background image

 

47

Burst time 

Maximum burst time is a feature based on the PRISM Nitro; a new WLAN software solution that more than triples 
802.11g throughput in a mixed-mode environment and offers up to 50 percent greater throughput performance in 
802.11g-only networks. PRISM Nitro is fully IEEE 802.11 compliant and uses prioritization algorithms and enhanced 
protection mechanisms to significantly increase wireless networking performance.The recommended value for the 
maximum burst time for 11b or the mixed 11b/g environment is 650. The 11g only mode uses the value 1400.

 

 

Beacon Period 

 
In wireless networking, a beacon is a packet sent by a connected device to inform other devices of its presence and 
readiness. When a wirelessly networked device sends a beacon, it includes with it a beacon interval which specifies 
the period of time before it will send the beacon again. The interval tells receiving devices on the network how long 
they can wait in low-power mode before waking up to handle the beacon. Network managers can adjust the beacon 
interval, usually measured in milliseconds (ms) or its equivalent, kilo microseconds (K

μ

sec). 

 

 
DTIM interval 
 

A Delivery Traffic Indication Message (DTIM) is a signal sent as part of a beacon by an access point to a client device 
in sleep mode, alerting the device to a packet awaiting delivery. A DTIM interval, also known as a Data Beacon Rate, is 
the frequency at which an access point's beacon will include a DTIM. This frequency is usually measured in 
milliseconds (ms) or its equivalent, kilo microseconds (K

μ

sec).

 

 
 

802.11d 

 
802.11d is a wireless network communications specification for use in countries where systems using other standards 
in the 802.11 family are not allowed to operate. The 802.11d specification is well suited for systems that want to 
provide global roaming. 
 

ACK Timeout 
 

 

Summary of Contents for TT 900

Page 1: ...1 TT 900 User Manual 802 11b g 200mW ...

Page 2: ...ion Interface 13 Client Bridge Mode 13 Access Point Mode 30 Appendix A Warranty Policy 50 Appendix B RMA Policy 51 Appendix C Regulatory Information 52 Appendix D Contact Information 54 Appendix E WDS Explained 55 Appendix F TT900 Upgrade FAQ 57 Appendix G Antenna Diversity 59 Appendix H Troubleshooting 60 Appendix I Key Requirement Chart 61 Appendix J Glossary 62 ...

Page 3: ... B Digital Device pursuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment usage generates radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communication However there is no grantee that interference will no...

Page 4: ...nce and capacity but also supports all current pre IEEE 802 11i wireless security standards The TT900 is housed in a weather proof NEMA 4 enclosure supports high power 802 11 b g radio industrial grade construction multiple antenna options surge protection on the radio and PoE Power Over Ethernet adaptor and RoHS compliance TT5800 Product Photos TT900 PCB IEEE 802 11a miniPCI Card TT900 Enclosure ...

Page 5: ...MAC address filtering Provide 10 100M auto sensing MDI MDI X Ethernet port EzManager Support Product Specifications Main Chips CPU Ubicom IP3023 Radio Supports 802 11b g Atheros AR5414 Mechanical Chassis Dimension W x D x L 7 5 x 2 75 x 9 Board Specifications Specification Description Network Standard IEEE 802 11 b g IEEE 802 3 IEEE802 3x Ethernet 10 100BaseT Ethernet Auto MDI MDI X Network Archit...

Page 6: ...ps 22dBm 1 5dB 2Mbps 21dBm 1 5dB 5 5Mbps 20dBm 1 5dB 11Mbps IEEE 802 11g 23dBm 1 5dB 54Mbps 22dBm 1 5dB 48Mbps 21dBm 1 5dB 36Mbps 20dBm 1 5dB 1 24 Mbps Receiver Sensitivity IEEE 802 11b g Sensitivity 8 Packet Error Rate 54Mbps 72dBm 6Mbps 92dBm Modulation IEEE 802 11b DSSS 5 5 11 Mbps CCK 2 Mbps DQPSK 1 Mbps DBPSK IEEE 802 11g OFDM DSSS 48 54 Mbps QAM 64 24 36 Mbps QAM 16 12 18 Mbps QPSK 6 9 Mbps ...

Page 7: ...eatures Universal Bridging MAC Address Cloning RTS Threshold Fragmentation Threshold Infrastructure or Ad Hoc Mode Non IP Traffic Bridging Security Features 64 Bit 128 Bit WEP Encryption WPA Personal Using TKIP or AES WPA Enterprise Using TKIP or AES 802 1x Authenticator Cisco LEAP Support MAC Address Filter Management Features Web Access Username Password Protected Static IP Automatic Device Disc...

Page 8: ...ser can adjust output power through a drop down menu but cannot adjust the output power over the applicati on The EUT will be settled output power not greater than the application by Manufacturer Installation of this device should be accomplished only by a qualified wireless LAN system installer who is Knowledgeable of the use Installation and configuration procedures and associated networking com...

Page 9: ...ide of the PoE Injector via a straight Ethernet cable Cat 5 and then connect the NET side of the PoE Injector to either a computer or an Ethernet Switch Note The TT900 now fully supports the MDI MDI X standard and no longer requires the use of a cross over cable to connect directly with a computer 3 Connect the 48VDC power adapter to the power jack on the PoE injector to power on the TT900 4 Check...

Page 10: ...choose Network Connections Right click the Local Area Connection icon and then choose Properties from the menu You should see the Local Area Connection Properties dialog box shown below 2 Select the Internet Protocol TCP IP for your network card and then click Properties 3 In the opened dialog box choose Use the following IP address 4 Under the General tab choose Use the following IP address and t...

Page 11: ...11 5 Click OK to finish configuration ...

Page 12: ...rowser window and type in the factory default IP address in the URL Press Enter on your keyboard and a login prompt window similar to the one shown below will appear There is no default User name or Password Leave User name and Password field blank and click OK Note You may set a new password by clicking the Admin tab after you enter the Web Configuration page ...

Page 13: ...pages Information APs Wireless Security Admin and Advanced Detailed information for each section is provided below Access Points APs The APs section displays available hotspots in the area along with the MAC address SSID Channel Wireless mode signal strength and transmission rate for each access point ...

Page 14: ...14 Wireless ...

Page 15: ... s This option indicates the transmission rate of the bridge Specify the rate according to the speed of your wireless network from the list Most of the time the default setting Best automatic should be selected for best performance The setting can be adjusted manually if the link quality and signal strength are unusually low or high to get the best performance 802 11 Mode Wireless mode allows the ...

Page 16: ...work reliability 802 11b g Non overlapping Channel Frequency Ranges Channel 1 2 401 GHz 2 423 GHz Channel 6 2 426 GHz 2 448 GHz Channel 11 2 451 GHz 2 473 GHz Americas Wireless Channels 1 11 Asia Wireless Channels 1 14 Europe Wireless Channels 1 13 802 11a Wireless Channel Frequency Range 5 15 GHz 5 35 GHz 5 725 5 825 802 11a is an extension to 802 11 that applies to wireless LANs and provides up ...

Page 17: ...l 149 5 725 5 745 Channel 153 5 745 5 765 Channel 157 5 765 5 785 Channel 161 5 785 5 805 Channel 165 5 805 5 825 Special Atheros Turbo Mode Channels Use this setting only when both side of the wireless connection is using the Atheros chipset The radio will combine 2 free channels for the wireless transmission to double the bandwidth Channel 42 5 210 Channel 50 5 250 Channel 58 5 290 Channel 152 5...

Page 18: ...18 Security ...

Page 19: ... It can be implemented immediately and inexpensively as a software or firmware upgrade to most existing Wi Fi CERTIFIED access points and client devices with minimal degradation in network performance WPA offers standards based Wi Fi CERTIFIED security It assures users that the Wi Fi CERTIFIED devices they buy will be cross vendor compatible When properly installed WPA provides a high level of ass...

Page 20: ...eless local area networks WLANs defined in the 802 11b standard WEP is designed to provide the same level of security as that of a wired LAN Enable WEP To enable the WEP Authenticator Default WEP key to use WEP Key 1 4 Select the key to be used as the default key Data transmissions are always encrypted using the default key The other keys can only be used to decrypt received data Authentication Op...

Page 21: ...de with challenge text 3 The authentication initiating wireless node replies to the authenticating wireless node with the challenge text that is encrypted using WEP and an encryption key that is derived from the shared key authentication secret 4 The authentication result is positive if the authenticating wireless node determines that the decrypted challenge text matches the challenge text origina...

Page 22: ...e Option to enable or disable SNMP support Community The SNMP Read only Community string is like a user id or password that allows access to a router s or other device s statistics or management information InterMapper sends the community string along with all SNMP requests If the community string is correct the device responds with the requested information If the community string is incorrect th...

Page 23: ...nd 162 on the internal network Change this value to have InterMapper use the new string when querying SNMP devices IP Settings IP Address Mode Static o Manually setup an IP address for this device DHCP o Set up the bridge as a DHCP client which will pick up an IP address from a DHCP server Default IP address The default Client Bridge Mode IP address 192 168 10 241 Default subnet mask The factory s...

Page 24: ...chdog Utility Ping Watchdog Utility Enabled If enabled the Ping Watchdog utility tracks the TCP IP link between this device and another remote destination at the other end of the wireless link When the remote destination is unreachable loss of connection the Ping Watchdog Utility will reboot the unit in an attempt to re establish the connection When the TT is up for 2 minutes the ping watchdog uti...

Page 25: ...ter The TT900 has implemented a hardware modification authorization process to prevent use by fraudulent hardware from other manufacturers This will require any hardware change on the radio card used on the TT900 to input a serial code generated based on each unique MAC address Please contact Teletronics Support to a pickup a valid serial number to deactivate the pre registration protection after ...

Page 26: ...26 Advanced ...

Page 27: ...nsiderable overhead Disabling RTS CTS can reduce overhead and latency in WLANs where all stations are close together but can increase collisions and degrade performance in WLANs where stations are far apart and unable to sense each other to avoid collisions aka Hidden Nodes If you are experiencing excessive collisions you can try turning RTS CTS on or if already on reduce RTS CTS Threshold on the ...

Page 28: ...ait for a certain amount of time ACK timeout or ACK window If the ACK is NOT received within that timeout period then the packet will be re transmitted from Station A resulting in reduced throughput When sending LOTS of packets as in 802 11g and 802 11a the constant re transmission could cost severe performance degradation due to the ACK frame not making it back to 802 11 Station A in time This wi...

Page 29: ...type in the factory default IP address in the URL Press Enter on your keyboard and a login prompt window similar to the one shown below will appear There is no default User name or Password Leave User Name and Password field blank and then click OK Note You may set a new password by clicking the Admin tab after you enter the Web Configuration page ...

Page 30: ...ation Stations Wireless WDS Security Access Admin Advanced Detailed information on each section is provided below Stations The Stations section will display all the associated clients along with the MAC address and basic RF related information on the Mode Rate Signal and StationIdleTime for each associated client ...

Page 31: ...31 Wireless ...

Page 32: ...rformance 802 11 Mode Wireless mode allows the user to select whether this Access Point will connect to an 802 11b only network an 802 11g only network an 802 11a only network or both b g networks For b or g only wireless devices on the network selecting 802 11b or 802 11g only mode will provide better performance than mixed mode For TT900 the options of 802 11b 802 11g only or Mixed 802 11g and 8...

Page 33: ...s Channels 1 11 Asia Wireless Channels 1 14 Europe Wireless Channels 1 13 802 11a Wireless Channel Frequency Range 5 15 GHz 5 35 GHz 5 725 5 825 802 11a is an extension to 802 11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band 802 11a uses an orthogonal frequency division multiplexing encoding scheme rather than FHSS or DSSS Unlike that of 802 11b g 802 11a standard separ...

Page 34: ...5 5 785 Channel 161 5 785 5 805 Channel 165 5 805 5 825 Special Atheros Turbo Mode Channels Use this setting only when both side of the wireless connection is using the Atheros chipset The radio will combine 2 free channels for the wireless transmission to double the bandwidth Channel 42 5 210 Channel 50 5 250 Channel 58 5 290 Channel 152 5 760 Channel 160 5 800 ...

Page 35: ...eless network is thus extended for authenticated client devices that can roam from this Access Point to another WDS can extend the reach of your network into areas where cabling might be difficult The TT900 in Access Point mode can support up to 6 other Access Points for WDS communication Enter the MAC Address of other Access Points in the area that you want to add to the WDS The MAC Address of th...

Page 36: ...36 Security ...

Page 37: ... It can be implemented immediately and inexpensively as a software or firmware upgrade to most existing Wi Fi CERTIFIED access points and client devices with minimal degradation in network performance WPA offers standards based Wi Fi CERTIFIED security It assures users that the Wi Fi CERTIFIED devices they buy will be cross vendor compatible When properly installed WPA provides a high level of ass...

Page 38: ...ess point and client end WPA Group Key Update Interval The Group Key Group Transient Key is a shared key among all Supplicants connected to the same AP and is used to secure multicast broadcast traffic It is not used for normal unicast traffic A pair wise Transient Key secures the unicast traffic Group Key renewal controls how often the Group Transient Key is changed The Group Key renewal does not...

Page 39: ...MAC address Open system authentication is used when no authentication is required It is the default authentication algorithm Open system authentication uses the following process 1 The authentication initiating wireless client sends an IEEE 802 11 authentication management frame that contains its identity 2 The receiving wireless AP checks the initiating station s identity and sends back an authen...

Page 40: ...iginally sent in the second frame The authenticating wireless node sends the authentication result 10 Because the shared key authentication secret must be manually distributed and typed this method of authentication does not scale appropriately in large infrastructure network mode such as corporate campuses WEP key lengths 64 bit 10 Hex Digit WEP Key type Example 64 bit WEP with 5 characters Key1 ...

Page 41: ...trol Enable access control If enabled this feature allows you to associate up to 64 different units devices by MAC addresses Any MAC addresses not programmed into the list will be prohibited from associating with this unit ...

Page 42: ...42 Admin ...

Page 43: ...community string is set to public It is standard practice to change all the community strings so that outsiders cannot access read information about the internal network In addition the administrator may also employ firewalls to block any SNMP traffic to ports 161 and 162 on the internal network Change this value to have InterMapper use the new string when querying SNMP devices IP Settings IP Addr...

Page 44: ...P address input box Ping Watchdog Utility Ping Watchdog Utility Enabled If enabled the Ping Watchdog utility tracks the TCP IP link between this device and another remote destination at the other end of the wireless link When the remote destination is unreachable loss of connection the Ping Watchdog Utility will reboot the unit in an attempt to re establish the connection Destination IP address of...

Page 45: ...the Browse button to select a file from the host machine Register The TT900 has implemented a hardware modification authorization process to prevent use by fraudulent hardware from other manufacturers This will require any hardware change on the radio card used on the TT900 to input a serial code generated based on each unique MAC address Please contact Teletronics Support to a pickup a valid seri...

Page 46: ... increase overhead degrading maximum possible throughput so adjusting this parameter means striking a good balance between error rate and throughput RTS threshold RTS Threshold is the frame size above which an RTS CTS handshake will be performed before attempting to transmit RTS CTS asks for permission to transmit to reduce collisions but adds considerable overhead Disabling RTS CTS can reduce ove...

Page 47: ...es the period of time before it will send the beacon again The interval tells receiving devices on the network how long they can wait in low power mode before waking up to handle the beacon Network managers can adjust the beacon interval usually measured in milliseconds ms or its equivalent kilo microseconds Kμsec DTIM interval A Delivery Traffic Indication Message DTIM is a signal sent as part of...

Page 48: ...et will be re transmitted from Station A resulting in reduced throughput When sending lots of packets as in 802 11g and 802 11a the constant re transmission could cost severe performance degradation due to the ACK frame not making it back to 802 11 Station A in time This will have a dramatic impact on the throughput of the link regardless of signal strength or good receiver sensitivity Antenna Sel...

Page 49: ...r alteration or maintenance by any person or party other than a Teletronics International Inc employee or authorized service facility or any use in violation of instructions furnished by Teletronics International Inc This warranty is also rendered invalid if this product is removed from the country in which it was purchased if it is used in a country in which it is not registered for use or if it ...

Page 50: ...warranty applies 30 Day full refund or credit policy 1 Product was purchased from Teletronics no more than 30 day prior to the return request 2 All shipping charges associated with returned items are non refundable 3 Products are returned in their original condition along with any associated packaging accessories mounting hardware and manuals Any discrepancy could result in a delay or partial forf...

Page 51: ... If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to overcome the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment and receiver Connect the equipment into an outlet on a circuit diff...

Page 52: ...nts under article 3 2 of the R TTE Directive EN 301 489 1 V1 4 1 2002 EN 301 489 17 V1 2 1 2002 Electromagnetic compatibility and radio spectrum matters ERM electromagnetic compatibility EMC standard for radio equipment and services Part 1 Common technical requirements Part 17 Part 17 Specific conditions for 2 4 GHz wideband transmission systems and5 GHz high performance RLAN equipment Warning Acc...

Page 53: ...ow more about networking with Teletronics products Give us a call at 301 309 8500 or fax your request to 301 309 8551 For technical support issues you can e mail us at support teletronics com If any Teletronics product proves defective during its warranty period you can email the Teletronics Return Merchandise Authorization department to obtain a Return Authorization Number at rma teletronics com ...

Page 54: ...reless hotspots Please take a look at the following two WDS topology examples WDS in a Star Configuration This is the mode to use if you re expanding the hotspots in the area around your master AP that is connected to the WAN What you ll need to do is enable WDS and ACL on all the APs Then input each of the MAC addresses of Slave A B C into the Master AP under both the WDS and ACL section For the ...

Page 55: ...area in length AP A will have only AP B s MAC address in its WDS and ACL configuration setting AP B will have AP A and C s MAC address in its WDS and ACL configuration setting AP C will have AP B and D s MAC address in its WDS and ACL configuration setting AP D will have only AP C s MAC address in its WDS and ACL configuration setting ...

Page 56: ...ou received boards by default with firmware 3 1 X then you have the 2M version If you received boards by default with firmware 3 2 X or above then you have the 4M version If you were to upgrade a 4M unit with a 2M firmware the unit will show no change after the flashing process For each release we publish 2 series of firmware one for 2M version and one for 4M version Function and performance wise ...

Page 57: ...ll upgrade keep my previous configuration Although the upgrade might keep your previous configuration we suggest customer to reset the unit to factory default located in admin section and configure it again ...

Reviews: