Axcess Network Receiver Installation Guide User Manual

Page 45

Advertising
background image

Network Receiver

© 2002, AXCESS Inc.

750.001.005 R0000

45

Appendix D: Network Receiver IP Configuration

Instructions

Introduction

The Network Receiver incorporates a small operating system that

provides a Unix™-like interface with a variety of commands. Several

of these commands will be utilized to configure the Network Receiver

for your use. Please refer to Appendix A for a complete description

of the available commands.

It will be imperative that the

Network Administrator

be brought into

the information loop prior to installing the equipment. That individual

will be the one to provide critical information that will be needed to

program the Network Receivers. For example he/she must provide

an IP Address and Subnet Mask for each unit to be put on the

network.

An

IP Address

is a number that identifies each sender or receiver of

information that is sent across a network.

A

subnet

is an identifiably separate part of a network, typically

represents all machines in a Local Area Network (LAN). A

subnet

mask

allows a router to quickly route data by blocking out unneeded

information in an IP address.

A

gateway

is a router between two dissimilar networks. It is also a

router that the host trusts to send data remotely.

The AXCESS Inc. Network Receiver has been factory-

configured to IP address “192.168.1.200”

Network Interface Log-File Maintenance

The Network Receiver’s ability to access a network or the internet is

possible due to a small on-board computer. The chip set on this

component maintains a

cumulative log

that is never erased by the

application software. Of 500K of available memory, only half (250K)

is available for non-program events such as logging, internal

processing, etc. Should free memory fall below 64K, available

memory will become critical. It is possible that, over time, this log file

will grow to a size such that memory is depleted and the entire file

system would have to be re-installed. These log files are small –

about 100 bits per boot-up.

Therefore, under normal conditions,

log size should not become an issue prior to a planned upgrade

in late March of 2001.

Advertising