Roving Networks RN-370 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Vernetzung Roving Networks RN-370 herunter. confidential [en] Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 70
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
Wireless Products Division
CONFIDENTIAL
Wi-Fi™ Module Product Training
April, 2012
Seitenansicht 0
1 2 3 4 5 6 ... 69 70

Inhaltsverzeichnis

Seite 1 - April, 2012

Wireless Products Division CONFIDENTIAL Wi-Fi™ Module Product Training April, 2012

Seite 2 - Wi-Fi™ Overview

10 Wireless Products Division CONFIDENTIAL Lab Agenda  Introducing WiFly  Firmware  Hardware architecture  Capabilities  Hands-On Wi-Fi Labs  As

Seite 3

11 Wireless Products Division CONFIDENTIAL Data & Command Modes  Data Mode (Default State) – WiFly module like data pipe – TCP/UDP header strippe

Seite 4 - Firmware

12 Wireless Products Division CONFIDENTIAL Command Mode: Configuration Settings  Performed Using ASCII Commands  User Guide  Configuration Settings

Seite 5 - Roving Networks Firmware

13 Wireless Products Division CONFIDENTIAL Command Mode: Syntax  Commands Use Keyword Followed by Additional Information  Command Rules  Case sensi

Seite 6 - Firmware Extensions

14 Wireless Products Division CONFIDENTIAL Command Mode: Keywords  Set: Immediate Effect, Permanent If Saved to Configuration File

Seite 7

15 Wireless Products Division CONFIDENTIAL Hardware Architecture: Key Features  2.4-GHz IEEE 802.11b/g Tx/Rx  Ultra Low-Power Consumption • 4-uA sle

Seite 8

16 Wireless Products Division CONFIDENTIAL Hardware Architecture: Silicon

Seite 9 - Wi-Fi Lab: Introduction

17 Wireless Products Division CONFIDENTIAL Hardware Architecture: Development Environment

Seite 10 - Lab Agenda

Wireless Products Division CONFIDENTIAL Wi-Fi Lab April, 2012

Seite 11 - Data & Command Modes

19 Wireless Products Division CONFIDENTIAL Lab Prerequisites  Hardware  RN-134-K or RN-174-K evaluation kit  Configured access point (AP)  Securit

Seite 12 - Configuration Settings

2 Wireless Products Division CONFIDENTIAL Wi-Fi™ Overview  Protocol  Built on the IEEE 802.11 standard  Conformance testing performed by the non-pr

Seite 13 - Command Mode: Syntax

20 Wireless Products Division CONFIDENTIAL Lab 1: Association & UDP  Lab Overview  Infrastructure & ad hoc networks  Hardware setup  Confi

Seite 14 - Keywords

21 Wireless Products Division CONFIDENTIAL Lab 1: Association & UDP  Supported Security Modes  WEP 64, WEP 128 OLD/NOT SECURE  WPA1 TKIP  WPA

Seite 15 - Features

22 Wireless Products Division CONFIDENTIAL Lab 1: Hardware Setup  Connect Evaluation Board  Connect board to your computer  Connect battery  Blue

Seite 16 - Silicon

23 Wireless Products Division CONFIDENTIAL Lab 1: Configure Module via UART  Launch Command Mode  Run Tera Term  Open assigned COM port  Serial po

Seite 17 - Development Environment

24 Wireless Products Division CONFIDENTIAL Lab 1: Joining/Associating with Networks  Search for Networks – $$$ (enter command mode) – scan  Join a n

Seite 18 - Wi-Fi Lab

25 Wireless Products Division CONFIDENTIAL Lab 1: Interim Summary  Configured Module via the UART in Command Mode  Next, Observe Wi-Fi Activity Usin

Seite 19 - Lab Prerequisites

26 Wireless Products Division CONFIDENTIAL Lab 1: Configure & Capture UDP with PortPeeker  Associate PC with Same AP as Module – Enter command mo

Seite 20 - Lab 1: Association & UDP

27 Wireless Products Division CONFIDENTIAL Lab 1: UDP Broadcast  Module Sends UDP Broadcast at Specified Intervals  UDP Broadcast Contains Informati

Seite 21

28 Wireless Products Division CONFIDENTIAL Lab 1: Setting Device Name  Device Names Can Identify Products on Network  Can Append Device ID to UDP Br

Seite 22 - Lab 1: Hardware Setup

29 Wireless Products Division CONFIDENTIAL Lab 1: Sending UDP Packets  UDP Mode Not Enabled by Default  Enable UDP by Setting Remote Host, Port &

Seite 23 - Launch Command Mode

3 Wireless Products Division CONFIDENTIAL Wi-Fi™ Overview  Roving Networks’ Wi-Fi Solution  Industry’s lowest power, complete system-on-module solut

