DEFAULT LOGIN DETAILS
IP Address192.168.0.1
Usernameadmin
Passwordpassword
CVE-30360
3
ABOUT THIS USER’S GUIDE
ABOUT THIS USER’S GUIDE
INTENDED AUDIENCE
This manual is intended for people who want to configure the CVE-30360’s features
via its Graphical User Interface (GUI).
HOW TO USE THIS USER’S GUIDE
This manual contains information on each the CVE-30360’s GUI screens, and
describes how to use its various features.
Use the Introduction (page 15) to see an overview of the topics covered in this
manual.
Use the Table of Contents (page 7), List of Figures (page 11) and List of Tables
(page 13) to quickly find information about a particular GUI screen or topic.
Use the Index (page 95) to find information on a specific keyword.
Use the rest of this User’s Guide to see in-depth descriptions of the CVE-
30360’s features.
RELATED DOCUMENTATION
Quick Installation Guide: see this for information on getting your CVE-30360
up and running right away. It includes information on system requirements,
package contents, the installation procedure, and basic troubleshooting tips.
Online Help: each screen in the CVE-30360’s Graphical User Interface (GUI)
contains a Help button. Click this button to see additional information about
configuring the screen.
DOCUMENT CONVENTIONS
This User’s Guide uses various typographic conventions and styles to indicate
content type:
4
HITRON CVE-30360 USER’S GUIDE
Bulleted paragraphs are used to list items, and to indicate options.
1 Numbered paragraphs indicate procedural steps.
NOTE: Notes provide additional information on a subject.
Product labels, field labels, field choices, etc. are in bold type. For example:
A mouse click in the Graphical User Interface (GUI) is denoted by a right angle
bracket ( > ). For example:
means that you should click Settings in the GUI, then Advanced settings.
A key stroke is denoted by square brackets and uppercase text. For example:
Warnings provide information about actions that could harm
you or your device.
Select UDP to use the User Datagram Protocol.
Click Settings > Advanced Settings.
Press [ENTER] to continue.
CUSTOMER SUPPORT
For technical assistance or other customer support issues, please consult your Hitron
representative.
ABOUT THIS USER’S GUIDE
5
HITRON CVE-30360 USER’S GUIDE
Copyright 2011 Hitron Technologies. All rights reserved. All trademarks and
registered trademarks used are the properties of their respective owners.
DISCLAIMER: The information in this User’s Guide is accurate at the time of writing.
This User’s Guide is provided “as is” without express or implied warranty of any kind.
Neither Hitron Technologies nor its agents assume any liability for inaccuracies in this
User’s Guide, or losses incurred by use or misuse of the information in this User’s
Guide.
ABOUT THIS USER’S GUIDE
6
HITRON CVE-30360 USER’S GUIDE
ABOUT THIS USER’S GUIDE
7
TABLE OF CONTENTS
TABLE OF CONTENTS
About This User’s Guide..................................................................3
Table of Contents..............................................................................7
List of Figures .................................................................................11
List of Tables...................................................................................13
TABLE 4: Private IP Address Ranges ...............................................................26
TABLE 5: IP Address: Decimal and Binary ........................................................27
TABLE 6: Subnet Mask: Decimal and Binary ....................................................27
TABLE 7: The Cable > System Info Screen ......................................................31
TABLE 8: The Cable > Status Screen ...............................................................34
TABLE 9: The Cable > Password Screen ..........................................................36
TABLE 10: The LAN > LAN IP Screen ..............................................................41
TABLE 11: The LAN > Switch Setup Screen .....................................................43
TABLE 12: The LAN > Debug Screen ...............................................................44
TABLE 13: The LAN > Backup Screen ..............................................................45
TABLE 14: The Firewall > Firewall Options Screen ...........................................50
TABLE 15: The Firewall > MAC Filtering Screen ...............................................51
TABLE 16: The Firewall > IP Filtering Screen ...................................................53
TABLE 17: The Firewall > IP Filtering > Add/Edit Screen ..................................55
TABLE 18: The Firewall > Forwarding Screen ..................................................56
TABLE 19: The Firewall > Forwarding > Add/Edit Screen .................................58
TABLE 20: The Firewall > Port Triggering Screen .............................................60
TABLE 21: The Firewall > Port Triggering > Add/Edit Screen ...........................62
TABLE 22: The Parent Control > Web Site Blocking Screen ............................64
TABLE 23: The Parent Control > Scheduling Screen ........................................66
TABLE 24: The Parental Control > Local Logs Screen .....................................67
TABLE 25: The Wireless > Basic Screen ..........................................................77
TABLE 26: The Wireless > Security Screen ......................................................79
TABLE 27: The Wireless > Access Control Screen ...........................................82
TABLE 28: The Wireless > WiFi Site Survey Screen ........................................84
TABLE 29: The EMTA > Status Screen .............................................................87
TABLE 30: The EMTA > DHCP Screen .............................................................89
14
HITRON CVE-30360 USER’S GUIDE
LIST OF TABLES
1
INTRODUCTION
This chapter introduces the CVE-30360 and its GUI (Graphical User Interface).
