KBC Networks WES User Manual
Page 19

WES Mesh Wireless System Operations Manual
 
APPENDIX (CONTINUED) 
 
MESH IP SCHEME 
The mesh nodes are default configured to 192.168.1.10, 1.11, 1.12, etc. In streaming 
CCTV applications, there are cameras attached to each of the nodes. It may be a 
simpler set up to reconfigure the nodes so that each node is set on a multiple of 10 (i.e, 
192.168.1.10, 192.168.1.20, 192.168.1.30, 192.168.1.40, etc.). Each connected 
camera/video server could then be configured as follows: node- 192.168.1.20= 
cameras- 192.168.1.21, 1.22, 1.23, etc. node- 192.168.1.30= cameras- 192.168.1.31, 
1.32, 1.33, etc. 
 
COMMAND PROMPT COMMANDS 
During set up and/or trouble-shooting, KBC recommends using the Command Prompt 
as the IP locating tool for the nodes. A regular ping will result in 4 replies. The following 
commands are also useful: 
 
Command 
Function
ping (IP Address)
Response from Ethernet device at IP address
ping (IP Address) -t
Constant response from Ethernet device at IP address
arp -d *
Recommended command to flush the arp table
ipconfig
Identifies the TCP/IP settings of the computer
ipconfig/flushdns
Flushes DNS cache
 
GLOSSARY OF BASIC ETHERNET & WIRELESS TERMS 
IP 
Internet Protocol
http / https
hypertext transfer protocol (s= secure)
Packet
Formatted data unit which is carried by a network connection
Frame
The capsule in which the packet and link-layer info are transmitted
MAC Address
A unique identification number for each Ethernet device
Subnet
Distinctly addressed segment of a single IP network
IP Address
Numerical identification assigned to devices operating on a TCP/IP 
network 
802.11
Set of standards for wireless local area network (WLAN) 
communication on the 2.4 and 5 GHz bands (as pertaining to KBC 
wireless products) 
Frequency Band Range of frequencies typically identified by FCC/IC or other
communications governing agencies allotments
802.11b
2.4 frequencies (up to 11Mbps)
802.11g
2.4 frequencies (up to 54 Mbps)
802.11a
5 GHz frequencies (up to 54 Mbps)
802.11a Turbo
5 GHz frequencies that combine throughput from adjacent 
frequencies in order to provide additional throughput 
Fresnel Zone
The three dimensional conceptualization of the antenna’s radiation 
pattern 
Line-of-Sight
An open area high above all obstructions clear enough so as not to
impede upon the Fresnel zone
 
 
A-3 
WES Mesh Wireless System Operations Manual
 
APPENDIX (CONTINUED) 
 
TECHNICAL RECOMMENDATIONS – MESH INTEGRATION 
The following section of the appendix will help to ensure long term weatherproofing of 
the Mesh nodes. 
 
LAN PORT WEATHERPROOF STRAIN RELIEF 
Each mesh node kit includes a strain relief assembly kit that protects the LAN port and 
RJ-45 connector on the underside of the node. Ensure that each node has its strain 
relief connected to the LAN port. 
 
WEATHERPROOF TAPE 
Each antenna port should be further protected with tape around the N-connectors of 
the antenna and antenna port on the node. Note- this tape is not provided. 
 
CAT5 CABLES 
All exterior cabling should be outdoor rated Cat5e or 6. All cables should be pulled 
through conduit if otherwise exposed. Indoor rated Cat5 or 6 can get brittle or the 
connectors can corrode over time. 
 
FURTHER PROTECTION 
Silicon sealing can trap moisture condensation on open ports to the node. Do not over 
seal the LAN port. Keep silicon protection minimal (with strain relief connector) so that 
moisture is able to release. Silicon should not be used in lieu of proper weatherproof 
seals. 
 
POWER OVER ETHERNET 
The Mesh node is not 802.11af compliant and requires the PIM which injects 12 volts 
DC. The PIM should be located in a place that can be reached easily (in case of need to 
cycle its power), however, within a reasonable length of cable (~50 meters) to the 
node to avoid voltage issues. 
 
ACCESSIBILITY 
The node should be mounted high enough to achieve clear line-of-sight to the next 
node. It is recommended to place the PIM or switch at a location that is accessible 
without the need of a lift truck or large ladder. All products should be kept from foreign 
accessibility so that an attacker cannot interfere with the security products. 
 
 
 
 
 
 
 
 
 
 
A-4 
