Reference Manual

05-4446A01, Rev. E Mercury Reference Manual 17
The Network Name and the Association Process
The Network Name is the foundation for building individual radio net-
works. Remotes in a network with the same network name as an Access
Point (AP) unit are “associated” with that AP.
The use of a different Network Name does not guarantee an interfer-
ence-free system. It does, however, assure that only data destined for a
unique network is passed through to that network.
Co-Location for
Multiple Networks
It may be desirable to co-locate Access Points at one location to take
advantage of an excellent location that can serve two independent net-
works. Configure each network with a unique Network Name, and
install each AP’s antenna with at least 10 feet of vertical separation to
minimize RFI.
To co-locate APs, configure them with Time Division Duplex (TDD)
Sync set to
GPS Required. Configure all APs that are within range of each
other with the same pattern, but with a unique Hop Pattern Offset. For
more information,
see “Frequency Control Menu” on Page 67.
NOTE: Transceivers are shipped with the Network Name set to
MDS-Mercury as a factory default.
Can radio frequency interference (RFI) disrupt my wireless
network?
When multiple radio networks operate in close physical proximity to
other wireless networks, individual units may not operate reliably under
weak signal conditions and may be influenced by strong radio signals on
adjacent bands. This radio frequency interference cannot be predicted
with certainty, and can only be determined by experimentation. If you
need to co-locate two units, start by using the largest possible vertical
antenna separation between the two AP antennas on the same support
structure. If that does not work, consult with your factory representative
about other techniques for controlling radio frequency interference
between the radios. (
See “A Word About Radio Interference” on
Page 170 for more details.)
1.5 GE MDS CYBER SECURITY SUITE
Today, the operation and management of an enterprise is increasingly
dependent on electronic information flow. An accompanying concern
becomes the cyber security of the communication infrastructure and the
security of the data itself.