05-4446A01, Rev. E
Mercury Reference Manual
17
The Network Name and the Association Process
The Network Name is the foundation for building individual radio net-
works. Remotes in a network with the same network name as an Access
Point (AP) unit are “associated” with that AP.
The use of a different Network Name does not guarantee an interfer-
ence-free system. It does, however, assure that only data destined for a
unique network is passed through to that network.
Co-Location for
Multiple Networks
It may be desirable to co-locate Access Points at one location to take
advantage of an excellent location that can serve two independent net-
works. Configure each network with a unique Network Name, and
install each AP’s antenna with at least 10 feet of vertical separation to
minimize RFI.
To co-locate APs, configure them with Time Division Duplex (TDD)
Sync set to
GPS Required
. Configure all APs that are within range of each
other with the same pattern, but with a unique Hop Pattern Offset. For
more information,
see “Frequency Control Menu”
on Page 67
.
NOTE:
Transceivers are shipped with the Network Name set to
MDS-Mercury
as a factory default.
Can radio frequency interference (RFI) disrupt my wireless
network?
When multiple radio networks operate in close physical proximity to
other wireless networks, individual units may not operate reliably under
weak signal conditions and may be influenced by strong radio signals on
adjacent bands. This radio frequency interference cannot be predicted
with certainty, and can only be determined by experimentation. If you
need to co-locate two units, start by using the largest possible vertical
antenna separation between the two AP antennas on the same support
structure. If that does not work, consult with your factory representative
about other techniques for controlling radio frequency interference
between the radios. (
See “A Word About Radio Interference” on
Page 170
for more details.)
1.5
GE MDS CYBER SECURITY SUITE
Today, the operation and management of an enterprise is increasingly
dependent on electronic information flow. An accompanying concern
becomes the cyber security of the communication infrastructure and the
security of the data itself.
Summary of Contents for Mercury 3650
Page 9: ...viii Mercury Reference Manual 05 4446A01 Rev E ...
Page 11: ...2 Mercury Reference Manual 05 4446A01 Rev E ...
Page 31: ...22 Mercury Reference Manual 05 4446A01 Rev E ...
Page 155: ...146 Mercury Reference Manual 05 4446A01 Rev E ...
Page 157: ...148 Mercury Reference Manual 05 4446A01 Rev E ...
Page 171: ...162 Mercury Reference Manual 05 4446A01 Rev E ...
Page 185: ...176 Mercury Reference Manual 05 4446A01 Rev E ...
Page 201: ...192 Mercury Reference Manual 05 4446A01 Rev E ...