User's Manual
Table Of Contents
- Chapter 1 Introduction
- Features and Benefits
- Equipment Features
- SPEEDLAN K2's Polling Protocol -- How it Works in Star Networks
- SPEEDLAN 9000 Mesh Protocol -- How It Works in Non-Line-of-Sight Networks
- Chapter 2 Installing the SPEEDLAN 9101 & SPEEDLAN 9102 Hardware
- Rooftop and Tower Installations Warning
- Hardware Overview
- Drawings of Outdoor, Remote-Mounted Components
- The SPEEDLAN 9101 (with an Attached Standard Omni)
- The SPEEDLAN 9102 (with an External Antenna)
- Chapter 3 Using the SPEEDLAN 9000 Configurator
- Initial Configuration of the SPEEDLAN 9000
- Overview of the SPEEDLAN 9000 Configurator Main Menu
- Logging on to the SPEEDLAN 9000 Configurator
- Interfaces
- System
- Routing
- Wireless
- DHCP Server
- DHCP Relay
- NAT
- Diagnostics & Troubleshooting
- Administrative Access Pages
- Chapter 4 Using SPEEDView
- What is SPEEDView?
- System Requirements
- Installation Instructions
- Starting SPEEDView
- The Program Instructions
- The Main Tab
- Options Tab
- Admin Tab
- Chapter 5 Basics of IP Addressing
- Basics of IP Addressing
- Glossary for Standard Data Communications
- Glossary for Standard Data Communications
- Software License Agreement
SPEEDLAN 9000 Series Installation and Operation User Guide
Glossary-16
Sidelobe
These are 20 dB lower than the main lobe, and it is critical from a performance standpoint that antennas are aligned with
respect to the main lobe. Failure to do so may cause the radio to be interfered with or the radio may interfere with other
systems.
Signal level
This is the value of the signal level at the receiving end of the transmission path.
Simple Network Management Protocol (SNMP)
The standard protocol for TCP/IP network management that has the most common worldwide use.
Site ID (Unique)
This is the alphanumeric site address given to the terminal by you (the user).
Spread Spectrum Technology (SST)
A method of encoding (with a PN code) a digital signal in a transmitter so as to spread it over a wide range of frequencies
so that the average signal power is close to the noise floor. The same code is known to the receiver and is used to decode
the signal. Keeping the code secret provides communications security.
Submask
This term allows you to mask section(s) (depending on the class specified) of the octets in the network address. Each octet
used in the subnet mask is assigned to a data link. The leftover octet(s) are assigned to the remaining nodes.
Subnet
This term allows you to create multiple networks within one Class A, B, or C network. Each data link (octet) contains its
own unique identifier also known as the subnet. Also, each node on the same data link must belong on the same subnet
as well.
Symbol Threshold
After a signal has been acquired, the acquisition algorithm in the spread-spectrum chip continues to run a cross-correla-
tion between the expected PN sequence and the received signal, but now uses the Symbol Threshold for comparison. If
the result of the cross-correlation drops below the Symbol Threshold, the signal is considered to have been lost, and the
algorithm begins trying to acquire the signal again.