background image

TANDBERG 

TANDBERG and Wireless LANs

 

2.2.3  Mode  

Requirement:  

Mandatory

 

 
The mode setting allows for two different modes of operation.  
 

Adhoc: 

 Also known as peer to peer and IBSS Ad Hoc.  This mode is used when 

communication is required between two units and an access point is not available.  
Additionally , if there is no need to communicate with a wired unit on a standard LAN, you 
can use this option.  This is similar to a ‘back to back’ Ethernet cable used to connect two IP 
enabled devices without a LAN. 
 

Managed:

  Also known as Infrastructure, Base Station, or Access Point.  When using an 

access point to connect a wired LAN to a wireless LAN.  This is the most popular 
application.  If this mode is used, the SSID in the TANDBERG unit must match the SSID in 
the access point. 
 

2.2.4  Security – Encryption 

The TANDBERG wireless 802.11b feature also supports Wired Equivalent Privacy (WEP) 
with the choice of 64-bit, 128-bit, or no encryption.  This feature allows the wireless network 
to prevent an unauthorized person from using the network resources.  It is important to 
remember that the encryption keys in the access point and in the TANDBERG unit must 
match.  If the encryption keys do not match, and the SSID is correct, you will get an IP 
address but will not be able to transmit video and audio. 
 
The encryption keys can be entered as a hexadecimal or as ASCII using a ‘*’ prefix.  
 
Example: 
 

Deffe57563dee 

hexadecimal 

 

*secretkey 

 

ASCII 

 
The 64-bit key can be 10 hexadecimals or ‘*’ + 5 ASCII characters.  The 128-bit keys can 
be 26 hexadecimals or ‘*’ + 13 ASCII characters. 
 
Additional security is offered in some access points by requiring the MAC addresses of the 
802.11b NIC cards to be registered in the access point.  Only units with the MAC 
addresses can use the access point. 
 

3.  Applications 

3.1  Why Wireless? 

The IP network is becoming a viable network for video conferencing.  Now that more 
companies are beginning to switch  to IP for their video conferencing needs, alternate 
methods of transmission are becoming necessary.  The use of wireless 802.11b is allowing 

Summary of Contents for D12809

Page 1: ...This document is not to be reproduced in whole or in part without the permission in writing from TANDBERG TANDBERG and Wireless LANs ____________________________________ TANDBERG D12809 Rev 1 0 ...

Page 2: ...ETHERNET 3 1 1 1 802 11a 3 1 1 2 802 11b 3 1 1 3 802 11g 3 1 2 BLUETOOTH 3 2 TANDBERG S IMPLEMENTATION 4 2 1 SUPPORTED PC CARDS 4 2 2 FEATURES AND MENU SETTINGS 4 2 2 1 SSID Service Set Identification 4 2 2 2 Community 4 2 2 3 Mode 6 2 2 4 Security Encryption 6 3 APPLICATIONS 6 3 1 WHY WIRELESS 6 4 GLOSSARY 8 ...

Page 3: ...bps 12Mbps and 24Mbps are more common 1 1 2 802 11b The 802 11b specification also known as Wi Fi uses complementary code keying CCK phase shift keying PSK instead of the traditional phase shift keying PSK used in 802 11 The use of CCK allows for higher data speeds and less interference to multipath propagation interference 802 11b operates at 2 4GHz and allows for speeds up to 11Mbps 1 1 3 802 11...

Page 4: ...wireless network interface cards NIC and access point vendors TANDBERG recommends using the same vendor for both to minimize any possible interoperability problems B3 3 and later B4 and later Compaq WL110 v v Lucent Orinoco Silver v v Lucent Orinoco Gold v v Cisco Aironet 350 v 2 2 Features and Menu Settings The following features are available through the user interface for set up 2 2 1 SSID Serv...

Page 5: ...G and Wireless LANs The Community name also known as Nickname can be used to attach a TANDBERG unit to a specific access point when all access points share the same SSID The feature is not required to function properly ...

Page 6: ...ncryption This feature allows the wireless network to prevent an unauthorized person from using the network resources It is important to remember that the encryption keys in the access point and in the TANDBERG unit must match If the encryption keys do not match and the SSID is correct you will get an IP address but will not be able to transmit video and audio The encryption keys can be entered as...

Page 7: ...ent moves and changes Scalability Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations Configurations are easily changed and range from peer to peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area How Wireless LANs Are Used in the Real ...

Page 8: ... Extended SSID See SSID Infrastructure See Managed Managed A mode used to communicate to a 802 11b access point This mode is necessary to communicate to a wire LAN through an access point NIC Network Interface Card Peer to Peer See Adhoc SSID Service Set Identifier This defines a local network ID similar to a NT domain WEP Wired Equivalency Privacy This is an encryption standard that allows for se...

Reviews: