User's Guide

PRODUCT PERFORMANCE
Q- What bandwidth can I expect?
A- Actual data throughput is approximately one-half the link rate at these ranges for 802.11
technology, which is standard for these types of products. Bluetooth throughput is
relatively consistent across the supported range.
Q- What Bluetooth profile(s) do you implement?
A- The LAN Access Profile is the first Bluetooth profile that is supported for the initial
Access/One Network release. The product architecture does allow for other Bluetooth
profiles to be supported, so as the need for support of other profiles is determined the
implementation will involve some level of development and testing effort.
Q- What Bluetooth devices may be used on an Access/One Network?
A- Any Bluetooth device that supports the Bluetooth SIG v1.1 standard with LAN Access
Profile.
Q- How many Network Server Modules do I need?
A- A single Network Server is needed for every eight (8) Network Nodes in the
Access/One Network, regardless of the RF technology is being used (802.11 or
Bluetooth). This rule applies whether the Network Nodes communicate with the
Network Server via wired Ethernet or wireless 802.11a. For traffic the Ethernet rule-of-
thumb applies: while Each Node can support up to 256 users per RF technology, for
optimal throughput target 20 users per RF per Node.
SYSTEM SOFTWARE AND OPERATION
Q- Describe the features in a Network Server.
A- The main features within the Network Server fall into three categories, discovery,
management and security.
The discovery category of features enables the Access/One Network elements to
automatically link themselves together enabling secure, reliable performance and
allowing IT administrators to install Network Nodes with minimal effort. The discovery
category also provides for complete user mobility within the Access/One Network.
There are two types of discovery mechanism within the Access/One Network:
infrastructure and user. Infrastructure discovery involves Access/One Network
automatic network construction, as well as self-healing. User discovery involves new
user authorization and mobility.
57