1.1 CVE-30360 OVERVIEW
Your CVE-30360 is a voice-enabled cable modem and wireless access point that
allows you to connect your computers, analog telephones, wireless devices, and
other network devices to one another, and to the Internet via the cable connection.
15
Computers with a wired connection to the CVE-30360 are on the Local Area Network
(LAN), computers with a wireless connection to the CVE-30360 are on the Wireless
Local Area Network (WLAN) and the CVE-30360 connects to the service provider
over the Wide Area Network (WAN).
FIGURE 1: Application Overview
INTRODUCTION
16
HITRON CVE-30360 USER’S GUIDE
1.1.1 KEY FEATURES
The CVE-30360 provides:
Internet connection to cable modem service via CATV port (F-type RF
connector)
Voice over IP (VoIP) connection to your voice service provider.
Local Area Network connection via four 10/100/1000 Mbps (megabits per
second) Ethernet ports
Dynamic Host Configuration Protocol (DHCP) for devices on the LAN
LAN troubleshooting tools (Ping and Traceroute)
IEEE 802.11b/g/n wireless MIMO (Multiple-In, Multiple-Out) networking, allowing
speeds of up to 300Mbps
Wireless security: WEP, WPA-PSK and WPA2-PSK encryption, Wifi Protected
Setup (WPS) push-button and PIN configuration and MAC filtering
Wired security: stateful inspection firewall with intrusion detection system, IP and
MAC filtering, port forwarding and port triggering, and De-Militarized Zone
(DMZ)
Parental control: scheduled website blocking and access logs
Settings backup and restore
Secure configuration interface, accessible by Web browser
1.2 HARDWARE CONNECTIONS
This section describes the CVE-30360’s physical ports and buttons.
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
FIGURE 2: Hardware Connections
17
TABLE 1: Hardware Connections
WIFIUse this button to turn the wireless network on or off,
and to begin the WiFi Protected Setup (WPS) PushButton Configuration (PBC) procedure (see WPS on
page 75 for more information.)
To turn the wireless network on or off, press the
button for between one and five seconds.
To begin the WPS PBC connection procedure, press
and hold the button for between five and ten
seconds. Press the PBC button on your wireless
clients in the coverage area within two minutes to
enable them to join the wireless network.
ResetUse this button to reboot or reset your CVE-30360.
Press the button and hold it for less than five
seconds to reboot the CVE-30360. The CVE-30360
restarts, using your existing settings.
Press the button and hold it for more than ten
seconds to delete all user-configured settings and
restart the CVE-30360 using its factory default
settings.
USBInsert USB disk to share files.
INTRODUCTION
18
HITRON CVE-30360 USER’S GUIDE
TABLE 1: Hardware Connections
LAN1Use these ports to connect your computers and other
LAN2
LAN3
LAN4
LINE 1Use these ports to connect your analog phones for VoIP
LINE 2
CABLEUse this to connect to the Internet via an F-type RF
POWERUse this to connect to the 12v/2A power adapter that
network devices, using Category 5 or 6 Ethernet cables
with RJ45 connectors.
services, using cables with RJ11 connectors.
cable.
came with your CVE-30360.
NEVER use another power adapter with
your CVE-30360. Doing so could harm
your CVE-30360.
ON/OFFUse this button to turn your CVE-30360 on or off.
To turn the CVE-30360 on, press and hold the ON/
OFF button for less than 1 second.
To turn the CVE-30360 off, press and hold the ON/
OFF button for 1~2 seconds.
1.3 LEDS
This section describes the CVE-30360’s LEDs (lights).
