all | frequencies |
|
exhibits | applications |
---|---|---|---|---|
manual |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 2 3 4 |
|
Manual | Users Manual | 2.15 MiB | January 07 2013 | |||
1 2 3 4 | Cover Letter(s) | |||||||
1 2 3 4 | Cover Letter(s) | |||||||
1 2 3 4 | RF Exposure Info | |||||||
1 2 3 4 | Cover Letter(s) | / January 07 2013 | ||||||
1 2 3 4 | External Photos | / January 07 2013 | ||||||
1 2 3 4 | Internal Photos | / January 07 2013 | ||||||
1 2 3 4 | ID Label/Location Info | / January 07 2013 | ||||||
1 2 3 4 | Cover Letter(s) | / January 07 2013 | ||||||
1 2 3 4 | RF Exposure Info | / January 07 2013 | ||||||
1 2 3 4 | Test Setup Photos | / January 07 2013 | ||||||
1 2 3 4 | Test Report | / January 07 2013 |
1 2 3 4 | Manual | Users Manual | 2.15 MiB | January 07 2013 |
RS-WC-301 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 December 2012 Redpine Signals, Inc. Redpine Signals, Inc. 2107 N. First Street, #680 2107 N. First Street, #680 San Jose, CA 95131. San Jose, CA 95131. Tel: (408) 748-3385 Tel: (408) 748-3385 Fax: (408) 705-2019 Fax: (408) 705-2019 Email: info@redpinesignals.com Email: info@redpinesignals.com Website: www.redpinesignals.com Website: www.redpinesignals.com Redpine Signals, Inc. Proprietary and Confidential. RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Table of Contents 4.1 2.1 3.1 3.2 5.1 5.2 5.3 5.4 RS-WC-301 ............................................................................... 1 1 Introduction ........................................................................ 6 2 Components on the EVB ....................................................... 7 Test Setup ........................................................................... 13 3 Using the EVB in UART mode ............................................. 14 Configure Serial port in PC .................................................. 14 Configure Serial Port Monitor in the PC ............................... 19 4 Evaluation of Client Mode with Personal Security .............. 23 Configuration and Test Procedure ....................................... 25 5 Evaluation of Client Mode with Enterprise Security ............ 30 Radius Server Configuration ............................................... 30 AP Settings ......................................................................... 33 Evaluating EAP-TLS Mode ................................................... 34 Evaluating EAP-TTLS, EAP-FAST and PEAP Modes ............... 36 6 Evaluation of Wi-Fi Direct Mode ......................................... 39 Configuration and Test Procedure ....................................... 39 7 Evaluation of Access Point Mode ........................................ 44 Configuration and Test Procedure ....................................... 44 8 Wireless Configuration ...................................................... 47 Configuration to join a Specific AP ...................................... 47 Configuration to create an AP ............................................. 51 9 Using the Module in USB Mode ........................................... 55 10 Using the Module in SPI Mode ......................................... 57 10.1 Sample flow for evaluating SPI mode ................................. 58 11 Upgrading Firmware Through the UART Interface ........... 60 12 Wireless Firmware Upgrade ............................................ 64 12.1 Users of Firmware Lower than version 2.1.0.1.2.5 .............. 64 12.2 Upgrading Firmware Wirelessly .......................................... 64 8.1 8.2 6.1 7.1 Redpine Signals, Inc. Page 2 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Table of Figures Figure 5: RS-WC-301-EVB ............................................................................ 7 Figure 6: Client Mode Set-up with Personal Security .................................. 23 Figure 7: Access Point Settings (Personal Security Mode) .......................... 24 Figure 8: Commands in Hyper-terminal ...................................................... 26 Figure 9: Execution of TCP.exe in Laptop C ................................................ 28 Figure 10: Enterprise Security Set-up ........................................................ 30 Figure 11: Access Point Settings (Enterprise Security Mode) ..................... 33 Figure 12: Command Flow in Enterprise Security Mode .............................. 35 Figure 13: Running of Python Script WiFi_Enterprise_TLS.py .................... 35 Figure 14: Wi-Fi Direct Set-up .................................................................... 39 Figure 15: Messages in Hyper-terminal ...................................................... 41 Figure 16: Command Flow in Wi-Fi Direct Mode ......................................... 42 Figure 17: Access Point Set-up ................................................................... 44 Figure 20: Interface between Module and Host .......................................... 57 Figure 21: Flow of Commands in SPI mode ................................................ 59 Figure 22: Set-up for Wireless Firmware Upgrade ...................................... 64 Figure 23: Signal Status During Firmware Upgrade .................................... 67 Redpine Signals, Inc. Page 3 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 List of Tables Table 1:UART Header (RS-WC-301).............................................................. 8 Table 2: Interface Selection ......................................................................... 8 Table 3: General Purpose Header (RS-WC-301-EVB) .................................. 10 Table 4: General Purpose Header(RS-WC-301-EVB) ................................... 11 Table 5: SPI Header Pins ............................................................................ 12 Table 6: Sensor Interface Header ............................................................... 13 Redpine Signals, Inc. Page 4 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Redpine Signals, Inc. Page 5 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 1 Introduction This document describes how to use the RS-WC-301 EVB. It describes the sequence of commands and set-up requirements to quickly evaluate the major functions of the modules. The document should be used in conjunction with the Programming Reference Manual (PRM) where all commands to configure and operate the modules are described in detail. Even if the user does not plan to use the UART interface, it is recommended to go through the UART sections because all the set-ups to evaluate different functionalities of the module in UART mode are directly reusable in the SPI and USB modes also. Redpine Signals, Inc. Page 6 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 2 Components on the EVB The RS-WC-301 EVB has various switches and headers to enable the user to configure it for different scenarios. Figure 1: RS-WC-301-EVB USB Connector for Power The power for the board can be supplied through this connector. Note that this connector is used only for supplying power. For actual communication using USB, the USB interface described below is used. Power Selection Switch The power selection switch should be put in the position shown in the figures above so that the board receives power from the USB connector. Reset Push button reset for the board. Note that there is a power-on reset circuit on the board that generates the necessary reset. This additional push-button is to reset the module during normal operation. UART Connector A DB9 connector is provided to interface the UART port. UART Header for MCU Redpine Signals, Inc. Page 7 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 If the EVB needs to be connected to the serial interface of an MCU platform, this header can be used. The voltage level of the UART Tx and Rx pins of this header is 3.3V. The Ground pin should be connected to a corresponding ground signal of the MCU board. For RS-WC-301 the header assignment is shown below Pin number Pin name 1 NC Direction Description
-
2 3 4 5 6 7 NC NC
-
-
UART-RX UART-TX UART-CTS Input Output
-
UART-RTS 8 9 10 GND GND GND
-
-
-
-
This pin must be left unconnected This pin must be left unconnected This pin must be left unconnected UART Rx pin of the module UART Tx pin of the module Not used in current firmware. Should be left unconnected Not used in current firmware. Should be left unconnected Ground Ground Ground Table 1:UART Header (RS-WC-301) Mode Selection Switches To select the interface in the EVB, configure the individual switches of Mode Selection Switch bank as shown in the below table. Switch #
1 2 3 4 UART Mode SPI Mode USB ON ON ON ON ON ON OFF ON ON OFF ON ON Table 2: Interface Selection Card Ready The Card Ready LED glows after the module has booted up successfully. It is an indication that the EVB is ready to accept commands from the Host. WIFI Activity Redpine Signals, Inc. Page 8 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 The LED indicates that wireless data transfer activity is in progress. This LED is not used in the current firmware. General Purpose Header Pin number Pin name 1 SPI_READY Direction Description Output 2 3 4 5 NC RESET_N
-
Input NC WAKEUP
-
Input 6 PT_GPIO2 Output 7 8 ADC2 Input PT_GPIO1 Output 9 10 GND VCC
-
Power 11 ADC1 Input Handshake signal used in SPI mode and connected to a GPIO pin of the Host MCU. In other modes, this signal can be left open No connect Active low reset input. This can be connected to the Host MCU to reset the module from the Host. If not used, should be left open No connect The module wakes up from sleep if a logic high is driven into this pin. Used only in SPI mode, should be left open in UART mode Pass through output pin controllable by Host software. Not used in current firmware, should be left open Analog input to internal ADC. Not used in current firmware, should be left open Pass through output pin controllable by Host software. Not used in current firmware, should be left open Ground 3.3V power supply. If the USB port for power supply is not used, this pin can be used to drive power to the EVB from the Host MCU platform. The direction of the Power Selection switch is ignored in this case. The maximum current sourcing capacity of the Host should be 500mA. If not used, this pin should be left open Analog input to internal ADC. Not used in current firmware, should Redpine Signals, Inc. Page 9 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 12 13 NC BT_PRIORITY
-
Input 14 15 NC WLAN_ACTIVE Output
-
be left open No connect Used to indicate through logic high that BT is transmitting high priority traffic. When BT coexistence is not used, this pin should be grounded No connect Used for BT Coexistence. It indicates with logic high that WLAN activity is in progress. When low, BT device has the opportunity to transmit. Not used in current firmware, should be left open No connect No connect No connect No connect Ground Handshake signal used in SPI mode and connected to a GPIO pin of the Host MCU. In other modes, this signal can be left open No connect Active low reset input. This can be connected to the Host MCU to reset the module from the Host. If not used, should be left open No connect The module wakes up from sleep if a logic high is driven into this pin. Used only in SPI mode, should be left open in UART mode Pass through output pin controllable by Host software. Not used in current firmware, should be left open No connect Pass through output pin controllable by Host software. Not used in current firmware, should NC NC NC NC GND
-
-
-
-
-
16 17 18 19 20 Pin number Pin name 1 SPI_READY Direction Description Output Table 3: General Purpose Header (RS-WC-301-EVB) 2 3 4 5 NC RESET_N
-
Input NC WAKEUP
-
Input 6 PT_GPIO2 Output 7 8 NC PT_GPIO1
-
Output Redpine Signals, Inc. Page 10 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 9 10 GND VCC
-
Power 11 12 13 NC NC BT_PRIORITY
-
-
Input 14 15 NC WLAN_ACTIVE Output
-
16 17 18 19 20 NC NC NC NC GND
-
-
-
-
-
be left open Ground 3.3V power supply. If the USB port for power supply is not used, this pin can be used to drive power to the EVB from the Host MCU platform. The direction of the Power Selection switch is ignored in this case. The maximum current sourcing capacity of the Host should be 500mA. If not used, this pin should be left open No connect No connect Used to indicate through logic high that BT is transmitting high priority traffic. When BT coexistence is not used, this pin should be grounded No connect Used for BT Coexistence. It indicates with logic high that WLAN activity is in progress. When low, BT device has the opportunity to transmit. Not used in current firmware, should be left open No connect No connect No connect No connect Ground Table 4: General Purpose Header(RS-WC-301-EVB) SPI Header The SPI header is used to connect the SPI interface of the module to a Host MCU. Pin Number 1 2 3 4 5 Pin Name Direction NC SPI_CS GND NC SPI_CLK
-
Input
-
-
Input Description No connect SPI slave select. Active low. Ground This pin must be left unconnected SPI clock. Max frequency of 12.5 Redpine Signals, Inc. Page 11 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 6 7 8 GND SPI_MOSI SPI_MISO INTERRUPT
-
Input Output Output MHz Ground SPI data input SPI data output Active high, level triggered interrupt, used in SPI mode. The interrupt is raised by the module to indicate there is data to be read by the Host, or to indicate the module has woken up from sleep. In UART mode, it can be left open No connect 9 10 NC
-
Table 5: SPI Header Pins UART Interface Selection These switches are present in RS-WC-301-EVB. If both the switches are put in the direction shown by the green arrow, the DB9 connector for UART is selected. If the switches are put in the direction shown by the red arrow, the UART Header for MCU is selected. Sensor Interface Header This header is present RS-WC-301-EVB. Pin Name Direction NC NC GND NC ADC2 GND ADC1
-
-
-
-
Input
-
Input WF_HNDSHKE1 Input NC WF_HNDSHKE2 Ouput
-
Pin Number 1 2 3 4 5 6 7 8 9 10 Description No connect No connect Ground This pin must be left unconnected Analog input to internal ADC. Not used in current firmware, should be left open Ground Analog input to internal ADC. Not used in current firmware, should be left open Handshake signal for wireless firmware upgrade. Should be connected to a GPIO pin of the Host MCU No connect Handshake signal for wireless firmware upgrade. Should be connected to a GPIO pin of the Host MCU Redpine Signals, Inc. Page 12 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 USB Interface Table 6: Sensor Interface Header This is a USB 2.0 interface and is supported in firmware version 2.0.0.1.2.4 and above. Jumper The jumper shown in some versions of the EVBs can be used for measurement of current consumed by the module. NOTE: EVB Versions below 3.1 do not support Power Save Mode 3 (Refer to Programming Reference Manual version 1.9 or higher for definition of this mode). 2.1 Test Setup The following additional components (not included with the EVB) are required to complete the procedures described here. 1. PC with an available serial port, and running Windows XP. The PC would be interfaced to the UART port of the EVB. 2. An 802.11a, 11b, 11g, or 11n Access Point with administrative access to change its settings 3. A RADIUS server for operation in enterprise security mode (see section Evaluation of Client Mode with Enterprise Security for details) 4. A Wi-Fi Direct compatible mobile phone or laptop (see section Evaluation of Wi-Fi Direct Mode ) 5. A third party client device, such as a laptop or Wi-Fi phone, for evaluating the EVB in the Access Point mode. Redpine Signals, Inc. Page 13 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 3 Using the EVB in UART mode The following sections describe how to use the Evaluation Board in UART mode. The sections should be used in conjunction with the Programming Reference Manual to understand the commands better. 3.1 Configure Serial port in PC To know the COM port name, check the computers Device Manager settings. The COM port name is displayed in the window. Hyperterminal or Teraterm should be opened and configured accordingly with this COM port name. The steps for configuring Hyperterminal are shown below. Redpine Signals, Inc. Page 14 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Open Hyperterminal Baud Rate: 115200 bps, Data bits: 8, Parity: None, Stop bits: 2, Flow Control:
None Other baud rates are not currently supported. Redpine Signals, Inc. Page 15 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Click on ASCII Setup Redpine Signals, Inc. Page 16 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Complete the settings as shown below and click OK. Redpine Signals, Inc. Page 17 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Teraterm can also be used. The steps for configuring Teraterm are shown below. Open Teraterm. Configure COM port settings Redpine Signals, Inc. Page 18 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Complete the settings as shown below and click OK. 3.2 Configure Serial Port Monitor in the PC The actual bytes exchanged between the module and the Host PC may not all be readable on Hyperterminal or Teraterm because of ASCII conversion. A serial port monitor1 can be used to see the actual bytes. A free package is available at http://www.serial-port-monitor.com/ , while other similar software such as Hterm, Docklight etc. also provide good interfaces to simultaneously view ASCII and actual bytes exchanged in the UART interface. The following sections assume that HHD Free Serial Port Monitor has been installed from the above link. Open the HHD Free Serial Port Monitor BEFORE opening the Hyperterminal or Teraterm. Click on File -> New Session. Select Serial Port Monitor. Select the appropriate COM port and Request view for the display format. 1 Redpine Signals Inc. assumes no liability for damages of any kind resulting from use of third party software. Redpine Signals, Inc. Page 19 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Redpine Signals, Inc. Page 20 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 All bytes exchanged through the UART interface will now be visible on the monitor. Redpine Signals, Inc. Page 21 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Redpine Signals, Inc. Page 22 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 4 Evaluation of Client Mode with Personal Security UART Interface PC (P) RS-WC-
301(A) Access Point
(B) Test_AP Laptop (C) Figure 2: Client Mode Set-up with Personal Security In this set-up the module acts as a client Wi-Fi module. It connects to an Access Point with WPA2-PSK security. It is assumed, in this example, that the SSID of the AP is Test_AP and IP of the AP is 192.168.50.1. Note: The Serial Port Monitor mentioned in the document works reliably in Windows XP machines Redpine Signals, Inc. Page 23 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Figure 3: Access Point Settings (Personal Security Mode) Redpine Signals, Inc. Page 24 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 4.1 Configuration and Test Procedure 1. Configure the EVB in UART mode and connect a UART cable between the PC and the EVB. 2. Open the Serial Port Monitor to see the actual bytes exchanged. Open Hyperterminal or Teraterm with the settings described in section Configure Serial port in PC. 3. Supply power to the EVB through the USB connector and put the Power Selection Switch to the position as shown in the figure Error!
Reference source not found.. 4. The terminal will show the message Welcome To WiSeConnect. The module boots up. Card Ready (LED2) glows on successful completion of boot-up and a string READY is sent from module to Host. The following commands can now be issued. Please refer to the Programming Reference Manual for detailed description of the commands and their responses. A command should not be sent until the response of the previous command is received. a. at+rsi_opermode=0 This configures the EVB to function in client mode. The module responds with OK b. at+rsi_band=0 This configures the operating band of the EVB. The module responds with OK c. at+rsi_init This initializes the Wi-Fi module in the EVB. The module responds with OK<MAC_Address>
d. at+rsi_fwversion?
Optional command to report the firmware version in use. e. at+rsi_scan=0 This makes the module scan for available networks. The module responds with information of the APs scanned. f. at+rsi_psk=12345678 This configures the PSK of the module to connect to a security enabled AP. g. at+rsi_join=Test_AP,0,2 This commands the module to join to the AP Test_AP. On successful association, the module responds with OK<GO_status>. The GO_status parameter can be ignored. h. at+rsi_ipconf=0,192.168.50.10,255.255.255.0,192.168. 50.1 Redpine Signals, Inc. Page 25 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 This command configures the modules IP to 192.168.50.10 in static mode. Make sure the desired IP is in the same subnet as the Access Point. The module responds to this command by sending the configured IP address to the Host as response to the command. In the terminal, this response might appear as unreadable characters because of ASCII conversion. The Serial Port Monitor can however be used to see the exact bytes. To get the IP is DHCP mode the command is at+rsi_ipconf=1,0,0,0 It is assumed in the following sections that an IP of 192.168.50.10 has been assigned. i. at+rsi_ltcp=5001 This command opens a server TCP socket in the module. The module responds with OK<socket_type><socket_handle><lport><module_ipaddr>. The socket_handle parameter will be used in the subsequent sections to send data. Figure 4: Commands in Hyper-terminal Redpine Signals, Inc. Page 26 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 5. Connect the Laptop C (Windows XP/Vista/Windows7) to the Access Point. It is assumed for the rest of this section that the Laptop has acquired an IP address of 192.168.50.20. 6. Exchanging data between the module and the Laptop C Using TCP Sockets a. Open a TCP socket in the Laptop C by typing the below command in the Windows command line interface. Make sure that any firewalls, that might prevent opening of sockets, are disabled. TCP.exe c 2001 192.168.50.10 5001 The application is found in the path RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\Applications\Peer\Windo ws\ . b. The command line window will display three options: 1 (Send), 2
(Receive) and 3 (Exit). Type 1 to send data to the Wi-Fi module. On being prompted Enter the string to be Transmitted, type any string from the Keyboard (test in this example). On pressing Enter key on the keyboard, the data is sent from the Laptop C to the module and the terminal displays it with the AT+RSI_READ message. c. To send data from the Wi-Fi module, first type Option 2 in Laptop C and then type the below command in the module at+rsi_snd=1,0,0,0,abcdefghij The first parameter in the command is the socket_handle. It is 1 in this case. It is returned as the response of the command at+rsi_ltcp and can be observed in the Serial Port Monitor. Refer to the Programming Reference Manual for more details. The data sent will be displayed in the Laptop C. Usage of PC applications:
TCP.exe <s for server> <lport> <dipaddr> <dport>
TCP.exe <c for client> <lport> <dipaddr> <dport>
s to open a server TCP socket c to open a client TCP socket lport Local port number dipaddr IP address of the destination dport Port number of the destination UDP.exe is also used in the same way. Redpine Signals, Inc. Page 27 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Figure 5: Execution of TCP.exe in Laptop C 7. HTTP server access: The firmware of the module comes with a pre-loaded webpage. Open the webpage in Laptop C by typing http://192.168.50.10 in the browser of the Laptop. 192.168.50.10 is the IP address of the module in this example. The source code of the default page is provided in RS.WSC.x.x.GENR.x.x.x.x.x.x\
Resources\Applications\WebPage\webpage.html Redpine Signals, Inc. Page 28 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 The values of the parameters can be updated dynamically (for example to 7654321,654321,54321 and 987654321 respectively) using the command at+rsi_webfields=1;7654321,2;654321,3;54321,4;987654321 . Refer to the command Load Web Fields in the Programming reference manual for more details. A new webpage can also be loaded into the module. It will overwrite the previously existing webpage. For example, below is given the source code of a reference page (91 characters in total).
<html><head><title>Untitled Document</title></head><body><h1>Hello World</h1></body></html>
This can be loaded into the module with the below command at+rsi_webpage=91,<html><head><title>Untitled Document</title></head><body><h1>Hello World</h1></body></html>
Refer to the command Load Web Page in Module in the Programming Reference Manual for more details. Redpine Signals, Inc. Page 29 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 5 Evaluation of Client Mode with Enterprise Security UART Interface PC (P) RS-WC-
301(A) Ethernet Interface Access Point
(B) Test_AP Laptop/PC
(D) running Radius Server Laptop (C) Figure 6: Enterprise Security Set-up In this set-up the RS-WC-301 EVB acts as a client Wi-Fi module. It connects to an Enterprise security enabled Access Point. RS-WC-301 module support four Enterprise Security modes:
1. EAP-TLS 2. EAP-TTLS 3. EAP-FAST 4. PEAP-MSCHAPV2 5.1 Radius Server Configuration To evaluate any of the Enterprise Security modes, a Radius server should be running on a Laptop/PC (node D in the above figure) connected to the Access Point. A Linux compatible radius server package is downloadable from http://freeradius.org. Installation instructions can be found in the documentation included in the package. Additionally, the install process is described below. Installation of the Radius Server on a Linux PC If the user wants to use the sample radius server for evaluation, he can install it on a Linux PC (recommended Fedora 2.6.30). 1. Uncompress the package freeradius-server-2.1.12.tar in the desired location in the Linux PC. After uncompressing is done, change directory to the freeradius-server-2.1.12 folder Redpine Signals, Inc. Page 30 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 2. Issue the following commands:
./configure make make install 3. The radius server is now installed in the PC (D). A folder raddb is created inside /usr/local/etc. Replace this folder with the raddb folder provided inside Redpines software package RS.WSC.x.x.GENR.x.x.x.x.x.x\ Software\Applications\Radius_server\
4. To start the Radius Server, issue the below command on the Linux terminal radiusd X NOTE: The user can use other Radius Server software also for evaluation. This radius server is provided for reference. Important files for the Radius_Server:
1. RS.WSC.x.x.GENR.x.x.x.x.x.x\Software\Applications\Radius_server\raddb
\certs\ wifiuser.pem This is the default certificate file provided with the software package. The file used for the parameter < certificate> in the command at+rsi_cert, when EAP-TLS mode is used in the module. This certificate file should be present in PC(P). NOTE: To generate a new certificate, the below process may be used in the Linux PC where freeradius-server was installed. Create Normal Certificate mkdir new_certs cd new_certs/
mkdir sslcert chmod 0700 sslcert cd sslcert mkdir certs private echo 100001 >serial touch certindex.txt vi openssl.cnf
/* CA root */
openssl req new x509 extensions v3_ca keyout private/cakey.pem out cacert.pem days 365 config ./openssl.cnf
/* Certificates Request */
openssl req new nodes out redpine-req.pem keyout private/redpine-key.pem Redpine Signals, Inc. Page 31 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 days 365 config ./openssl.cnf
<openssl.cnf is the configuration file used to generate the certificate. A sample file is provided at RS.WSC.x.x.GENR.x.x.x.x.x.x\Software\Applications\Radius_server\openssl.cnf>
/* Signing the certificates with ca root certificate generated in section CA root */
openssl ca out redpine-cert.pem days 365 config ./openssl.cnf infiles redpine-
req.pem Finally concatenate the redpine-key.pem, redpine-cert.pem cacert.pem cat redpine-key.pem >> redpine-cert.pem >> cacert.pem. File redpine-key.pem is the new certificate. Create Encrypted Certificate mkdir new_certs cd new_certs/
mkdir sslcert chmod 0700 sslcert cd sslcert mkdir certs private echo '100001' >serial touch certindex.txt vi openssl.cnf
/* CA root */
openssl req -new -x509 -extensions v3_ca -keyout private/cakey.pem -out cacert.pem -days 365
-config ./openssl.cnf
/*Encrypt Private Key - use this encrypted key (private/cakey1.pem ) in openssl.cnf*/
openssl pkcs8 -in private/cakey.pem -topk8 -out private/cakey1.pem
/* Certificates Request */
openssl req -new -nodes -out redpine-req.pem -keyout private/redpine-key.pem -
days 365 -config
./openssl.cnf
/* Signing the certificates with ca root certificate generated in section CA root */
openssl ca -out redpine-cert.pem -days 365 -config ./openssl.cnf -infiles redpine-
req.pem /*Encrypt Key*/
Redpine Signals, Inc. Page 32 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 openssl pkcs8 -in private/redpine-key.pem -topk8 -out private/redpine-key1.pem
/*Finally concatenate the redpine-key1.pem, redpine-cert.pem cacert.pem in the order */
cat redpine-key1.pem redpine-cert.pem cacert.pem > cert.pem 2. RS.WSC.x.x.GENR.x.x.x.x.x.x\Software\Applications\Radius_server\raddb
\users This file contains the user id and password, to be used in <user_identity>
and <password> fields of the command at+rsi_eap 3. RS.WSC.x.x.GENR.x.x.x.x.x.x\Software\Applications\Radius_server\raddb
\eap.conf This file is used to select the EAP methods. The password wifi
(<private_key_password = wifi> inside the file) should be used for the field <key_password> in the command at+rsi_cert. 5.2 AP Settings A snapshot is shown for AP Settings to work in Enterprise Security mode. A Linksys AP (model no. WRT400N) is used for illustration. This should match IP Address of the PC (D) in figure Enterprise Security Set-up running the Radius Server This should match the parameter secret in file clients.conf inside raddb folder Figure 7: Access Point Settings (Enterprise Security Mode) Redpine Signals, Inc. Page 33 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 5.3 Evaluating EAP-TLS Mode To verify the EAP-TLS mode, a security certificate file should be loaded into the module. A Python based flow is provided to verify this mode as loading of certificate files cannot be done through Hyper-terminal or Teraterm. 1. Enable WPA2-Enterprise in the Access Point settings and start the Radius Server in the Laptop (D) connected to the AP. 2. Install Python on PC(P). The pyserial package should be included in the installation to access the serial port. 3. Configure the EVB in UART mode, connect a UART cable between the PC and the EVB and power up the EVB. 4. Make sure the following things are configured accordingly in the Python script RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\UART\Python\WiFi_Enterpris e_TLS.py a. Path of the certificate file
[f3=open(<Path>\\RS.WSC.x.x.GENR.x.x.x.x.x.x\\Resources\
\Applications\\Radius_server\\raddb\\certs\\wifiuser.pem,r+
)]
b. SSID of the Access Point at rsi_ssid. It should reflect the SSID of the AP you want to connect to. c. Values for parameters user_identity and security_key should match the values in the file <radius server path>\raddb\users d. Parameter oper_mode should be 2 e. COM port name (called param1 in the script) should match the name of the COM port name in PC. f. rsi_band should be configured according to the settings of the AP. 5. Open Windows Command Line in the PC (P) and run the script WiFi_Enterprise_TLS.py. Power cycle or reset the module before every fresh run of the script. The script sends AT commands to the module from the PC and makes the module connect to the Access Point. The sequence of commands executed in the script is shown below. NOTE: It is strongly recommended that the user downloads the latest software package inside www.redpinesignals.com/OpenKM (inside Wi-Fi Modules/WiSeConnect/Software folder. The software package contains the latest raddb folder and also the latest Python script that is used in this illustration. Redpine Signals, Inc. Page 34 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Power Up EVB at+rsi_opermode at+rsi_band at+rsi_init at+rsi_eap at+rsi_scan at+rsi_cert at+rsi_join at+rsi_ipconf to acquire IP address Open a server TCP socket with port number 5001 The acquired IP address is displayed by the Python script Figure 8: Command Flow in Enterprise Security Mode Data received by the module, sent from Laptop
(C) in step 8 below. Figure 9: Running of Python Script WiFi_Enterprise_TLS.py Redpine Signals, Inc. Page 35 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 After opening the Server TCP socket, the script prompts to enter 1 to receive data. Enter 1 and proceed to step 6 below. 6. Connect Laptop C, as shown in the figure Enterprise Security Set-up. It should have proper security credentials to connect to the AP. 7. A ping2 can be issued from Laptop C to the Wi-Fi module to verify connectivity through the AP. 8. Exchanging data between the module and the Laptop (C) a. Open a client TCP socket on the Laptop C by typing the below command in the command line:
TCP.exe c 2001 <Modules IP address> 5001 The IP address of the module is displayed in the command window in Laptop (D) where the Python script was invoked. A server socket is already opened in the module by the Python script. b. The command line window in Laptop C will display three options: 1
(Send), 2 (Receive) and 3 (Exit). Enter 1 to send data to the Wi-
Fi module. On being prompted Enter the string to be transmitted, type any string from the Keyboard. On pressing Enter key on the keyboard, the data is sent from the Laptop(B) to the module and the terminal displays it with the AT+RSI_READ message as shown in figure Running of Python Script WiFi_Enterprise_TLS.py. 9. HTTP server access: To access the HTTP server, the step #7 in section Configuration and Test Procedure should be used. The URL http://<modules IP Address> should be opened in a browser in Laptop C. 5.4 Evaluating EAP-TTLS, EAP-FAST and PEAP Modes These modes can be evaluated using the Hyperterminal or Teraterm. The same set-up as shown in the figure Enterprise Security Set-up can be used. 1. Run the radius server in the Laptop (D). Power up the module and issue the following commands. a. at+rsi_opermode=2 This configures the EVB to function in client mode with Enterprise Security. The module responds with OK. b. at+rsi_band=0 2 The module can respond to a ping request sent from a remote terminal. There is no command to send a ping request from the module. This is true in all the modes-
Client, AP and Wi-Fi Direct. Redpine Signals, Inc. Page 36 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 This configures the operating band of the EVB. The module responds with OK. c. at+rsi_init This initializes the Wi-Fi module in the EVB. The module responds with OK<MAC_Address>
d. at+rsi_fwversion?
Optional command to report the firmware version in use. e. at+rsi_eap=TTLS,MSCHAPV2,user1,password1 This configures the EAP mode of the module. In case of PEAP mode, change TTLS to PEAP. The module responds with OK. f. at+rsi_scan=0 This makes the module scan for available networks. The module responds with information of the Aps scanned. g. at+rsi_join=Test_AP,0,2 This commands the module to join to the AP Test_AP. On successful association, the module responds with OK<GO_status>. The GO_status parameter can be ignored. h. at+rsi_ipconf=0,<desired IP>,<subnet>,<gateway>
This command configures the modules IP in static mode (not DHCP). Make sure the desired IP is in the same subnet as the Access Point. The module responds to this command by sending the configured IP address to the Host as response to the command. In the terminal, this response might appear as unreadable characters because of ASCII conversion. The Serial Port Monitor can however be used to see the exact bytes. To get the IP is DHCP mode the command is at+rsi_ipconf=1,0,0,0 i. at+rsi_ltcp=5001 This command opens a server TCP socket with port number 5001, in the module. The module responds with OK<socket_type><socket_handle><lport><module_ipaddr>. The socket_handle parameter will be used in the subsequent sections to send data. 2. Connect Laptop C, as shown in the figure Enterprise Security Set-up. It should have proper security credentials to connect to the AP a. Open a client TCP socket on the Laptop C by typing the below command in the command line:
TCP.exe c 2001 <Modules IP address> 5001 The application is found in the path RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\Applications\Peer\Windo Redpine Signals, Inc. Page 37 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 ws\ . The IP address of the module is displayed in the command window in Laptop (D) where the Python script was invoked. b. The command line window will display three options: 1 (Send), 2
(Receive) and 3 (Exit). Type 1 to send data to the Wi-Fi module. On being prompted Enter the string to be sent, type any string from the Keyboard. On pressing Enter key on the keyboard, the data is sent from the Laptop(B) to the module and the Hyperterminal displays it with the AT+RSI_READ message. c. To send data from the Wi-Fi module, type Option 2 in Laptop C and then type the below command in the module at+rsi_snd=<socket_handle>,0,0,0,abcdefgh socket_handle is the parameter returned when the TCP socket is opened in the module. Refer to the programming reference manual for more details. 3. HTTP server access: To access the HTTP server, the step #7 in section Configuration and Test Procedure should be used. The URL http://<modules IP Address> should be opened in a browser in Laptop C. Redpine Signals, Inc. Page 38 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 6 Evaluation of Wi-Fi Direct Mode UART Interface PC RS-WC-
301(A) Wi-Fi Direct Mobile Phone or other Wi-
Fi Direct device (B) Figure 10: Wi-Fi Direct Set-up In this set-up, a RS-WC-301 EVB is at one end of the set-up and the other end is a Wi-Fi Direct device such as a phone. 6.1 Configuration and Test Procedure The following steps should be executed:
1. Enable Wi-Fi Direct Mode in the phone. Below is shown an example with an Android 2.3 phone. The Wi-Fi Direct mode can be configured by going into the phones Wi-Fi Settings. The Configure Wi-Fi Direct button can be clicked to set the device name accordingly (Android_phone in this case). 2. Open the Serial Port Monitor to see the actual bytes exchanged. Open Hyperterminal or Teraterm. 3. Configure the EVB in UART mode, connect a UART cable and Power on the EVB. Redpine Signals, Inc. Page 39 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 4. The terminal will show the message Welcome to WiSeConnect. The module boots up. Card Ready (LED2) glows on successful completion of boot-up and a string READY is sent from module to host. 5. Enter the following commands3. A command should be entered only after getting the response of the previous command a. at+rsi_opermode=1 This configures the EVB to function in Wi-Fi Direct mode. The module responds with OK. b. at+rsi_band=0 This configures the operating band of the EVB. The module responds with OK. c. at+rsi_init This initializes the Wi-Fi module in the EVB. The module responds with OK<MAC_Address>. d. at+rsi_fwversion?
Optional command to report the firmware version in use. e. at+rsi_wfd=15,RED,1,wiseconnect,12345678 This starts the Wi-Fi Direct functionality in the module. The first parameter in this command is called the Group_Owner_Intent. It gives the willingness of the module to become a Group Owner. It has been set to the highest value of 15 in this case. Refer to the Programming Reference Manual for more details. The module responds with OK. 6. After issuing the last command, the module starts scanning for Wi-Fi Direct devices, and reports any that are found through the asynchronous message AT+RSI_WFDDEV 7. After the module reports Wi-Fi Direct devices, issue the Join command to connect. at+rsi_join=Android_phone,0,2 In this example, it is assumed that the device name of the phone is configured as Android_phone. The phone should also display the device name of the module (RED in this example). Within about 10 secs of issuing the Join command in the module, click Connect on the phone as well to connect to the module. On successful connection, the module responds with OK and the Phone displays Connected 3 Please refer to the Programming Reference Manual for detailed descriptions of all the commands. Redpine Signals, Inc. Page 40 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Module reported the device name of the Phone Issue Connect on the Phone also when the Join command is issued in the module. Figure 11: Messages in Hyper-terminal 8. If the module has NOT become a GO (Group Owner), issue the below command to get an IP address from the phone. If the module has become a GO, this command need not be issued. at+rsi_ipconf=1,0,0,0 The acquired IP address is returned to the Host and can be observed in Serial Port Monitor. Please refer to the description for the command Join in the Programming Reference Manual. The parameter GO_Status returned with the OK response of the Join command is used to determine whether the module became a GO or not. If the module becomes the GO, it will internally assign itself the IP 192.168.100.76 and will act as a DHCP server. The Wi-Fi Direct phone will acquire an IP address from the module automatically (assuming DHCP client is enabled in the phone). Since the Group_Owner_Intent in point #5 above has been set to the highest value, there is a very strong chance the module will become a Group Owner. Redpine Signals, Inc. Page 41 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 RS-WC-301 (A) Power Up EVB Welcome to Wise Connect Card Ready LED glows READY message sent from module at+rsi_opermode = 1 at+rsi_band at+rsi_init at+rsi_wfd Module scans for Wi-Fi Direct devices and reports to Host at+rsi_join with target device name Wi-Fi Direct phone or other device (B) Power Up Device Scan for Wi-Fi Direct devices Issue join or connect instruction to the Phone within 1 minute of issuing at+rsi_join in the RS-WC-
301 module GO Negotiation starts between the two devices Yes Module granted GO status?
No Node (B) is GO (Group Owner). Module associates to the GO. WPA2-PSK is the security mode used. Send at+rsi_ipconf to configure IP of the module. Module and Node B associate. The module configures its IP as 192.168.100.76. Node B gets IP address from the DHCP server of the module. Figure 12: Command Flow in Wi-Fi Direct Mode Redpine Signals, Inc. Page 42 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 9. Exchanging Data with the Module In the following descriptions it is assumed for illustrative purposes that the modules IP address is 192.168.100.76 and the remote peer
(phone) IP address is 192.168.100.77. Running Ping Application A ping application can be run from the Wi-Fi Direct Phone, with the destination address as 192.168.100.76. The module will send the ping response. Ping based applications are freely available for Android phones. Exchanging data through sockets For exchanging data between the module and the Wi-Fi Direct Phone, an application may be written by the user at the mobile phone to open sockets and transmit or receive data. At the module side, sockets can be opened by using the below commands:
a. To open a server TCP socket in the module, issue the below command. at+rsi_ltcp=5001 5001 is the example port number of the socket opened. Once the socket is opened, a client socket should be opened at the remote peer (phone) to connect to this socket and establish a TCP connection. The module responds with OK<socket_type><socket_handle><lport><module_ipaddr>. The socket_handle parameter will be used in the subsequent sections to send data. b. After the TCP connection is established, data can be exchanged between the two nodes. To send data from the module, issue the following command can be typed in Hyperterminal or Teraterm:
at+rsi_snd=<socket_handle>,0,0,0,abcdefgh where abcdefgh is the data stream to be transmitted to the remote Peer. Socket_handle is the parameter returned when the TCP socket is opened in the module. Refer to the programming reference manual for more details. If the remote peer sends data to the module, the module would receive it and show the data in the terminal with the message AT+RSI_READ<socket handle><size><Source IP><Source port><data stream>
10. HTTP server access: To access the HTTP server, the step #7 in section Configuration and Test Procedure should be used. The URL http://<modules IP Address> should be opened in the connected phone. Redpine Signals, Inc. Page 43 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 7 Evaluation of Access Point Mode UART Interface PC (P) RS-WC-301(A)
(Access Point) Client Laptop(B) Client Laptop(C)
(Optional) Figure 13: Access Point Set-up In this set-up, the module is the Access Point and a Laptop is the client. A maximum of 4 clients can be supported 7.1 Configuration and Test Procedure The following steps should be executed:
1. Open the Serial Port Monitor to see the actual bytes exchanged. Open Hyperterminal or Teraterm. 2. Configure the EVB in UART mode, connect a UART cable and Power on the EVB. 3. The terminal will show the message Welcome To WiSeConnect. The module boots up. Card Ready (LED2) glows on successful completion of boot-up and a string READY is sent from module to host. 4. Enter the following commands. A command should be entered only after getting the response of the previous command a. at+rsi_opermode=6 This configures the EVB to function in AP mode. The module responds with OK. b. at+rsi_band=0 This configures the operating band of the EVB. The module responds with OK. c. at+rsi_init Redpine Signals, Inc. Page 44 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 This initializes the WiFi module in the EVB. The module responds with OK<mac_address>
d. at+rsi_fwversion?
Optional command to report the firmware version in use. e. at+rsi_ipconf=0,192.168.50.1,255.255.255.0,192.168.5 0.1 To configure the IP (192.168.50.1 in this example) of the AP. If this command is not issued, a default IP of 192.168.100.76 will be used. f. at+rsi_apconf=1,redpine,2,2,12345678,300,2,4 The SSID is configured as redpine, to operate in channel 1. g. at+rsi_join=redpine,0,2 This starts the Access Point functionality in the module. The module is now configured as an Access Point. Its IP address is 192.168.50.1. A Laptop can now scan for networks and the SSID of the module, redpine will be displayed in the Laptops list of Scanned APs. After the client Laptop (B) connects to the AP by providing the correct password (12345678 in this example), it acquires an IP address. It is assumed for illustrative purposes that the IP of the Laptop is 192.168.50.2 5. Exchanging data between the client Laptop (B) and the Access Point a. Open a Listening TCP socket on the module by issuing the command at+rsi_ltcp=5001 b. Open a TCP socket on the client Laptop (B) (Windows OS based) by typing the below command on the command line:
TCP.exe c 2001 192.168.50.1 5001 The application is found in the path RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\Applications\Peer\Windo ws\ . The destination IP (the Access Point in this case) is 192.168.50.1. c. The command line window will display three options: 1 (Send), 2
(Receive) and 3 (Exit). Type 1 to send data to the Wi-Fi module. On being prompted Enter the string to be transmitted, type any string from the Keyboard. On pressing Enter key on the keyboard, the data is sent from the Laptop(B) to the module and the Hyperterminal displays it with the AT+RSI_READ message. d. To send data from the Wi-Fi module, type Option 2 in Laptop (B) and then type the below command in the module at+rsi_snd=<socket_handle>,0,0,0,abcdefgh Redpine Signals, Inc. Page 45 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511
<socket_handle> is the parameter returned by the module when a socket is opened in the module. Refer to the programming reference manual for more details. A second Laptop I can also be connected to the modules AP and data transfers can be done between it and Laptop (B). 6. HTTP server access: To access the HTTP server, the step #7 in section Configuration and Test Procedure should be used. The URL http://<modules IP Address> should be opened in any of the connected client devices. Redpine Signals, Inc. Page 46 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 8 Wireless Configuration The module can be configured wirelessly to join a specific AP (referred to as auto-connect) or create an Access Point (referred to as auto-create). 8.1 Configuration to join a Specific AP Flow 1: In this flow, an AP is first created in the module, to which a remote device connects and configures the module. UART Interface PC (P) RS-WC-
301(A) Laptop (B) 1. Connect a PC or Host to the module through the UART interface and power up the module. 2. Configure the module to become an AP by issuing commands from PC
(P) as in section Evaluation of Access Point Mode. The sequence of commands is given below. a. at+rsi_opermode=6 b. at+rsi_band=0 c. at+rsi_init d. at+rsi_fwversion?
e. at+rsi_ipconf=0,192.168.50.1,255.255.255.0,192.168.5 0.1 f. at+rsi_apconf=1,redpine,2,2,12345678,300,2,4 g. at+rsi_join=redpine,0,2 The module is now configured as an Access Point. Its IP address is 192.168.50.1. 3. Connect a Laptop (B) to the created AP. Open the URL http://<Modules IP address>/config.htm in the Laptop. In this case, the URL is http://192.168.50.1/config.html. Make sure the browser in the laptop does not have any proxies enabled. Redpine Signals, Inc. Page 47 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 4. In the web page that opens, select Client mode and enter desired values. SSID: This is the SSID of the AP to which the module should connect after configuration is over. Data rate: Physical data rate. This can be set to 0. For more details, refer to the section on wireless configuration in the PRM. Tx Power: RF power for Tx. Set to 2. Security mode and PSK: This should match the security mode of the AP to which the module should connect. DHCP: If DHCP is selected, the module will work as a DHCP client, otherwise, an IP should be hard coded in the web page. Channel: Channel number at which the target AP is present. Set to 0 in this example. For more details, refer to the section on wireless configuration in the PRM. Click on Submit Query button. The information is sent to the module and stored in its internal flash. 5. The module should now be power cycled or hard reset. It boots up and then automatically scans channels for the target AP and connects to it and gets an IP address. The module will send out two responses to the Host, the first corresponds to the internally given Join command and the second to the Set IP Parameters command. Note that once the module is restarted, no commands need to be given. The module automatically scans and joins the target AP, after which the stored configuration parameters can be retrieved using the Redpine Signals, Inc. Page 48 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 command at+rsi_cfgget. If the auto-connect feature needs to be disabled, issue the command at+rsi_cfgenable=0. Refer to the PRM for more details on these commands. Flow 2: In this flow, the module is connected to an AP. A remote device connects to the same AP and configures the module. UART Interface PC (P) RS-WC-
301(A) Access Point
(C) Laptop (B) 1. Connect a PC or Host to the module through the UART interface and power up the module. 2. Configure the module to become a client and connect to an AP as described in section Evaluation of Client Mode with Personal Security. 3. Connect a Laptop (B) to the same AP. Open the URL http://<Modules IP address>/config.htm in the Laptop. For example, if the module was configured to have an IP of 192.168.100.20, then the URL is http://192.168.100.20/config.htm. Make sure the browser in the laptop does not have any proxies enabled. 4. In the web page that opens, select Client mode and enter desired values. SSID: This is the SSID of the AP to which the module should connect after configuration is over. Data rate: Physical data rate. This can be set to 0. For more details, refer to the section on wireless configuration in the PRM. Tx Power: RF power for Tx. Set this to 2. Security mode and PSK: This should match the security mode of the AP to which the module should connect. Redpine Signals, Inc. Page 49 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 DHCP: If DHCP is selected, the module will work as a DHCP client, otherwise, an IP should be hard coded in the web page. Channel: Channel number at which the target AP is present. This can be set to 0 in this example. For more details, refer to the section on wireless configuration in the PRM. Click on Submit Query button. The information is sent to the module and stored in its internal flash. 5. The module should now be power cycled or hard reset. It boots up and then automatically scans channels for the target AP and connects to it and gets an IP address. The module will send out two responses to the Host, the first corresponds to the internally given Join command and the second to the Set IP Parameters command. Note that once the module is restarted, no commands need to be given. The module automatically scans and joins the target AP, after which the stored configuration parameters can be retrieved using the command at+rsi_cfgget. If the auto-connect feature needs to be disabled, issue the command at+rsi_cfgenable=0. Refer to the PRM for more details on these commands. Redpine Signals, Inc. Page 50 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 8.2 Configuration to create an AP Flow 1: In this flow, an AP is first created in the module, to which a remote device connects and configures the module. UART Interface PC (P) RS-WC-
301(A) Laptop (B) 1. Connect a PC or Host to the module through the UART interface and power up the module. 2. Configure the module to become an AP by issuing commands through PC (P). 3. Connect a Laptop (B) to the created AP. Open the URL http://<Modules IP address>/config.htm in the Laptop. For example, if the module was configured to have an IP of 192.168.100.1, then the URL is http://192.168.100.1/config.htm. Make sure the browser in the laptop does not have any proxies enabled. 4. In the web page that opens, select Access Point mode and enter desired values. SSID: This is the SSID of the AP which will be created after configuration is over. Data rate: Set the data rate to 0. Tx Power: RF power for Tx. Set this value to 2. Security mode, PSK, security type, encryption type: This is to configure the security mode of the AP. Channel: Channel number at which the target AP is present. Value of 0 is not allowed. IP, Mask, Gateway: These parameters set the IP parameters of the AP. Beacon Interval and DTIM count: This to set the beacon parameters of the AP. For example, if beacon interval is 200 (msecs) and DTIM count is 3, the DTIM interval would be 2x300=600 msecs. Redpine Signals, Inc. Page 51 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Click on Submit Query button. The information is sent to the module and stored in its internal flash. 5. The module should now be power cycled or hard reset. It boots up and then automatically creates and AP with the configured parameters. The module will send out two responses to the Host, the first corresponds to the internally given Set IP Parameters command and the second to the Join command. Note that once the module is restarted, no commands need to be given. The module automatically and internally executes the commands to create an AP. The stored configuration parameters can be retrieved using the command at+rsi_cfgget. If the auto-connect feature needs to be disabled, issue the command at+rsi_cfgenable to the module. Refer to the PRM for more details on these commands. Redpine Signals, Inc. Page 52 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Flow 2: In this flow, the module is connected to an AP. A remote device connects to the same AP and configures the module. UART Interface PC (P) RS-WC-
301(A) Access Point
(C) Laptop (B) 1. Connect a PC or Host to the module through the UART interface and power up the module. 2. Configure the module to become a client and connect to an AP by issuing commands from the PC (P). 3. Connect a Laptop (B) to the created AP. Open the URL http://<Modules IP address>/config.htm in the Laptop. For example, if the module was configured to have an IP of 192.168.100.20, then the URL is http://192.168.100.20/config.htm. Make sure the browser in the laptop does not have any proxies enabled. 4. In the web page that opens, select Access Point mode and enter desired values. SSID: This is the SSID of the AP which will be created after configuration is over. Data rate: Set the data rate to 0. Tx Power: RF power for Tx. Set this value to 2. Security mode , PSK, security type, encryption type: This is to configure the security mode of the AP. Channel: Channel number at which the target AP is present. Value of 0 is not allowed. Redpine Signals, Inc. Page 53 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 IP, Mask, Gateway: These parameters set the IP parameters of the AP. Beacon Interval and DTIM count: This to set the beacon parameters of the AP. For example, if beacon interval is 200 (msecs) and DTIM count is 3, the DTIM interval would be 2x300=600 msecs. Click on Submit Query button. The information is sent to the module and stored in its internal flash. 5. The module should now be power cycled or hard reset. It boots up and then automatically creates and AP with the configured parameters. The module will send out two responses to the Host, the first corresponds to the internally given Set IP Parameters command and the second to the Join command. Note that once the module is restarted, no commands need to be given. The module automatically and internally executes the commands to create an AP. The stored configuration parameters can be retrieved using the command at+rsi_cfgget. If the auto-connect feature needs to be disabled, issue the command at+rsi_cfgenable=0 to the module. Refer to the PRM for more details on these commands. Redpine Signals, Inc. Page 54 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 9 Using the Module in USB Mode The module supports the USB 2.0 interface. It corresponds to the CDC-
ACM class and presents itself as a USB Device to the Host USB. A file is provided with the software package that the user should install in the Host platform, in order to communicate with the module. A sample flow is provided below to use the module with a PCs USB interface. The parameters corresponding to the device after the USB is detected are:
Device Descriptor:
bcdUSB: 0x0200 bDeviceClass:
bDeviceSubClass:
bDeviceProtocol:
bMaxPacketSize0:
idVendor: 0x041B idProduct: 0x0102 bcdDevice: 0x0002 iManufacturer: 0x01 0x02 0x00 0x00 0x10 (16) NOTE: It is essential to read all the previous sections of the document that describes how to use the module in UART mode. The steps t use the module in USB mode are the same. 1. Configure the EVB in USB mode (Interface Selection) and connect the USB interface of a PC to that of the module. The PC prompts for installing the driver. Install the file from RS.WSC.2.0.GENR.x.x.x.x.x.x\Resources\USB\rsi_usbcdc. The installation needs to be done only once. 2. Power cycle the module. Check the list in Ports in the Device Manager Settings of the PC. It should show the device as RSI WSC Virtual Com Port. 3. Open Hyper-terminal and follow the steps in section Configure Serial Port Monitor in the PC to configure the Hyperterminal. The COM port number (COM3 in the above example) should be supplied to the Hyperterminal. Set Flow Control to None. Baud rate, Data bits, Parity and Stops bits for Dont care fields in USB mode. Redpine Signals, Inc. Page 55 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 4. The module sends the message Welcome to WiSeConnect and then READY. Now, AT commands can be issued from at+rsi_opermode onwards, through the virtual Com port (follow sections 4, 5, 6 and 7 of the document). The behavior of the module, commands, command responses, error codes and flow of commands are exactly same as in the UART mode except for a few exceptions described in the Programming Reference Manual. Python scripts can also be run to configure and operate the module. A sample script is given for EAP-
TLS mode ( refer section Evaluation of Client Mode with Enterprise Security) inside RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\USB\WiFi_Enterprise_TLS_F or_USB.py can be run in the USB mode. The USB interface of the module supports the full speed USB mode
(12 Mbps physical data rate). NOTE: If after one session of testing, the user wants to reset the EVB and start over again, he should open a fresh Hyperterminal session and make sure the newly assigned COM port is supplied to the Hyperterminal. Redpine Signals, Inc. Page 56 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 10 Using the Module in SPI Mode To evaluate the module in SPI mode, the following steps should be followed:
1. SPI interface of the EVB should be interfaced with the Host MCU. Host MCU SPI MOSI SPI MISO SPI CLK SPI CS SPI MOSI (SPI Header) SPI MISO (SPI Header) SPI CLK (SPI Header SPI CS (SPI Header) INTERRUPT INTERRUPT (SPI Header Pins) GPIO SPI_READY (General Purpose Header) RESET_N RESET_N (General Purpose Header) GPIO WAKEUP RS-WC-301 Figure 14: Interface between Module and Host Signal Integrity Guidelines for SPI interface: Glitches in the SPI clock may take the SPI interface out of synchronization. The quality and integrity of the clock line should be maintained. The following steps are recommended. This is not an exhaustive list of guidelines and depending on individual cases additional steps may be needed. 1. Avoid using long cables to connect the Host platform with the EVBs SPI interface. If a cable is used, minimize its length to as small as possible, preferably to within two inches. 2. Increase the number of ground connections between the Wi-Fi PCB and the MCU PCB 3. Add a series resistor into the clock line. Choice of value is mentioned in the Module Integration Guide. 4. If the SPI clock line is mapped to a programmable I/O on the MCU, configure that I/O to an output with as high a drive as is available. 5. Ensure that the EVBs reset input is mapped to a MCU controllable line, so that the system can recover through a hard reset. Redpine Signals, Inc. Page 57 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 2. The DIP switches should be configured to put the EVB in SPI mode according to table Interface Selection. 3. The source code of a sample driver, API set and application is provided with the Software Package. The developer should port the source code into the target platform. Appropriate HAL changes may be required for porting. a. The Driver source code is present in the software package inside RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\SPI\Driver\
b. The porting guidelines to port the driver are present in the document RS-WC-301_Software_PRM.pdf in the section Driver Porting Guide for SPI c. The section RS-WC-301 in SPI mode in RS-WC-
301_Software_PRM.pdf should be carefully read to understand all the commands to configure and operate the module. 4. The following settings should be observed to use the SPI interface a. SPI CPOL=0 b. SPI CPHASE=0 c. Max SPI Clock = 12.5 Mhz (For detailed timing information on the SPI signals, please refer to the Datasheet). d. The Interrupt output from the module is active high, level triggered. 10.1 Sample flow for evaluating SPI mode The set-ups described in the previous sections describing the UART interface (Client Mode with Personal Security, Client Mode with Enterprise Security, Wi-Fi Direct Mode and Access Point mode can be used to evaluate the module in SPI mode. A sample flow for evaluating the module in different modes is given below. The Application running in the Host should execute this flow by calling the different APIs provided. Redpine Signals, Inc. Page 58 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Power up Module boots up and sends Interrupt Host Executes CARD READY Operation (refer PRM) Set Operating Mode Operating Mode=0
(Client Mode Set-
up with Personal Security) Operating Mode=2
(Enterprise Security Set-up) Operating Mode=1
(Wi-Fi Direct Set-
up) Operating Mode=6(Access Point Set-up) Band Init Band Init Band Init Band Init Query Firmware Query Firmware Query Firmware Query Firmware Version Version Version Version Set EAP Configure WFD P2P Configure AP Mode
(GOIntent 15) Scan Set PSK Join Scan Set Certificate (if TLS mode is used) Set IP Parameters Join Open a Server TCP Socket Open a Client socket at the remote terminal
(using TCP.exe) and transfer data Set IP Parameters Open a Server TCP Socket Open a Client socket at the remote terminal
(using TCP.exe) and transfer data Join Join Set IP Parameters if module is not a Group Owner Open a Server TCP Socket Open a Client socket at the remote terminal and transfer data AP is now created Connect clients to the AP Open a Server TCP Socket in module Open a Client socket at the remote terminal
(using TCP.exe) and transfer data Figure 15: Flow of Commands in SPI mode Redpine Signals, Inc. Page 59 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 11 Upgrading Firmware Through the UART Interface For Users of Firmware Version lower than 2.1.0.1.2.5 This section is for users who want to upgrade from Version x to Version y, both x and y being less than 2.1.0.1.2.5 The firmware of the module can be upgraded using the UART interface. Upgrading of firmware using the SPI interface is not supported. However, upgrading firmware using the wireless interface is supported. If the user wants to the upgrade the firmware of the module with a newer version, the following flow should be used. 1.Connect a PC to the Module through the UART interface, using a UART cable. 2.Open the application RS.WSC.x.x.GENR.x.x.x.x.x.x\Resources\UART\Firmware_upgrade\WSC _FW_Upgrade_Util.exe in the PC. This application can be found in the software release package. The application will automatically scan for UART ports in the PC and display the appropriate port. 2.From the drop-down box, select the COM port that is connected to the modules UART interface. 3.Click Open S19 button. Select the file RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WiSe_WLAN.S19. Now press Connect button. 4.Within 10 secs of pressing the Connect button, give a hard-reset to the module. 5.The message window of the GUI will prompt to start the upgrade. Click on Start Upgrade button. Redpine Signals, Inc. Page 60 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 6.The Message window prompts Upgradation Completed. Card_Ready (LED2) glows. It may take up to 1.5 mins for it to glow. 7. Click Open S19 button. Select the file RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WiSe_Control.S19. Now press Connect button. Within 10 secs of pressing the Connect button, give a hard-
reset to the module or power cycle the module. 8. The message window of the GUI will prompt to start the upgrade. Click on Start Upgrade button. 9. The Message window prompts Upgradation Completed. This completed the Firmware Upgrade Process. The module should now be reset or power cycled to operate in normal mode. NOTE: The utility WSC_FW_Upgrade_Util.exe is not compatible with Windows 7 64-
bit systems. For Users migrating to 2.1.0.1.2.5 This section is for users who want to upgrade from Version x to Version 2.1.0.1.2.5, x being lower than 2.1.0.1.2.5. 1.Connect a PC to the module through the UART interface, using a UART cable. 2.Open the application RS.WSC.x.x.GENR.2.1.0.1.2.5\Resources\UART\Firmware_upgrade\WS C_FW_Upgrade_Util.exe in the PC. This application can be found in the software release package. The application will automatically scan for UART ports in the PC and display the appropriate port. Redpine Signals, Inc. Page 61 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 2.From the drop-down box, select the COM port that is connected to the modules UART interface. 3.Click Open S19 button. Select the file RS.WSC.x.x.GENR.2.1.0.1.2.5\Firmware\WFU\WFU_Control.S19. Now press Connect button. 4. Within 10 secs of pressing the Connect button, give a hard-reset to the module. 5.The message window of the GUI will prompt to start the upgrade. Click on Start Upgrade button. 6.The Message window prompts Upgradation Completed. 7. Click Open S19 button. Select the file RS.WSC.x.x.GENR.2.1.0.1.2.5\Firmware\WFU\WLAN_Config.S19. Now press Connect button. Within 10 secs of pressing the Connect button, give a hard-reset to the module or power cycle the module. 8. The message window of the GUI will prompt to start the upgrade. Click on Start Upgrade button. 9. The Message window prompts Upgradation Completed. Card_Ready (LED2) goes Low. It may take up to 1 min for the pin to go low. 10.From the drop-down box, select the COM port that is connected to the modules UART interface. Click Open S19 button. Select the file RS.WSC.x.x.GENR.2.1.0.1.2.5\Firmware\WiSe_WLAN.S19. Now press Connect button. 11.Within 10 secs of pressing the Connect button, give a hard-reset to the module. 12.The message window of the GUI will prompt to start the upgrade. Click on Start Upgrade button. 13.The Message window prompts Upgradation Completed. Card_Ready (LED2) goes Low. It may take up to 1 min for the pin to go low. 14. Click Open S19 button. Select the file RS.WSC.x.x.GENR.2.1.0.1.2.5\Firmware\WiSe_Control.S19. Now press Connect button. Within 10 secs of pressing the Connect button, give a hard-
reset to the module or power cycle the module. 15. The message window of the GUI will prompt to start the upgrade. Click on Start Upgrade button. 16. The Message window prompts Upgradation Completed. This completed the Firmware Upgrade Process. Close the application in the PC and power cycle the module For Users migrating to versions higher than 2.1.0.1.2.5 This section is for users migrating from version x to version y, both x and y being equal to or greater than 2.1.0.1.2.5. There are two options available:
1. Wireless firmware upgrade. For this option follow the section Wireless Firmware Upgrade. Redpine Signals, Inc. Page 62 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 2. Wired firmware upgrade using the UART interface. For this option, follow the process in the sub-section: For Users of Firmware Version lower than 2.1.0.1.2.5. The process for upgrade is same as listed in that section. Redpine Signals, Inc. Page 63 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 12 Wireless Firmware Upgrade The firmware of the module can be upgraded wirelessly. This feature is available from firmware version 2.1.0.1.2.5 onwards. The following sections describe the process. 12.1 Users of Firmware Lower than version 2.1.0.1.2.5 The user should first upgrade to version 2.1.0.1.2.5 to use the feature of wireless firmware upgrade. Refer to the section Upgrading Firmware Through the UART Interface. 12.2 Upgrading Firmware Wirelessly If the user already has firmware version 2.1.0.1.2.5 or above in the module, this section should be followed. To upgrade the firmware of the module, pins WF_HNDSHKE1 and WF_HNDSHKE2 should be connected to corresponding GPIO pins of the Host. Host WF_HNDSHKE2 RS-WC-
301 Laptop WF_HNDSHKE1 Figure 16: Set-up for Wireless Firmware Upgrade The steps are mentioned below:
1. Set WF_HNDSHKE1 to logic 1 from the Host 2. Power up the module 3. Module boots up and comes up as an Access Point in open mode with with SSID REDPINE_<MAC> where <MAC> are the last 3 bytes of the MAC address of the module. The default IP address of the module is found 192.168.40.61. 4. Connect a Laptop to the Access Point 5. Open the application RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WFU WiSeConfigGUI.exe in the Laptop Redpine Signals, Inc. Page 64 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 6. Click on the Connect button. Then click on the button Upgrade Folder. Select the files RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WFU\control_file.rps and RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WFU\wlan_file.rps in the browsing window that comes up. Redpine Signals, Inc. Page 65 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 7. Tick the check boxes and click on the Upgrade button. The progress of the upgrade is shown in the progress bars. After the files are transferred, it may take up to 1 min for the final upgrade confirmation to come in as shown below. Redpine Signals, Inc. Page 66 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 Meanwhile, the Host can keep polling the signal WF_HNDSHKE2. After the upgrade process is over, the module will set the signal to high and will set it again to high or low depending on whether the upgrade was successful, after a delay of 1 msec after the first pulse. This process would confirm the final upgrade status to the Host. The module can now be power cycled for normal operation (WF_HNDSHKE1 should be kept 0 in normal operation) WF_HNDSHKE1 WF_HNDSHKE2 First pulse after upgrade completion Upgrade in progress 1-Upgrade success Host waits for 1 msec 0-Upgrade failure. Try again after fresh power cycle Figure 17: Signal Status During Firmware Upgrade After the confirmation, the module should be power cycled and operated normally thereafter. Redpine Signals, Inc. Page 67 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 NOTE:
If a user is using firmware version 2.1.0.1.2.5 or above in the module, during normal operation of the module the pin WF_HNDSHKE1 should be set to 0. The ONLY scenario where this signal should be set to 1 is when the user wants to upgrade the modules firmware wirelessly. The feature of Wireless Firmware Upgrade is not dependent on the interface
(UART/SPI/USB). The file RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WFU\control_file.rps is exactly same as RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WiSe_Control.S19. The former is in a different format and is used to wirelessly upgrade the firmware, while the latter is used to upgrade the firmware using the UART interface. Same is the case with RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\WFU\wlan_file.rps and RS.WSC.x.x.GENR.x.x.x.x.x.x\Firmware\Wise_WLAN.S19
*****
Redpine Signals, Inc. Page 68 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 13 FCC and IC Declaration This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la classe A est conforme la norme NMB-003 du Canada. This device complies with Industry Canada license-exempt RSS standard(s). Operation is subject to the Following two conditions :( 1) this device may not cause interference, and (2) This device must accept any interference, including interference that may cause undesired operation of the device. Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de licence. L'exploitation est autorise aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et
(2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptibled'en compromettre le fonctionnement. CAUTION: Any changes or modifications not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. This equipment should be installed and operated with minimum distance 20 cm between the radiator & your body. End Product Labelling This Module is labelled with its own FCC ID. If the FCC ID Certification Number is not visible while installed inside another device, then the device should display the label on it referring the enclosed module. In that case, the final end product must be labelled in a visible area with the following:
Contains Transmitter Module FCC ID: XF6-RSWC201 OR Contains FCC ID: XF6-RSWC201 The OEM should not provide information to the end user regarding installation or removal of this RF module or change RF related parameters in the user manual of the end product. The OEM integrator is still responsible for testing their end-product for any additional compliance requirements required with this module installed (for example, digital device emissions, PC peripheral requirements, etc.). Redpine Signals, Inc. Page 69 RRSS--WWCC--330011 EEvvaalluuaattiioonn BBooaarrdd UUsseerr GGuuiiddee VVeerrssiioonn 22..5511 The end user shall declare in the user manual that: The band 5150 - 5250 MHz is for indoor use only"
nonc de la FCC (tats-Unis seulement) Cet quipement a t test et jug conforme aux limites de Classe B pour un appareil numrique, en vertu de larticle 15 de la rglementation de la FCC. Ces limites ont t instaures our fournir une rotection raisonnable contre toute interfrence nuisible dans une installation rsidentielle. Cet quipement gnre, utilise et peut mettre de lnergie radiofrquence. Sil nest pas install et utilis conformment aux instructions, il peut provoquer des interfrences sur les communications radio. Cependant, il nest pas garanti que des interfrences ne se produiront pas dans certaines installations. Si cet quipement cause des interfrences la reception radio ou tlvise (ce qui peut tre vrifi en teignant lappareil puis en le remettant sous tension), lutilisateur peut enter de soudre en suivant une ou plusieurs des mesures ci-aprs : Rorienter ou dplacer lantenne rceptrice. ugmenter lespace entre lappareil et le rcepteur. Brancher lappareil une prise de courant diffrente de celle sur laquelle le rcepteur est branch. Pour obtenir de laide, contacter le vendeur ou un technician radio/television expriment. REMARQUE: Toute modifi cation non autorise expressment par le fabricant responsable de la onformit peut annuler le droit de lutilisateur faire fonctionner le produit. Redpine Signals, Inc. Page 70
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2016-02-19 | 5745 ~ 5825 | DTS - Digital Transmission System | Class II Permissive Change |
2 | 5180 ~ 5240 | NII - Unlicensed National Information Infrastructure TX | ||
3 | 2013-07-01 | 5745 ~ 5825 | DTS - Digital Transmission System | Original Equipment |
4 | 5180 ~ 5240 | NII - Unlicensed National Information Infrastructure TX |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 2 3 4 | Effective |
2016-02-19
|
||||
1 2 3 4 |
2013-07-01
|
|||||
1 2 3 4 | Applicant's complete, legal business name |
Redpine Signals Inc
|
||||
1 2 3 4 | FCC Registration Number (FRN) |
0018834648
|
||||
1 2 3 4 | Physical Address |
2107 N.First Street, Suite 540
|
||||
1 2 3 4 |
San Jose, CA
|
|||||
1 2 3 4 |
United States
|
|||||
app s | TCB Information | |||||
1 2 3 4 | TCB Application Email Address |
c******@curtis-straus.com
|
||||
1 2 3 4 |
r******@twn.tuv.com
|
|||||
1 2 3 4 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 2 3 4 | Grantee Code |
XF6
|
||||
1 2 3 4 | Equipment Product Code |
RSWC301
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 2 3 4 | Name |
S******** A******
|
||||
1 2 3 4 | Title |
Vice President - Systems & Software
|
||||
1 2 3 4 | Telephone Number |
+1 40********
|
||||
1 2 3 4 | Fax Number |
+1 40********
|
||||
1 2 3 4 |
s******@redpinesignals.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 2 3 4 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
1 2 3 4 | Yes | |||||
1 2 3 4 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 2 3 4 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 2 3 4 | Equipment Class | DTS - Digital Transmission System | ||||
1 2 3 4 | NII - Unlicensed National Information Infrastructure TX | |||||
1 2 3 4 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | 802.11 abgn WiSeConnect MODULE | ||||
1 2 3 4 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 2 3 4 | Modular Equipment Type | Single Modular Approval | ||||
1 2 3 4 | Purpose / Application is for | Class II Permissive Change | ||||
1 2 3 4 | Original Equipment | |||||
1 2 3 4 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | Yes | ||||
1 2 3 4 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 2 3 4 | Grant Comments | Class II Permissive Change to allow co-location of up to a hypothetical limit of thirty-three (33) FCC ID: XF6-RSWC301 modules, as described in filing. Output power listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. This transmitter is restricted for use with the specific antenna(s) tested in this application for Certification and must not be co-located or operating in conjunction with any other antenna or transmitters within a host device, except in accordance with FCC multi-transmitter product procedures. The antenna of this transmitter must be installed to provide a separation distance of at least 20 cm from all persons. | ||||
1 2 3 4 | Output power listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. This transmitter is restricted for use with the specific antenna(s) tested in this application for Certification and must not be co-located or operating in conjunction with any other antenna or transmitters within a host device, except in accordance with FCC multi-transmitter product procedures. The antenna of this transmitter must be installed to provide a separation distance of at least 20 cm from all persons. | |||||
1 2 3 4 | Output power listed is conducted. This grant is valid only when the module is sold to OEM integrators and must be installed by the OEM or OEM integrators. This transmitter is restricted for use with the specific antenna(s) tested in this application for Certification and must not be co-located or operating in conjunction with any other antenna or transmitters within a host device, except in accordance with FCC multi-transmitter product procedures. The antenna of this transmitter must be installed to provide a separation distance of at least 20 cm from all persons. Operation in the 5150 - 5250 MHz band is for indoor use only. | |||||
1 2 3 4 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 2 3 4 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 2 3 4 | Firm Name |
LCIE Sud-Est
|
||||
1 2 3 4 |
TUV Rheinland (India) Pvt. Ltd.,
|
|||||
1 2 3 4 | Name |
J******** L******
|
||||
1 2 3 4 |
B****** G****
|
|||||
1 2 3 4 | Telephone Number |
33-4-********
|
||||
1 2 3 4 |
91-80******** Extension:
|
|||||
1 2 3 4 | Fax Number |
33-4-********
|
||||
1 2 3 4 |
91-80********
|
|||||
1 2 3 4 |
j******@Lcie.fr
|
|||||
1 2 3 4 |
g******@ind.tuv.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | CC | 2412 | 2472 | 0.08185 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | CC | 5745 | 5825 | 0.01211 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
2 | 1 | 15E | CC | 5180.00000000 | 5240.00000000 | 0.0079610 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
3 | 1 | 15C | CC | 2412 | 2472 | 0.08185 | |||||||||||||||||||||||||||||||||||
3 | 2 | 15C | CC | 5745 | 5825 | 0.01211 | |||||||||||||||||||||||||||||||||||
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
4 | 1 | 15E | CC | 5180.00000000 | 5240.00000000 | 0.0079610 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC