Wireless Products Division CONFIDENTIAL Wi-Fi™ Module Product Training April, 2012
10 Wireless Products Division CONFIDENTIAL Lab Agenda Introducing WiFly Firmware Hardware architecture Capabilities Hands-On Wi-Fi Labs As
11 Wireless Products Division CONFIDENTIAL Data & Command Modes Data Mode (Default State) – WiFly module like data pipe – TCP/UDP header strippe
12 Wireless Products Division CONFIDENTIAL Command Mode: Configuration Settings Performed Using ASCII Commands User Guide Configuration Settings
13 Wireless Products Division CONFIDENTIAL Command Mode: Syntax Commands Use Keyword Followed by Additional Information Command Rules Case sensi
14 Wireless Products Division CONFIDENTIAL Command Mode: Keywords Set: Immediate Effect, Permanent If Saved to Configuration File
15 Wireless Products Division CONFIDENTIAL Hardware Architecture: Key Features 2.4-GHz IEEE 802.11b/g Tx/Rx Ultra Low-Power Consumption • 4-uA sle
16 Wireless Products Division CONFIDENTIAL Hardware Architecture: Silicon
17 Wireless Products Division CONFIDENTIAL Hardware Architecture: Development Environment
Wireless Products Division CONFIDENTIAL Wi-Fi Lab April, 2012
19 Wireless Products Division CONFIDENTIAL Lab Prerequisites Hardware RN-134-K or RN-174-K evaluation kit Configured access point (AP) Securit
2 Wireless Products Division CONFIDENTIAL Wi-Fi™ Overview Protocol Built on the IEEE 802.11 standard Conformance testing performed by the non-pr
20 Wireless Products Division CONFIDENTIAL Lab 1: Association & UDP Lab Overview Infrastructure & ad hoc networks Hardware setup Confi
21 Wireless Products Division CONFIDENTIAL Lab 1: Association & UDP Supported Security Modes WEP 64, WEP 128 OLD/NOT SECURE WPA1 TKIP WPA
22 Wireless Products Division CONFIDENTIAL Lab 1: Hardware Setup Connect Evaluation Board Connect board to your computer Connect battery Blue
23 Wireless Products Division CONFIDENTIAL Lab 1: Configure Module via UART Launch Command Mode Run Tera Term Open assigned COM port Serial po
24 Wireless Products Division CONFIDENTIAL Lab 1: Joining/Associating with Networks Search for Networks – $$$ (enter command mode) – scan Join a n
25 Wireless Products Division CONFIDENTIAL Lab 1: Interim Summary Configured Module via the UART in Command Mode Next, Observe Wi-Fi Activity Usin
26 Wireless Products Division CONFIDENTIAL Lab 1: Configure & Capture UDP with PortPeeker Associate PC with Same AP as Module – Enter command mo
27 Wireless Products Division CONFIDENTIAL Lab 1: UDP Broadcast Module Sends UDP Broadcast at Specified Intervals UDP Broadcast Contains Informati
28 Wireless Products Division CONFIDENTIAL Lab 1: Setting Device Name Device Names Can Identify Products on Network Can Append Device ID to UDP Br
29 Wireless Products Division CONFIDENTIAL Lab 1: Sending UDP Packets UDP Mode Not Enabled by Default Enable UDP by Setting Remote Host, Port &
3 Wireless Products Division CONFIDENTIAL Wi-Fi™ Overview Roving Networks’ Wi-Fi Solution Industry’s lowest power, complete system-on-module solut
30 Wireless Products Division CONFIDENTIAL Lab 1: UDP Auto Pairing Mode (Optional Slide) Similar to Bluetooth Pairing, Module Can Store IP Addresses
31 Wireless Products Division CONFIDENTIAL Lab 1: Conclusion RN-134-K or RN-174-K with Terminal Emulator & Serial Cable Provides Simple, Effecti
32 Wireless Products Division CONFIDENTIAL Lab 2: TCP Objective Connect from module to remote host using TCP Connect to module from remote host
33 Wireless Products Division CONFIDENTIAL Lab 2: TCP Connections WiFly Module Opens TCP Connection Sensing applications Sending data to web serv
34 Wireless Products Division CONFIDENTIAL Lab 2: Setup PortPeeker Associate Computer with AP Launch PortPeeker Configure PortPeeker Click Con
35 Wireless Products Division CONFIDENTIAL Lab 2: Open TCP Connection from Module With Module Connected to PC over USB-Serial Cable, Open Tera Term
36 Wireless Products Division CONFIDENTIAL Lab 2: Connecting from Remote Host to WiFly module In Command Mode, Obtain Module’s IP Address get ip
37 Wireless Products Division CONFIDENTIAL Lab 2: TCP modes Module Supports Three TCP Modes TCP client & server mode Default mode initiates
38 Wireless Products Division CONFIDENTIAL Lab 2: TCP Client Mode Set Up Module in TCP Client Mode set ip proto 8 save & reboot Open New T
39 Wireless Products Division CONFIDENTIAL Lab 2: Auto-Connect Feature Module Can Automatically Open TCP Connection to Remote Host on Power Up or W
Wireless Products Division CONFIDENTIAL Firmware April, 2012
40 Wireless Products Division CONFIDENTIAL Lab 2: Auto Connect Feature (Timers) Module Attempts a TCP Connection Every 10 seconds, Drops Connection
41 Wireless Products Division CONFIDENTIAL Lab 2: Alternative GPIO Functions Firmware Uses GPIO 4, 5 & 6 to Blink Evaluation Board’s Status LEDs
42 Wireless Products Division CONFIDENTIAL Lab 2: Alternative GPIO Functions Enable Alternative Functions set wlan ssid <string> set sys i
43 Wireless Products Division CONFIDENTIAL Lab 2: Setting Comm Strings Microcontroller Can Look for UART comm Strings as Indication of TCP Connecti
44 Wireless Products Division CONFIDENTIAL Lab 2: Forwarding TCP packets When Data Is Written to Module’s UART, TCP Packets Forwarded Based On Fl
45 Wireless Products Division CONFIDENTIAL Lab 2: Forwarding TCP packets Forwarding Packets Based on Flush Timer set comm timer 1000 save open
46 Wireless Products Division CONFIDENTIAL Lab 2: Conclusion Module Can Open TCP Connection to Remote Host & Accept Incoming Connections from R
47 Wireless Products Division CONFIDENTIAL Lab 3: Association/Roaming & FTP Objective Wake & sleep timers Auto join Roaming configura
48 Wireless Products Division CONFIDENTIAL Lab 3: Where in the World Wide Web are you? Module Associates with AP Based on SSID Password required d
49 Wireless Products Division CONFIDENTIAL Lab 3: Wake & Sleep Timers Several Options to Wake Module FORCE WAKE Signal Sensors Internal Ti
5 Wireless Products Division CONFIDENTIAL Roving Networks Firmware Standard Firmware Simplifies customer design No register-level configurations
50 Wireless Products Division CONFIDENTIAL Lab 3: Join Modes Useful for Module to Associate with Network Automatically Association Controlled with
51 Wireless Products Division CONFIDENTIAL Lab 3: Roaming (Optional Slide) Module Wakes, Searches for Aps, Connects, Off Loads Data & Returns to
52 Wireless Products Division CONFIDENTIAL Lab 3: FTP Update (REQUIRES Internet Access) Use Module’s FTP Client to Update Firmware & Put/Get Dat
53 Wireless Products Division CONFIDENTIAL Lab 3: Setting Firmware Boot Image Firmware Stored in Embedded Flash Memory Boot Image is Firmware Ver
54 Wireless Products Division CONFIDENTIAL Lab 3: FTP put & get FTP Client Can Stream Files to/from FTP Server Useful in data logger applicati
55 Wireless Products Division CONFIDENTIAL Lab 3: Conclusion Sleep & Wake Timers Allow Module to Deep Sleep to Save Power & Periodically Con
56 Wireless Products Division CONFIDENTIAL Lab 4: HTTP Client Objective Post data to web server Uses built-in feature Does not require externa
57 Wireless Products Division CONFIDENTIAL Lab 4: Solutions Architecture Weather Station GPS Unit Remote Sensors AP RN-370 RN-370 RN-370 AP Internet
58 Wireless Products Division CONFIDENTIAL Lab 4: Enabling HTTP Client Mode HTTP Client Mode Disabled by Default To enable use set ip proto 18 co
59 Wireless Products Division CONFIDENTIAL Lab 4: Auto-Posting Sensor Data In HTTP Client Mode, Module Sends Request Message GET /server.php?value
6 Wireless Products Division CONFIDENTIAL Firmware Extensions Sensor: Real-Time Monitoring Uses Roving Networks silicon Monitors I/O pin & A
60 Wireless Products Division CONFIDENTIAL *OPEN*HTTP/1.1 200 OK Date: Fri, 19 Nov 2010 19:24:07 GMT Server: Apache X-Powered-By: PHP/5.2.13 Connectio
61 Wireless Products Division CONFIDENTIAL Lab 4: Add Device Name & RTC to Sensor Data Append Device ID & RTC Value to Sensor Data so Server
62 Wireless Products Division CONFIDENTIAL Lab 4: Auto-Posting UART Data Module Can Wake on Receiving UART Data, Associate with AP & Send Reques
63 Wireless Products Division CONFIDENTIAL Lab 4: Auto-Posting Serial Data OPEN*SEND-WEBPOST HTTP/1.1 200 OK Date: Mon, 06 Dec 2010 18:25:36 GMT Serve
64 Wireless Products Division CONFIDENTIAL Lab 4: Conclusion Module Supports HTTP Client Mode Natively When Configured, Module Can Append GPIO
65 Wireless Products Division CONFIDENTIAL Lab 5: Access Point Mode Advantages Enables Android devices to talk to modules without infrastructur
66 Wireless Products Division CONFIDENTIAL Lab 5: Creating a Default AP Network Download Firmware Supporting AP Mode via FTP RN-131: ftp update
67 Wireless Products Division CONFIDENTIAL Lab 5: Create Custom AP Network in Software Create Custom AP Network with User-Defined Settings set w
68 Wireless Products Division CONFIDENTIAL Lab 5: Connect to AP Network Created by Module From PC/Mobile Phone/Tablet, Connect to Module-Created Ne
69 Wireless Products Division CONFIDENTIAL Lab 5: View Associated Devices & Lease Times View Device Lease Times show lease View List of Conn
7 Wireless Products Division CONFIDENTIAL Firmware Extensions WebScan: Real-Time Location System Uses Roving Networks silicon Uses I/O pins, ADC
70 Wireless Products Division CONFIDENTIAL Wi-Fi Training Session Questions
8 Wireless Products Division CONFIDENTIAL Firmware Extensions WebScan Example Application Goods monitored by tag attached to pallet Pallets arri
Wireless Products Division CONFIDENTIAL Wi-Fi Lab: Introduction April, 2012
Kommentare zu diesen Handbüchern