Part Number Hot Search : 
AC2078 KSZ8999 FDC602P HYS64 D0Z14G16 NTD72H LM8363 X9421
Product Description
Full Text Search
 

To Download WSN802G Datasheet File

  If you can't view the Datasheet, Please click here to try to view without PDF Reader .  
 
 


  Datasheet File OCR Text:
  www.rfm.com technical support +1.678.684.2000 page 1 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 WSN802G series 802.11g wireless sensor network modules integration guide
www.rfm.com technical support +1.678.684.2000 page 2 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 important regulatory information rfm product fcc id: hsw-WSN802G ic 4492a-WSN802G note: this unit has been tested and found to comply with the limits for a class b digital device, pursuant to part 15 of the fcc rules. these limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. this equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the in- struction manual, may cause harmful interference to radio communications. operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to cor- rect the interference at their expense. the WSN802G has been designed to operate with any dipole antenna of up to 9 dbi of gain, or any patch antenna of up to 12 dbi gain. see section 3.10 of this manual for regulatory notices and labeling requirements. changes or modifica- tions to a WSN802G not expressly approved by rfm may void the user?s authority to operate the module. important export information eccn: 5a002.a.1 enc ccats: g073573 the WSN802G products are classified under eccn codes as 5a002.a.1 class devices and carry and enc encryption exception. rfm has had the WSN802G products pre-screened which allows exports to countries listed in supplement 3 to part 740 of the export administration requirements license excep- tion enc favorable treatment countries . when exporting products containing any of the WSN802G products to this list of countries, ccats g073573 should be referenced. export of the WSN802G products or products containing any of the WSN802G products to other coun- tries will require additional review and may be prohibited. this information is provided as a guide to exporting WSN802G-based products but it is the responsibility of the entity exporting WSN802G products or devices to determine their actual requirements.
www.rfm.com technical support +1.678.684.2000 page 3 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 table of contents 1.0 WSN802G introduction ...................................................................................................... ................. 5 1.1 features................................................................................................................. .......................... 6 1.2 applications............................................................................................................. ......................... 6 2.0 WSN802G operation ........................................................................................................ ................. 7 2.1 active and sleep modes ................................................................................................... ............... 7 2.2 automatic i/o reporting .................................................................................................. ................ 8 2.3 data serial port......................................................................................................... ....................... 8 2.4 diagnostic serial port ................................................................................................... ................... 8 2.5 serial peripheral interface (spi) port ................................................................................... ........... 8 2.6 analog i/o ............................................................................................................... ......................... 9 2.7 digital i/o .............................................................................................................. ......................... 10 3.0 WSN802G hardware .......................................................................................................... .............. 11 3.1 absolute maximum ratings ................................................................................................. .......... 11 3.2 specifications........................................................................................................... ...................... 12 3.3 module interface ......................................................................................................... ................... 13 3.4 WSN802Gc and WSN802Gp antenna connector ....................................................................... 14 3.5 input voltage............................................................................................................ ...................... 15 3.6 esd and transient protection ............................................................................................. .......... 15 3.7 interfacing to 5 v logic systems ......................................................................................... .......... 15 3.8 power-on reset requirements.............................................................................................. ....... 15 3.9 mounting and enclosures ................................................................................................... .............. 16 3.10 labeling and notices ..................................................................................................... ................ 17 4.0 application protocol ...................................................................................................... .................... 19 4.1 i/o read request ......................................................................................................... ................. 19 4.2 i/o read - i/o report.................................................................................................... ................. 20 4.3 i/o write gpio........................................................................................................... .................... 20 4.4 i/o write pwm............................................................................................................ ................... 20 4.5 i/o write reply.......................................................................................................... ..................... 21 4.6 i/o serial read .......................................................................................................... .................... 21 4.7 i/o serial write......................................................................................................... ...................... 22 4.8 i/o spi read............................................................................................................. ..................... 22 4.9 i/o spi write ............................................................................................................ ...................... 23 4.10 cfg read................................................................................................................. ..................... 23 4.11 cfg read reply ........................................................................................................... ................ 23 4.12 cfg write ................................................................................................................ ...................... 22 4.13 cfg write reply.......................................................................................................... .................. 24 4.14 configuration parameters................................................................................................. ............. 24 5.0 ip address discovery protocol ............................................................................................. ............ 38 5.1 ip hunt query ............................................................................................................ .................... 39 5.2 ip hunt reply............................................................................................................ ..................... 39 6.0 ssid, channel, encryption and authentication .............................................................................. .. 40 6.1 connection scanning...................................................................................................... ............... 40 6.2 ad hoc mode .............................................................................................................. ................... 40 7.0 snmp module configuration ................................................................................................ ............ 41 7.1 snmp traps ............................................................................................................... ................... 41 7.2 snmp parameter oids...................................................................................................... ............... 42
www.rfm.com technical support +1.678.684.2000 page 4 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 8.0 WSN802Gdk/WSN802Gadk and WSN802Gdk-a/WSN802Gadk-a developer?s kits................ 67 8.1 kit contents ............................................................................................................. ...................... 67 8.2 additional items needed.................................................................................................. .............. 67 8.3 developer kit assembly and testing....................................................................................... ...... 68 8.4 host configurations to support module discovery ....................................................................... 70 8.5 developer board features................................................................................................. ............ 73 8.6 wsnconfig program operation .............................................................................................. ...... 75 9.0 troubleshooting ........................................................................................................... ..................... 92 10.0 appendices ................................................................................................................ ....................... 93 10.1 ordering information..................................................................................................... ................. 93 10.2 technical support ........................................................................................................ .................. 93 10.3 WSN802G mechanical specifications ........................................................................................ ... 94 10.4 WSN802G developer board schematic........................................................................................ 98 11.0 warranty.................................................................................................................. ........................ 101
www.rfm.com technical support +1.678.684.2000 page 5 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 1.0 WSN802G introduction the WSN802G transceiver module is a low cost, robust solution for 802.11b/g/n sensor networks. the WSN802G is unique in that it is able to sleep while still remaining a member of an 802.11b/g/n network. the WSN802G ? s low active current and very low sleep current makes long life battery operation practical. the WSN802G module includes analog, digital and serial i/o, providing the flexibility and versatility needed to serve a wide range of sensor network applications. the WSN802G module is easy to integrate and is compatible with standard 802.11b/g/n routers.         
      
        
                 
        
                                
        
       !       "  #  $ % figure 1.0.1 an example 802.11b/g/n network with WSN802G sensor nodes is shown in figure 1.0.1. a sensor net- work application running on a server or pc communicates with one or more WSN802G sensor nodes through a commercial 802.11b/g/n router. WSN802G sensor nodes can be used with 802.11b/g/n routers that are also serving other applications.  
     & $   & $    '    ( )    ( )   
        
    &   !      (   *  !   ( )    ( ) +  & $ ,  - .   / - , (
0    +  $   "     & ( ) ,  1 &   & ( ) , 2 1 &     (  )   (        3 )  2 , $ 2   3 )  2 ,  2   
    3   '  !   !              (  )   & ( ) ,  1 &   & ( ) , 2 1 &   / - , (
  / - , ) 4 2   ( )   
        
    3   '  !   !                 &     (                &     )       ( )    ( )    ( ) +    +  $   "       (  )  3 )  2 , $ 2   3 )  2 ,  2    (       figure 1.0.2 a WSN802G module is integrated with other components to create a complete sensor node. these com- ponents include a host circuit board, a power supply (battery), sensor i/o electronics and/or a host micro- controller, and a housing (external antenna also required on some WSN802G models). two common configurations are show in figure 1.0.2. serial sensor data communication between a WSN802G module and its host microcontroller requires no protocol formatting. the WSN802G formats data received from its host into udp packets for rf transmission, and delivers the payload data from received udp packets to its host. the sensor network application on the server or pc uses a simple protocol to send and receive
www.rfm.com technical support +1.678.684.2000 page 6 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 data from WSN802G sensor nodes, as detailed in section 4. WSN802G modules can receive configura- tion commands through either their serial port or over-the-air in udp packets carrying snmp commands. 1.1 features WSN802G modules provide a unique set of features for wireless sensor network applications: ? compatibility with commercial and industrial 802.11b/g/n routers ? low power consumption for long life battery operation including sleep mode ? full -40 to +85 o c industrial temperature range operation ? analog and digital i/o, plus two serial and one spi port ? separate data and diagnostic ports ? system/application set up using just two management information blocks (mibs) ? full 14 channel 802.11b/g coverage for world wide operation ? fcc, canadian ic and european etsi certifications ? four module configurations: WSN802Gc - solder reflow mounting with rf connector for external antenna connection WSN802Gca - solder reflow mounting with integral chip antenna WSN802Gp - plug in connector mounting with rf connector for external antenna connection WSN802Gpa - plug in connector mounting with integral chip antenna ? automatic or manual i/o data reporting 1.2 applications WSN802G sensor networks are well suited to applications where ieee 802.11b/g/n router compatibility, industrial temperature range operation and long battery life are important. many applications match these criteria, including: ? energy monitoring and management ? physical asset management ? cold chain data logging and food safety ? security and access control systems ? environmental monitoring ? many more
www.rfm.com technical support +1.678.684.2000 page 7 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 2.0 WSN802G operation WSN802G operation is designed to support long battery life by allowing the module to stay in sleep mode to the maximum extent possible. compared to 802.11b/g cards used in notebook and handheld com- puters, the WSN802G ? s active current is also very low. 2.1 active and sleep modes once the snmp server ip address has been set, the default state of the WSN802G is sleep mode. the WSN802G has a dedicated input to switch it from sleep to active mode, wake_in (pin 26). there are five events that will wake the WSN802G from sleep mode: ? applying a logic high signal on the wake_in pin ? expiration of the autoreport timer ? expiration of linkup trap timer ? expiration of the config trap timer ? module ? s primary snmp server ip address has not been set (this will not wake it, it prevents it from sleeping) the wake_in pin and autoreport can be enabled/disabled. the linkup timer sends a keep alive packet to the router every 60 seconds by default. the config timer cannot be disabled and will generate a config trap every 10 seconds by default. once a module has been initially configured, the config timer is typi- cally set to a longer interval. when the module wakes to an active state due to either the wake_in pin or the autoreport timer, it re- mains awake for a time period controlled by the waketimeout timer. the module returns to sleep mode when the waketimeout timer expires, subject to the conditions listed below. the waketimeout timer is held in reset and the module remains in active mode when any of the following events occur: ? a logic high signal is held on the wake_in pin ? a serial byte is received ? an rf packet is sent or received ? module ? s snmp server ip address has not been set the waketimeout feature is used to support scenarios such as a server application parsing the i/o report and sending back a serial string or i/o output change command, or a host processor sending a serial string and waiting for a response. as discussed in section 5, the snmp server ip address can be set in a short period of time, allowing the module to switch to sleep mode for battery conservation. the snmp server ip address only needs to be set one time. a WSN802G module that has an snmp server ip address but is not linked to an 802.11b/g/n router will cycle between sleep and active mode under the control of the scanning algorithm, even if none of the wake events discussed above are present.
www.rfm.com technical support +1.678.684.2000 page 8 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 whenever the module is in active mode, a logic high is asserted on wake_out (pin 27). wake_out can be used to signal an external processor. when the WSN802G is in sleep mode, wake_out is set to logic low. 2.2 automatic i/o reporting the WSN802G sends an i/o report when one of the following events occur: ? a logic high signal is applied to the wake_in pin ? the autoreport timer fires (module in either active or sleep mode) 2.3 data serial port the data serial port on the WSN802G modules supports baud rates from 1.2 to 921.6 kbps. the following serial port configurations are supported: ? 5, 6, 7 and 8-bit character lengths ? 1 or 2 stop bits ? even, odd, mark, space or no parity the default serial port configuration is 9.6 kbps, 8, n,1. see sections 4.14 and 7.2 for serial port configu- ration details. serial port operation is full-duplex. data is sent and received on the serial port transpar- ently, with configuration information sent and received as udp datagrams. the WSN802G includes an acknowledgement and retry mechanism to minimize data loss on rf transmissions. however, the udp/ip protocol being carried by the rf transmissions does not provide guaranteed end-to-end delivery. the user must make provisions for detecting and resending data lost on an end-to-end transmission. the WSN802G data port is supported with optional /host_rts and /host_cts flow control signals. 2.4 diagnostic serial port the diagnostic serial port on the WSN802G modules supports baud rates from 1.2 to 115.2 kbps. the default diagnostic port configuration is 9.6 kbps, 8, n,1. diagnostic port operation is full-duplex, three- wire, without flow control support. diagnostic data is sent and received using a simple string protocol. contact rfm module technical support for diagnostic port data format information. 2.5 serial peripheral interface (spi) port the WSN802G spi port provides master mode functionality at data rates configurable up to 11 mbps. spi port operation is full duplex in the sense that a single clock signal simultaneously shifts data into and out of the spi port.
www.rfm.com technical support +1.678.684.2000 page 9 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11  
      "  
      ( '    '               $  /   ( , ) 4 2   ( , (
figure 2.5.1 figure 2.5.1 shows the signals a WSN802G uses in spi master mode. the autoreport function triggers the WSN802G module to clock out a configurable command string, spi_mastercmdstr , to collect data from a slave peripheral. the collected data is then transmitted as a data message. alternatively, a host connected to the base can transmit an spi command as a data message to the remote. the WSN802G will clock the command into its slave peripheral and transmit back the slave ? s response, as show in fig- ure 2.5.2. in either case, data strings are limited to 256 bytes.     $  /   ( , ) 4 2   ( , (
  ( 5  $  !  &    &      6    " &    &      6 *   6   "  
      ( '    '   )       figure 2.5.2 2.6 analog i/o the WSN802G includes two 10-bit adc inputs, adc0 (pin 18) and adc1 (pin 19). pin 25 provides a full- scale reference voltage to support ratiometric adc measurements. adc measurements are triggered and added to the automatic i/o report when a logic high signal is first applied to the wake_ in pin or the autoreport timer fires, as discussed in section 2.2. an adc reading is also made on the internal buss voltage of the WSN802G and included in the automatic i/o report. these readings can also be retrieved anytime the WSN802G is in active mode using the io_report application protocol command as dis- cussed in section 4.1. the WSN802G also includes a 16-bit pulse width modulated output, pwm0 (pin 9). the pwm output is low-pass filtered to provide an analog output voltage with ripple suppressed to 7 bits. external low-pass filtering can be added to further suppress ripple. the full-scale pwm output is referenced to the regulated
www.rfm.com technical support +1.678.684.2000 page 10 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 supply voltage (pin 24). the pwm output is set using the io_ write_pwm application protocol com- mand, as discussed in section 4.4. 2.7 digital i/o the WSN802G includes four general purpose input/output (gpio) ports, gpio0 (pin 4), gpio1 (pin 11), gpio2 (pin 10) and gpio3 (pin 12). when programmed as inputs, gpio pins include an internal weak pull-up. the states of pins configured as inputs are captured as part of the automatic i/o report when a logic high signal is applied to the wake_in pin or the autoreport timer fires, as discussed in section 2.2. these readings can also be retrieved anytime the WSN802G is in active mode using the io_read_re- quest application protocol command as discussed in section 4.1. the states of gpio pins configured as outputs are set using the io_write_gpio application protocol command as discussed in section 4.3.
www.rfm.com technical support +1.678.684.2000 page 11 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 3.0 WSN802G hardware    7        +  8  9  :  ;  9  ;  :  +       7  8 9 ;  
    5  !  &      6  8          $     2     !  "  : +     .   
& & (   , 2 1 & (   ,  1   ( )    & ( ) , 2 1 &   & ( ) ,  1 &  3 )  2 , $ 2   3 )  2 ,  2    '    ( )    ( )    ( ) +   < & < $ $ 
& : : ' 3 = +   8 9   3 = 
&   -  - 2  & $    ( , (
  ( , ) 4 2     $  / +  + < , ) 4 2  & $  - .   / - , (
  / - , ) 4 2  & $  5    > 5  .   0 +  + < 0    <  . ( )    7 +  
& 
&   < & figure 3.0.1 WSN802G modules operate in the international 2.4 ghz ism band over the frequency range of 2401- 2474 mhz, with a nominal rf output power of 10 mw. WSN802G modules support four standard 802.11g rf data rates, 1, 2, 5.5 and 11 mbps. WSN802G modules provide a variety of hardware inter- faces. there are two serial interfaces, one for data and a second for diagnostics. the data port supports standard serial baud rates from 1.2 to 921.6 kbps, and the diagnostic port supports standard serial baud rates from 1.2 to 115.2 kbps. optional hardware flow control is provided for the data serial port. there is also a serial peripheral interface (spi), which can operate in either master or slave mode. spi slave mode supports data rates up to 2 mbps, and master mode supports data rates up to 11 mbps. WSN802G modules includes two 10-bit adc inputs, a 16-bit pwm (dac) output, and four general pur- pose input/output (gpio) ports. WSN802G modules are available with either rf connectors for external antennas, or with integral chip antennas (a suffix). WSN802G modules are available in two mounting con- figurations. the WSN802Gc and WSN802Gca are designed for solder reflow mounting, and the WSN802Gp and WSN802Gpa are designed for plug-in connector mounting. 3.1 absolute maximum ratings rating sym value units input/output pins except adc inputs -0.5 to +3.63 v adc input pins -0.5 to 1.98 v non-operating ambient temperature range -40 to +85 o c table 3.1.1
www.rfm.com technical support +1.678.684.2000 page 12 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 3.2 specifications characteristic sym minimum typical maximum units operating frequency range 2401 2474 mhz spread spectrum method direct sequence rf chip rate 11 mcps rf data rates 1, 2, 5.5, 11 mbps modulation type bpsk at 1 mbps, qpsk at 2 mbps cck at 5.5 and 11 mbps number of rf channels 11 rf channel spacing 5 mhz receiver sensitivity, 8% per: 1 mbps rf data rate -92 dbm 2 mbps rf data rate -90 dbm 5.5 mbps rf data rate -84 11 mbps rf data rate -81 rf transmit power 10 mw WSN802Gc and WSN802Gp rf connector u.fl coaxial connector optimum external antenna impedance 50 ? WSN802Gca and WSN802Gpa antenna integral chip adc input range 0 1.8 v adc input resolution 10 bits adc input impedance 1 m ? pwm output resolution 16 bits data serial port baud rates 1.2, 2.4, 4.8, 9.6 (default), 19.2, 28.8, 38.4, 57.6, 76.8, 115.2, 230.4, 460.8, 921.6 kbps diagnostic serial port baud rate 1.2, 2.4, 4.8, 9.6 (default), 19.2, 28.8, 38.4, 57.6, 76.8, 115.2 kbps serial peripheral interface (spi) data rate, master mode 11 mbps serial peripheral interface (spi) data rate, slave mode 2 mbps digital i/o: logic low input level -0.3 0.7 v logic high input level 2.24 v cc v input pull-up resistor 50 1000 k ? logic low output level 0 0.4 v logic high output level 2.4 v cc v power supply voltage range v cc +3 +3.63 vdc power supply voltage ripple 10 mv p-p receive mode current 150 ma transmit mode current 200 ma sleep mode current 7.5 a WSN802Gc and WSN802Gca mounting reflow soldering WSN802Gp and WSN802Gpa mounting socket operating temperature range -40 85 o c operating relative humidity range, non-condensing 10 90 % table 3.2.1
www.rfm.com technical support +1.678.684.2000 page 13 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 3.3 module interface pin name i/o description 1 gnd - power supply and signal ground. connect to the host circuit board ground. 2 diag_tx o diagnostic serial port output. 3 diag_rx i diagnostic serial port input. 4 gpio0 i/o configurable digital i/o port 0. an internal weak pull-up is provided when configured as an input. 5 radio_txd o serial data output from the radio. 6 radio_rxd i serial data input to the radio. 7 /host_cts o uart/spi flow control output. the module sets this line low when it is ready to accept data from the host on the radio_rxd or mosi input. when the line goes high, the host must stop sending data. 8 /host_rts i uart flow control input. the host sets this line low to allow data to flow from the module on the radio_txd pin. when the host sets this line high, the module will stop sending data to the host. 9 pwm0 o 16-bit pulse-width modulated output with internal low-pass filter. filter is first-order, with a 159 hz 3 db bandwidth, 10k output resistance. 10 gpio2 i/o configurable digital i/o port 2. an internal weak pull-up is provided when configured as an input. 11 gpio1 i/o configurable digital i/o port 1. an internal weak pull-up is provided when configured as an input. 12 gpio3 i/o configurable digital i/o port 3. an internal weak pull-up is provided when configured as an input. 13 rsvd - reserved pin. leave unconnected. 14 vcc i power supply input, +3.0 to +3.63 vdc. 15 gnd - power supply and signal ground. connect to the host circuit board ground. 16 gnd - power supply and signal ground. connect to the host circuit board ground. 17 /reset i active low module hardware reset. 18 adc0 i 10-bit adc input 0. adc full scale reading can be referenced to the module ? s +1.8 v regulated supply. 19 adc1 i 10-bit adc input 1. adc full scale reading can be referenced to the module ? s +1.8 v regulated supply. 20 spi_in i/o this pin is the spi master mode input. 21 spi_out i/o this pin is the spi master mode output. 22 /ss i/o spi active low slave select. this pin is an output when the module is operating as a master, and an input when it is operating as a slave. 23 sclk i/o spi clock signal. this pin is an output when operating as a master, and an input when operating as a slave. 24 3.3v_out o module ? s +3.3 v regulated supply, available to power external sensor circuits. current drain on this output should be no greater than 50 ma. 25 adc_ref o module ? s +1.8 v regulated supply, used for ratiometric adc readings. current drain on this output should be no greater than 10 ma. 26 wake_in i active high interrupt input to wake the module from timer sleep. can be used to wake module on event, etc. 27 wake_out o active high output asserted when module wakes from timer sleep. can be used to wake an external device. 28 gnd - connect to the host circuit board ground plane. 29 rsvd - reserved pin. leave unconnected. 30 gnd - connect to the host circuit board ground plane. table 3.3.1
www.rfm.com technical support +1.678.684.2000 page 14 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 3.4 WSN802Gc and WSN802Gp antenna connector a u.fl miniature coaxial connector is provided on the WSN802Gc and WSN802Gp modules for connec- tion to the rfio port. a short u.fl coaxial cable can be used to connect the rfio port directly to an an- tenna. in this case the antenna should be mounted firmly to avoid stressing the u.fl coaxial cable due to antenna mounting flexure. alternately, a u.fl coaxial jumper cable can be used to connect the WSN802G module to a u.fl connector on the host circuit board. the connection between the host circuit board u.fl connector and the antenna or antenna connector on the host circuit board should be imple- mented as a 50 ohm stripline. referring to figure 3.4.1, the width of this stripline depends on the thick- ness of the circuit board between the stripline and the groundplane. for fr-4 type circuit board materials (dielectric constant of 4.7), the width of the stripline is equal to 1.75 times the thickness of the circuit board. note that other circuit board traces should be spaced away from the stripline to prevent signal coupling, as shown in table 3.4.1. the stripline trace should be kept short to minimize its insertion loss. $              $           2   ! .  ? :  $ 5 '     $   !   5           2   ! &   .   ;    6  6     !  @   8 ; a 3 figure 3.4.1 trace separation from 50 ohm microstrip length of trace run parallel to microstrip 100 mil 125 mill 150 mil 200 mil 200 mil 290 mil 250 mil 450 mil 300 mil 650 mil table 3.4.1
www.rfm.com technical support +1.678.684.2000 page 15 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 3.5 input voltage WSN802G radio modules can operated from an unregulated dc input (pin 14) in the range of 3.0 v (trough) to 3.63 v (peak) over the temperature range of -40 to 85 c. applying ac, reverse dc, or a dc voltage outside the range given above can cause damage and/or create a fire and safety hazard. further, care must be taken so logic inputs applied to the radio stay within the voltage range of 0 to 3.3 v. signals applied to the analog inputs must be in the range of 0 to adc_ref (pin 25). applying a voltage to a logic or analog input outside of its operating range can damage the WSN802G module. 3.6 esd and transient protection WSN802G circuit boards are electrostatic discharge (esd) sensitive. esd precautions must be observed when handling and installing these components. installations must be protected from electrical transients on the power supply and i/o lines. this is especially important in outdoor installations, and/or where con- nections are made to sensors with long leads. inadequate transient protection can result in damage and/or create a fire and safety hazard. 3.7 interfacing to 5 v logic system all logic signals including the serial ports on the WSN802G are 3.3 v signals. to interface to 5 v signals, the resistor divider network shown in figure 3.7.1 below must be placed between the 5 v signal outputs and the WSN802G signal inputs. the output voltage swing of the WSN802G 3.3 v signals is sufficient to drive 5 v logic inputs. ; <     ! &
2 ;      / :  + / figure 3.7.1 3.8 power-on reset requirements when applying power to the WSN802G, the /reset pin should be held low until the power supply volt- age reaches 3.3 volts for 100 milliseconds. 3.9 mounting and enclosures WSN802Gc radio modules are mounted by reflow soldering them to a host circuit board. WSN802Gp modules are mounted by plugging their pins into a set of mating connectors on the host circuit board. refer to section 10.3 and/or the WSN802G data sheet for mounting details. WSN802G enclosures must be made of plastics or other materials with low rf attenuation to avoid com- promising antenna performance where antennas are internal to the enclosure. metal enclosures are not suitable for use with internal antennas as they will block antenna radiation and reception. outdoor enclo- sures must be water tight, such as a nema 4x enclosure. WSN802G
www.rfm.com technical support +1.678.684.2000 page 16 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 3.10 labeling and notices WSN802G fcc certification - the WSN802G hardware has been certified for operation under fcc part 15 rules, section 15.247. the antenna(s) used for this transmitter must be installed to provide a separa- tion distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. WSN802G fcc notices and labels - this device complies with part 15 of the fcc rules. operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. a clearly visible label is required on the outside of the user ? s (oem) enclosure stating ? contains fcc id: hsw-WSN802G. ? warning: this device operates under part 15 of the fcc rules. any modification to this device, not expressly authorized by rfm, inc., may void the user ? s authority to operate this device. canadian de- partment of communications industry notice - ic: 4492a-WSN802G this apparatus complies with health canada ? s safety code 6 / ic rss 210. ices-003 this digital apparatus does not exceed the class b limits for radio noise emissions from digital apparatus as set out in the radio interference regulations of industry canada. le present appareil numerique n ? emet pas de bruits radioelectriques depassant les limites applicables aux appareils numeriques de classe b prescrites dans le reglement sur le brouillage radioelectrique edicte par industrie canada. etsi en 300 328 the WSN802G module has passed etsi en 300 328 testing conducted by an independent test laboratory.
www.rfm.com technical support +1.678.684.2000 page 17 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 4.0 application protocol in most applications, the WSN802G auto-reporting function will be used to routinely send data from a module to the application. the WSN802G supports this type of operation through use of the auto- reporting function and the autoreport and waketimeout timers. there are three ways to read and write data and configuration parameters to and from the WSN802G module: (1) over the air using snmp traps - configuration only; (2) over the air using udp to send the wsn protocol; and (3) through the module ? s uart or spi port using the wsn protocol. the snmp pro- tocol is distinct from the udp and serial port protocol. the udp and serial port protocol only differs in the upd/ip packet header data. modules will request snmp configuration changes using config traps . the frequency of checking for changes is configured through the config trap timer. details of the snmp commands and operation is provided in section 7 of this manual. modules must be in active mode (awake) to receive api commands through either over the air udp commands or through the module ? s uart or spi port. in addition to sending data, auto-report transmis- sions signal the application that the module is awake. setting the waketimeout timer to 2 seconds will keep the module awake, giving the application 2 seconds to send api commands to the module. the module will remain awake past the 2 seconds if commands are being received or processed. once the commands are completed the module will return to sleep immediately if the waketimeout time has elapsed. the format of all of the wsn api commands and responses are given in sections 4.1 through 4.13 be- low. api commands and responses sent through a wireless server (access point, etc.) are formatted as udp/ip packets. the ipv4 udp/ip packet format is shown in figure 4.0.1 below. api commands and re- sponses are carried in the udp datagram payload area. in the text below, api commands and responses will be referred to as datagrams with the understanding they are the payload of a udp datagram when sent through a wireless server. automatically generated i/o reports from the WSN802G module due to timeouts or event interrupts take the form of the io_read - io_report datagram shown in section 4.2. the io_read ? io_report message is only available over the air and not through the module ? s serial ports. byte 0 byte 1 byte 2 byte 3 ip version header length type of service total length id flags fragment offset time to live protocol header che cksum source ip address destination ip address source port destination port udp length checksum payload (application command) figure 4.0.1 WSN802G modules only accept wireless application commands from and send wireless application com- mand data/replies to the ip address of the server running their sensor application which is configured in the sensorserverip parameter.
www.rfm.com technical support +1.678.684.2000 page 18 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 as shown in figure 4.0.2 below, WSN802G application protocol datagrams use a standard header begin- ning with a protocol identifier to discriminate WSN802G protocol messages from other message types. datagrams are in 32-bit, big-endian format. the standard header fields are: protocol identifier: unique identifier for all wsn messages, 0x52464d49 opcode: code indicating the type of command or response transaction id: this is an incrementing transaction reference counter. each end of the link must keep its own counter for transactions that it originates. the most significant bit of the transaction id will be set for all transactions that the server originates. the WSN802G application protocol messages are listed in table 4.0.1 below. the port number that the module sends and receives wireless udp application messages on is defined by the sensorserverport- num parameter, as discussed in section 7.2. a WSN802G module will accept wireless udp messages specifically addressed to it, or that are broadcast (addressed to all modules). if a command is received through a wireless broadcast, the WSN802G module will reply with a broadcast. the message format is the same for both the over the air udp payload and the serial data communicated over either the module ? s uart or spi ports. the protocol identifier serves as the start character for uart or spi communicated packets with the opcode used as a further validation of a api message in- stead of application data. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode transaction id data (variable length) figure 4.0.2 opcode direction description 0x0000 server-to-module io_read_request 0x0001 module-to-server io_read - io_report 0x0002 server-to-module io_write_gpio 0x0003 server-to-module io_write_pwm 0x0004 module-to-server io_write_reply 0x0005 module-to-server io_serial_read 0x0006 server-to-module io_serial_write 0x0007 module-to-server io_spi_read 0x0008 server-to-module io_spi_write 0x0010 server-to-module cfg_read 0x0011 module-to-server cfg_read_reply 0x0012 server-to-module cfg_write 0x0013 module-to-server cfg_write_reply table 4.0.1
www.rfm.com technical support +1.678.684.2000 page 19 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 4.1 i/o read request the io_read_request datagram is used to request current i/o values, as shown in figure 4.1.1. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0000 transaction id = varies figure 4.1.1 the module responds to an io_read_request with an io_read - io_report 4.2 i/o read - i/o report the io_read - io_report datagram is used to report current i/o values, as shown in figure 4.2.1. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0001 transaction id = varies timestamp [7..4] timestamp [3..0] mac address bytes [5..2] mac address bytes [1..0] (sender) adc0 adc1 volt rssi gpio figure 4.2.1 the fields specific to this datagram are: timestamp: timestamp of reading in 7.62939 s timer ticks since startup mac address: as an io_read - io_report can be sent unsolicited, the mac ad- dress is provided to identify the sender, which can be helpful in situations where dhcp is used and the ip address is initially unknown or if the sender ? s ip address has been exchanged do to nat. adc0: current adc0 reading, only the low 10 bits are significant adc1: current adc1 reading, only the low 10 bits are significant volt: current module voltage reading, 16-bit count in millivolts rssi: current rssi reading, only the low 10 bits are significant gpio: current gpio states, only gpio lines defined as inputs are valid the module generates an io_read - io_report datagram based on the autoreportinterval and in response to an io_read_request.
www.rfm.com technical support +1.678.684.2000 page 20 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 4.3 i/o write gpio the io_write_gpio datagram is used to set module outputs, as shown in figure 4.3.1. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0002 transaction id = varies gpio figure 4.3.1 the field specific to this datagram is: gpio: states for gpio lines defined as outputs. setting a gpio bit to 1 sets its output to 3.3 v, setting a bit to 0 sets its output to 0 v. the module responds to an io_write_gpio with an io_write_reply. 4.4 i/o write pwm the io_write_pwm datagram is to set the pwm0 output , as shown in figure 4.4.1. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0003 transaction id = varies pwm0 reserved figure 4.4.1 the field specific to this datagram is: pwm0: pwm0 setting, 16-bit unsigned value the module responds to an io_write_pwm with an io_write_reply. 4.5 i/o write reply an io_write_reply datagram is sent by the WSN802G module to confirm receipt of an io_write_gpio, or io_write_pwm datagram, as shown in figure 4.5.1. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0004 transaction id = varies status figure 4.5.1 the field specific to this datagram is: status: 0x0000 = successful, 0x0001 = failed
www.rfm.com technical support +1.678.684.2000 page 21 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 4.6 i/o serial read the io_serial_read datagram shown in figure 4.6.1 is used by the module to send out data received on its serial port. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0005 transaction id = varies timestamp high bytes timestamp low bytes mac address bytes [5..2] mac address bytes [1..0] (sender) length serial data, 0-256 bytes figure 4.6.1 the fields specific to this datagram are: timestamp: timestamp of reading in 7.62939 s timer ticks since startup mac address: as an io_serial_read can be sent unsolicited, the mac address is provided to identify the sender, which can be helpful in situations where dhcp is used and the ip address is initially unknown length: length of serial data string serial data: serial data string, 0-256 bytes when a module receives a string on its serial port, it send an io_serial_read message to its server. if the module receives an io_serial_write message, it will output the received data on its serial port. 4.7 i/o serial write the io_serial_write datagram shown in figure 4.7.1 is used to send data to the module to output on its serial port. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0006 transaction id = varies length serial data, 0-256 bytes figure 4.7.1 the fields specific to this datagram are: length: length of serial data string serial data: serial data string, 0-256 bytes when the module receives an io_serial_write message, it will output the received data on its serial port. a serial string length of zero causes no data output, but is allowed for system testing purposes.
www.rfm.com technical support +1.678.684.2000 page 22 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 4.8 i/o spi read the io_spi_read datagram shown in figure 4.8.1 is used by the module to send out data received on its serial peripheral interface (spi) port. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0007 transaction id = varies timestamp high bytes timestamp low bytes mac address bytes [5..2] mac address bytes [1..0] (sender) length spi data, 0-256 bytes figure 4.8.1 the fields specific to this datagram are: timestamp: timestamp of reading in 7.62939 s timer ticks since startup mac address: as an io_spi_read can be sent unsolicited, the mac address is pro- vided to identify the sender, which can be helpful in situations where dhcp is used and the ip address is initially unknown length: length of serial data string spi data: data string, 0-256 bytes the WSN802G spi port operates in master mode. the auto-reporting function triggers the WSN802G spi port to clock out a stored command string, spi_mastercmdstr , to collect data from a slave peripheral. the collected data is then transmitted as an io_spi_read datagram. 4.9 i/o spi write the io_spi_write datagram shown in figure 4.9.1 is used to send data to the module to output on its serial peripheral interface (spi) port. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0008 transaction id = varies length spi data, 0-256 bytes figure 4.9.1 the fields specific to this datagram are: length: length of serial data string spi data: data string, 0-256 bytes the WSN802G spi port operates in master mode, where the WSN802G clocks out data to its slave.
www.rfm.com technical support +1.678.684.2000 page 23 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 4.10 cfg read the cfg_read datagram is used to read a configuration register from the module through the wireless link, serial port or spi port. configuration registers are sorted into banks. the register location in a bank may also be referred to as the register ? s offset. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0010 transaction id = varies length bank location figure 4.10.1 the fields specific to this datagram are: length: total length of the following bank and location sections, in bytes bank: target register bank number location: target register location the module responds to a cfg_read with a cfg_read_reply. note that the module must be awake in order to receive and process this command. 4.11 cfg read reply in response to a cfg_read command, the cfg_read_reply datagram is sent by the module to pro- vide the contents of a configuration register byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0011 transaction id = varies length bank location value figure 4.11.1 the fields specific to this datagram are: length: total length of the following bank, register and value sections, in bytes bank: target register bank number location: target register location value: value in target register important note: the register value is returned in little-endian order, least significant byte first. 4.12 cfg write the cfg_write datagram is sent through the module ? s wireless link, serial port or spi port to set a con- figuration register in the module. configuration registers are sorted into banks. the register location in a bank may also be referred to as the register ? s offset.
www.rfm.com technical support +1.678.684.2000 page 24 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0012 transaction id = varies length bank location value figure 4.12.1 the fields specific to this datagram are: length: total length of the following bank, register and value sections, in bytes bank: target register bank location: target register location value: target register value important note: the register value must be entered in little-endian order, least significant byte first. the module responds to a cfg_write with a cfg_write_reply. note that the module must be awake in order to receive and process this command. 4.13 cfg write reply a cfg_write_reply datagram is sent by the module to confirm the receipt of a cfg_write datagram. byte 0 byte 1 byte 2 byte 3 WSN802G protocol identifier = 0x52464d49 opcode = 0x0013 transaction id = varies length status figure 4.13.1 the fields specific to this datagram are: length: length of the remainder of the packet in bytes status: status code: 0 = successful, 1 = failed 4.14 configuration parameters the parameters that can be accessed through the cfg series api commands are detailed below, organ- ized by bank and location. the default values in tables 4.14.1 through 4.14.8 are shown as they would be sent using cfg_write or received using cfg_read. all numerical values in the tables are in little- endian byte order, starting with the least significant byte on the left. ascii strings holding a representa- tion of a numerical value, such as the autoreportinterval in bank 1, location 2 below, use little-endian byte order. strings holding text, such as the sensorname in bank 1, location 1 below, are in reading byte order, first character on the left, last character on the right.
www.rfm.com technical support +1.678.684.2000 page 25 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 bank 1 - general module configuration bank location name r/w size, bytes range default 1 1 sensorname r/w 128 ascii string ? wsn sensor ? 1 2 autoreportinterval r/w 8 ascii string ? 0000000a00000000 ? (5 s) 1 3 sensorserverip r/w 4 class a,b,c 0xc803a8c0 (192.168.3.200) 1 4 sensorserverport r/w 4 1..2 16 -1 0x3f200000 (8255) 1 5 wakeoutpredelay r/w 4 0..2 32 -1 0x0a000000 (10 ms) 1 6 wakeoutpostdelay r/w 4 0..2 32 -1 0x0a000000 (10 ms) 1 7 waketimeout r/w 4 0..2 32 -1 0x00000000 (0 ms) 1 8 txpower r/w 4 0..7 0x00000000 (8 mw) 1 9 hardwarerevision r n/a ascii string 0x312e302e30 (1.0.0) 1 10 firmwarerevision r n/a ascii string 0x322e302e31303236 (2.0.1026) 1 11 firmwarebuilddate r 4 ascii string unique to each build date 1 12 txretrylimit r/w 4 0..15 0x04000000 (4 retries) 1 13 networkmode r/w 4 0..1 0x00000000 (only udp currently supported) table 4.14.1 sensorname - this parameter is a user-assignable sensor module name, for example ? utility room tem- perature sensor ? . the name can contain up to 128 bytes. autoreportinterval - this parameter sets the interval at which the sensor will send periodic reports. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. sensorserverip - this parameter holds the ip address of the server for the module to send sensor data reports. the ip address is formatted as a 32-bit value. sensorserverport - this parameter holds the port number of the server for the module to send sensor data reports. the port number is formatted as a 32-bit value, with the lower 16 bits containing the port number and the upper 16 bits set to zero. wakeoutpredelay - this parameter sets the duration in milliseconds the wake_out pin turns on to acti- vate an external user circuit prior to the rest of the module waking up. wakeoutpostdelay - this parameter sets the duration in milliseconds the wake_out turn on to activate an external user circuit subsequent to the rest the module waking up. waketimeout - this parameter sets the duration of inactivity in milliseconds that triggers the module to go back to sleep after being activated. txpower - this parameter set the transmitter output power level. changes to this parameter require a re- boot to take effect. the parameter range is 0 to 7, with 0 the highest power setting. hardwarerevision - this parameter holds the revision code of the module hardware. this parameter is read-only. firmwarerevision - this parameter holds the firmware revision code. this parameter is read-only.
www.rfm.com technical support +1.678.684.2000 page 26 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 firmwarebuilddate - this parameter codes the build date and timestamp of the module firmware as an ascii string. this parameter is read-only. txretrylimit - this parameter sets the retry limit for 802.11 transmissions. networkmode - this parameter specifies the ip format for sending auto-reports. set this parameter to 0x00 for udp format. bank 2 - module i/o configuration bank location name r/w size, bytes range default 2 1 gpio_in r 4 0.. 0x0000000f 0x0c000000 2 2 gpio_out r/w 4 0.. 0x0000000f 0x0c000000 2 3 adc_values r/w 4 0.. 0x03ff03ff n/a 2 4 battrssi_values r/w 4 0.. 0x03ff00ff n/a 2 5 pwm_values r/w 4 0.. 0x000003ff 0x00000000 (0 v) 2 6 gpio_config r/w 4 0.. 0x00888888 0x22448800 2 7 gpio_set w 4 0.. 0x0000000f n/a 2 8 gpio_clear w 4 0.. 0x0000000f n/a table 4.14.2 gpio_in - this parameter reads the state of the gpio. this parameter is read-only. gpio_out - this parameter sets the states of the gpio pins configured as outputs. adc_ values - this parameter holds the concatenation of the last readings of adc1 and adc0. the lower two bytes of this parameter hold the right justified 10-bit adc0 reading. the upper two bytes of this pa- rameter hold the right justified 10-bit adc1 reading. the module ? s adc_ref output (pin 25) provides a 1.8 v adc full-scale reference voltage to support ratiometric sensor measurements. battrssi_values - this parameter holds the concatenation of the current module input voltage and the rssi value of the last received 802.11 packet. the lower two bytes of this parameter hold the right justi- fied 8-bit rssi reading. the upper two bytes of this parameter hold the right justified 10-bit input voltage reading, with a 3.600 v input providing a full scale 0x03ff count, or 3.519 mv/count. pwm_values - this parameter holds the concatenation of the pwm output values. the lower two bytes of this parameter hold the 16-bit pwm0 setting. the upper two bytes are reserved. full scale pwm outputs equal the module input voltage. gpio_config - this parameter sets the gpio direction, the pullup/pulldown configuration of each gpi con- figured as input, and the alternate gpio functions. the parameter consists of a four 4-bit fields, with each gpio, 0 through 3, having a 4-bit field to control its configuration. a 0x0 field sets a gpio as an input, 0x2 field sets a gpio as an input with internal pulldown, 0x3 sets a gpio as an input with an internal pullup, 0x4 selects output, and a 0x8 value specifies an alternate function where defined. gpio_set - writing to this parameter location sets gpio output values. setting a '1' in a bit position sets the corresponding gpio output to a logic high state. only bits corresponding to gpios configured as out-
www.rfm.com technical support +1.678.684.2000 page 27 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 puts are effected. the four bit positions in this parameter are right registered, with gpio0 in the right-most bit position. gpio_clear - writing to this parameter location clears gpio output values. setting a '1' in a bit position clears the corresponding gpio output to a logic low state. only bits corresponding to gpios set as out- puts have any effect. the four bit positions in this parameter are right registered, with gpio0 in the right- most bit position. bank 3 - module serial configuration bank location name r/w size, bytes range default 3 1 serialdivisor r/w 4 0..2 16 -1 0x30000000 (9600 bps) 3 2 serialcharformat r/w 4 0..3 0x03000000 (8-bit) 3 3 serialstopbits r/w 4 0..1 0x00000000 (1 stop bit) 3 4 serialparity r/w 4 0..4 0x04000000 (no parity) 3 5 serialrxtimeout r/w 4 0..2 32 -1 0x20000000 (32 ms) 3 6 serialflowcontrol r/w 4 0..1 0x00000000 (flow control disabled) 3 7 diagdivisior r/w 4 0..2 32 -1 0x30000000 (9600 bps) 3 8 diagenable r/w 4 0..1 0x01000000 (diagnostic port enabled) 3 9 spi_mode r/w 4 0..2 0x00000000 (disabled) 3 10 spi_masterclock- divisor r/w 4 0..2 32 -1 0x64000000 3 11 spi_mastercmd- string r/w 4 ascii string ?? (null string) table 4.14.3 serialdivisor - this parameter sets the main serial port baud rate, equal to 460800 divided by the serialdivisor value. serialcharformat - this parameter sets the format for the main serial port as follows (big-endian format): 0x00000000 for 5-bit format 0x00000001 for 6-bit format 0x00000002 for 7-bit format 0x00000003 for 8-bit format (default) serialstopbits - this parameter sets the number of stop bits for the main serial port as follows : 0x00000000 for 1 stop bit (default) 0x00000001 for 2 stop bits serialparity - this parameter sets the parity configuration for the main serial port as follows: 0x00000000 for odd parity 0x00000001 for even parity 0x00000002 for mark parity 0x00000003 for space parity 0x00000004 for no parity (default) serialrxtimeout - this parameter sets the received message timeout for the main serial port. a received message is interpreted as complete when no additional bytes are received during a timeout interval. the serialrxtimeout parameter is scaled in milliseconds.
www.rfm.com technical support +1.678.684.2000 page 28 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 serialflowcontrol - this parameter enables/disables /host_rts - /host_cts hardware flow control: 0x00000000 disables flow control (default) 0x00000001 for enables flow control diagdivisior - this parameter sets this parameter sets the diagnostic serial port baud rate, equal to 460800 divided by the diagdivisor value. diagenable - this parameter enables/disables diagnostic port operation: 0x00000000 disables diagnostic port operation 0x00000001 enables diagnostic port operation (default) spi_mode - this parameter sets the spi port mode: 0x00000000 to disable spi port (default) 0x00000002 to enable spi master mode spi_masterclockdivisor - this parameter sets spi master mode bit rate, equal to 11,000,000 divided by the spi_masterclockdivisor value. spi_mastercmdstring - this parameter holds the command string to clock into the peripheral spi slave when the module is acting as an spi master.
www.rfm.com technical support +1.678.684.2000 page 29 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 bank 4 - module wlan configuration bank location name r/w size, bytes range default 4 1 ap1_ssid r/w 32 ascii string ? wsn-default ? 4 2 ap1_channel r/w 4 0..11 0x0b000000 4 3 ap1_authmode r/w 4 1..8 0x03000000 (automatic authentication) 4 4 ap1_encryptionmode r/w 4 1..165 0xa5000000 (all) 4 5 ap1_pskpassphrase r/w 32 ascii string ? wsn-password ? 4 6 ap1_pskkey r/w 32 ascii string n/a 4 7 ap1_wepkeyid r/w 1 0..3 n/a 4 8 ap1_wepkeylength r/w 1 5..13 n/a 4 9 ap1_wepkeyvalue r/w 13 ascii string n/a 4 10 ap2_ssid r/w 32 ascii string ? wsn-default ? 4 11 ap2_channel r/w 4 0..11 0x0b000000 4 12 ap2_authmode r/w 4 1..8 0x03000000 (automatic authentication) 4 13 ap2_encryptionmode r/w 4 0..165 0xa5000000 (all) 4 14 ap2_pskpassphrase r/w 32 ascii string ? wsn-password ? 4 15 ap2_pskkey r/w 32 ascii string n/a 4 16 ap2_wepkeyid r/w 1 0..3 n/a 4 17 ap2_wepkeylength r/w 1 5..13 n/a 4 18 ap2_wepkeyvalue r/w 13 ascii string n/a 4 19 ap3_ssid r/w 32 ascii string ? wsn-default ? 4 20 ap3_channel r/w 4 0..11 0x0b000000 4 21 ap3_authmode r/w 4 1..8 0x03000000 (automatic authentication) 4 22 ap3_encryptionmode r/w 4 0..165 0xa5000000 (all) 4 23 ap3_pskpassphrase r/w 32 ascii string ? wsn-password ? 4 24 ap3_pskkey r/w 32 ascii string n/a 4 25 ap3_wepkeyid r/w 1 0..3 n/a 4 26 ap3_wepkeylength r/w 1 5..13 n/a 4 27 ap3_wepkeyvalue r/w 13 ascii string n/a 4 28 adhoc_ssid r/w 32 ascii string ? rfm- mac ? ( mac = modules mac addr.) 4 29 adhoc_channel r/w 4 0..11 0x0b000000 4 30 adhoc_authmode r/w 4 1..8 0x01000000 (open authentication) 4 31 adhoc_encryption- mode r/w 4 0..165 0x08000000 (none) 4 32 adhoc_psk- passphrase r/w 32 ascii string ?? (null bytes) 4 33 adhoc_pskkey r/w 32 ascii string ?? (null bytes) 4 34 adhoc_wepkeyid r/w 1 0..3 n/a 4 35 adhoc_wepkey- length r/w 1 5..13 n/a 4 36 adhoc_wepkeyvalue r/w 13 ascii string n/a table 4.14.4 ap1_ssid - this parameter holds the ssid of preferred access point 1. ap1_channel - this parameter sets the channel of operation for preferred access point 1. ap1_authmode - this parameter sets the authentication mode for preferred access point 1. as follows (big-endian format):
www.rfm.com technical support +1.678.684.2000 page 30 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication ap1_encryptionmode - this parameter selects the encryption mode for preferred access point 1 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. ap1_pskpassphrase - this parameter holds the psk passphrase for preferred access point 1. ap1_pskkey - this parameter holds the psk key for preferred access point 1. ap1_wepkeyid - this parameter sets the wep key id for preferred access point 1. the range of this pa- rameter is 0x00000000 to 0x00000003. ap1_wepkeylength - this parameter sets the wep key length in bytes for preferred access point 1. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). ap1_wepkeyvalue - this parameter holds the wep key ascii string for access point 1, 5 to 13 bytes. the number of bytes must match the wep key length. ap2_ssid - this parameter holds the ssid of preferred access point 2. ap2_channel - this parameter sets the channel of operation for preferred access point 2. ap2_authmode - this parameter sets the authentication mode for preferred access point 2 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan
www.rfm.com technical support +1.678.684.2000 page 31 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication ap2_encryptionmode - this parameter selects the encryption mode for preferred access point 2 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. ap2_pskpassphrase - this parameter holds the psk passphrase for preferred access point 2. ap2_pskkey - this parameter holds the psk key for preferred access point 2. ap2_wepkeyid - this parameter sets the wep key id for preferred access point 2. the range of this pa- rameter is 0 to 3. ap2_wepkeylength - this parameter sets the wep key length in bytes for preferred access point 2. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). ap2_wepkeyvalue - this parameter holds the wep key ascii string for preferred access point 2, 5 to 13 bytes. the number of bytes must match the wep key length. ap3_ssid - this parameter holds the ssid of preferred access point 3. ap3_channel - this parameter sets the channel of operation for preferred access point 3. ap3_authmode - this parameter sets the authentication mode for preferred access point 3 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present
www.rfm.com technical support +1.678.684.2000 page 32 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication ap3_encryptionmode - this parameter selects the encryption mode for preferred access point 3 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. ap3_pskpassphrase - this parameter holds the psk passphrase for preferred access point 3. ap3_pskkey - this parameter holds the psk key for preferred access point 3. ap3_wepkeyid - this parameter is holds wep key id for preferred access point 3. the range of this pa- rameter is 0 to 3. ap2_wepkeylength - this parameter sets the wep key length for preferred access point 3. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). ap2_wepkeyvalue - this parameter holds the wep key ascii string for preferred access point 3, 5 to 13 bytes; the number of bytes must match the wep key length. adhoc_ssid - this parameter is the ssid for a fallback ad hoc server. setting this parameter to null bytes disables ad hoc fallback. adhoc_channel - this parameter sets the channel for ad hoc operation. adhoc_authmode - this parameter sets the authentication mode for ad hoc operation as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication
www.rfm.com technical support +1.678.684.2000 page 33 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication adhoc_encryptionmode - this parameter selects the ad hoc encryption mode as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. adhoc_pskpassphrase - this parameter holds the psk passphrase for ad hoc operation. adhoc_pskkey - this parameter holds the psk key for ad hoc operation. adhoc_wepkeyid - this parameter is holds wep key id for ad hoc operation. the range of this parame- ter is 0 to 3. adhoc_wepkeylength - this parameter sets the wep key length for ad hoc operation. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). adhoc_wepkeyvalue - this parameter holds the wep key ascii string for ad hoc operation, 5 to 13 bytes. the number of bytes must match the adhoc_wepkeylength value. bank 5 - module node options bank location name r/w size, bytes range default 5 1 pspolltimer r/w 8 ascii string ? 0000007800000000 ? (60 s) 5 4 restorefactorycfg w 4 0..1 n/a 5 6 rebootnode w 4 0..1 n/a 5 10 batteryreadfreq r/w 4 0..1023 0x01000000 (reads on each tx) 5 12 batterywarning- levelinmvolt r/w 4 0..1023 0xfc080000 (2300 mv) 5 13 batterystandby- levelinmvolt r/w 4 0..1023 0xf6090000 (2550 mv) 5 14 batteryrfirstboot- standbylevel- inmvolt r/w 4 0..1023 0xfc080000 (2550 mv) 5 16 disablestdby w 4 0..2 n/a 5 17 systemtime r/w 8 ascii string n/a table 4.14.5 pspolltimer - this parameter sets the interval that the module polls the access point to send any data the access point is holding for it. parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value.
www.rfm.com technical support +1.678.684.2000 page 34 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 restorefactorycfg - writing any non-zero value to this location will restore module parameters with fac- tory defaults to their default values. this parameter is write-only. rebootnode - writing any non-zero value to this location performs a ? battery-plugged ? reboot of the module. this parameter is write-only. batteryreadfreq - this parameter holds the number of transmissions from one battery reading to the next. batterywarninglevelinmvolt - this parameter sets the battery voltage level that triggers a low battery warning trap message. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. batterystandbylevelinmvolt - this parameter sets the battery voltage level that triggers the node to switch to standby. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. warning: setting the value of this parameter too high can ? lock up ? the module. batteryrfirstbootstandbylevelinmvolt - this parameter sets the battery voltage level that triggers the node to switch to standby immediately when booted up. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. warning: setting the value of this parameter too high can ? lock up ? the module. disablestdby - writing a non-zero value to this location will disable the module standby function. this parameter is write-only. systemtime - this parameter holds the time interval since the module was last booted. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. bank 6 - module scanning authentication bank location name r/w size, bytes range default 6 1 scantype r/w 4 0..1 0x00000000 (active) 6 6 eapouterauthtype r 4 0..2 32 -1 n/a 6 7 eapinnerauthtype r 4 0..2 32 -1 n/a 6 8 radiususername w 15 ascii string n/a 6 9 radiuspasswd w 15 ascii string n/a 6 17 eaptlsprovision- cacert w 15 ascii string n/a 6 18 eaptlsprovision- clientcert w 15 ascii string n/a 6 19 eaptlsprovision- pvtkey w 15 ascii string n/a table 4.14.6 scantype - this parameter selects active or passive scan mode as follows (big-endian format): 0x00000000 for active scan mode 0x00000000 for passive scan mode eapouterauthtype - this parameter holds the outer authentication type used for eap_fast. it is format- ted as a 32-bit hexadecimal value. this parameter is read-only.
www.rfm.com technical support +1.678.684.2000 page 35 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 eapinnerauthtype - this parameter holds the inner authentication type used for eap_fast. it is format- ted as a 32-bit hexadecimal value. this parameter is read-only radiususername - this parameter holds the ascii user name for authenticating with the radius server. this parameter is write-only. radiuspasswd - this parameter hold the ascii password for authenticating with the radius server. this parameter is write-only. eaptlsprovisioncacert - this parameter holds the ascii eap-tls provision certificate authority certificate. this parameter is write-only. eaptlsprovisionclientcert - this parameter holds the ascii eap_tls provision client certificate. this parameter is write-only. eaptlsprovisionpvtkey - this parameter holds the provision private key as an ascii string. this parame- ter is write-only. bank 7 - module network configuration bank location name r/w size, bytes range default 7 1 ipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) 7 2 subnetmask r/w 4 class a,b,c 0x00000000 (0.0.0.0) 7 3 gatewayipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) 7 4 performdhcp r/w 4 class a,b,c 0x00000000 (enabled) 7 5 macaddress r 4 oid 00:30:66 unique for each module 7 7 primarydns- ipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) 7 8 secondarydns- ipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) 7 9 curntipaddress r 4 class a,b,c n/a 7 10 curntsubnetaddress r 4 class a,b,c n/a 7 11 curntgateway- ipaddress r 4 class a,b,c n/a 7 12 curntprimary- dnsipaddress r 4 class a,b,c n/a 7 13 curntsecondary- dnsipaddress r 4 class a,b,c n/a 7 14 dhcpleasetime r 8 ascii string n/a table 4.14.7 ipaddress - this parameter holds the module ? s ip address if dhcp is disabled. the address must be a valid unicast address. the address is formatted as a 32-bit hexadecimal number. subnetmask - this parameter holds the subnet mask for the wlan interface. the mask is formatted as a 32-bit hexadecimal number. gatewayipaddress - this parameter holds the subnet gateway ip address. the address is formatted as a 32-bit hexadecimal number.
www.rfm.com technical support +1.678.684.2000 page 36 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 performdhcp - this parameter sets the ip address mode as follows (big-endian format): 0x00000000 - for dhcp 0x00000001 - for static ip address macaddress - this parameter holds the module ? s unique mac address. this parameter is read-only. primarydnsipaddress - this parameter holds the ip address for the primary dns server. the address is formatted as a 32-bit hexadecimal number. secondarydnsipaddress - this parameter holds the ip address for the secondary dns server. the ad- dress is formatted as a 32-bit hexadecimal number. curntipaddress - this parameter holds the current ip address assigned to the module. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. curntsubnetaddress - this parameter hold the ip address of the current subnet address. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. curntgatewayipaddress - this parameter hold the ip address of the current subnet gateway address. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. curntprimarydnsipaddress - this parameter hold the ip address of the current primary dns server. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. curntsecondarydnsipaddress - this parameter hold the ip address of the current secondary dns server. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. dhcpleasetime - this parameter holds the time remaining on the current dhcp lease. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. this parameter is read-only. bank 8 - module snmp configuration bank location name r/w size, bytes range default 8 3 primarysnmpmgrip r/w 4 class a,b,c 0x00000000 (0.0.0.0) 8 4 secondary- snmpmgrip r/w 4 class a,b,c 0xc803a8c0 (192.168.3.200) 8 10 getcommstring r/w 15 ascii string ? gsn_get ? 8 11 setcommstring r/w 15 ascii string ? gsn_set ? 8 12 trapcommstring r/w 15 ascii string ? gsn_trap ? 8 15 snmptrapsrcport r/w 4 1..2 16 -1 0xa2000000 (162) 8 16 snmptrapdstport r/w 4 1..2 16 -1 0xa1000000 (161) table 4.14.8 primarysnmpmgrip - this parameter holds the ip address of the primary snmp manager. the address is formatted as a 32-bit hexadecimal number. secondarysnmpmgrip - this parameter holds the ip address of the secondary snmp manager. the ad- dress is formatted as a 32-bit hexadecimal number.
www.rfm.com technical support +1.678.684.2000 page 37 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 getcommstring - this parameter holds the get community ascii string. setcommstring - this parameter holds the set community ascii string. trapcommstring - this parameter holds the trap community ascii string. snmptrapsrcpor t - this parameter holds the port number for the snmp trap source. the parameter is formatted as a 32-bit hexadecimal number. snmptrapdstport - this parameter holds the port number for the snmp trap destination. the parameter is formatted as a 32-bit hexadecimal number.
www.rfm.com technical support +1.678.684.2000 page 38 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 5.0 ip address discovery protocol the WSN802G module supports a separate udp client port that provides a discovery protocol for wire- less communications. the discovery protocol is used to find ip addresses of modules in a network when the ip addresses have been assigned by a dhcp server. the discovery protocol is also used to set the module ? s snmp server ip addresses which enables module commissioning. this protocol uses port 24776. the discovery protocol datagrams are shown in table 5.0.1. opcode direction description 0x0071 server-to-module ip_hunt_query 0x0072 module-to-server ip_hunt_reply table 5.0.1 since the ip addresses of potential recipients may not be known, both query and reply messages are sent as udp broadcasts. udp broadcasts are not routed, so only nodes on the same network segment as the sender will respond. all nodes that hear an ip_hunt_query will respond with an ip_hunt_ reply. ordinarily these commands are only used to initially commission a module. since a WSN802G module must be in active mode to hear a command, an un-commissioned module stays in active mode until its primary snmp server address has been set. 5.1 ip hunt query the ip_hunt_query datagram shown in figure 5.1.1 is broadcast by a commissioning server to dis- cover WSN802G modules: byte 0 byte 1 byte 2 byte 3 i p h u n t e r opcode = 0x7100 primary snmp server ip address [31:16] primary snmp server ip address [15:0] secondary snmp server ip address [31:16] secondary snmp server ip address [15:0] figure 5.1.1 the fields specific to this datagram are: snmp server address: the primary and secondary snmp server address fields inform WSN802G modules of the snmp server addresses to solicit for configuration parameter updates (destination addresses for config traps). if either or both server ad- dress fields are set to 0.0.0.0, a module hearing the message will retain its current snmp server setting for the respective field(s). the default ip ad- dresses for the primary snmp server is 0.0.0.0. the default ip address for the secondary snmp server is 192.168.3.200. the primary snmp server ip address must be set to a different value to allow the module to enter normal sleep mode.
www.rfm.com technical support +1.678.684.2000 page 39 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 5.2 ip hunt reply the ip_hunt_reply datagram shown in figure 5.2.1 is sent by a module in response to an ip_hunt_query command: byte 0 byte 1 byte 2 byte 3 i p h u n t e r opcode = 0x7200 mac address [47:32] mac address [31:0] ip address subnet mask device code = 0x0102 hardware version firmware version figure 5.2.1 the fields specific to this datagram are: mac address: mac address of the module ip address: ip address of the module subnet mask: subnet mask of the module device code: unique WSN802G device code - 0x0102 hardware version: hardware version of the module firmware version: firmware version in the module
www.rfm.com technical support +1.678.684.2000 page 40 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 6.0 ssid, channel, encryption and authentication WSN802G modules support ssid, channel, encryption and authentication mode options for three access point connections plus an ad hoc connection. the ssid, channel, encryption and authentication mode options are summarized in tables 4.14.1 and 4.14.6 in section 14 above. 6.1 connection scanning to establish an 802.11b/g/n connection, WSN802G modules will scan for access point 1, then 2, then 3 and then switch to ad hoc server mode and broadcast for a connection. this sequence repeats until a connection is established. this scanning sequence is automatic. note that failure to make a quick con- nection will adversely affect battery operating life. 6.2 ad hoc mode WSN802G modules support ad hoc operation. ad hoc operation is an 802.11 mode where two non- access point devices (sometimes called non-infrastructure devices) communicate directly with each other in a point-to-point network. ad hoc mode can be used to configure a WSN802G device over a wireless link without needing an access point. in an ad hoc network, there are server nodes and client nodes. server nodes broadcast their presence and client nodes, once they have heard a server node, will request to join. some devices, such as pcs, can operate as both a client and a server, where they broadcast their presence but also listen for other devices that are advertising their presence. the WSN802G module acts only as a server. that is, it ad- vertises its presence and waits for requests from client devices to join. the WSN802G module will automatically enter ad hoc mode if it is unable to join any of the three net- works specified in the preferred ssid parameters. to operate in ad hoc mode, the WSN802G module must have dhcp disabled, have an ip address statically assigned as well as a subnet mask and a gate- way ip address. these values can be set through the serial port in bank 7, or through snmp commands. refer to sections 4 and 7 in this manual for details. since an ad hoc session will terminate if a wsn- 802g module enters sleep mode, the module should be kept awake by asserting the wake_in signal. when the WSN802G module is in ad hoc mode it will advertise itself using the ssid ? rfm- macaddress ? where macaddress is an ascii string of the module ? s mac address with the colons between values re- moved. a device wishing to join the WSN802G ad hoc network must have a statically set ip address that is on the same subnet as the WSN802G ip address. the WSN802G module ad hoc mode also allows the choice of an rf channel and encryption mode. a device wanting to join the WSN802G ad hoc net- work must have these parameters agree with the values set in the WSN802G module. when operating in ad hoc mode, the WSN802G module will operate in the same way as when it is con- nected to an access point. this means the module will send linkup and config traps as when in normal access point operation. a device connected to the WSN802G module can simply ignore these transmis- sions.
www.rfm.com technical support +1.678.684.2000 page 41 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 7.0 snmp module configuration a WSN802G can be configured two ways - (1) through api cfg parameter commands as discussed in section 4 above, or (2) through snmp maintenance commands sent over the wireless link in response to snmp configuration requests (config traps) from the module. WSN802G modules support two snmp oid parameter sets, as discussed in section 7.2 below. the first set of oids is very similar to the oids in the WSN802G modules prior to revision f. there are a few oids that did change - these are detailed in the document 11 mbps firmware changes which can be found on the cd in the developer ? s kit or on the rfm website in the module tech support section. the second set of oids, distinguished by a different left-hand string, includes most but not all of the oids in the first set. traps, time-related parameters, and firmware upgrade related items are only found in the first set of oids. where there is duplication, it does not matter which oid is used as they operate identi- cally. the last two, non-zero, oid values of the second set of oids are the same as the bank and loca- tion values used in the serial port configuration commands. for example, to read the autoreportinveral using snmp, an snmp get to oid 1.3.6.1.4.1.32345.88.1.2.0 would be issued. to read the module ? s gpios through the uart or spi port, the cfg_read command would be issued with bank 1, location 2. 7.1 snmp traps WSN802G modules can generate four trap messages - request to update configuration, request to main- tain association, request to update time, and low battery warning. the port numbers used for snmp are 162 for source and 161 for destination snmp commands. a config trap is a message sent periodically to poll the snmp server to see if it has any commands wait- ing for it. after sending the trap, the module remains awake for a period of four seconds to allow the server to send it commands. by default, the module issues config traps over the wireless link every 20 seconds. config traps are sent to the snmp server address in the iphunter device discovery com- munications. the interval between config traps is a configurable parameter. the less frequently config traps are issued by the module, the longer the battery life will be, but the longer it takes to change the module ? s configuration over the wireless link. because config trap activity requires a significant amount of energy to execute, for battery-powered deployments the user should set this interval to once an hour or a few times a day to conserve battery life. at receiving a config trap, the server should immediately send a configcomplete command to indicate it has no commands to send. this allows the module to go back to sleep mode, rather than remaining in active mode for rest of the configuration window. the linkup trap is a message sent periodically by the module to maintain its association with its 802.11b/g/n access point. no information is conveyed, just "i'm here". the period of the linkup trap is set by the linkuptrapinterval system parameter. for compatibility with the majority of 802.11b/g/n routers, the default period is 10 seconds. note - this parameter should not be set above two minutes without con- tacting rfm technical support. the time sync update trap is a message requesting the time server to send updated time. windows xp and later microsoft operating systems include a time server, allowing the module to get its time from a pc. the batterywarninglevelinmvolt parameter (see table 4.14.5) sets the battery voltage level that triggers a low battery warning trap message. the default setting for a low battery warning is 2.3 v.
www.rfm.com technical support +1.678.684.2000 page 42 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 the wsnconfig utility included with the developer ? s kit is designed to operate as a commissioning utility for the WSN802G. the wsnconfig utility allows for each node to be configured independently or as a whole. individual settings may be configured or a list of configuration parameters can be queued for transmission when the node or nodes wake up and issue the config trap. alternatively, a third party snmp server or utility may be used to serve the same function. 7.2 snmp parameter oids tables 7.2.1 through 7.2.7 detail the snmp parameter oids supported by the WSN802G firmware rev f or later with left-side fields of 1.3.6.1.4.1.28295.1.1 . the remaining oid fields for each parameter are shown in the left column of each table. shown below is the most commonly occurring sequence of snmp messages between a module and its access point/server. the sequence of messages begins with a config trap from the module. in most cases the server will not need to update the module ? s configuration, so it will send a configcomplete message which allows the module to immediately return to sleep mode. the module acknowledges the message and returns to sleep. config trap from module: 04 08 47 53 4e 5f 54 52 41 50 a4 3a 06 09 2b 06 01 04 01 81 dd 07 01 40 04 c0 a8 03 a6 02 01 06 02 01 02 43 04 80 86 c4 6b 30 1b 30 82 00 17 06 0d 2b 06 01 04 01 81 dd 07 01 01 04 02 02 04 06 00 30 66 50 01 00 configcomplete from access point/server: 04 07 47 53 4e 5f 53 45 54 a3 20 02 02 00 6a 02 01 00 02 01 00 30 14 30 12 06 0d 2b 06 01 04 01 81 d0 70 10 10 40 60 00 20 01 01 configcomplete ack from module: 04 07 47 53 4e 5f 53 45 54 a2 20 02 02 00 6a 02 01 00 02 01 00 30 14 30 12 06 0d 2b 06 01 04 01 81 dd 07 01 01 04 06 00 02 01 01 generic configuration parameter (genericcfg) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .1.6.0 gsnrebootnode w 4 0..1 n/a .1.10.0 gsnbatteryreadfrequency r/w 4 0..1023 0x00000001 (read on each tx) .1.12.0 gsnbatterywarning- levelinmvolt r/w 4 0..1023 0x000008fc (2300 mv) .1.13.0 gsnbatterystandby- levelinmvolt r/w 4 0..1023 0x000009f6 (2550 mv) .1.14.0 gsnbatteryrfirstboot- standbylevelinmvolt r/w 4 0..1023 0x000008fc (2550 mv) .1.16.0 gsndisablestdby w 4 0..2 n/a .1.17.0 gsnsystemtime r 8 ascii string n/a table 7.2.1
www.rfm.com technical support +1.678.684.2000 page 43 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnrebootnode - writing any non-zero value to this location performs a ? battery-plugged ? reboot of the module. this parameter is write-only. gsnbatteryreadfrequency - this parameter holds the number of transmissions from one battery reading to the next. gsnbatterywarninglevelinmvolt - this parameter sets the battery voltage level that triggers a low battery warning trap message. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. gsnbatterystandbylevelinmvolt - this parameter sets the battery voltage level that triggers the node to switch to standby. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. warning: setting the value of this parameter too high can ? lock up ? the module. gsnbatteryrfirstbootstandbylevelinmvolt - this parameter sets the battery voltage level that triggers the node to switch to standby immediately when booted up. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. warning: setting the value of this parameter too high can ? lock up ? the module. gsndisablestdby - writing a non-zero value to this location will disable the module standby function. this parameter is write-only. gsnsystemtime - this parameter holds the time interval since the module was last booted. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. the system time parameter rolls over every 128 seconds. this parameter is read-only. scanning/authentication/association parameter (saa802dot11) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .2.1.0 gsnscantype r/w 4 0..1 0x00000000 (active) .2.6.0 gsnouterauthtype r 4 0..2 32 -1 n/a .2.7.0 gsninnerauthtype r 4 0..2 32 -1 n/a .2.8.0 gsnusername w 15 ascii string n/a .2.9.0 gsnpassword w 15 ascii string n/a .2.17.0 gsneaptlsprovisioncacert w 15 ascii string n/a .2.18.0 gsneaptlsprovision clientcert w 15 ascii string n/a .2.19.0 gsneaptlsprovision pvtkey w 15 ascii string n/a table 7.2.2 gsnscantype - this parameter selects active or passive scan mode as follows: 0x00000000 for active scan mode 0x00000000 for passive scan mode gsnouterauthtype - this parameter holds the outer authentication type used for eap_fast. it is format- ted as a 32-bit hexadecimal value. this parameter is read-only.
www.rfm.com technical support +1.678.684.2000 page 44 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsninnerauthtype - this parameter holds the inner authentication type used for eap_fast. it is format- ted as a 32-bit hexadecimal value. this parameter is read-only. gsnusername - this parameter holds the ascii user name for authenticating with the radius server. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnpassword - this parameter hold the ascii password for authenticating with the radius server. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsneaptlsprovisioncacert - this parameter this parameter holds the ascii eap-tls provision certificate authority certificate. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsneaptlsprovisionclientcert - this parameter this parameter holds the ascii eap_tls provision client certificate. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsneaptlsprovisionpvtkey - this parameter - this parameter holds the provision private key as an ascii string. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. network configuration parameter (networkcfg) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .3.1.0 gsnipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .3.2.0 gsnsubnetaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .3.3.0 gsngatewayipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .3.4.0 gsnperformdhcp r/w 4 class a,b,c 0x00000000 (enabled) .3.5.0 gsnmacaddress r 4 oid 00:30:66 unique for each module .3.7.0 gsnprimarydnsipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .3.8.0 gsnsecondarydnsipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .3.9.0 gsncurntipaddress r 4 class a,b,c n/a .3.10.0 gsncurntsubnetaddress r 4 class a,b,c n/a .3.11.0 gsncurntgatewayipaddress r 4 class a,b,c n/a .3.12.0 gsncurntprimarydns- ipaddress r 4 class a,b,c n/a .3.13.0 gsncurntsecondarydns- ipaddress r 4 class a,b,c n/a .3.14.0 gsndhcpleasetime r 8 ascii string n/a table 7.2.3 gsnipaddress - this parameter holds the module ? s ip address if dhcp is disabled. the address must be a valid unicast address. the address is formatted as a 32-bit hexadecimal number. setting this parameter to zero invokes dhcp. gsnsubnetaddress - this parameter this parameter holds the subnet address for the wlan interface. the mask is formatted as a 32-bit hexadecimal number. gsngatewayipaddress - this parameter holds the subnet gateway ip address. the address is formatted as a 32-bit hexadecimal number.
www.rfm.com technical support +1.678.684.2000 page 45 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnperformdhcp - this parameter sets the ip address mode as follows: 0x00000000 - for dhcp 0x00000001 - for static ip address gsnmacaddress - this parameter holds the module ? s unique mac address. this parameter is read-only. gsnprimarydnsipaddress - this parameter holds the ip address for the primary dns server. the address is formatted as a 32-bit hexadecimal number. gsnsecondarydnsipaddress - this parameter holds the ip address for the secondary dns server. the address is formatted as a 32-bit hexadecimal number. gsncurntipaddress - this parameter this parameter holds the current ip address assigned to the module. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. gsncurntsubnetaddress - this parameter this parameter hold the ip address of the current subnet address. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. gsncurntgatewayipaddress - this parameter hold the ip address of the current subnet gateway address. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. gsncurntprimarydnsipaddress - this parameter hold the ip address of the current primary dns server. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. gsncurntsecondarydnsipaddress - this parameter hold the ip address of the current secondary dns server. the address is formatted as a 32-bit hexadecimal number. this parameter is read-only. gsndhcpleasetime - this parameter holds the time remaining on the current dhcp lease. the parame- ter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number format- ted as an ascii string of the equivalent hexadecimal value. this parameter is read-only. system management configuration parameter (sysmgmtcfg) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .4.3.0 gsnprimarysnmpmgrip r/w 4 class a,b,c 0x00000000 (0.0.0.0) .4.4.0 gsnsecon- darysnmpmgrip r/w 4 class a,b,c 0xc0a803c8 (192.168.3.200) .4.5.1.2.1 gsnap1ssid r/w 32 ascii string ? wsn-default ? .4.5.1.3.1 gsnap1channel r/w 4 0..11 0x0000000b .4.5.1.4.1 gsnap1wepkeyid w 1 0..3 n/a .4.5.1.5.1 gsnap1wepkeylen w 1 5..13 n/a .4.5.1.6.1 gsnap1wepkeyval w 13 ascii string n/a .4.5.1.7.1 gsnap1pskpassphrase w 32 ascii string ? wsn-password ? .4.5.1.10.1 gsnap1authmode r/w 4 1..8 0x00000003 (automatic authorization) .4.5.1.11.1 gsnap1encmode r/w 4 0..165 0x000000a5 (all) .4.5.1.12.1 gsnap1pskkey w 32 ascii string n/a .4.5.1.2.2 gsnap2ssid r/w 32 ascii string ? wsn-default ? .4.5.1.3.2 gsnap2channel r/w 4 0..11 0x0000000b .4.5.1.4.2 gsnap2wepkeyid w 1 0..3 n/a
www.rfm.com technical support +1.678.684.2000 page 46 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 .4.5.1.5.2 gsnap2wepkeylen w 1 5..13 n/a .4.5.1.6.2 gsnap2wepkeyval w 13 ascii string n/a .4.5.1.7.2 gsnap2pskpassphrase w 32 ascii string ? wsn-password ? .4.5.1.10.2 gsnap2authmode r/w 4 1..8 0x00000003 (automatic authorization) .4.5.1.11.2 gsnap2encmode r/w 4 0..165 0x000000a5 (all) .4.5.1.12.2 gsnap2pskkey w 32 ascii string n/a .4.5.1.2.3 gsnap3ssid r/w 32 ascii string ? wsn-default ? .4.5.1.3.3 gsnap3channel r/w 4 0..11 0x0000000b .4.5.1.4.3 gsnap3wepkeyid w 1 0..3 n/a .4.5.1.5.3 gsnap3wepkeylen w 1 5..13 n/a .4.5.1.6.3 gsnap3wepkeyval w 13 ascii string n/a .4.5.1.7.3 gsnap3pskpassphrase w 32 ascii string ? wsn-password ? .4.5.1.10.3 gsnap3authmode r/w 4 1..8 0x00000003 (automatic authorization) .4.5.1.11.3 gsnap3encmode r/w 4 0..165 0x000000a5 (all) .4.5.1.12.3 gsnap3pskkey w 32 ascii string n/a .4.5.1.2.4 gsnadhocssid r/w 32 ascii string ? wsn-default ? .4.5.1.3.4 gsnadhocchannel r/w 4 0..11 0x0000000b .4.5.1.4.4 gsnadhocwepkeyid w 1 0..3 n/a .4.5.1.5.4 gsnadhocwepkeylen w 1 5..13 n/a .4.5.1.6.4 gsnadhocwepkeyval w 13 ascii string n/a .4.5.1.7.4 gsnadhocpskpassphrase w 32 ascii string ? wsn-password ? .4.5.1.10.4 gsnadhocauthmode r/w 4 1..8 0x00000003 (automatic authorization) .4.5.1.11.4 gsnadhocencmode r/w 4 0..165 0x000000a5 (all) .4.5.1.12.4 gsnadhocpskkey w 32 ascii string n/a .4.6.0 gsnconfigcomplete r/w 4 1..2 32 -1 0x00000001 .4.10.0 gsngetcommstring r/w 15 ascii string ? gsn_get ? .4.11.0 gsnsetcommstring r/w 15 ascii string ? gsn_set ? .4.12.0 gsntrapcommstring r/w 15 ascii string ? gsn_trap ? .4.13.0 gsntrapconfiginttmr r/w 8 ascii string ? 0000000028000000 ? (20 seconds) .4.14.0 gsntraplinkupinttmr r/w 8 ascii string ? 0000000014000000 ? (10 seconds) .4.15.0 gsnsnmptrapsrcport r/w 4 1..2 16 -1 0x000000a2 (162) .4.16.0 gsnsnmptrapdstport r/w 4 1..2 16 -1 0x000000a1 (161) .4.17.0 gsnsnmppspolltimer r/w 8 ascii string ? 0000000078000000 ? (60 s) table 7.2.4 gsnprimarysnmpmgrip - this parameter holds the ip address of the primary snmp manager. the address is formatted as a 32-bit hexadecimal number. gsnsecondarysnmpmgrip - this parameter holds the ip address of the secondary snmp manager. the address is formatted as a 32-bit hexadecimal number. gsnap1ssid - this parameter holds the ssid for access point 1. gsnap1channel - this parameter sets the channel of operation for access point 1. gsnap1wepkeyid - this parameter sets the wep key id for access point 1. the range of this parameter is 0x00000000 to 0x00000003. this parameter is write-only. attempting to read a write-only snmp parame- ter returns an error.
www.rfm.com technical support +1.678.684.2000 page 47 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnap1wepkeylen - this parameter sets the wep key length in bytes for access point 1. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap1wepkeyval - this parameter holds the wep key ascii string for access point 1, 5 to 13 bytes. the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write- only snmp parameter returns an error. gsnap1pskpassphrase - this parameter holds the psk passphrase for access point 1. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap1authmode - this parameter sets the authentication mode for access point 1 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication gsnap1encmode - this parameter selects the encryption mode for access point 1 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. gsnap1pskkey - this parameter this parameter holds the psk key for access point 1. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap1ssid - this parameter holds the ssid for access point 1. gsnap1channel - this parameter sets the channel of operation for access point 1. gsnap1wepkeyid - this parameter sets the wep key id for access point 1. the range of this parameter is 0x00000000 to 0x00000003. this parameter is write-only. attempting to read a write-only snmp parame- ter returns an error.
www.rfm.com technical support +1.678.684.2000 page 48 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnap1wepkeylen - this parameter sets the wep key length in bytes for access point 1. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap1wepkeyval - this parameter holds the wep key ascii string for access point 1, 5 to 13 bytes. the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write- only snmp parameter returns an error. gsnap1pskpassphrase - this parameter holds the psk passphrase for access point 1. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap1authmode - this parameter sets the authentication mode for access point 1 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication gsnap1encmode - this parameter selects the encryption mode for access point 1 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. gsnap1pskkey - this parameter this parameter holds the psk key for access point 1. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap2ssid - this parameter holds the ssid for access point 2. gsnap2channel - this parameter sets the channel of operation for access point 2. gsnap2wepkeyid - this parameter sets the wep key id for access point 2. the range of this parameter is 0x00000000 to 0x00000003. this parameter is write-only. attempting to read a write-only snmp parame- ter returns an error.
www.rfm.com technical support +1.678.684.2000 page 49 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnap2wepkeylen - this parameter sets the wep key length in bytes for access point 2. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap2wepkeyval - this parameter holds the wep key ascii string for access point 2, 5 to 13 bytes. the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write- only snmp parameter returns an error. gsnap2pskpassphrase - this parameter holds the psk passphrase for access point 2. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap2authmode - this parameter sets the authentication mode for access point 2 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication gsnap2encmode - this parameter selects the encryption mode for access point 2 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. gsnap2pskkey - this parameter this parameter holds the psk key for access point 2. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap3ssid - this parameter holds the ssid for access point 3. gsnap3channel - this parameter sets the channel of operation for access point 3. gsnap3wepkeyid - this parameter sets the wep key id for access point 3. the range of this parameter is 0x00000000 to 0x00000003. this parameter is write-only. attempting to read a write-only snmp parame- ter returns an error.
www.rfm.com technical support +1.678.684.2000 page 50 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnap3wepkeylen - this parameter sets the wep key length in bytes for access point 3. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap3wepkeyval - this parameter holds the wep key ascii string for access point 3, 5 to 13 bytes. the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write- only snmp parameter returns an error. gsnap3pskpassphrase - this parameter holds the psk passphrase for access point 3. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnap3authmode - this parameter sets the authentication mode for access point 3 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication gsnap3encmode - this parameter selects the encryption mode for access point 3 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. gsnap3pskkey - this parameter this parameter holds the psk key for access point 3. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnadhocssid - this parameter is the ssid for a fallback ad hoc server. setting this parameter to null bytes disables ad hoc fallback. gsnadhocchannel - this parameter sets the channel for ad hoc operation. gsnapadhocwepkeyid - this parameter sets the wep key id for ad hoc operation. the range of this pa- rameter is 0x00000000 to 0x00000003. this parameter is write-only. attempting to read a write-only snmp parameter returns an error.
www.rfm.com technical support +1.678.684.2000 page 51 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsnapadhocwepkeylen - this parameter sets the wep key length in bytes for ad hoc operation. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. gsnapadhocwepkeyval - this parameter holds the wep key ascii string for ad hoc operation, 5 to 13 bytes. the number of bytes must match the gsn adhocwepkeylen value. this parameter is write-only. at- tempting to read a write-only snmp parameter returns an error. gsnadhocpskpassphrase - this parameter holds the psk passphrase for ad hoc operation. this parame- ter is read-only. gsnapadhocauthmode - this parameter sets the authentication mode for ad hoc operation as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication gsnapadhocencmode - this parameter selects the ad hoc encryption mode as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. gsnadhocpskkey - this parameter holds the psk key for ad hoc operation. this parameter is read-only. gsnconfigcomplete - writing any non-zero value to this location in the referenced information table sig- nals that configuration updates are complete. gsngetcommstring - this parameter holds the get community ascii string. gsnsetcommstring - this parameter holds the set community ascii string. gsntrapcommstring - this parameter holds the trap community ascii string.
www.rfm.com technical support +1.678.684.2000 page 52 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 gsntrapconfiginttmr - this parameter sets the interval for the module to transmit configuration traps. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit num- ber, formatted as an ascii string of the equivalent hexadecimal value. gsntraplinkupinttmr - this parameter sets the interval for the module to transmit linkup traps. the pa- rameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number, formatted as an ascii string of the equivalent hexadecimal value. gsnsnmptrapsrcport - this parameter holds the port number for the snmp trap source. the parameter is formatted as a 32-bit hexadecimal number. gsnsnmptrapdstport - this parameter holds the port number for the snmp trap destination. the parame- ter is formatted as a 32-bit hexadecimal number. gsnsnmppspolltimer - this parameter sets the interval that the module polls the access point to send any data the access point is holding for it. parameter scaling is in microcontroller clock cycles of 0.029802322 microseconds. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexa- decimal value. trap parameter (traps) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .4.2.1 linkup n/a n/a n/a n/a .4.2.2 config n/a n/a n/a n/a .4.2.4 time (sync update) n/a n/a n/a n/a .4.2.6 battery low n/a n/a n/a n/a table 7.2.5 linkup - trap to maintain link association. config - trap to request any pending configuration updates. time sync update - trap to request time sync update. battery low - low battery warning trap. time configuration parameter (timesynccfg) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .5.5.0 gsntimesynctmr r/w 8 ascii string ? 00000000 ? (disabled) .5.6.0 gsntimesyncsntpsrvrip r/w 4 0..2 32 -1 0xc0a803c8 (192.168.3.200) .5.7.0 gsntimesyncsntpsrvr- timeout r/w 4 0..2 32 -1 0x00000003 (3 seconds) table 7.2.6 gsntimesynctmr - this parameter sets the interval that the module polls the time sync server. parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. this parameter defaults to zero, disabling the
www.rfm.com technical support +1.678.684.2000 page 53 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 function. the time base within a WSN802G module is crystal controlled, so to conserve battery power, a sync update once a day or less is generally sufficient. gsntimesyncsntpsrvrip - this parameter holds the ip address of the time sync server. note that if the ip address held in this parameter is not a valid ip address, the module will be forced to stay active for the full time set by the gsntimesyncsntpsrvrtimeout parameter discussed below, which will consume more bat- tery power than necessary. pcs running microsoft windows xp, vista or windows 7 include a built-in time sync server function. gsntimesyncsntpsrvrtimeout - this parameter sets the time out interval for a response from the time sync server. the default value is 3 seconds. firmware update parameter (timesynccfg) oids: 1.3.6.1.4.1.28295.1.1 + oid end oid end name r/w size, bytes range default .6.1.0 gsnfwupdateip r/w 4 0..2 32 -1 0xc0a803c8 (192.168.3.200) .6.2.0 gsnfwupdateport r/w 4 0..2 16 -1 0x000020a3 (8355) .6.3.0 gsnfwupgradeneeded r/w 4 0..2 32 -1 0x0000000a table 7.2.7 gsnfwupdateip - this parameter holds the ip address of the firmware update server. gsnfwupdateport - this parameter hold the port number for the firmware update downloads gsnfwupgradeneeded - setting this parameter to 0x0000000a signals the module that a firmware update is available and needed. the following oids have left-side fields of 1.3.6.1.4.1.32345.88 . the remaining three right-side oid fields for each parameter are shown in the left column or each table. note that the last two non-zero right-side oid fields match the bank and location for the serial api cfg parameters (same mib data base). general module configuration parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .1.1.0 sensorname r/w 128 ascii string ? wsn sensor ? .1.2.0 autoreportinterval r/w 8 ascii string ? 000000000a000000 ? (5 s) .1.3.0 sensorserverip r/w 4 class a,b,c 0xc0a803c8 (192.168.3.200) .1.4.0 sensorserverport r/w 4 1..2 16 -1 0x0000203f (8255) .1.5.0 wakeoutpredelay r/w 4 0..2 32 -1 0x0000000a (10 ms) .1.6.0 wakeoutpostdelay r/w 4 0..2 32 -1 0x0000000a (10 ms) .1.7.0 waketimeout r/w 4 0..2 32 -1 0x00000000 (0 ms) .1.8.0 txpower r/w 4 0..7 0x00000000 (8 mw) .1.9.0 hardwarerevision r n/a ascii string 0x312e302e30 (1.0.0) .1.10.0 firmwarerevision r n/a ascii string 0x322e302e31303236 (2.0.1026) .1.11.0 firmwarebuilddate r 4 ascii string unique to each build date .1.12.0 txretrylimit r/w 4 0..15 0x00000004 (4 retries) .1.13.0 networkmode r/w 4 0..1 0x00000000 (only udp currently supported) table 7.2.8
www.rfm.com technical support +1.678.684.2000 page 54 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 sensorname - this parameter is a user-assignable sensor module name, for example ?utility room temperature sensor?. the name can contain up to 128 bytes. autoreportinterval - this parameter sets the interval at which the sensor will send periodic reports. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. sensorserverip - this parameter holds the ip address of the server for the module to send sensor data reports. the ip address is formatted as a 32-bit value. sensorserverport - this parameter holds the port number of the server for the module to send sensor data reports. the port number is formatted as a 32-bit value. wakeoutpredelay - this parameter sets the duration in milliseconds the wake_out pin turns on to acti- vate an external user circuit prior to the rest of the module waking up. wakeoutpostdelay - this parameter sets the duration in milliseconds the wake_out turn on to activate an external user circuit subsequent to the rest the module waking up. waketimeout - this parameter sets the duration of inactivity in milliseconds that triggers the module to go back to sleep after being activated. txpower - this parameter set the transmitter output power level. changes to this parameter require a re- boot to take effect. the parameter range is 0 to 7, with 0 the highest power setting. hardwarerevision - this parameter holds the revision code of the module hardware. this parameter is read-only. firmwarerevision - this parameter holds the firmware revision code. this parameter is read-only. firmwarebuilddate - this parameter codes the build date and timestamp of the module firmware as an ascii string. txretrylimit - this parameter sets the retry limit for 802.11 transmissions. networkmode - this parameter specifies the ip format for sending auto-reports. set this parameter to 0x00 for udp format or 0x01 for tcp format.
www.rfm.com technical support +1.678.684.2000 page 55 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 module i/o configuration parameter oids 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .2.1.0 gpio_in r 4 0.. 0x0000000f 0x0000000c .2.2.0 gpio_out r/w 4 0.. 0x0000000f 0x0000000c .2.3.0 adc_values r/w 4 0.. 0x03ff03ff n/a .2.4.0 battrssi_values r/w 4 0.. 0x03ff00ff n/a .2.5.0 pwm_values r/w 4 0.. 0x03ff03ff 0x00000000 (0 v) .2.6.0 gpio_config r/w 4 0.. 0x00888888 0x00884422 .2.7.0 gpio_set w 4 0.. 0x0000000f n/a .2.8.0 gpio_clear w 4 0.. 0x0000000f n/a table 7.2.9 gpio_in - this parameter maps the states of the gpio pins configured as inputs. gpio_out - this parameter sets the states of the gpio pins configured as outputs. adc_ values - this parameter holds the concatenation of the last readings of adc1 and adc0. the lower two bytes of this parameter hold the right justified 10-bit adc0 reading. the upper two bytes of this pa- rameter hold the right justified 10-bit adc1 reading. the module ? s adc_ref output (pin 25) provides a 1.8 v adc full-scale reference voltage to support ratiometric sensor measurements. battrssi_values - this parameter holds the concatenation of the current module input voltage and the rssi value of the last received 802.11 packet. the lower two bytes of this parameter hold the right justi- fied 8-bit rssi reading. the upper two bytes of this parameter hold the 16-bit voltage value in millivolts, such that a value of 0x0e4c, 3660 decimal, corresponds to 3.660 volts. pwm_values - this parameter holds the concatenation of the pwm output values. the lower two bytes of this parameter hold the 16-bit pwm0 setting. the upper two bytes of this parameter hold the 16-bit pwm1 setting. full scale pwm outputs equal the module input voltage. gpio_config - this parameter sets the gpio direction, the pullup/pulldown configuration of each gpi con- figured as input, and the alternate gpio functions. the parameter consists of a four 4-bit fields, with each gpio, 0 through 3, having a 4-bit field to control its configuration. a 0x0 field sets a gpio as an input, 0x2 field sets a gpio as an input with internal pulldown, 0x3 sets a gpio as an input with an internal pullup, 0x4 selects output, and a 0x8 value specifies an alternate function where defined. gpio_set - writing to this parameter location sets gpio output values. setting a '1' in a bit position sets the corresponding gpio output to a logic high state. only bits corresponding to gpios configured as out- puts are effected. the four bit positions in this parameter are right registered, with gpio0 in the right-most bit position. this parameter is write-only. gpio_clear - writing to this parameter location clears gpio output values. setting a '1' in a bit position clears the corresponding gpio output to a logic low state. only bits corresponding to gpios set as out- puts have any effect. the four bit positions in this parameter are right registered, with gpio0 in the right- most bit position. this parameter is write-only.
www.rfm.com technical support +1.678.684.2000 page 56 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 module serial configuration parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .3.1.0 serialdivisor r/w 4 0..2 32 -1 0x00000030 (9600 bps) .3.2.0 serialcharformat r/w 4 0..3 0x00000003 (8-bit) .3.3.0 serialstopbits r/w 4 0..1 0x00000000 (1 stop bit) .3.4.0 serialparity r/w 4 0..3 0x00000004 (no parity) .3.5.0 serialrxtimeout r/w 4 0..2 32 -1 0x00000020 (32 ms) .3.6.0 serialflowcontrol r/w 4 0..1 0x00000000 (flow control disabled) .3.7.0 diagdivisior r/w 4 0..2 32 -1 0x00000030 (9600 bps) .3.8.0 diagenable r/w 4 0..1 0x00000001 (diagnostic port enabled) .3.9.0 spi_mode r/w 4 0..2 0x00000000 (disabled) .3.10.0 spi_masterclock- divisor r/w 4 0..2 32 -1 0x00000001 .3.11.0 spi_mastercmd- string r/w 4 ascii string ?? (null string) table 7.2.10 serialdivisor - this parameter sets the main serial port baud rate, equal to 460800 divided by the serialdivisor value. serialcharformat - this parameter sets the format for the main serial port as follows: 0x00000000 for 5-bit format 0x00000001 for 6-bit format 0x00000002 for 7-bit format 0x00000003 for 8-bit format (default) serialstopbits - this parameter sets the number of stop bits for the main serial port as follows: 0x00000000 for 1 stop bit (default) 0x00000001 for 2 stop bits serialparity - this parameter sets the parity configuration for the main serial port as follows: 0x00000000 for odd parity 0x00000001 for even parity 0x00000002 for mark parity 0x00000003 for space parity 0x00000004 for no parity (default) serialrxtimeout - this parameter sets the received message timeout for the main serial port. a received message is interpreted as complete when no additional bytes are received during a timeout interval. the serialrxtimeout parameter is scaled in milliseconds. serialflowcontrol - this parameter enables/disables /host_rts - /host_cts hardware flow control: 0x00000000 disables flow control (default) 0x00000001 for enables flow control diagdivisior - this parameter sets this parameter sets the diagnostic serial port baud rate, equal to 460800 divided by the diagdivisor value.
www.rfm.com technical support +1.678.684.2000 page 57 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 diagenable - this parameter enables/disables diagnostic port operation: 0x00000000 disables diagnostic port operation 0x00000001 enables diagnostic port operation (default) spi_mode - this parameter sets the spi port mode: 0x00000000 to disable spi port (default) 0x00000002 to enable spi master mode spi_masterclockdivisor - this parameter sets spi master mode bit rate, equal to 460800 divided by the spi_masterclockdivisor value. spi_mastercmdstring - this parameter holds the command string to clock into the peripheral spi slave when the module is acting as an spi master.
www.rfm.com technical support +1.678.684.2000 page 58 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 module wlan configuration parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .4.1.0 ap1_ssid r/w 32 ascii string ? wsn-default ? .4.2.0 ap1_channel r/w 4 0..11 0x0000000b .4.3.0 ap1_authmode r/w 4 1..8 0x00000003 (automatic authentication) .4.4.0 ap1_encryptionmode r/w 4 1..165 0x000000a5 (all) .4.5.0 ap1_pskpassphrase w 32 ascii string ? wsn-password ? .4.6.0 ap1_pskkey w 32 ascii string n/a .4.7.0 ap1_wepkeyid w 1 0..3 n/a .4.8.0 ap1_wepkeylength w 1 5..13 n/a .4.9.0 ap1_wepkeyvalue w 13 ascii string n/a .4.10.0 ap2_ssid r/w 32 ascii string ? wsn-default ? .4.11.0 ap2_channel r/w 4 0..11 0x0000000b .4.12.0 ap2_authmode r/w 4 1..8 0x00000003 (automatic authentication) .4.13.0 ap2_encryptionmode r/w 4 0..165 0x000000a5 (all) .4.14.0 ap2_pskpassphrase w 32 ascii string ? wsn-password ? .4.15.0 ap2_pskkey w 32 ascii string n/a .4.16.0 ap2_wepkeyid w 1 0..3 n/a .4.17.0 ap2_wepkeylength w 1 5..13 n/a .4.18.0 ap2_wepkeyvalue w 13 ascii string n/a .4.19.0 ap3_ssid r/w 32 ascii string ? wsn-default ? .4.20.0 ap3_channel r/w 4 0..11 0x0000000b .4.21.0 ap3_authmode r/w 4 1..8 0x00000003 (automatic authentication) .4.22.0 ap3_encryptionmode r/w 4 0..165 0x000000a5 (all) .4.23.0 ap3_pskpassphrase w 32 ascii string ? wsn-password ? .4.24.0 ap3_pskkey w 32 ascii string n/a .4.25.0 ap3_wepkeyid w 1 0..3 n/a .4.26.0 ap3_wepkeylength w 1 5..13 n/a .4.27.0 ap3_wepkeyvalue w 13 ascii string n/a .4.28.0 adhoc_ssid r/w 32 ascii string ? rfm-mac ? (mac = module ? s mac addr.) .4.29.0 adhoc_channel r/w 4 0..11 0x0000000b .4.30.0 adhoc_authmode r/w 4 1..8 0x00000001 .4.31.0 adhoc_encryption- mode r/w 4 0..165 0x00000080 (none) .4.32.0 adhoc_psk- passphrase r 32 ascii string ?? (null bytes) .4.33.0 adhoc_pskkey r 32 ascii string ?? (null bytes) .4.34.0 adhoc_wepkeyid w 1 0..3 n/a .4.35.0 adhoc_wepkey- length w 1 5..13 n/a .4.36.0 adhoc_wepkeyvalue w 13 ascii string n/a table 7.2.11 ap1_ssid - this parameter holds the ssid of preferred access point 1. ap1_channel - this parameter sets the channel of operation for preferred access point 1.
www.rfm.com technical support +1.678.684.2000 page 59 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 ap1_authmode - this parameter sets the authentication mode for preferred access point 1. as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication ap1_encryptionmode - this parameter selects the encryption mode for preferred access point 1 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. ap1_pskpassphrase - this parameter holds the psk passphrase for preferred access point 1. this pa- rameter is write-only. attempting to read a write-only snmp parameter returns an error. ap1_pskkey - this parameter holds the psk key for preferred access point 1. this parameter is write- only. attempting to read a write-only snmp parameter returns an error. ap1_wepkeyid - this parameter sets the wep key id for preferred access point 1. the range of this pa- rameter is 0x00000000 to 0x00000003. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap1_wepkeylength - this parameter sets the wep key length in bytes for preferred access point 1. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap1_wepkeyvalue - this parameter holds the wep key ascii string for access point 1, 5 to 13 bytes. the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap2_ssid - this parameter holds the ssid of preferred access point 2. ap2_channel - this parameter sets the channel of operation for preferred access point 2.
www.rfm.com technical support +1.678.684.2000 page 60 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 ap2_authmode - this parameter sets the authentication mode for preferred access point 2 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication ap2_encryptionmode - this parameter selects the encryption mode for preferred access point 2 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. ap2_pskpassphrase - this parameter holds the psk passphrase for preferred access point 2. this pa- rameter is write-only. attempting to read a write-only snmp parameter returns an error. ap2_pskkey - this parameter holds the psk key for preferred access point 2. this parameter is write- only. attempting to read a write-only snmp parameter returns an error. ap2_wepkeyid - this parameter sets the wep key id for preferred access point 2. the range of this pa- rameter is 0 to 3. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap2_wepkeylength - this parameter sets the wep key length in bytes for preferred access point 2. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap2_wepkeyvalue - this parameter holds the wep key ascii string for preferred access point 2, 5 to 13 bytes. the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap3_ssid - this parameter holds the ssid of preferred access point 3. ap3_channel - this parameter sets the channel of operation for preferred access point 3.
www.rfm.com technical support +1.678.684.2000 page 61 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 ap3_authmode - this parameter sets the authentication mode for preferred access point 3 as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication ap3_encryptionmode - this parameter selects the encryption mode for preferred access point 3 as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. ap3_pskpassphrase - this parameter holds the psk passphrase for preferred access point 3. this pa- rameter is write-only. attempting to read a write-only snmp parameter returns an error. ap3_pskkey - this parameter holds the psk key for preferred access point 3. this parameter is write- only. attempting to read a write-only snmp parameter returns an error. ap3_wepkeyid - this parameter is holds wep key id for preferred access point 3. the range of this pa- rameter is 0 to 3. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap2_wepkeylength - this parameter sets the wep key length for preferred access point 3. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. ap2_wepkeyvalue - this parameter holds the wep key ascii string for preferred access point 3, 5 to 13 bytes; the number of bytes must match the wep key length. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. adhoc_ssid - this parameter is the ssid for a fallback ad hoc server. setting this parameter to null bytes disables ad hoc fallback.
www.rfm.com technical support +1.678.684.2000 page 62 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 adhoc_channel - - this parameter sets the channel for ad hoc operation. adhoc_authmode - this parameter sets the authentication mode for ad hoc operation as follows: 0x00000001 - open authentication, allows connection to a wlan with any type of authentication 0x00000002 - shared authentication, allows connection to a wlan only with wep shared authentication; must be used to connect to a wep shared wlan 0x00000003 - automatic authentication, allows connection to a wlan with any type of authentication 0x00000004 - wpa authentication, allows connection to a wlan with wpa/wpa2 802.1x authentication; wpa2 is selected over wpa if both are present 0x00000005 - wpapsk authentication, allows connection to a wlan with wpa/wpa2 authentication; wpa2 is selected over wpa if both are present 0x00000007 - wpa2 authentication, allows connection to a wlan with wpa2 802.1x authentication 0x00000008 - wpa2psk authentication, allows connection to a wlan with wpa2 psk authentication adhoc_encryptionmode - this parameter selects the ad hoc encryption mode as follows: 0x00000001 - allows connection to a wlan only with wep encryption 0x00000004 - allows connection to a wlan only with tkip encryption, either unicast or group; it connects if either unicast cipher or group cipher is tkip 0x00000020 - allows connection to a wlan only with ccmp encryption, either unicast or group; it connects if either unicast cipher or group cipher is ccmp 0x00000080 - allows connection to a wlan only with no encryption 0x000000a5 - allows connection to a wlan with any of the above modes note that encryption mode 0x000000a5 is derived from logically oring the values of the four encryption modes above it. any combination of ored encryption modes are allowed. adhoc_pskpassphrase - this parameter holds the psk passphrase for ad hoc operation. this parameter is read-only. adhoc_pskkey - this parameter holds the psk key for ad hoc operation. this parameter is read-only. adhoc_wepkeyid - this parameter is holds wep key id for ad hoc operation. the range of this parameter is 0 to 3. this parameter is write-only. attempting to read a write-only snmp parameter returns an error. adhoc_wepkeylength - this parameter sets the wep key length for ad hoc operation. the range of this parameter is 0x00000005 to 0x0000000d (5 to 13). this parameter is write-only. attempting to read a write-only snmp parameter returns an error. adhoc_wepkeyvalue - this parameter holds the wep key ascii string for ad hoc operation, 5 to 13 bytes. the number of bytes must match the adhoc_wepkeylength value. this parameter is write-only. attempting to read a write-only snmp parameter returns an error.
www.rfm.com technical support +1.678.684.2000 page 63 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 module node options parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .5.1.0 pspolltimer r/w 8 ascii string ? 0000000078000000 ? (60 s) .5.4.0 restorefactorycfg w 4 0..1 n/a .5.6.0 rebootnode w 4 0..1 n/a .5.10.0 batteryreadfreq r/w 4 0..1023 0x00000001 (read on each tx) .5.12.0 batterywarning- levelinmvolt r/w 4 0..1023 0x000008fc (2300 mv) .5.13.0 batterystandby- levelinmvolt r/w 4 0..1023 0x000009f6 (2550 mv) .5.14.0 batteryrfirstboot- standbylevel- inmvolt r/w 4 0..1023 0x000008fc (2550 mv) .5.16.0 disablestdby w 4 0..2 n/a .5.17.0 systemtime r/w 8 ascii string n/a table 7.2.12 pspolltimer - this parameter sets the interval that the module polls the access point to send any data the access point is holding for it. parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. restorefactorycfg - writing any non-zero value to this location will restore module parameters with fac- tory defaults to their default values. this parameter is write-only. rebootnode - writing any non-zero value to this location performs a ? battery-plugged ? reboot of the module. this parameter is write-only. batteryreadfreq - this parameter holds the number of transmissions from one battery reading to the next. batterywarninglevelinmvolt - this parameter sets the battery voltage level that triggers a low battery warning trap message. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. batterystandbylevelinmvolt - this parameter sets the battery voltage level that triggers the node to switch to standby. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. warning: setting the value of this parameter too high can ? lock up ? the module. batteryrfirstbootstandbylevelinmvolt - this parameter sets the battery voltage level that triggers the node to switch to standby immediately when booted up. the parameter scaling is in millivolts, formatted as a 4-byte hexadecimal number. warning: setting the value of this parameter too high can ? lock up ? the module. disablestdby - writing a non-zero value to this location will disable the module standby function. this pa- rameter is write-only. systemtime - this parameter holds the time interval since the module was last booted. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. the system time parameter rolls over every 128 seconds.
www.rfm.com technical support +1.678.684.2000 page 64 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 module scanning authentication parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .6.1.0 scantype r/w 4 0..1 0x00000000 (active) .6.6.0 eapouterauthtype r 4 0..2 32 -1 n/a .6.7.0 eapinnerauthtype r 4 0..2 32 -1 n/a .6.8.0 radiususername w 15 ascii string n/a .6.9.0 radiuspasswd w 15 ascii string n/a .6.17.0 eaptlsprovision- cacert w 15 ascii string n/a .6.18.0 eaptlsprovision- clientcert w 15 ascii string n/a .6.19.0 eaptlsprovision- pvtkey w 15 ascii string n/a table 7.2.13 scantype - this parameter selects active or passive scan mode as follows: 0x00000000 for active scan mode 0x00000000 for passive scan mode eapouterauthtype - this parameter holds the outer authentication type used for eap_fast. it is format- ted as a 32-bit hexadecimal value. eapinnerauthtype - this parameter holds the inner authentication type used for eap_fast. it is format- ted as a 32-bit hexadecimal value. radiususername - this parameter holds the ascii user name for authenticating with the radius server. radiuspasswd - this parameter hold the ascii password for authenticating with the radius server. eaptlsprovisioncacert - this parameter holds the ascii eap-tls provision certificate authority certificate. eaptlsprovisionclientcert - this parameter holds the ascii eap_tls provision client certificate. eaptlsprovisionpvtkey - this parameter holds the provision private key as an ascii string.
www.rfm.com technical support +1.678.684.2000 page 65 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 module network configuration parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .7.1.0 ipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .7.2.0 subnetmask r/w 4 class a,b,c 0x00000000 (0.0.0.0) .7.3.0 gatewayipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .7.4.0 performdhcp r/w 4 class a,b,c 0x00000000 (enabled) .7.5.0 macaddress r 4 oid 00:30:66 unique for each module .7.7.0 primarydns- ipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .7.8.0 secondarydns- ipaddress r/w 4 class a,b,c 0x00000000 (0.0.0.0) .7.9.0 curntipaddress r 4 class a,b,c n/a .7.10.0 curntsubnetaddress r 4 class a,b,c n/a .7.11.0 curntgateway- ipaddress r 4 class a,b,c n/a .7.12.0 curntprimary- dnsipaddress r 4 class a,b,c n/a .7.13.0 curntsecondary- dnsipaddress r 4 class a,b,c n/a .7.14.0 dhcpleasetime r 8 ascii string n/a table 7.2.14 ipaddress - this parameter holds the module ? s ip address if dhcp is disabled. the address must be a valid unicast address. the address is formatted as a 32-bit hexadecimal number. setting this parameter to zero invokes dhcp. subnetmask - this parameter holds the subnet mask for the wlan interface. the mask is formatted as a 32-bit hexadecimal number. gatewayipaddress - this parameter holds the subnet gateway ip address. the address is formatted as a 32-bit hexadecimal number. performdhcp - this parameter sets the ip address mode as follows: 0x00000000 - for dhcp 0x00000001 - for static ip address macaddress - this parameter holds the module ? s unique mac address. this parameter is read only. primarydnsipaddress - this parameter holds the ip address for the primary dns server. the address is formatted as a 32-bit hexadecimal number. secondarydnsipaddress - this parameter holds the ip address for the secondary dns server. the ad- dress is formatted as a 32-bit hexadecimal number. curntipaddress - this parameter holds the current ip address assigned to the module. the address is formatted as a 32-bit hexadecimal number. curntsubnetaddress - this parameter hold the ip address of the current subnet address. the address is formatted as a 32-bit hexadecimal number.
www.rfm.com technical support +1.678.684.2000 page 66 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 curntgatewayipaddress - this parameter hold the ip address of the current subnet gateway address. the address is formatted as a 32-bit hexadecimal number. curntprimarydnsipaddress - this parameter hold the ip address of the current primary dns server. the address is formatted as a 32-bit hexadecimal number. curntsecondarydnsipaddress - this parameter hold the ip address of the current secondary dns server. the address is formatted as a 32-bit hexadecimal number. dhcpleasetime - this parameter holds the time remaining on the current dhcp lease. the parameter scaling is in microcontroller clock cycles of 0.029802322 s. this parameter is a 64-bit number formatted as an ascii string of the equivalent hexadecimal value. module snmp configuration parameter oids: 1.3.6.1.4.1.32345.88 + oid end oid end name r/w size, bytes range default .8.3.0 primarysnmpmgrip r/w 4 class a,b,c 0x00000000 (0.0.0.0) .8.4.0 secondary- snmpmgrip r/w 4 class a,b,c 0xc0a803c8 (192.168.3.200) .8.10.0 getcommstring r/w 15 ascii string ? gsn_get ? .8.11.0 setcommstring r/w 15 ascii string ? gsn_set ? .8.12.0 trapcommstring r/w 15 ascii string ? gsn_trap ? .8.15.0 snmptrapsrcport r/w 4 1..2 16 -1 0x000000a2 (162) .8.16.0 snmptrapdstport r/w 4 1..2 16 -1 0x000000a1 (161) table 7.2.15 primarysnmpmgrip - this parameter holds the ip address of the primary snmp manager. the address is formatted as a 32-bit hexadecimal number. secondarysnmpmgrip - this parameter holds the ip address of the secondary snmp manager. the ad- dress is formatted as a 32-bit hexadecimal number. getcommstring - this parameter holds the get community ascii string. setcommstring - this parameter holds the set community ascii string. trapcommstring - this parameter holds the trap community ascii string. snmptrapsrcport - this parameter holds the port number for the snmp trap source. the parameter is formatted as a 32-bit hexadecimal number. snmptrapdstport - this parameter holds the port number for the snmp trap destination. the parameter is formatted as a 32-bit hexadecimal number.
www.rfm.com technical support +1.678.684.2000 page 67 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 8.0 WSN802Gdk/WSN802Gadk and WSN802Gdk-a/WSN802Gadk-a developer ? s kit figure 8.1.1 8.1 kit contents ? one WSN802Gp transceiver module installed in a developer board with one u.fl jumper cable or one WSN802Gpa transceiver module installed in a developer board with integrated antenna ? one patch antenna and one dipole antenna with mmcx to sma-r adaptor cable (not required for WSN802Gpa transceiver module) ? one 9 v wall-plug power supply, 120/240 vac, for developer board power, and one 9 v battery ? one rj-45/db-9f cable assembly, one rj-11/db-9f cable assembly and one a/b usb cable ? one pre-configured netgear wgr614 wireless-g router with wall-plug power supply and ethernet cable (WSN802Gdk-a/WSN802Gadk-a kits only) ? one WSN802Gdk documentation and software cd 8.2 additional items needed ? one pc with microsoft windows xp, vista, or windows 7 operating system. figure 8.3.1 figure 8.3.2
www.rfm.com technical support +1.678.684.2000 page 68 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 8.3 developer kit assembly and testing note: the netgear wgr614 router has been preconfigured for use with the WSN802Gdk-a and WSN802Gadk-a developer ? s kits. do not reconfigure the router . see the quick start guide in the WSN802Gdk kit for information on using a customer supplied router. 1. observe esd precautions when handling the WSN802Gdk/WSN802Gadk developer board. referring to figures 8.3.1 and 8.3.2, install the patch antenna on the WSN802Gdk developer board antenna connector. the antenna ? snaps ? onto the connector with moderate pressure. the patch antenna is not required for the WSN802Gadk developer board. 2. install an ac plug on the 9 v developer board power supply. plug the power supply cable into the developer board power connector as shown figure 8.3.1, and plug the 9 v power supply into ac. 3. if using a pc with wifi that supports wpa2 encryption, connect the netgear wall-plug power supply cable to the netgear router and plug the power supply into ac. no other connections to the router are required. confirm the pc is configured for dhcp. open the wireless network connection dialog box on the pc. the netgear router will be operating on channel 11 with an ssid of wsn-default in secure mode. the psk security passphrase to allow router access is wsn-password. establish a wireless connection to the router. 4. if using a pc without wifi, or with wifi that does not supports wpa2 encryption, connect the ethernet cable between the pc and one of the lan ports on the netgear router. confirm the pc is configured for dhcp. connect the netgear wall-plug power supply cable to the netgear router and plug the power supply in. 5. copy wsnconfig.exe and wsnapp.exe from the programs folder on the kit cd to a convenient folder on the pc. these programs run using ordinary window ? s resources and do not require any framework installations, registry entries, etc., to run. figure 8.3.3
www.rfm.com technical support +1.678.684.2000 page 69 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 6. start the wsnconfig.exe program. click on the discovery button. in a few moments the ip address of the WSN802G module will be displayed near the top of the left hand text box on the wsnconfig window, as shown in figure 8.3.3. if the module ip address does not appear, see section 8.4 below. figure 8.3.4 7. select sensor server ip address from the select item drop-down box on the wsnconfig.exe com- mission tab. enter the ip address from the pc information area in the item value text box. then click the add/update button. see figure 8.3.4. this action configures the WSN802G module to send its periodic i/o_read data to the pc running wsnconfig.exe. 8. click on the io report tab. data will automatically begin filling the chart at a 10 s update interval. blowing warm air (breath) on thermistor rt1 on the developer board can be observed on the chart, as shown in figure 8.3.5. the developer kit is now ready for use. figure 8.3.5 9. if any difficulty is encountered in setting up your kit, contact rfm ? s module technical support group. see section 10.2 for contact details.
www.rfm.com technical support +1.678.684.2000 page 70 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 8.4 host configurations to support module discovery WSN802G module ip address discovery is discussed in section 8.3, step 6. if the modules ip address does not appear in a few seconds after clicking the discovery button the first time, try clicking the button several more times at intervals of about 5 seconds. if the ip address still does not appear, open your ac- cess point web browser configuration utility and check to see if the WSN802G module is associated with the access point. if the WSN802G module is not associated with the access point, check for an rf issue such as a loose antenna connection. if the WSN802G module is associated with the access point, there is something blocking module ip address discovery in the host pc. for example, if the host pc is block- ing udp broadcast messages, module ip address discovery cannot work. some firewalls and other low- level security applications block udp broadcast messages by default. there are two options to solving this problem. first, it may be possible to configure the security application to process udp broadcast messages. if this is not possible or is considered to create a security problem, the host pc can be config- ured with the default ip address the module will recognize. this address is 192.168.3.200, using subnet mask 255.255.255.0. figure 8.4.1 to configure the pc with this static address, click on the pc ? s start button and select network connec- tions from the settings menu, as shown in figure 8.4.1.
www.rfm.com technical support +1.678.684.2000 page 71 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.4.2 double-click on the lan or high-speed internet connection being used to display its related local area connection status dialog box, as shown in figure 8.4.2. then click on properties to display the local area connection properties dialog box, as shown in figure 8.4.3. figure 8.4.3 select the internet protocol (tcp/ip) item as shown in figure 8.4.3 and click on properties .
www.rfm.com technical support +1.678.684.2000 page 72 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.4.4 click on the use the following ip address radio button. load the ip address text box with 192.168.3.200 and load the subnet mask with 255.255.255.0. then click on ok . it should now be possible to discover the WSN802G module ? s ip address by repeating section 8.3, step 6.
www.rfm.com technical support +1.678.684.2000 page 73 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 8.5 developer board features a schematic of the WSN802Gdk developer board is provided in the appendix section 10.4. the location of key components is shown in figures 8.5.1 and 8.5.2. figure 8.5.1 switch s1 is connected to the WSN802G ? s gpio0 input and switch s2 is connected to the gpio1 input. these normally open, momentary contact switches present a logic low unless pressed, when they pre- sent a logic high. note: the silkscreen on some developer boards have the gpio labels reversed on switches s1 and s2. switch s3 provides a hardware reset for the WSN802G module. switch s4 asserts a hardware wake input to the WSN802G module. placing a jumper on jp14 provides a continuous wake input to the module. pot r9 is the input to adc0 on the WSN802G module. thermistor rt1 is part of a voltage divider driving the adc1 input of the WSN802G module.
www.rfm.com technical support +1.678.684.2000 page 74 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 led d1 illuminates when the developer board is powered. when run from a battery, d2 will illuminate when the battery voltage declines to the minimum operating voltage. d3 illuminates when the WSN802G ? s wake_out line is high. d4 illuminates when gpio3 on the module outputs a logic high. d5 illuminates when gpio2 on the module outputs a logic high. figure 8.5.2
www.rfm.com technical support +1.678.684.2000 page 75 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 8.6 wsnconfig program operation wsnconfig.exe provides a number of useful functions in addition to those covered above. wsn- config.exe can be run separately or at the same time as the customer ? s application program to provide WSN802G module configuration support. wsnconfig.exe configuration commands run on port 161, and wsnconfig.exe listens for snmp commands on port 162. the application (sensor server) runs on port 8255 by default. when active, the customer program runs as the sensor server. only one program at a time can run as the sensor server. wsnapp.exe on the kit cd is an example customer application pro- gram. figure 8.6.1 double clicking on a module ip address in the left text box of the main wsnconfig frame launches a multi-tab configuration dialog box for the module, as shown in figure 8.6.1. all tabs in this config dialog frame have refresh , get all , apply, default and reboot buttons. wsncon- fig.exe maintains a local buffer that holds a copy of all mib configuration parameters (see table 7.3.1). clicking the refresh button loads the configuration parameters from the local buffer into various tabs in the config dialog box. clicking the get all button queues a request to the WSN802G module to send a new copy of all its con- figuration parameters. how quickly the module responds depends on the configtrapinterval system pa- rameter and when in the trap interval the request was queued. as a new copy of the configuration pa- rameters is received, the local buffer is updated. clicking the refresh button after the local buffer is up- dated will, in turn, update the data in the various tabs in the config dialog box. clicking on the apply button followed by clicking on the reboot button will queue a request to the WSN802G module to modify parameter values that have been changed in a config dialog tab and to reboot to use the parameter changes. again, how quickly the module updates parameter values depends on the configtrapinterval system parameter and when in the trap interval the request was queued.
www.rfm.com technical support +1.678.684.2000 page 76 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 clicking the default button queues a request to the WSN802G module to load factory default values for all configuration parameters. the reboot button must be clicked following a default reload to enable the use of the default parameters. how quickly the module responds depends on the configtrapinterval sys- tem parameter and when in the trap interval the request was queued. the ip address in the lower left of each tab in the config dialog box is the WSN802G module ip address. figure 8.6.2 the first network tab displays basic network parameters information. note: unless you are familiar with ip networking contact rfm module technical support before making any changes on this tab. a parame- ter entry error on this tab can disable the WSN802G module wireless link. figure 8.6.3 the second network tab displays the module ? s fixed mac address, plus the currently assigned ip, sub- net, gateway and dns addresses, and the dhcp lease time remaining for these assignments. the con- tents of this tab are read only.
www.rfm.com technical support +1.678.684.2000 page 77 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.4 the wireless tab accepts inputs for the primary and secondary snmp manager ip addresses, the config and linkup trap intervals, the trap alarm timeout (0 disables the alarm), plus the ip address , poll timer interval, and timeout for the time sync server . clicking the apply button and then the reboot button queues a request to update the module with changes entered in this tab. figure 8.6.5 the first system management tab displays and accepts inputs for the ssid , channel , authentication mode and encryption mode for wlan configurations 1, 2, 3 and ad-hoc.
www.rfm.com technical support +1.678.684.2000 page 78 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.6 the second system management tab displays and accepts inputs for the psk (wpa2) passphrases for wlan configurations 1, 2, 3 and ad-hoc. the community strings for get , set and trap are also displayed on this tab, plus the related trap source and destination ports. figure 8.6.7 the rfm mib tab displays and accepts inputs related to the basic mib oid application parameters. the sensor server ip address can be set and applied in this tab as an alternative to step 7 in section 8.3. the auto report interval can be increased over the default 10 second interval to conserve battery power where the values or states of the sensor inputs change slowly.
www.rfm.com technical support +1.678.684.2000 page 79 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.8 the gpio tab displays analog and digital module inputs and displays and accepts changes in analog and digital module outputs. numerical data is displayed and entered in decimal format. note: the pwm 1 text box is not used by the current version of the WSN802G module. figure 8.6.9 the serial tab displays and accepts changes for parameters related to the module ? s serial ports. the diag port is not used for operational diagnostics in the current firmware.
www.rfm.com technical support +1.678.684.2000 page 80 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.10 the firmware update tab allows new firmware to be loaded into a WSN802G module. input the names of the two firmware application files including the paths to the files if they are not located in the same folder as wsnconfig.exe. click on each select file button. set the firmware server ip address and firmware server port number. select yes from the update firmware drop-down box and click on apply . figure 8.6.11 the battery tab allows the power supply voltage levels that send a warning, place the module in standby, or allow the module to bootup to be read and/or modified. the read frequency is in units of seconds. note: contact rfm module technical support before making changes to the default warning, standby and bootup levels. system time is also provided on this tab for reference, but its value is not require for external applications.
www.rfm.com technical support +1.678.684.2000 page 81 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.12 wep encryption can be used instead of psk encryption for compatibility with legacy wifi routers. wep encryption is not implemented in the current version of the module firmware. figure 8.6.13 the authentication tab is included on the wireless link config tab for the future inclusion of enterprise security. scan type is currently defaulted to passive and should be left in this mode.
www.rfm.com technical support +1.678.684.2000 page 82 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.14 figure 8.6.14 shows the same wsnconfig main screen as figure 8.3.4, but with the module ip address tree expanded on the left and the sensor sever ip address tree expanded on the right. figure 8.6.15 the snmp tab allows individual parameters to be manually displayed and modified. the oid value s and the object types for the two parameter sets are detailed in sections 7.2 (gainspan) and 7.3 (rfm). checking the use rfm oid box on the lower right corner of the main window accesses the rfm oid parameter set. clicking the get button queues a request to retrieve the value of a parameter. clicking the set button queues a request to change the value of a parameter. how quickly the module responds to set or get depends on the configtrapinterval system parameter and when in the trap interval the request was queued. clicking the config button launches the wireless link config dialog box discussed above.
www.rfm.com technical support +1.678.684.2000 page 83 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.16 the events tab displays a running history of events received from the WSN802G module. figure 8.6.17 the WSN802G module must be awake in order to use the io read tab. to hold the module awake, place a jumper on jp14, which is labeled always on or push and hold the wake in button. the ip address and port number on the i/o read tab refer to the WSN802G module ? s sensor socket. clicking read sends an io_read_request to the module. note that adc0 is reading the voltage from pot r9, and adc1 is reading the voltage from a voltage divider consisting of a fixed resistor and thermistor rt1. gpio0 reads the state of switch s1 and gpio1 reads the state of switch s2. a gpio value of 1 indicates the switch is closed. note: the silkscreen on some developer boards have the gpio labels reversed on switches s1 and s2. a quick reply to the io_read_request is indicated by a successful status . a failure status is usually caused by forgetting to install a jumper on jp14.
www.rfm.com technical support +1.678.684.2000 page 84 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.18 the WSN802G module must be awake in order to use the serial data tab. to hold the module awake, place a jumper on jp14, which is labeled always on or push and hold the wake in button. the ip address and port number on the i/o read tab refer to the WSN802G module ? s sensor socket. clicking send data sends the string in the transmit data text box in a serial_data command to the module. a quick reply to the command is indicated by a successful status . a failure status is usually caused by forgetting to install a jumper on jp14. figure 8.6.19 the WSN802G module must be awake in order to use the io write tab. to hold the module awake, place a jumper on jp14, which is labeled always on or push and hold the wake in button. the ip address and port number on the i/o read tab refer to the WSN802G module ? s sensor socket. clicking the write button under gpio out values sends an io_write_gpio to the module. clicking the write button under
www.rfm.com technical support +1.678.684.2000 page 85 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 pwm 0 sends an io_write_pwm command to the module. a quick reply to either write command is indicated by a successful status . a failure status is usually caused by forgetting to install a jumper on jp14. on the developer board, gpio2 and 3 are connected to leds such that the leds light when the module pin is set to 1. figure 8.6.20 the cfg tab allows the api cfg commands to be routed in udp packets over the wireless link. figure 8.6.21 the WSN802G module must be awake in order to use the io report tab. to hold the module awake, place a jumper on jp14, which is labeled always on or push and hold the wake in button. either a single parameter can be selected for charting from the drop-down box in the lower left corner of the io report tab, or all parameters can be selected for charting by clicking on the show all button. the chart area can be cleared and reset by clicking the clear button.
www.rfm.com technical support +1.678.684.2000 page 86 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.22 the WSN802G module must be awake in order to use the com port tab. to hold the module awake, place a jumper on jp14, which is labeled always on or push and hold the wake in button. the com port tab allows access to the same parameters through the serial port that can be accessed by the snmp server over the wireless link using the rfm oid addresses. install a serial cable between the host pc and the WSN802G development board. then click on the connect button as shown in figure 8.6.21 above. the config button will become active. next, click on the config button to launch the multi-tab serial configuration dialog window, as shown in figure 8.6.23. figure 8.6.23 all tabs in the serial config dialog frame have refresh , get all , apply, default and reboot buttons. wsnconfig.exe maintains a local buffer that holds a copy of all mib configuration parameters (see table 7.3.1). clicking the refresh button loads the configuration parameters from the local buffer into various tabs in the config dialog box. clicking the get all button requests the WSN802G module to send a new copy of all its configuration pa- rameters. as a new copy of the configuration parameters is received, the local buffer is updated. clicking
www.rfm.com technical support +1.678.684.2000 page 87 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 the refresh button after the local buffer is updated will, in turn, update the data in the various tabs in the config dialog box. clicking on the apply button followed by clicking on the reboot button requests the WSN802G module to modify parameter values that have been changed in a config dialog tab and to reboot to use the parame- ter changes. clicking the default button requests the WSN802G module to load factory default values for all configura- tion parameters. the reboot button must be clicked following a default reload to enable the use of the default parameters. the first network tab, as shown in figure 8.6.24, displays and accepts inputs for basic network parameters. figure 8.6.24 the second network tab displays the module ? s fixed mac address, plus the currently assigned ip, sub- net, gateway and dns addresses, and the dhcp lease time remaining for these assignments. the con- tents of this tab are read only. figure 8.6.25
www.rfm.com technical support +1.678.684.2000 page 88 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 the wireless tab accepts inputs for the primary and secondary snmp manager ip addresses, and the config and linkup trap intervals. clicking the apply button and then the reboot button requests the module to update the parameter changes entered in this tab. figure 8.6.26 the first system management tab displays and accepts inputs for the ssid , channel , authentication mode and encryption mode for wlan configurations 1, 2, 3 and ad-hoc. figure 8.6.27 the second system management tab displays and accepts inputs for the psk (wpa2) passphrases for wlan configurations 1, 2, 3 and ad-hoc. the community strings for get , set and trap are also displayed on this tab, plus the related trap source and destination ports.
www.rfm.com technical support +1.678.684.2000 page 89 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.28 the rfm mib tab displays and accepts inputs related to the basic mib oid application parameters. the sensor server ip address can be set and applied in this tab as an alternative to step 7 in section 8.3. the auto report interval can be increased over the default 10 second interval to conserve battery power where the values or states of the sensor inputs change slowly. figure 8.6.29 the gpio tab displays analog and digital module inputs and displays and accepts changes in analog and digital module outputs. numerical data is displayed and entered in decimal format. note: the pwm 1 text box is not used by the current version of the WSN802G module.
www.rfm.com technical support +1.678.684.2000 page 90 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.30 the serial tab displays and accepts changes for parameters related to the module ? s serial ports. the diag port is not used for operational diagnostics in the current firmware. figure 8.6.31 the battery tab allows the power supply voltage levels that send a warning, place the module in standby, or allow the module to bootup to be read and/or modified. the read frequency is in units of seconds. note: contact rfm module technical support before making changes to the default warning, standby and bootup levels. system time is also provided on this tab for reference, but its value is not require for external applications.
www.rfm.com technical support +1.678.684.2000 page 91 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 figure 8.6.32 wep encryption can be used instead of psk encryption for compatibility with legacy wifi routers. wep encryption is not implemented in the current version of the module firmware. figure 8.6.33 the authentication tab is included on the serial config tab for the future inclusion of enterprise security. scan type is currently defaulted to passive and should be left in this mode.
www.rfm.com technical support +1.678.684.2000 page 92 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 9.0 troubleshooting wsnconfig.exe does not communicate with a WSN802G module - the wireless router and the wifi in the pc running wsnconfig.exe must be set to match the WSN802G wireless configuration. the default is channel 11 with an ssid of wsn-default (case sensitive) in secure mode. the security passphrase to allow router access is wsn-password. note: the netgear router shipped in the WSN802Gdk is preconfigured for use with the WSN802G module. do not reconfigure the router. the WSN802G module must be connected to an antenna to work. WSN802G will not accept sensor application commands - the module must be awake to accept applica- tion commands. either assert a logic high on the wake_in hardware line or queue the sensor application command to immediately follow an automatic (timer) i/o_report. use the rfm mib tab on the config dialog window in wsnconfig.exe to check for suitable autoreport and waketimeout values. see section 8.6 for additional information. range is extremely limited - this is usually a sign of a poor antenna connection or the wrong antenna. check that the antenna is firmly connected. if possible, remove any obstructions near the antenna.
www.rfm.com technical support +1.678.684.2000 page 93 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 10.0 appendices 10.1 ordering information WSN802Gc: transceiver module for solder-pad mounting with rf connector for external antenna WSN802Gca: transceiver module for solder-pad mounting with integral chip antenna WSN802Gp: transceiver module for pin-socket mounting with rf connector for external antenna WSN802Gpa: transceiver module for pin-socket mounting with integral chip antenna 10.2 technical support for WSN802G product support contact rfm ? s module technical support group. the phone number is +1.678.684.2000. phone support is available from 08.30 am to 5:30 pm us eastern time zone, monday through friday. the e-mail address is tech_sup@rfm.com.
www.rfm.com technical support +1.678.684.2000 page 94 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 10.3 WSN802G mechanical specifications    +  #   8 9 %    :  #     %    ;  #  9  8 %   7   #  :  7 %  
    $ )       '       &  6          ;  #    8 %  2   <      ; # +    %  ;  9 +  &  6           !   # 6 6 %    ;  #    8 %    7  #    7 % figure 10.3.1    9  #   ;  %    ;  #  9  8 %   7 9  #  :  : %  
    $        &  6          ;  #    8 %  2   <   ;  9 +  &  6           !   # 6 6 %    + ; #    7 %    :  #  9  : %    ;  #    8 % figure 10.3.2
www.rfm.com technical support +1.678.684.2000 page 95 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11    9  #   ;  %    ;  #  9  8 %      #  8  7 %  
     )       '       &  6          ;  #    8 %  2   <      ; # +    %  ;  9 +  &  6           !   # 6 6 %    ;  #    8 %    7  #    7 %     ; # ;  8  %   7   #  :  7 % figure 10.3.3   7   #  :  7 %    ;  #    8 %   8   #  8   %      #   ; : %      #    + %  
     (   *  ! $    !    $ 5   b   &   $    !        ' 2 - $   ' ?   ; ?   ?  ?    - c   "   &  6             !   # 6 6 % figure 10.3.4
www.rfm.com technical support +1.678.684.2000 page 96 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11    +  #   8 9 %    :  #     %    ;  #  7   %   7   #  :  7 %  
    $  )       '       &  6          ;  #    8 %  2   <      ; # +    %  ;  9 +  &  6           !   # 6 6 %    ;  #    8 %     ; # +    % figure 10.3.5    9  #   ;  %    ;  #  9  8 %   7 9  #  :  : %  
    $         &  6          ;  #    8 %  2   <   ;  9 +  &  6           !   # 6 6 %    + ; #    7 %    :  #  9  : %    ;  #    8 % figure 10.3.6
www.rfm.com technical support +1.678.684.2000 page 97 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11    9  #   ;  %    ;  #  7   %      #  8  7 %  
      )       '       &  6          ;  #    8 %  2   <      ; # +    %  ;  9 +  &  6           !   # 6 6 %    ;  #    8 %     ; # +    %     ; # ;  8  %   7   #  :  7 % figure 10.3.7   7   #  :  7 %    ;  #    8 %   8   #  8   %      #   ; : %      #    + %  
      (   *  ! $    !    $ 5   b   &   $    !        ' 2 - $   ' ?   ; ?   ?  ?    - c   "   &  6             !   # 6 6 % figure 10.3.8
www.rfm.com technical support +1.678.684.2000 page 98 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 10.4 WSN802G developer board schematic
www.rfm.com technical support +1.678.684.2000 page 99 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11
www.rfm.com technical support +1.678.684.2000 page 100 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11
www.rfm.com technical support +1.678.684.2000 page 101 of 101 ?2009-2011 by rf monolithics, inc. e-mail: tech_sup@rfm.com WSN802G - 03/16/11 11.0 warranty seller warrants solely to buyer that the goods delivered hereunder shall be free from defects in materials and workmanship, when given normal, proper and intended usage, for twelve (12) months from the date of delivery to buyer. seller agrees to repair or replace at its option and without cost to buyer all defective goods sold hereunder, provided that buyer has given seller written notice of such warranty claim within such warranty period. all goods returned to seller for repair or replacement must be sent freight prepaid to seller ? s plant, provided that buyer first obtain from seller a return goods authorization before any such return. seller shall have no obligation to make repairs or replacements which are required by normal wear and tear, or which result, in whole or in part, from catastrophe, fault or negligence of buyer, or from improper or unauthorized use of the goods, or use of the goods in a manner for which they are not de- signed, or by causes external to the goods such as, but not limited to, power failure. no suit or action shall be brought against seller more than twelve (12) months after the related cause of action has oc- curred. buyer has not relied and shall not rely on any oral representation regarding the goods sold here- under, and any oral representation shall not bind seller and shall not be a part of any warranty. the provisions of the foregoing warranty are in lieu of any other warranty, whether express or implied, written or oral (including any warranty or mer- chant ability or fitness for a particular purpose). seller ? s liability arising out of the manufacture, sale or supplying of the goods or their use or dispo- sition, whether based upon warranty, contract, tort or otherwise, shall not exceed the actual purchase price paid by buyer for the goods. in no event shall seller be liable to buyer or any other person or entity for special, in- cidental or consequential damages, including, but not limited to, loss of prof- its, loss of data or loss of use damages arising out of the manufacture, sale or supplying of the goods. the foregoing warranty extends to buyer only and shall not be applicable to any other person or entity including, without limi- tation, customers of buyers. part # m-0802-1002, rev f


▲Up To Search▲   

 
Price & Availability of WSN802G

All Rights Reserved © IC-ON-LINE 2003 - 2022  

[Add Bookmark] [Contact Us] [Link exchange] [Privacy policy]
Mirror Sites :  [www.datasheet.hk]   [www.maxim4u.com]  [www.ic-on-line.cn] [www.ic-on-line.com] [www.ic-on-line.net] [www.alldatasheet.com.cn] [www.gdcy.com]  [www.gdcy.net]


 . . . . .
  We use cookies to deliver the best possible web experience and assist with our advertising efforts. By continuing to use this site, you consent to the use of cookies. For more information on cookies, please take a look at our Privacy Policy. X