Name This user point to the ftp server account Password User s password Apply Apply the FTP Server Settings Upgrade Upgrade Firmware image When the upgrade is completed successfully a confirmation message will appear and the bridge restarts Do not switch off and do not disconnect the Wireless Bridge from...

Page 66: ...he device will reboot after you confirm Reboot will power down and power up the Bridge It will not reset any configuration settings Reset Figure 49 Reset Wireless Bridge Click Reset button the device will reset after you confirm CAUTION All configuration settings will be reset to factory ...

Page 67: ...es Level shows how important the event or how critical the error is Emergency Alert Critical Error Warning Notice Info Debug Facility indicates the unique identifier of the facility that generated the event A facility can be a hardware device a protocol or a module of the system software Kernel User Security Clock LogAudit LogAlert System Network Wlan management ID indicates an internal number for...

Page 68: ...to an log server by setting the Remote Log Server Figure 51 Event Log Setup TFTP Server IP Address The TFTP Server s IP Address File Name The configure file s name you backup or restore Apply Apply the TFTP Server Settings Backup Backup system logs via TFTP Syslogs Server You can active the automatically backup function by enable On button or inactive it by clicking Off button Syslogs Server IP Ad...

Page 69: ...e can filter logs by Logs Category Second one can filter logs by Logs level You could make the kernel to generate the event logs that you are interested by selecting the combinations of check boxes in category and level Figure 52 Event Log Filter Apply Apply the Logs Filter Settings ...

Page 70: ...amount of received bytes on the interface including framing characters InUcast totals unicast frames received at the port excluding discards InMcast totals multicast frames received at the port excluding discards OutOctets shows the total transmitted frames of the interface in bytes including framing characters OutUcast totals unicast frames transmitted from the port including discards OutMcast to...

Page 71: ...itted MSDU after one or more retransmissions Multi Retry Count displays the number of successfully transmitted MSDU after more than one retransmission Duplicate Frames displays the total of duplicate frames RTS Success Count displays the total of successfully received RTS packets RTS Failure Count displays total of not received RTS packets ACK Failure Count displays total of expected but not recei...

Page 72: ... root of the spanning tree Max Age is the maximum time in seconds this device can wait without receiving a configuration message before attempting to reconfigure Hello Time is the time interval in seconds at which this device transmits a configuration message Forward Delay is the time in seconds this device will wait before changing states Priority is the priority of this device It is a part of th...

Page 73: ...of the port on this switch that is closest to the root This switch communicates with the root device through this port This is 0 if your bridge is the root device Refresh Refresh local page and all the statistics STP Port This page shows the status of STP Spanning Tree Protocol function Figure 56 Spanning Tree Protocol Status Peers Address displays the MAC address of the remote WDS bridge s Name T...

Page 74: ...ork values are restored NOTE on the outdoor bridge the RESET button is located on the PCB behind the removable panel Once the panel is removed the reset button is located next to the CAT5 connection on the PCB 2 After it starts up use 3Com Wireless Infrastructure Device Manager WIDMAN to discover the wireless bridge Setting IP Address Using 3Com Wireless Infrastructure Device Manager Use the follo...

Page 75: ...nager WIDMAN discover the wireless bridge 2 Double click the wireless bridge logo listed in the list box 3 If the 3Com Wireless Infrastructure Device Manager WIDMAN found the wireless bridge but could not be access it by it s IP the 3Com Wireless Infrastructure Device Manager WIDMAN will pop up a dialog for configuring the wireless bridge IP address 4 Enter an IP address and subnet mask then click...

Page 76: ...rough 11 can be used indoors and outdoors Users are responsible for ensuring that the channel set configuration compiles with the regulatory standards of Mexico France is included in the EMEA regulatory domain however only channels 10 through 13 can be used in France Users are responsible for ensuring that the channel set configuration compiles with the regulatory standards of France ...

Page 77: ...mm 4 8 x 3 3 x 1 5 in L x W x D Weight 350g includes mounting kit Environment Specification Outdoor 3CRWEASYG73 Temperature 33 to 50 Humidity Up to 95 Indoor 3CRWE920G73 Temperature 20 to 65 Humidity Up to 95 Power Supply Power Adaptor Power over Ethernet IEEE 802 3af compliant power injector Spec INPUT AC 100 240V 50 60Hz 500mA OUTPUT DC 48V 400mA Mechanical Specification Outdoor Ruggedized IPX4 ...

Page 78: ...ith Point to Point and Point to Multi Point connections Support WDS Supports WPA PSK with TKIP or AES Advanced Encryption Standard encryption 64 128 bit WEP DHCP Server Client Hide SSID Broadcast Web Management Interface NTP Client SNMP Management MIBII 802 11MIB Private MIB Remote software upgrade ...

Page 79: ... Technically the difference in Hertz Hz between the highest and lowest frequencies of a transmission channel However as typically used the amount of data that can be sent through a given communication circuit For example typical Ethernet has a bandwidth of 100Mbps bps bits per second A measure of the data transmission rate D DHCP Dynamic Host Configuration Protocol DHCP is a communications protoco...

Page 80: ...ocol by which data is sent from one computer to another on the Internet Each computer known as a host on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet When you send or receive data for example an e mail note or a Web page the message gets divided into little chunks called packets Each of these packets contains both the sender s Intern...

Page 81: ...net protocol IP and is designed to handle others It is sometimes considered a member of the TCP IP suite of protocols Relative to the Open Systems Interconnection OSI reference model PPP provides layer 2 data link layer service Essentially it packages your computer s TCP IP packets and forwards them to the server where they can actually be put on the Internet PPP is a full duplex protocol that can...

Page 82: ... the Internet Protocol IP to send data in the form of message units between computers over the Internet While IP takes care of handling the actual delivery of the data TCP takes care of keeping track of the individual units of data called packets that a message is divided into for efficient routing through the Internet TCP is a connection oriented protocol which means that a connection is establis...

Page 83: ... distinguishes a broader telecommunication structure from a local area network LAN A wide area network may be privately owned or rented but the term usually connotes the inclusion of public shared user networks An intermediate form of network in terms of geography is a metropolitan area network MAN WDS The Wireless Bridge supports WDS Wireless Distribution System to act as bridges or repeaters WPA...

Page 84: ...nt and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received incl...

Page 85: ...re requirement 3 Effective power output According to US Rule CFR 47 part 15 Section 15 247 Operation within the bands 902 928 MHz 2400 2483 5 MHz and 5725 5850 MHz the authorized maximum peak conducted output power at antenna terminal is 1 watt per the measurement procedure as described in the rule part Please refer to the related rules for detail 4 Installation procedure Please refer to user s ma...

Reviews: