beautypg.com

KBC Networks WES User Manual

Page 19

background image

WES Mesh Wireless System Operations Manual


APPENDIX (CONTINUED)


MESH IP SCHEME
The mesh nodes are default configured to 192.168.1.10, 1.11, 1.12, etc. In streaming
CCTV applications, there are cameras attached to each of the nodes. It may be a
simpler set up to reconfigure the nodes so that each node is set on a multiple of 10 (i.e,
192.168.1.10, 192.168.1.20, 192.168.1.30, 192.168.1.40, etc.). Each connected
camera/video server could then be configured as follows: node- 192.168.1.20=
cameras- 192.168.1.21, 1.22, 1.23, etc. node- 192.168.1.30= cameras- 192.168.1.31,
1.32, 1.33, etc.

COMMAND PROMPT COMMANDS
During set up and/or trouble-shooting, KBC recommends using the Command Prompt
as the IP locating tool for the nodes. A regular ping will result in 4 replies. The following
commands are also useful:

Command

Function

ping (IP Address)

Response from Ethernet device at IP address

ping (IP Address) -t

Constant response from Ethernet device at IP address

arp -d *

Recommended command to flush the arp table

ipconfig

Identifies the TCP/IP settings of the computer

ipconfig/flushdns

Flushes DNS cache


GLOSSARY OF BASIC ETHERNET & WIRELESS TERMS
IP

Internet Protocol

http / https

hypertext transfer protocol (s= secure)

Packet

Formatted data unit which is carried by a network connection

Frame

The capsule in which the packet and link-layer info are transmitted

MAC Address

A unique identification number for each Ethernet device

Subnet

Distinctly addressed segment of a single IP network

IP Address

Numerical identification assigned to devices operating on a TCP/IP
network

802.11

Set of standards for wireless local area network (WLAN)
communication on the 2.4 and 5 GHz bands (as pertaining to KBC
wireless products)

Frequency Band Range of frequencies typically identified by FCC/IC or other

communications governing agencies allotments

802.11b

2.4 frequencies (up to 11Mbps)

802.11g

2.4 frequencies (up to 54 Mbps)

802.11a

5 GHz frequencies (up to 54 Mbps)

802.11a Turbo

5 GHz frequencies that combine throughput from adjacent
frequencies in order to provide additional throughput

Fresnel Zone

The three dimensional conceptualization of the antenna’s radiation
pattern

Line-of-Sight

An open area high above all obstructions clear enough so as not to

impede upon the Fresnel zone



A-3

WES Mesh Wireless System Operations Manual


APPENDIX (CONTINUED)


TECHNICAL RECOMMENDATIONS – MESH INTEGRATION
The following section of the appendix will help to ensure long term weatherproofing of
the Mesh nodes.

LAN PORT WEATHERPROOF STRAIN RELIEF
Each mesh node kit includes a strain relief assembly kit that protects the LAN port and
RJ-45 connector on the underside of the node. Ensure that each node has its strain
relief connected to the LAN port.

WEATHERPROOF TAPE
Each antenna port should be further protected with tape around the N-connectors of
the antenna and antenna port on the node. Note- this tape is not provided.

CAT5 CABLES
All exterior cabling should be outdoor rated Cat5e or 6. All cables should be pulled
through conduit if otherwise exposed. Indoor rated Cat5 or 6 can get brittle or the
connectors can corrode over time.

FURTHER PROTECTION
Silicon sealing can trap moisture condensation on open ports to the node. Do not over
seal the LAN port. Keep silicon protection minimal (with strain relief connector) so that
moisture is able to release. Silicon should not be used in lieu of proper weatherproof
seals.

POWER OVER ETHERNET
The Mesh node is not 802.11af compliant and requires the PIM which injects 12 volts
DC. The PIM should be located in a place that can be reached easily (in case of need to
cycle its power), however, within a reasonable length of cable (~50 meters) to the
node to avoid voltage issues.

ACCESSIBILITY
The node should be mounted high enough to achieve clear line-of-sight to the next
node. It is recommended to place the PIM or switch at a location that is accessible
without the need of a lift truck or large ladder. All products should be kept from foreign
accessibility so that an attacker cannot interfere with the security products.









A-4