Frequently Asked Questions
Scale FAQs
Q: Is the 3-Com ECB (Mercury
Module) the same item as theCB-1000 ?
A. Yes. The 3COM ECB and
Symbol CB-1000 are similar items with different firmware.
Q: Could a customer take an 8461 Ethernet Scale, connect the 3-Com
ECB/CB-1000, a PCMCIA and be able to communicate"?
A: A kit is needed to provide power and attach the ECB/CB-1000. The
kits are 09770099000(ECB) and 09770129000(CB-1000)
Q: Does MT Scales support WEP?
A: Yes. With the correct 3COM ECB firmware (ver. 3.06 for 128-bit) the
scales support both the 40-bit and 128-bit encryption with 802.11b standards.
Q: I have an Ethernet Scale, do
I have to upgrade the scale firmware to support WEP?
A: NO. The scales has no knowledge of the encryption.
Wireless Network FAQs
Q: What is
IEEE 802.11?
A: IEEE 802.11 is a family of specifications developed by the IEEE
(Institute of Electrical and Electronics Engineers) for wireless LAN technology.
802.11 specifies an over-the-air interface between a wireless client and an
access point (base station) or between two wireless clients.
Q: What is
IEEE 802.11a?
A: IEEE 802.11a is an extension to 802.11 that applies to wireless LANs and
provides up to 54 Mbps in the 5GHz band.
Q: What is
IEEE 802.1x?
A: IEEE 802.1x is a standard designed to enhance the security of local area
networks. 802.1X provides an authentication framework based on the Extensible
Authentication Protocol (EAP) standard. The user is not allowed to transmit
"normal" traffic until the authentication process has been successfully
completed.
Q:
What is 802.11b?
A: IEEE 802.11b (also referred to as 802.11 High Rate or Wi-Fi) is a
wireless networking standard created by the Institute of Electrical and
Electronics Engineers (IEEE). The standard uses a method called Direct Sequence
Spread Spectrum that allows a maximum data rate of 11 Mbps (with a fallback to
5.5, 2 and 1 Mbps) in the 2.4 GHz band.
Q: What is WEP?
A: WEP stands for Wired Equivalent Privacy and adds encryption as a way of
securing your wireless network: WEP uses either 40 or 128 bit keys that must
match between Client and AP.
Q: What is an ESSID?
A: ESSID stands for Extended Service Set Identifier and identifies the
wireless LAN. The ESSID in the scale must match the ESSID of the Access
Point to be able to communicate with the AP. The ESSID is a 32-character
maximum string and is case-sensitive.
Q: What is a MAC address?
A: MAC stands for Media Access Control. The MAC address is a 48-bit address
(usually expressed as 12 hexadecimal digits) that is hard-corded into a network
device (such as PCI Network cards, PCMCIA wireless cards) during the
manufacturing process and cannot be changed by the user. I
Q.: What is LEAP?
A: LEAP (Lightweight Extensible Authentication Protocol) is implementation
of 802.1x (EAP) by CISCO, which includes a dynamic WEP process and sophisticated
key management.
Q: What is Wi-Fi?
A: The Wi-Fi logo signifies that a product is compliant with wireless
networking equipment from other vendors. A Wi-Fi logo product has been tested
and certified by the Wireless Ethernet Compatibility Alliance (WECA).
Q: Can I connect to another device using a WAN card?
A. Yes, this is called "Ad Hoc" or "Point-to-Point" mode. A wireless
connection between two mobile units is called an "Ad Hoc" network. This can be
set in the Wireless Network utility. Keep in mind that to use this mode requires
an application that can take advantage of an Ad Hoc connection.
Q: Can I prevent someone from looking at the WEP key on my device?
A. The Symbol Status Utility is written such that once it is entered and
applied, it will no longer be visible. Asterisks will appear in place of the
hexadecimal digits.
Q: There is an option to set "Mandatory AP". What is it and when would it
be used?
A. Mandatory AP is used when you know specifically which AP you want to
associate with. More often than not, this is used for testing rather than
general use, when you would want to see performance under specific operating
conditions.
Q: Can the Symbol Status Utility be used to perform a site survey?
A: Yes, the Ping page allows a user to survey wireless coverage in a site
that has one or more APs. This is done by pinging to a wired device to check
coverage of all APs in the site or by pinging to a single AP to check its
coverage. This page provides statistics on the data rate, the signal strength,
and the round trip time to send and receive packets.
Q: What is Kerberos?
A.
Kerberos is a
security protocol that authenticates users and clients in a wired network
environment and to securely distribute encryption keys. Kerberos provides both
user authentication and encryption key management to guard wired networks from
all forms of attacks on data in transmission, including, interruption,
interception, modification, and fabrication. This security system is going to be
part of Symbol's Spectrum24 geared towards the 802.11b wireless VoIP handsets,
enabled PDAs, handheld mobile computing devices, and Laptops.