Page 24 - Security Today, October 2017
P. 24
Another method is to increase the installation height of both access points until there is no obstruction in view.
Applications
Point to Point
A common application for wireless bridging is for surveillance sys- tems where cabling is not an option. The installation can take place between two different buildings or from a building to a pole in a parking lot. Wireless bridge solutions are especially useful for proj- ects in remote locations.
Point to Multi-Point
A point to multi-point solution uses both omnidirectional and direc- tional access points. This is a popular solution because it can be more cost effective, as long as you do not require a large amount of bandwidth. When using a point to multi-point solution, bandwidth is shared with other outdoor access points in the network.
WDS Bridge Setup
WDS Bridge can be used to share internet access to a building that is not able to get internet otherwise. This is also a cost-effective solution since it does not require major rework of existing infrastruc- ture (in the building without internet access).
tated by the weaker radio specification. For best results, use the same model access point for your point-to-point bridge installation.
The FCC (and other government organizations) limits the trans- mit power of wireless products, which directly effects the maximum
wireless range. Some access points use uncommon and/or unlicensed frequencies to increase the distance or range. Using an unlicensed frequency has its benefits, but it locks you into a specific brand since it uses a unique and/or uncommon frequency.
For outdoor access points that are used to provide internet access to client devices, the range is limited by the client device and not the access point itself. On average, the range for client devices will be 50-300 feet.
Line of Sight
When installing access points, ensure that there is a direct line of sight from one AP to the other AP. There should be no obstructions of any kind, including other buildings or trees. If line of sight is compro- mised, there are alternative installation methods to consider such as wireless repeating, hub and spoke (point to multiple point), or adjust- ing installation location.
Wireless repeating or wireless hopping is where the connection is repeated from Building A to Building B to then reach Building C. Daisy chaining is not a recommended option as bandwidth will be lost with each wireless touch point. Depending on your application, it is not recommended to repeat more than once. Be sure you have enough bandwidth for your
specific project.
Emily Chae is the senior mar- keting manager at TRENDnet. Evan Davis is the senior man- ager of solutions engineering at TRENDnet.
WIRELESS TECHNOLOGY
CyberLock® ELECTRONIC ACCESS
CONTROL SOLUTION
RETROFIT MECHANICAL LOCKS WITH CYBERLOCK ELECTRONIC CYLINDERS
CYBERKEY BLUE 2
Access on the go! With Bluetooth® 4.2 wireless technology, pairs with any smart device running the CyberAudit® Link App. Internal memory contains encrypted access codes, a list of up to 12,000 locks it may access, schedules of authorized dates and times it may access, and a begin-end date range during which the key will operate. CYBERKEY BLUE 2 has Dual Mode operation (Classic or Bluetooth low energy options). Upgrade your mobility with the CYBERKEY BLUE 2!
VALIDIKEYTM 20 VAULT
The VALIDIKEY 20 Vault can program and dis- pense up to 20 keys. Unprogrammed CyberKeys are stored in the locked cabinet. Once an approved RFID card or PIN is presented, the cabinet door may be opened and a designated programmed key may be removed. The VALIDIKEY 20 also comes with an LCD screen which displays key status. VALIDIKEY 20 may operate as a stand-alone system or as a communicator in a CyberAudit® Enterprise system making it an optimal choice for medium to large scale facilities.
24
CONTROL AND MONITOR ACCESS: DOORS, CABINETS, AND GATES CYBERLOCK.COM/LOCK184 | 541.738.5500 | SALES@CYBERLOCK.COM
1017 | SECURITY TODAY Go to sp.hotims.com and enter 24 for product information. GCO3944