Seite 24 - Lab 1: Joining/Associating

30 Wireless Products Division CONFIDENTIAL Lab 1: UDP Auto Pairing Mode (Optional Slide)  Similar to Bluetooth Pairing, Module Can Store IP Addresses

Seite 25 - Lab 1: Interim Summary

31 Wireless Products Division CONFIDENTIAL Lab 1: Conclusion  RN-134-K or RN-174-K with Terminal Emulator & Serial Cable Provides Simple, Effecti

Seite 26 - UDP with PortPeeker

32 Wireless Products Division CONFIDENTIAL Lab 2: TCP  Objective  Connect from module to remote host using TCP  Connect to module from remote host

Seite 27 - Lab 1: UDP Broadcast

33 Wireless Products Division CONFIDENTIAL Lab 2: TCP Connections WiFly Module Opens TCP Connection  Sensing applications  Sending data to web serv

Seite 28 -  Set Broadcast UDP Port

34 Wireless Products Division CONFIDENTIAL Lab 2: Setup PortPeeker  Associate Computer with AP  Launch PortPeeker  Configure PortPeeker  Click Con

Seite 29 - Enter command mode

35 Wireless Products Division CONFIDENTIAL Lab 2: Open TCP Connection from Module  With Module Connected to PC over USB-Serial Cable, Open Tera Term

Seite 30 - Mode (Optional Slide)

36 Wireless Products Division CONFIDENTIAL Lab 2: Connecting from Remote Host to WiFly module  In Command Mode, Obtain Module’s IP Address  get ip

Seite 31 - Lab 1: Conclusion

37 Wireless Products Division CONFIDENTIAL Lab 2: TCP modes  Module Supports Three TCP Modes  TCP client & server mode  Default mode initiates

Seite 32 - Lab 2: TCP

38 Wireless Products Division CONFIDENTIAL Lab 2: TCP Client Mode  Set Up Module in TCP Client Mode  set ip proto 8  save & reboot  Open New T

Seite 33 - Lab 2: TCP Connections

39 Wireless Products Division CONFIDENTIAL Lab 2: Auto-Connect Feature  Module Can Automatically Open TCP Connection to Remote Host on Power Up or W

Seite 34 - Lab 2: Setup PortPeeker

Wireless Products Division CONFIDENTIAL Firmware April, 2012

Seite 35 - Lab 2: Open TCP Connection

40 Wireless Products Division CONFIDENTIAL Lab 2: Auto Connect Feature (Timers)  Module Attempts a TCP Connection Every 10 seconds, Drops Connection

Seite 36 - WiFly module

41 Wireless Products Division CONFIDENTIAL Lab 2: Alternative GPIO Functions  Firmware Uses GPIO 4, 5 & 6 to Blink Evaluation Board’s Status LEDs

Seite 37 - Lab 2: TCP modes

42 Wireless Products Division CONFIDENTIAL Lab 2: Alternative GPIO Functions  Enable Alternative Functions  set wlan ssid <string>  set sys i

Seite 38 - Lab 2: TCP Client Mode

43 Wireless Products Division CONFIDENTIAL Lab 2: Setting Comm Strings  Microcontroller Can Look for UART comm Strings as Indication of TCP Connecti

Seite 39 - Feature

44 Wireless Products Division CONFIDENTIAL Lab 2: Forwarding TCP packets  When Data Is Written to Module’s UART, TCP Packets Forwarded Based On  Fl

Seite 40 - Feature (Timers)

45 Wireless Products Division CONFIDENTIAL Lab 2: Forwarding TCP packets  Forwarding Packets Based on Flush Timer  set comm timer 1000  save  open

Seite 41 - Functions

46 Wireless Products Division CONFIDENTIAL Lab 2: Conclusion  Module Can Open TCP Connection to Remote Host & Accept Incoming Connections from R

Seite 42

47 Wireless Products Division CONFIDENTIAL Lab 3: Association/Roaming & FTP  Objective  Wake & sleep timers  Auto join  Roaming configura

Seite 43 - CONFIDENTIAL

48 Wireless Products Division CONFIDENTIAL Lab 3: Where in the World Wide Web are you?  Module Associates with AP Based on SSID  Password required d

Seite 44 - Lab 2: Forwarding TCP

49 Wireless Products Division CONFIDENTIAL Lab 3: Wake & Sleep Timers  Several Options to Wake Module  FORCE WAKE Signal  Sensors  Internal Ti

Seite 45

5 Wireless Products Division CONFIDENTIAL Roving Networks Firmware  Standard Firmware  Simplifies customer design  No register-level configurations

Seite 46 - Lab 2: Conclusion

50 Wireless Products Division CONFIDENTIAL Lab 3: Join Modes  Useful for Module to Associate with Network Automatically  Association Controlled with

Seite 47 - Prerequisites

51 Wireless Products Division CONFIDENTIAL Lab 3: Roaming (Optional Slide)  Module Wakes, Searches for Aps, Connects, Off Loads Data & Returns to

Seite 48 - Wide Web are you?