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
FIGURE 3: LEDs
19
TABLE 2: LEDs
LEDSTATUSDESCRIPTION
LINE 1
LINE 2
WIRELESSOffNo data is being transmitted or received over the
USBOnValid USB connection status.
OffYour service plan does not include voice service.
NOTE: The number of LINE LEDs that light up
depends on your voice service plan.
BlinkingA telephone is connected to the relevant Line port,
and is off-hook.
OnYour service plan includes voice service.
NOTE: The number of LINE LEDs that light up
depends on your voice service plan.
wireless network.
BlinkingData is being transmitted or received over the
wireless network.
OffNo USB is connected or invalid USB connection
status.
INTRODUCTION
20
HITRON CVE-30360 USER’S GUIDE
TABLE 2: LEDs
ETH OffNo device is connected to any LAN port.
BlinkingA device is connected to a LAN port via a fast
Ethernet link, and is transmitting or receiving data.
OnA device is connected to a LAN port via a fast
ethernet link, but is not transmitting or receiving
data.
StatusBlinkingThe CVE-30360’s cable modem is registering with
the service provider.
OnThe CVE-30360’s cable modem has successfully
registered with the service provider.
USBlinkingThe CVE-30360 is searching for an upstream
frequency on the CATV connection.
OnThe CVE-30360 has successfully located and
locked onto an upstream frequency on the CATV
connection.
DSBlinkingThe CVE-30360 is searching for a downstream
frequency on the CATV connection.
OnThe CVE-30360 has successfully located and
locked onto a downstream frequency on the CATV
connection.
Power OnThe CVE-30360 is receiving power.
OffThe CVE-30360 is not receiving power.
When you turn on the CVE-30360, the LEDs light up in the following order:
Power
US
DS
Status
The ETH 1~4 LEDs light up as soon as there is activity on the relevant port, the
LINE 1~2 ports light up if your service contract includes voice service (the
number of LEDs that lights up depends on your service plan), USB LED lights
up if your have valid USB connection, and the WIRELESS LED lights up once
the wireless network is ready.
1.4 IP ADDRESS SETUP
Before you log into the CVE-30360’s GUI, your computer’s IP address must be in the
same subnet as the CVE-30360. This allows your computer to communicate with the
CVE-30360.
NOTE: See IP Addresses and Subnets on page 25 for background information.
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
The CVE-30360 has a built-in DHCP server that, when active, assigns IP addresses
to computers on the LAN. When the DHCP server is active, you can get an IP
address automatically. The DHCP server is active by default.
If your computer is configured to get an IP address automatically, or if you are not
sure, try to log in to the CVE-30360 (see Logging into the CVE-30360 on page 13).
If the login screen displays, your computer is already configured correctly.
If the login screen does not display, either the CVE-30360’s DHCP server is not
active or your computer is not configured correctly. Follow the procedure in
Manual IP Address Setup on page 12 and set your computer to get an IP
address automatically. Try to log in again. If you cannot log in, follow the manual
IP address setup procedure again, and set a specific IP address as shown. Try
to log in again.
NOTE: If you still cannot see the login screen, your CVE-30360’s IP settings may
have been changed from their defaults. If you do not know the CVE-30360’s
new address, you should return it to its factory defaults. See Resetting the
CVE-30360 on page 14. Bear in mind that ALL user-configured settings are
lost.
21
1.4.1 MANUAL IP ADDRESS SETUP
By default, your CVE-30360’s local IP address is 192.168.0.1. If your CVE-30360 is
using the default IP address, you should set your computer’s IP address to be
between 192.168.0.2 and 192.168.0.254.
NOTE: If your CVE-30360 DHCP server is active, set your computer to get an IP
address automatically in step 5. The CVE-30360 assigns an IP address to
your computer. The DHCP server is active by default.
Take the following steps to manually set up your computer’s IP address to connect to
the CVE-30360:
NOTE: This example uses Windows XP; the procedure for your operating system
may be different.
1 Click Start, then click Control Panel.
2 In the window that displays, double-click Network Connections.
3 Right-click your network connection (usually Local Area Connection) and click
Properties.
4 In the General tab’s This connection uses the following items list, scroll
down and select Internet Protocol (TCP/IP). Click Properties.
5 You can get an IP address automatically, or specify one manually:
INTRODUCTION
22
HITRON CVE-30360 USER’S GUIDE
If your CVE-30360’s DHCP server is active, select Get an IP address
automatically.
