User's Manual
Table Of Contents
- Your Feedback Please
- How to Contact Us
- ProSoft Technology® Product Documentation
- Important Safety Information
- Recommended Antennas
- Antenna spacing requirements for user safety
- 1 Start Here
- 2 RLX2 Quick Setup
- 3 Planning the Network
- 4 Installing the Radios
- 5 Diagnostics and Troubleshooting
- 6 Detailed Radio Configuration / Diagnostics
- 7 RadioLinx Industrial Hotspot Browser
- 8 Reference
- 8.1 Product Overview
- 8.2 Compatibility with ProSoft RLXIB Series Radios
- 8.3 Dimensional Drawings
- Master Channel-Frequency Table
- 8.4 FCC Emission Regulations
- 8.5 Radio hardware
- 8.6 RLX2-IHA Detailed Specifications
- 8.7 RLX2-IHG Detailed Specifications
- 8.8 RLX2-IHNF Detailed Specifications
- 8.9 RLX2-IHW Detailed Specifications
- 9 Antenna Configuration
- 10 Support, Service & Warranty
- Glossary of Terms
- 802.11
- 802.11a
- 802.11b
- 802.11g
- 802.11i
- 802.11n
- Access Point
- Ad hoc Mode
- AES
- Amplifier
- Antenna
- ASCII
- Association
- Authenticate
- Authentication Server
- Band
- Bandwidth
- Base Station
- Baud Rate
- bps
- CACT
- Channel
- Channel Move Time
- Client, Radio Mode
- Client, Software
- Configuration PC
- dBi
- dBm
- DCE
- Decibel (dB)
- Default Gateway
- Device-to-Device Network (Peer-to-Peer Network)
- DFS
- DHCP
- Direct Sequence Spread Spectrum
- Directional Antenna
- Diversity Antenna
- DTE
- Dual Band
- EAP
- EIRP
- Encryption
- ESD
- ESSID
- Firmware
- Frequency Hopping
- Frequency Hopping Spread Spectrum
- Fresnel Zone
- Full-Duplex
- Gain
- Gateway
- Guard Interval (GI)
- Half-Duplex
- Hz
- IEEE
- IP Address
- Key
- LAN
- LED
- Line of Sight (LoS)
- Link point
- MAC ID
- Master device
- Mbps
- Megahertz
- MIC
- MIMO
- Modbus
- Modem
- Network
- Node
- Non-Occupancy Period
- Null Modem Cable
- Panel Antenna
- Parabolic Antenna
- Peer-to-Peer Network
- Point-Multipoint (Broadcast) Network
- Point-Multipoint (Modbus) Network
- Point-to-Multipoint
- Point-to-Point Network
- Poll
- Power Supply
- Protocol
- QoS
- Range
- Remote Access Point
- Remote device
- Repeater
- Repeater, Radio Mode
- RS-232
- RTU (Remote Terminal Unit)
- Sector Antenna
- Signal Diversity
- Signal Loss
- Signal Strength
- Simplex
- Site Survey
- Spectrum
- Spread Spectrum
- SSI
- Subnet Mask
- TKIP
- UART
- WAP
- WDS
- WEP
- Wi-Fi
- Wi-Fi CERTIFIED™
- Wi-Fi Interoperability Certificate
- Wi-Fi Protected Setup
- Wireless Gateway
- Wireless Network
- WLAN
- WPA
- WPA2
- Yagi Antenna
- Index
RLX2 Series ♦ 802.11a, b, g, n Support, Service & Warranty
Industrial Hotspots User Manual
Wi-Fi
A certification mark managed by a trade group called the Wi-Fi Alliance. Wi-Fi
certification encompasses numerous standards including 802.11a, 802.11b,
802.11g, WPA, and more. Equipment must pass compatibility testing to receive
the Wi-Fi mark.
Wi-Fi CERTIFIED™
The certification standard designating IEEE 802.11-based wireless local area
network (WLAN) products that have passed interoperability testing requirements
developed and governed by the Wi-Fi alliance.
Wi-Fi Interoperability Certificate
A statement that a product has passed interoperability testing and will work with
other Wi-Fi CERTIFIED products.
Wi-Fi Protected Setup
Wi-Fi Protected Setup™ (previously called Wi-Fi Simple Config) is an optional
certification program developed by the Wi-Fi alliance designed to ease set up of
security enabled Wi-Fi networks in the home and small office environment. Wi-Fi
Protected Setup supports methods (pushing a button or entering a PIN into a
wizard-type application) that are familiar to most consumers to configure a
network and enable security.
Wireless Gateway
Term used to differentiate between an access point and a more-capable device
that can share an internet connection, serve DHCP, and bridge between wired
and wireless networks.
Wireless Network
Devices connected to a network using a centralized wireless access point.
WLAN
Wireless Local Area Network. A type of local area network in which data is sent
and received via high-frequency radio waves rather than cables or wires.
WPA
Wi-Fi Protected Access is a data encryption specification for 802.11 wireless
networks that replaces the weaker WEP. It improves on WEP by using dynamic
keys, Extensible Authentication Protocol to secure network access, and an
encryption method called Temporal Key Integrity Protocol (TKIP) to secure data
transmissions.
WPA2
An enhanced version of WPA. It is the official 802.11i standard. It uses Advanced
Encryption Standard instead of TKIP. AES supports 128-bit, 192-bit, and 256-bit
encryption keys.
ProSoft Technology, Inc. Page 157 of 161
November 29, 2012