Nikon WT-1A Wireless Network Setup Guide ユーザーズマニュアル
Page 3
Wireless Networking with Nikon Cameras
DRAFT #4
as each device on the network has a
similar front part and a unique ending
number.
similar front part and a unique ending
number.
IP Number Distribution
There are several ways that each
device on a network can be given a
unique number. The fi rst (and most
complicated) is called “Manual” ad-
dressing. In a manual IP network the
network administrator has a list of
addresses and manual assigns one to
each device. This is a complicated and
time consuming method as a single
unique number. The fi rst (and most
complicated) is called “Manual” ad-
dressing. In a manual IP network the
network administrator has a list of
addresses and manual assigns one to
each device. This is a complicated and
time consuming method as a single
IP number can be used by only one de-
vice and each device has to be manu-
ally confi gured.
A much easier solution is to use a
“DHCP Server.” DHCP stands for
Dynamic Host Controller Protocol. A
DHCP server is either software run-
DHCP server is either software run-
ning on a computer or a function of
the router or other hardware on the
network.
the router or other hardware on the
network.
The DHCP server automatically gives
each device on a network a unique
IP address as well as providing other
important information about the network.
Simply set the computer or device to
important information about the network.
Simply set the computer or device to
“Obtain an IP address automatically” and the DHCP server will issue and manage
the numbers.
MAC Addresses
The Media Access Control or MAC address is a unique number that each and
every device on the network has. Unlike IP addresses, which can be changed, a
MAC address is hard coded into the network device and generally cannot be
changed by the user. While not normal used MAC addresses can be used to fur-
ther protect a network. For instance the router can be setup to only allow certain
MAC addresses to use the network. Other devices will not be able to connect.
changed by the user. While not normal used MAC addresses can be used to fur-
ther protect a network. For instance the router can be setup to only allow certain
MAC addresses to use the network. Other devices will not be able to connect.
A typical network showing wired computers connected to a hub (which is also a router/gateway in
this case). Also shown is a wireless access point allowing a Nikon camera and a laptop computer
to access the network. Each device has a unique IP address and can access the global “Internet”
through the Router/Hub/Gateway