User Manual

System Architecture and Protocol Guide – 9-05 2 © 2005 SkyPilot Networks, Inc.
Table of Contents
Introduction ....................................................................................................................................3
System Components .................................................................................................................3
Network Topologies.......................................................................................................................4
Point-to-Point/Multipoint ............................................................................................................ 4
Mesh..........................................................................................................................................4
RF Management .............................................................................................................................7
Eight-way Antenna Array...........................................................................................................7
Spectral Management ............................................................................................................... 8
Link Management ...................................................................................................................... 9
Per-link Data Rates for Different Modulation Types.................................................................. 9
SkyPilot Synchronous Mesh Protocol...................................................................................... 10
Quality of Service.........................................................................................................................12
Security Provisions......................................................................................................................14
Traffic Filtering.........................................................................................................................14
VLANs......................................................................................................................................15
Encryption and Authentication.................................................................................................15
Network Management..................................................................................................................16