52 Wireless Products Division CONFIDENTIAL Lab 3: FTP Update (REQUIRES Internet Access)  Use Module’s FTP Client to Update Firmware & Put/Get Dat

Seite 49

53 Wireless Products Division CONFIDENTIAL Lab 3: Setting Firmware Boot Image  Firmware Stored in Embedded Flash Memory  Boot Image is Firmware Ver

Seite 50 - Lab 3: Join Modes

54 Wireless Products Division CONFIDENTIAL Lab 3: FTP put & get  FTP Client Can Stream Files to/from FTP Server  Useful in data logger applicati

Seite 51

55 Wireless Products Division CONFIDENTIAL Lab 3: Conclusion  Sleep & Wake Timers Allow Module to Deep Sleep to Save Power & Periodically Con

Seite 52 - Internet Access)

56 Wireless Products Division CONFIDENTIAL Lab 4: HTTP Client  Objective  Post data to web server  Uses built-in feature  Does not require externa

Seite 53 - Lab 3: Setting Firmware Boot

57 Wireless Products Division CONFIDENTIAL Lab 4: Solutions Architecture Weather Station GPS Unit Remote Sensors AP RN-370 RN-370 RN-370 AP Internet

Seite 54 - Lab 3: FTP put & get

58 Wireless Products Division CONFIDENTIAL Lab 4: Enabling HTTP Client Mode  HTTP Client Mode Disabled by Default  To enable use set ip proto 18 co

Seite 55 - Lab 3: Conclusion

59 Wireless Products Division CONFIDENTIAL Lab 4: Auto-Posting Sensor Data  In HTTP Client Mode, Module Sends Request Message  GET /server.php?value

Seite 56 - Lab 4: HTTP Client

6 Wireless Products Division CONFIDENTIAL Firmware Extensions  Sensor: Real-Time Monitoring  Uses Roving Networks silicon  Monitors I/O pin & A

Seite 57 - Architecture

60 Wireless Products Division CONFIDENTIAL *OPEN*HTTP/1.1 200 OK Date: Fri, 19 Nov 2010 19:24:07 GMT Server: Apache X-Powered-By: PHP/5.2.13 Connectio

Seite 58 - Client Mode

61 Wireless Products Division CONFIDENTIAL Lab 4: Add Device Name & RTC to Sensor Data  Append Device ID & RTC Value to Sensor Data so Server

Seite 59 - Sensor Data

62 Wireless Products Division CONFIDENTIAL Lab 4: Auto-Posting UART Data  Module Can Wake on Receiving UART Data, Associate with AP & Send Reques

Seite 60 - Lab 4: Web Server

63 Wireless Products Division CONFIDENTIAL Lab 4: Auto-Posting Serial Data OPEN*SEND-WEBPOST HTTP/1.1 200 OK Date: Mon, 06 Dec 2010 18:25:36 GMT Serve

Seite 61 -  Post Data

64 Wireless Products Division CONFIDENTIAL Lab 4: Conclusion  Module Supports HTTP Client Mode Natively  When Configured, Module Can Append  GPIO

Seite 62 - Lab 4: Auto-Posting UART

65 Wireless Products Division CONFIDENTIAL Lab 5: Access Point Mode  Advantages  Enables Android devices to talk to modules without infrastructur

Seite 63 - Lab 4: Auto-Posting Serial

66 Wireless Products Division CONFIDENTIAL Lab 5: Creating a Default AP Network  Download Firmware Supporting AP Mode via FTP  RN-131: ftp update

Seite 64 - Lab 4: Conclusion

67 Wireless Products Division CONFIDENTIAL Lab 5: Create Custom AP Network in Software  Create Custom AP Network with User-Defined Settings  set w

Seite 65 - Lab 5: Access Point Mode

68 Wireless Products Division CONFIDENTIAL Lab 5: Connect to AP Network Created by Module  From PC/Mobile Phone/Tablet, Connect to Module-Created Ne

Seite 66 - AP Network

69 Wireless Products Division CONFIDENTIAL Lab 5: View Associated Devices & Lease Times  View Device Lease Times  show lease  View List of Conn

Seite 67 - Network in Software

7 Wireless Products Division CONFIDENTIAL Firmware Extensions  WebScan: Real-Time Location System  Uses Roving Networks silicon  Uses I/O pins, ADC

Seite 68 - Created by Module

70 Wireless Products Division CONFIDENTIAL Wi-Fi Training Session Questions

Seite 69 - Devices & Lease Times

8 Wireless Products Division CONFIDENTIAL Firmware Extensions  WebScan Example Application  Goods monitored by tag attached to pallet  Pallets arri

Seite 70 - Wi-Fi Training Session

Wireless Products Division CONFIDENTIAL Wi-Fi Lab: Introduction April, 2012

Kommentare zu diesen Handbüchern

Keine Kommentare