Axcess Network Receiver Installation Guide User Manual
Page 45
![background image](/manuals/555119/45/background.png)
Network Receiver
© 2002, AXCESS Inc.
750.001.005 R0000
45
Appendix D: Network Receiver IP Configuration
Instructions
Introduction
The Network Receiver incorporates a small operating system that
provides a Unix™-like interface with a variety of commands. Several
of these commands will be utilized to configure the Network Receiver
for your use. Please refer to Appendix A for a complete description
of the available commands.
It will be imperative that the
Network Administrator
be brought into
the information loop prior to installing the equipment. That individual
will be the one to provide critical information that will be needed to
program the Network Receivers. For example he/she must provide
an IP Address and Subnet Mask for each unit to be put on the
network.
An
IP Address
is a number that identifies each sender or receiver of
information that is sent across a network.
A
subnet
is an identifiably separate part of a network, typically
represents all machines in a Local Area Network (LAN). A
subnet
mask
allows a router to quickly route data by blocking out unneeded
information in an IP address.
A
gateway
is a router between two dissimilar networks. It is also a
router that the host trusts to send data remotely.
The AXCESS Inc. Network Receiver has been factory-
configured to IP address “192.168.1.200”
Network Interface Log-File Maintenance
The Network Receiver’s ability to access a network or the internet is
possible due to a small on-board computer. The chip set on this
component maintains a
cumulative log
that is never erased by the
application software. Of 500K of available memory, only half (250K)
is available for non-program events such as logging, internal
processing, etc. Should free memory fall below 64K, available
memory will become critical. It is possible that, over time, this log file
will grow to a size such that memory is depleted and the entire file
system would have to be re-installed. These log files are small –
about 100 bits per boot-up.
Therefore, under normal conditions,
log size should not become an issue prior to a planned upgrade
in late March of 2001.