User's Manual
Table Of Contents
- Your Feedback Please
- How to Contact Us
- ProSoft Technology® Product Documentation
- Important Safety Information
- Recommended Antennas
- Antenna spacing requirements for user safety
- 1 Start Here
- 2 RLX2 Quick Setup
- 3 Planning the Network
- 4 Installing the Radios
- 5 Diagnostics and Troubleshooting
- 6 Detailed Radio Configuration / Diagnostics
- 7 RadioLinx Industrial Hotspot Browser
- 8 Reference
- 8.1 Product Overview
- 8.2 Compatibility with ProSoft RLXIB Series Radios
- 8.3 Dimensional Drawings
- Master Channel-Frequency Table
- 8.4 FCC Emission Regulations
- 8.5 Radio hardware
- 8.6 RLX2-IHA Detailed Specifications
- 8.7 RLX2-IHG Detailed Specifications
- 8.8 RLX2-IHNF Detailed Specifications
- 8.9 RLX2-IHW Detailed Specifications
- 9 Antenna Configuration
- 10 Support, Service & Warranty
- Glossary of Terms
- 802.11
- 802.11a
- 802.11b
- 802.11g
- 802.11i
- 802.11n
- Access Point
- Ad hoc Mode
- AES
- Amplifier
- Antenna
- ASCII
- Association
- Authenticate
- Authentication Server
- Band
- Bandwidth
- Base Station
- Baud Rate
- bps
- CACT
- Channel
- Channel Move Time
- Client, Radio Mode
- Client, Software
- Configuration PC
- dBi
- dBm
- DCE
- Decibel (dB)
- Default Gateway
- Device-to-Device Network (Peer-to-Peer Network)
- DFS
- DHCP
- Direct Sequence Spread Spectrum
- Directional Antenna
- Diversity Antenna
- DTE
- Dual Band
- EAP
- EIRP
- Encryption
- ESD
- ESSID
- Firmware
- Frequency Hopping
- Frequency Hopping Spread Spectrum
- Fresnel Zone
- Full-Duplex
- Gain
- Gateway
- Guard Interval (GI)
- Half-Duplex
- Hz
- IEEE
- IP Address
- Key
- LAN
- LED
- Line of Sight (LoS)
- Link point
- MAC ID
- Master device
- Mbps
- Megahertz
- MIC
- MIMO
- Modbus
- Modem
- Network
- Node
- Non-Occupancy Period
- Null Modem Cable
- Panel Antenna
- Parabolic Antenna
- Peer-to-Peer Network
- Point-Multipoint (Broadcast) Network
- Point-Multipoint (Modbus) Network
- Point-to-Multipoint
- Point-to-Point Network
- Poll
- Power Supply
- Protocol
- QoS
- Range
- Remote Access Point
- Remote device
- Repeater
- Repeater, Radio Mode
- RS-232
- RTU (Remote Terminal Unit)
- Sector Antenna
- Signal Diversity
- Signal Loss
- Signal Strength
- Simplex
- Site Survey
- Spectrum
- Spread Spectrum
- SSI
- Subnet Mask
- TKIP
- UART
- WAP
- WDS
- WEP
- Wi-Fi
- Wi-Fi CERTIFIED™
- Wi-Fi Interoperability Certificate
- Wi-Fi Protected Setup
- Wireless Gateway
- Wireless Network
- WLAN
- WPA
- WPA2
- Yagi Antenna
- Index
Support, Service & Warranty RLX2 Series ♦ 802.11a, b, g, n
User Manual Industrial Hotspot
Subnet Mask
A mask used to determine what subnet an IP address belongs to. An IP address
has two components: the network address, and the host (node or device)
address. For example, consider the IP address 150.215.017.009. Assuming this
is part of a Class B network (with a subnet mask of 255.255.0.0), the first two
numbers (150.215) represent the Class B network address, and the second two
numbers (017.009) identify a particular host on this network.
T
TKIP
Temporal Key Integrity Protocol. The wireless security encryption mechanism in
Wi-Fi Protected Access. TKIP uses a key hierarchy and key management
methodology that removes the predictability that intruders relied upon to exploit
the WEP key. In increases the size of the key from 40 to 128 bits and replaces
WEP’s single static key with keys that are dynamically generated and distributed
by an authentication server, providing some 500 trillion possible keys that can be
used on a given data packet. If also includes a Message Integrity Check (MIC),
designed to prevent the attacker from capturing data packets, altering them, and
resending them. By greatly expanding the size of keys, the number of keys in
use, and by creating an integrity checking mechanism, TKIP magnifies the
complexity and difficulty involved in decoding data on a Wi-Fi network. TKIP
greatly increases the strength and complexity of wireless encryption, making it far
more difficult (if not impossible) for a would-be intruder to break into a Wi-Fi
network.
U
UART
Universal Asynchronous Receiver/Transmitter
W
WAP
Wireless Application Protocol. A set of standards to enable wireless devices to
access internet services, such as the World Wide Web and email.
WDS
Wireless Distribution System. Enables access points to communicate with one
another in order to extend the range of a wireless networks. Used in 802.11g
based access points.
WEP
Wired-Equivalent Privacy protocol was specified in the IEEE 802.11 standard to
provide a WLAN with a minimal level of security and privacy comparable to a
typical wired LAN, using data encryption.
Page 156 of 161 ProSoft Technology, Inc.
November 29, 2012