Mettler Toledo Home
  Retail
  Trends
  Wrapping
  & Labeling
  IT
  Software
  Service
  Counter
  Service
  & Labels
Product Support

Search
  Table of Contents

 Frequently Asked Questions

Scale FAQs

Q: Is the 3-Com ECB (Mercury Module) the same item as theCB-1000 ?
A. Yes. The 3COM ECB and Symbol CB-1000 are similar items with different firmware.

Q: Could a customer take an 8461 Ethernet Scale, connect the 3-Com ECB/CB-1000, a PCMCIA and be able to communicate"?
A:
A kit is needed to provide power and attach the ECB/CB-1000. The kits are 09770099000(ECB) and 09770129000(CB-1000)

Q:  Does MT Scales support WEP?
A:
  Yes. With the correct 3COM ECB firmware (ver. 3.06 for 128-bit) the scales support both the 40-bit and 128-bit encryption with 802.11b standards.

Q: I have an Ethernet Scale, do I have to upgrade the scale firmware to support WEP?
A:
NO. The scales has no knowledge of the encryption.

Wireless Network FAQs

Q: What is IEEE 802.11?
A:
IEEE 802.11 is a family of specifications developed by the IEEE (Institute of Electrical and Electronics Engineers) for wireless LAN technology. 802.11 specifies an over-the-air interface between a wireless client and an access point (base station) or between two wireless clients.

Q: What is IEEE 802.11a?
A:
IEEE 802.11a is an extension to 802.11 that applies to wireless LANs and provides up to 54 Mbps in the 5GHz band.

Q: What is IEEE 802.1x?
A:
IEEE 802.1x is a standard designed to enhance the security of local area networks. 802.1X provides an authentication framework based on the Extensible Authentication Protocol (EAP) standard. The user is not allowed to transmit "normal" traffic until the authentication process has been successfully completed.

Q: What is 802.11b?
A:
IEEE 802.11b (also referred to as 802.11 High Rate or Wi-Fi) is a wireless networking standard created by the Institute of Electrical and Electronics Engineers (IEEE). The standard uses a method called Direct Sequence Spread Spectrum that allows a maximum data rate of 11 Mbps (with a fallback to 5.5, 2 and 1 Mbps) in the 2.4 GHz band.

Q: What is WEP?
A:
WEP stands for Wired Equivalent Privacy and adds encryption as a way of securing your wireless network: WEP uses either 40 or 128 bit keys that must match between Client and AP.

Q: What is an ESSID?
A:
ESSID stands for Extended Service Set Identifier and identifies the wireless LAN. The ESSID in the scale  must match the ESSID of the Access Point to be able  to communicate with the AP. The ESSID is a 32-character maximum string and is case-sensitive.

Q: What is a MAC address?
A:
MAC stands for Media Access Control. The MAC address is a 48-bit address (usually expressed as 12 hexadecimal digits) that is hard-corded into a network device (such as PCI Network cards, PCMCIA wireless cards) during the manufacturing process and cannot be changed by the user. I

Q.: What is LEAP?
A:
LEAP (Lightweight Extensible Authentication Protocol) is implementation of 802.1x (EAP) by CISCO, which includes a dynamic WEP process and sophisticated key management.

Q: What is Wi-Fi?
A:
The Wi-Fi logo signifies that a product is compliant with wireless networking equipment from other vendors. A Wi-Fi logo product has been tested and certified by the Wireless Ethernet Compatibility Alliance (WECA).

Q: Can I connect to another device using a WAN card?
A.
Yes, this is called "Ad Hoc" or "Point-to-Point" mode. A wireless connection between two mobile units is called an "Ad Hoc" network. This can be set in the Wireless Network utility. Keep in mind that to use this mode requires an application that can take advantage of an Ad Hoc connection.

Q: Can I prevent someone from looking at the WEP key on my device?
A.
The Symbol Status Utility is written such that once it is entered and applied, it will no longer be visible. Asterisks will appear in place of the hexadecimal digits.

Q: There is an option to set "Mandatory AP". What is it and when would it be used?
A.
Mandatory AP is used when you know specifically which AP you want to associate with. More often than not, this is used for testing rather than general use, when you would want to see performance under specific operating conditions.

Q: Can the Symbol Status Utility be used to perform a site survey?
A:
Yes, the Ping page allows a user to survey wireless coverage in a site that has one or more APs. This is done by pinging to a wired device to check coverage of all APs in the site or by pinging to a single AP to check its coverage. This page provides statistics on the data rate, the signal strength, and the round trip time to send and receive packets.

Q: What is Kerberos?
A.
Kerberos is a security protocol that authenticates users and clients in a wired network environment and to securely distribute encryption keys. Kerberos provides both user authentication and encryption key management to guard wired networks from all forms of attacks on data in transmission, including, interruption, interception, modification, and fabrication. This security system is going to be part of Symbol's Spectrum24 geared towards the 802.11b wireless VoIP handsets, enabled PDAs, handheld  mobile computing devices, and Laptops.