background image

TANDBERG 

TANDBERG and Wireless LANs

 

1.  Overview Of Wireless Standards 

1.1  802.11 Wireless Ethernet 

Ethernet was pioneered by Xerox in the 1970’s and was in fact a registered trademark of 
Xerox Corporation.  After further development, the technology was improved and became 
known as Ethernet II.  Xerox, with the help from Digital and Intel began establishing and 
publishing the standards.  Realizing the international community would not recognize the 
standard, IEEE was charged with formalizing the standard along with other LAN 
technologies.  The 802 committee was assembled to investigate Ethernet, Token Ring, Fiber 
Optic, and other LAN technology.   

1.1.1  802.11a 

The 802.11a specification applies to wireless ATM systems and is primarily used in access 
hubs.  This specification operates at 5GHz and 6GHz.  By using a modulation scheme of 
orthogonal frequency division multiplexing (OFDM), 802.11a can achieve speeds up to 
54Mbps.  However, speeds of 6Mbps, 12Mbps and 24Mbps are more common.  

1.1.2  802.11b 

The 802.11b specification, also known as Wi-Fi, uses complementary code keying (CCK) 
phase-shift keying (PSK) instead of the traditional phase-shift keying (PSK) used in 802.11.  
The use of CCK allows for higher data speeds and less interference to multipath-propaga tion 
interference.  802.11b operates at 2.4GHz and allows for speeds up to 11Mbps. 

1.1.3  802.11g 

The 802.11g specification allows for speeds up to 54Mbps over short distances.  The 
802.11g standard also operates at 2.4GHz and is compatible with 802.11b. 
 

1.2  BlueTooth 

BlueTooth is another wireless standard named for the 10

th

 Century Viking king Harald 

Blåtand of Denmark.  The Bluetooth wireless specification defines a low-power, low-cost 
technology that provides a standardized platform for eliminating cables between  mobile 
devices and facilitating connections between products.  Bluetooth operates at the unlicensed 
2.4GHz frequency.  The standard uses a spread spectrum, frequency hopping, full-duplex 
signal at up to 1600 hops/sec. The signal hops among 79 frequencies at 1 MHz intervals to 
give a high degree of interference immunity. 
 

Summary of Contents for D12809

Page 1: ...This document is not to be reproduced in whole or in part without the permission in writing from TANDBERG TANDBERG and Wireless LANs ____________________________________ TANDBERG D12809 Rev 1 0 ...

Page 2: ...ETHERNET 3 1 1 1 802 11a 3 1 1 2 802 11b 3 1 1 3 802 11g 3 1 2 BLUETOOTH 3 2 TANDBERG S IMPLEMENTATION 4 2 1 SUPPORTED PC CARDS 4 2 2 FEATURES AND MENU SETTINGS 4 2 2 1 SSID Service Set Identification 4 2 2 2 Community 4 2 2 3 Mode 6 2 2 4 Security Encryption 6 3 APPLICATIONS 6 3 1 WHY WIRELESS 6 4 GLOSSARY 8 ...

Page 3: ...bps 12Mbps and 24Mbps are more common 1 1 2 802 11b The 802 11b specification also known as Wi Fi uses complementary code keying CCK phase shift keying PSK instead of the traditional phase shift keying PSK used in 802 11 The use of CCK allows for higher data speeds and less interference to multipath propagation interference 802 11b operates at 2 4GHz and allows for speeds up to 11Mbps 1 1 3 802 11...

Page 4: ...wireless network interface cards NIC and access point vendors TANDBERG recommends using the same vendor for both to minimize any possible interoperability problems B3 3 and later B4 and later Compaq WL110 v v Lucent Orinoco Silver v v Lucent Orinoco Gold v v Cisco Aironet 350 v 2 2 Features and Menu Settings The following features are available through the user interface for set up 2 2 1 SSID Serv...

Page 5: ...G and Wireless LANs The Community name also known as Nickname can be used to attach a TANDBERG unit to a specific access point when all access points share the same SSID The feature is not required to function properly ...

Page 6: ...ncryption This feature allows the wireless network to prevent an unauthorized person from using the network resources It is important to remember that the encryption keys in the access point and in the TANDBERG unit must match If the encryption keys do not match and the SSID is correct you will get an IP address but will not be able to transmit video and audio The encryption keys can be entered as...

Page 7: ...ent moves and changes Scalability Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations Configurations are easily changed and range from peer to peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area How Wireless LANs Are Used in the Real ...

Page 8: ... Extended SSID See SSID Infrastructure See Managed Managed A mode used to communicate to a 802 11b access point This mode is necessary to communicate to a wire LAN through an access point NIC Network Interface Card Peer to Peer See Adhoc SSID Service Set Identifier This defines a local network ID similar to a NT domain WEP Wired Equivalency Privacy This is an encryption standard that allows for se...

Reviews: