User's Manual

USER GUIDE
PRODUCT PERFORMANCE
Q- What bandwidth can I expect?
A- Actual data throughput is approximately one-half the link rate at these ranges for 802.11
technology, which is standard for these types of products.
Q- How many Network Server Modules do I need?
A- A single Network Server is needed for every eight (8) Network Nodes in the
Access/One Network, regardless of the RF technology is being used. This rule applies
whether the Network Nodes communicate with the Network Server via wired Ethernet
or wireless 802.11a. For traffic the Ethernet rule-of-thumb applies: while Each Node
can support up to 256 users per RF technology, for optimal throughput target 20 users
per RF per Node.
SYSTEM SOFTWARE AND OPERATION
Q- Describe the features in a Network Server.
A- The main features within the Network Server fall into three categories, discovery,
management and security.
The discovery category of features enables the Access/One Network elements to
automatically link themselves together enabling secure, reliable performance and
allowing IT administrators to install Network Nodes with minimal effort. The discovery
category also provides for complete user mobility within the Access/One Network.
There are two types of discovery mechanism within the Access/One Network:
infrastructure and user. Infrastructure discovery involves Access/One Network
automatic network construction, as well as self-healing. User discovery involves new
user authorization and mobility.
The management category of features provides the tools and facilities to monitor,
diagnose, configure, meter usage, and extend Access/One Network services so that
administration of the wireless network is minimal (occurs automatically), intuitive,
flexible and secure. These tools include configuration management, usage metering and
SNMP monitoring.
The security category of features protects the customer’s internal network resources
from unauthorized access through the Access/One Network, providing privacy for
wireless communications and mitigating the risk of denial-of-service and other similar
attacks.
53