If your CVE-30360’s DHCP server is not active, select Use the following IP
address. In the IP address field, enter a value between 192.168.0.2 and
192.168.0.254 (default). In the Subnet mask field, enter 255.255.255.0
(default).
NOTE: If your CVE-30360 is not using the default IP address, enter an IP address
and subnet mask that places your computer in the same subnet as the CVE-
30360.
6 Click OK. The Internet Protocol (TCP/IP) window closes. In the Local Area
Connection Properties window, click OK.
Your computer now obtains an IP address from the CVE-30360, or uses the IP
address that you specified, and can communicate with the CVE-30360.
1.5 LOGGING INTO THE CVE-30360
Take the following steps to log into the CVE-30360’s GUI.
NOTE: You can log into the CVE-30360’s GUI via the wireless interface. However, it
is strongly recommended that you configure the CVE-30360 via a wired
connection on the LAN.
1 Open a browser window.
2 Enter the CVE-30360’s IP address (default 192.168.0.1) in the URL bar. The
Login screen displays.
FIGURE 4: Login
3 Enter the Username and Password. The default login username is admin, and
the default password is password.
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
NOTE: The Username and Password are case-sensitive; “admin” is not the same as
“Admin”.
4 Click Login. The System Info screen displays (see The System Info Screen on
page 30).
1.6 GUI OVERVIEW
This section describes the CVE-30360’s GUI.
FIGURE 5: GUI Overview
23
TABLE 3: GUI Overview
Primary
Navigation Bar
Secondary
Navigation Bar
Main WindowUse this section to read information about your CVE-30360’s
Use this section to move from one part of the GUI to another.
Use this section to move from one related screen to another.
configuration, and make configuration changes.
1.7 RESETTING THE CVE-30360
When you reset the CVE-30360 to its factory defaults, all user-configured settings are
lost, and the CVE-30360 is returned to its initial configuration state.
There are two ways to reset the CVE-30360:
INTRODUCTION
24
HITRON CVE-30360 USER’S GUIDE
Press the RESET button on the CVE-30360, and hold it in for ten seconds or
longer.
Click LAN > Backup. In the screen that displays, click the Factory Reset
button.
The CVE-30360 turns off and on again, using its factory default settings.
NOTE: Depending on your CVE-30360’s previous configuration, you may need to re-
configure your computer’s IP settings; see IP Address Setup on page 11.
INTRODUCTION
25
CABLE
2
CABLE
This chapter describes the screens that display when you click Cable in the toolbar.
2.1 CABLE OVERVIEW
This section describes some of the concepts related to the Cable screens.
2.1.1 DOCSIS
The Data Over Cable Service Interface Specification (DOCSIS) is a
telecommunications standard that defines the provision of data services) Internet
access) over a traditional cable TV (CATV) network.
Your CVE-30360 supports DOCSIS version 3.0.
2.1.2 IP ADDRESSES AND SUBNETS
Every computer on the Internet must have a unique Internet Protocol (IP) address.
The IP address works much like a street address, in that it identifies a specific
location to which information is transmitted. No two computers on a network can have
the same IP address.
2.1.2.1 IP ADDRESS FORMAT
IP addresses consist of four octets (8-bit numerical values) and are usually
represented in decimal notation, for example 192.168.1.1. In decimal notation, this
means that each octet has a minimum value of 0 and a maximum value of 255.
An IP address carries two basic pieces of information: the “network number” (the
address of the network as a whole, analogous to a street name) and the “host ID”
(analogous to a house number) which identifies the specific computer (or other
network device).
2.1.2.2 IP ADDRESS ASSIGNMENT
IP addresses can come from three places:
The Internet Assigned Numbers Agency (IANA)
26
HITRON CVE-30360 USER’S GUIDE
Your Internet Service Provider
You (or your network devices)
IANA is responsible for IP address allocation on a global scale, and your ISP assigns
IP addresses to its customers. You should never attempt to define your own IP
addresses on a public network, but you are free to do so on a private network.
In the case of the CVE-30360:
The public network (Wide Area Network or WAN) is the link between the cable
(CATV) connector and your Internet Service Provider. Your CVE-30360’s IP
address on this network is assigned by your service provider.
