Specifications
Chapter 1 Introduction Installation and Operation Manual
1-2 Overview Airmux-200 Ver. 1.750
• F59, 5.865–5.935 GHz
Several special systems are also available;
• AIRMUX-200-AIND, All Indoor unit, F58/FCC with 4T1 support.
AIRMUX-200-AIND integrates the ODU and the IDU-E into a single 19" IDU-E
box.
• AIRMUX-200-L, Ethernet only units powered over the Ethernet via PoE unit.
Available in F23, F24, or F58 frequency ranges.
• AIRMUX-200-LC, ODU is equipped with special hardware for the collocation of
several units, using Hub Site Synchronization (HSS).
Features
Wireless Link
Airmux-200 delivers up to 48 Mbps air rate for Ethernet and E1/T1 traffic. The
system supports a variety of spectrum bands and can be configured to operate in
any channel in the band with a carrier step resolution of 5, 10, or 20 MHz.
Airmux-200 operation complies with ETSI, CSA, CN, UK, and the FCC 47CFR Part
15 and subpart C and E requirements.
Airmux-200 employs Time Division Duplex (TDD) transmission. This technology
simplifies the installation and configuration procedure. There is no need to plan
and to allocate separate channels for the uplink and downlink data streams.
Operation over 2.4 GHz and 5.x GHz bands is not affected by harsh weather
conditions, such as fog and heavy rain.
LAN Interface
The Airmux-200 LAN port provides 10/100BaseT interfaces with autonegotiation
and transparent VLAN support. Traffic handling is provided by a MAC-level
self-learning bridge.
TDM Interface
The Airmux-200 TDM interface accepts E1 or T1 traffic, supporting the following:
• Unframed operation (E1 and T1)
• AMI and B8ZS zero suppression (T1).
Advanced Encryption System
Airmux-200 (version 1.500 and above) ensures user's data security with one of
the most sophisticated commercially available combined encryption and
authentication techniques, CCM/AES. This technique combines message
authentication (preventing antispoofing and replay protection) with commercial
encryption, and complies with the IEEE 802.11i (phase iii) security
recommendations.
CCM/AES uses a symmetric 128-bit encryption key (EK), and a nonce, and
provides both message encryption and authenticating signature. The nonce
mechanism enables the receiver to remember already received genuine messages
and reject all replayed messages.