BIXOLON WD-MSB WIFI MODULE User Manual

BIXOLON Co.,Ltd. WIFI MODULE Users Manual

Users Manual

Download: BIXOLON WD-MSB WIFI MODULE User Manual
Mirror Download [FCC.gov]BIXOLON WD-MSB WIFI MODULE User Manual
Document ID2132908
Application IDe2AcDitXOYXyQZnDvAS2sA==
Document DescriptionUsers Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize156.9kB (1961268 bits)
Date Submitted2013-12-03 00:00:00
Date Available2013-12-03 00:00:00
Creation Date2013-12-03 13:59:45
Producing SoftwareHaansoft PDF 1.3.0.437
Document Lastmod2013-12-03 13:59:45
Document TitleMicrosoft Word - Wi-Fi P2P Module User Manual Ver1.1
Document CreatorHaansoft PDF 1.3.0.437
Document Author: 이영택

WD-MSB P2P Module
User Manual
Upgrade History
Date
Version
2013-09-13
V1.0
2013-10-31
V1.1
Comment
Release
Contents
1.
General Description ……………………………………………………………………………………………...….6
1.1 Features …………………………………………………………………………………………………………………………………..6
1.2 Applications ……………………………………………………………………………………………....……..…………….………6
1.3 Product description ………………………………………………………………………………………….…………………….6
1.4 Specification ……………………………………………………………………………………….…………….…………………….7
2.
Installation ……………………………………………………………………………………………………….…….9
2.1 Fundamentals of wireless LAN ……………………………………………………………………………………………….9
2.1.1 Infrastructure Mode ……………………………………………………………………………………………………….9
2.1.2 Ad-hoc Mode …………………………………………………………………………………………..………………….10
2.1.3 Basic Requisites …………………………………………………………………………………………………………...10
2.1.4 Authentication and Security ………………………….…………………………………………………………….11
2.2 Installation …………………………………………………………………………………………………………………………….11
2.2.1 Making Wireless LAN Network ………………………………………………………………………………….12
3.
Configuration …………………………………………………………………………..…………………………….15
3.1 Configuration with WLAN Module Manager ……………………………………………………………………...15
3.1.1 Configuration via WLAN ………………………..…………………………………………………………………….15
3.1.2 Configuration via Serial ……………………………………………………………………………………………....16
3.1.3 Printer Search ……………………………………………………………………………………..……………………….16
3.1.4 System ………………………………………………………………………………………………………...……………….17
3.1.5 Protocol ………………………………………………………………………………………….......................................17
3.1.6 BSS Info …..……………………………………………………………………………………….....................................18
3.1.7 Network …………..…………………………………………………………………………………………………………...19
3.1.8 Authentication ……….…………………………………………………………………………………………………….20
3.1.9 Certification ……………………….….……………………………………………………………………………………..21
3.1.10 Firmware ………………….………………………………………………………………………………………………...21
3.1.11 Information ………………….…………………………………………………………………………………………....22
3.2 Web Configuration ……………………………………………………………………………………………………………....23
3.2.1 Web Connection ………………………………………………………………………………………………………...23
3.2.2 Home ……………………………….………………………………………………………………………………………….24
3.2.3 System …………………………………………………………………………………………………………………………25
3.2.4 Protocol ………………………….…………………………………………………………………………………………...26
3.2.5 Network ……………………………………………………………………………………………………………………...26
3.2.6 Authentication …………………………………………………………………………………………………………....27
3.2.7 Wizard ………………………………………………………………………………………………………………………...28
3.2.8 Web Site ……………………………………………………………………………………………………………………..
3.2.9 Contact ……………………………………………………………………………………………………………………….
3.3 TELNET ………………………………………………………………………………………………………………………………….30
3.3.1 TELNET Connection …………………………………………………………………………………………………...30
3.3.2 System ………………………………………………………………………………………………………………………..31
3.3.3 Protocol ……………………………………………………………………………………………………………………...31
3.3.4 Network ……………………………………………………………………………………………………………………...32
3.3.5 Authentication …………………………………………………………………………………………………………...33
3.3.6 Save …………………………………………………………………………………………………………………………….37
3.3.7 Exit ……………………………………………………………………………………………………………………………...37
3.4 FTP ………………………………………………………………………………………………………………………………………..37
3.4.1 FTP Connection ………………………………………………………………………………………………………….37
3.4.2 Config File list view …………………………………………………………………………………………………...38
