Solved

Antenna Elements

Posted on 2013-01-23
3
268 Views
Last Modified: 2013-02-23
Hi,

I'm assessing an AP which has 4 RPSM and is dual radio with RPSMA connectors for external Antennas.  I would like to use a antenna which is 3 element which has 3 pigtails.

Can anyone clarify if the each element represent a single transmit and receive chain and if for instance connecting all 3 RPSM sockets to antenna would result in 2 sets of transmit and receive chains (2 per radio)

Let me know if this is not clear enough
0
Comment
Question by:simonphoenix10
  • 2
3 Comments
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
Comment Utility
If you mean something like http://www.l-com.com/item.aspx?id=28947
those are 3 separate antennae, and connecting all 3 should result in 3 sets of transmit and receive chains per radio, if that's what its radios are capable of.
See http://en.wikipedia.org/wiki/IEEE_802.11n#Number_of_antennas

If you have 4 RP-SMA connectors on the AP, you might consider http://www.l-com.com/item.aspx?id=28246 instead... then you could use all 4 of them with one unit if you wanted to.
0
 

Author Comment

by:simonphoenix10
Comment Utility
Thanks any idea how this works for a 3x3x3 if using 3 element with both apps connect at 600mbps
0
 
LVL 44

Expert Comment

by:Darr247
Comment Utility
Well, yes... but what I don't understand is exactly what it is you're asking.  :-)
If you want to know if that's going to work for what you want, I have no idea.
I don't even know what antennae and APs you have, let alone where you plan on installing them.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now