The private network (in routing mode - see Routing Mode on page 28) is your
Local Area Network (LAN) and Wireless Local Area Network (WLAN), if
enabled. You are free to assign IP addresses to computers on the LAN and
WLAN manually, or to allow the CVE-30360 to assign them automatically via
DHCP (Dynamic Host Configuration Protocol). IANA has reserved the following
blocks of IP addresses to be used for private networks only:
TABLE 4: Private IP Address Ranges
FROM......TO
10.0.0.010.255.255.255
172.16.0.0172.31.255.255
192.168.0.0192.168.255.255
If you assign addresses manually, they must be within the CVE-30360’s LAN
subnet.
2.1.2.3 SUBNETS
A subnet (short for sub-network) is, as the name suggests, a separate section of a
network, distinct from the main network of which it is a part. A subnet may contain all
of the computers at one corporate local office, for example, while the main network
includes several offices.
In order to define the extent of a subn
a subnet mask is used. This “masks” the part of the IP address that refers to the main
network, leaving the part of the IP address that refers to the sub-network.
Each subnet mask has 32 bits (binary digits), as does each IP address:
et, and to differentiate it from the main network,
A binary value of 1 in the subnet mask indicates that the corresponding bit in the
IP address is part of the main network.
A binary value of 0 in the subnet mask indicates that the corresponding bit in the
IP address is part of the sub-network.
CABLE
27
HITRON CVE-30360 USER’S GUIDE
For example, the following table shows the IP address of a computer (192.168.1.1)
expressed in decimal and binary (each cell in the table indicates one octet):
TABLE 5: IP Address: Decimal and Binary
19216801
11000000101010000000000000000001
The following table shows a subnet mask that “masks” the first twenty-four bits of the
IP address, in both its decimal and binary notation.
TABLE 6: Subnet Mask: Decimal and Binary
2552552550
11111111111111111111111100000000
This shows that in this subnet, the first three octets (192.168.1, in the example IP
address) define the main network, and the final octet (1, in the example IP address)
defines the computer’s address on the subnet.
The decimal and binary notations give us the two common ways to write a subnet
mask:
Decimal: the subnet mask is written in the same fashion as the IP address:
255.255.255.0, for example.
Binary: the subnet mask is indicated after the IP address (preceded by a forward
slash), specifying the number of binary digits that it masks. The subnet mask
255.255.255.0 masks the first twenty-four bits of the IP address, so it would be
written as follows: 192.168.1.1/24.
2.1.3 DHCP
The Dynamic Host Configuration Protocol, or DHCP, defines the process by which IP
addresses can be assigned to computers and other networking devices
automatically, from another device on the network. This device is known as a DHCP
server, and provides addresses to all the DHCP client devices.
In order to receive an IP address via DHCP, a computer must first request one from
the DHCP server (this is a broadcast request, meaning that it is sent out to the whole
network, rather than just one IP address). The DHCP server hears the requests, and
responds by assigning an IP address to the computer that requested it.
If a computer is not configured to request an IP address via DHCP, you must
configure an IP address manually if you want to access other computers and devices
on the network. See IP Address Setup on page 20 for more information.
By default, the CVE-30360 is a DHCP client on the WAN (the CATV connection). It
broadcasts an IP address over the cable network, and receives one from the service
provider. By default, the CVE-30360 is a DHCP server on the LAN; it provides IP
addresses to computers on the LAN which request them.
CABLE
28
HITRON CVE-30360 USER’S GUIDE
2.1.4 DHCP LEASE
“DHCP lease” refers to the length of time for which a DHCP server allows a DHCP
client to use an IP address. Usually, a DHCP client will request a DHCP lease
renewal before the lease time is up, and can continue to use the IP address for an
additional period. However, if the client does not request a renewal, the DHCP server
stops allowing the client to use the IP address.
This is done to prevent IP addresses from being used up by computers that no longer
require them, since the pool of available IP addresses is finite.
2.1.5 MAC ADDRESSES
Every network device possesses a Media Access Control (MAC) address. This is a
unique alphanumeric code, given to the device at the factory, which in most cases
cannot be changed (although some devices are capable of “MAC spoofing”, where
they impersonate another device’s MAC address).
MAC addresses are the most reliable way of identifying network devices, since IP
addresses tend to change over time (whether manually altered, or updated via
DHCP).
Each MAC address displays as six groups of two hexadecimal digits separated by
colons (or, occasionally, dashes) for example 00:AA:FF:1A:B5:74.
NOTE: Each group of two hexadecimal digits is known as an “octet”, since it
represents eight bits.
Bear in mind that a MAC address does not precisely represent a computer on your
network (or elsewhere), it represents a network device, which may be part of a
computer (or other device). For example, if a single computer has an Ethernet card
(to connect to your CVE-30360 via one of the LAN ports) and also has a wireless
card (to connect to your CVE-30360 over the wireless interface) the MAC addresses
of the two cards will be different. In the case of the CVE-30360, each internal module
(cable modem module, Ethernet module, wireless module, etc.) possesses its own
MAC address.
2.1.6 ROUTING MODE
When your CVE-30360 is in routing mode, it acts as a gateway for computers on the
LAN to access the Internet. The service provider assigns an IP address to the CVE30360 on the WAN, and all traffic for LAN computers is sent to that IP address. The
CVE-30360 assigns private IP addresses to LAN computers (when DHCP is active),
and transmits the relevant traffic to each private IP address.
NOTE: When DHCP is not active on the CVE-30360 in routing mode, each computer
on the LAN must be assigned an IP address in the CVE-30360’s subnet
manually.
CABLE
29
HITRON CVE-30360 USER’S GUIDE
When the CVE-30360 is not in routing mode, the service provider assigns an IP
address to each computer connected to the CVE-30360 directly. The CVE-30360
does not perform any routing operations, and traffic flows between the computers and
the service provider.
Routing mode is not user-configurable; it is specified by the service provider in the
CVE-30360’s configuration file.
2.1.7 CONFIGURATION FILES
The CVE-30360’s configuration (or config) file is a document that the CVE-30360
obtains automatically over the Internet from the service provider’s server, which
specifies the settings that the CVE-30360 should use. It contains a variety of settings
that are not present in the user-configurable Graphical User Interface (GUI) and can
be specified only by the service provider.
2.1.8 DOWNSTREAM AND UPSTREAM TRANSMISSIONS
The terms “downstream” and “upstream” refer to data traffic flows, and indicate the
direction in which the traffic is traveling. “Downstream” refers to traffic from the
service provider to the CVE-30360, and “upstream” refers to traffic from the CVE30360 to the service provider.
2.1.9 CABLE FREQUENCIES
Just like radio transmissions, data transmissions over the cable network must exist
on different frequencies in order to avoid interference between signals.
The data traffic band is separate from the TV band, and each data channel is
separate from other data channels.
2.1.10 MODULATION
Transmissions over the cable network are based on a strong, high frequency periodic
waveform known as the “carrier wave.” This carrier wave is so called because it
“carries” the data signal. The data signal itself is defined by variations in the carrier
wave. The process of varying the carrier wave (in order to carry data signal
information) is known as “modulation.” The data signal is thus known as the
“modulating signal.”
Cable transmissions use a variety of methods to perform modulation (and the
“decoding” of the received signal, or “demodulation”). The modulation methods
defined in DOCSIS 3 are as follows:
In many cases, a number precedes the modulation type (for example 16 QAM). This
number refers to the complexity of modulation. The higher the number, the more data
can be encoded in each symbol.
NOTE: In modulated signals, each distinct modulated character (for example, each
audible tone produced by a modem for transmission over telephone lines) is
known as a symbol.
Since more information can be represented by a single character, a higher number
indicates a higher data transfer rate.
2.1.11 TDMA, FDMA AND SCDMA
Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA)
and Synchronous Code Division Multiple Access (SCDMA) are channel access
methods that allow multiple users to share the same frequency channel.
TDMA allows multiple users to share the same frequency channel by splitting
transmissions by time. Each user is allocated a number of time slots, and
transmits during those time slots.
FDMA allows multiple users to share the same frequency channel by assigning a
frequency band within the existing channel to each user.
SCDMA allows multiple users to share the same frequency channel by assigning
a unique orthogonal code to each user.
2.2 THE SYSTEM INFO SCREEN
Use this screen to see general information about your CVE-30360’s hardware, its
software, and its connection to the Internet.
NOTE: Most of the information that displays in this screen is for troubleshooting
purposes only. However, you may need to use the MAC Address information
when setting up your network.
Click Cable > System Info. The following screen displays.
CABLE
Loading...
+ 68 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.