3.4.3 Config File download ………………………………………………………………………………………………...38
3.4.4 Config File Upload ……………………………………………………………………………………………………..38
3.4.5 Config File Specification ..…………………………………………………………………………………………..39
3.5 SNMP ……………………………………………………………………………………………………………………….…………...41
3.5.1 SNMP Connection ………………………………………………………………………………………….…………..41
3.5.2 SNMP Manager operation test…………………………………………………………………………………...42
4.
Hardware Block Diagram ……………………………………………………………………………….………...45
4.1 Hardware Pin Array …………………………………………………………………………………………………….………...46
5.
Demo and Test …………………………………………………………………………………………….………...48
5.1 Test environment ………………………………………………………………………………………………………….……….48
5.1.1 Hardware …………………………………………………………………………………………………………………....48
5.1.2 Software ……………………………………………………………………………………………………………….……..48
5.2 Start Test ……………………………………………………………………………………………………………………………….48
5.2.1 STEP1. ……………………………………………………………………………………………………….………………...48
5.2.2 STEP2. ……………………………………………………………………………………………………….………………...48
5.2.3 STEP3. ………………………………………………………………………………………………………….……………...48
6.
Configuration Tool Command List ……………………………………………………………………………..49
6.1 Configuration Tool Protocol ……………………………………………………………………………….………………...49
6.1.1 Serial Operation Specification ….……………………………………………………………….………………..49
6.1.2 WLAN Operation Protocol & Port ………………………………………………………….……………..…..49
6.2 Serial & WLAN Command ……………………………………………………………………………….…………………..50
6.2.1 Serial Operation ………………………………………………………………………………………………………....50
6.2.2 Wireless LAN Operation …………………………………………………………………………………………….51
6.2.3 Serial & Wireless LAN Command Format …………………………………………………………….…...51
7.
Technical Support, Warranty, and Precaution ………………………………………………………….…...58
7.1 Technical Support ………………………………………………………………………………………….…………………...58
7.2 Warranty ………………………………………………………………………………………………………………………….…….58
7.2.1 Refund …………………………………………………………………………………………………………………….…..58
7.2.2 Free Repair Services …………………………………………………………………………………………………..58
7.2.3 Charged Repair Services …………………………………………………………………………………………....58
7.3 Precaution …………………………………………………………………………………………………………………………….58
1. General Description
Wi-Fi P2P Module supports stand-alone WLAN system which embeds MCU (Micro Controller
Unit) with various configuration applications, monitoring functions and security protocols.
The stand-alone WLAN system, along with CMAX S/W package, can easily be adapted to target
systems which have RS-232 serial interface to enable wireless network (IEEE802.11 b/g/n)
functionality with no redesign of the system, thus making the system connected, controlled and
maintained in WLAN network.
2.1 Features
Embedded 802.11b/g/n Wireless Networking
Supports Serial to WLAN, Infrastructure, Ad-hoc mode
Supports network status indicator LEDs
UART/SPI Interface
Strong Security with WEP 64/128, WPA/WPA2 Personal, Enterprise
Supports DHCP Client, HTTP, HTTPS, TELNET, FTP, ARP, SNMP, IPv4, TCP, UDP Protocol
Compact design 27mm × 36mm × 4.7mm
Distance Outdoor: approx. 100m
2.2 Applications
POS Equipment
Automotive Applications
Medical Equipment
Street Furniture
Telematics
Industrial Automation
Metering Applications
2.3 Product description
CATEGORIES
IMPLEMENTATION
Wi-Fi P2P Module
Debugger board
Serial Cable
(Serial Communication Cable)
Power
(DC 5V/1000mA Adapter)
CD
(User Manual and H/W, S/W Doc Package)
[Table 1.3.1] Product Description
2.4 Specifications
ITEM
SPECIFICATIONS
WIRELESS SPECIFICATION
Wireless Standard
IEEE802.11b/g/n
Frequency Range
2.412~2.484GHz in 20Mhz
Channels
1 ~ 14 Channels
Baseband Processing
OFDM, CCK and DSSS
Modulation
BPSK, QPSK, 16-QAM, 64-QAM
Range
Up to 100m free space (Outdoor)
Connection Modes
Infrastructure/Ad-hoc (IBSS)/P2P
RF PERFORMANCE
Antenna Gain
2dBi ± 0.5 dBi, (internal chip antenna)
Tx EVM
25dB
Tx Center Frequency Accuracy
20ppm
Tx Symbol Clock Frequency
Tolerance
Tx Spectrum Mask
(54Mbps)
20ppm
-21dBr @ fc +/- 11MHz
-29dBr @ fc +/- 20MHz
-41dBr @ fc +/- 30MHz
Tx Spectral Flatness
2dB/ - 4dB
ANTENNA MODES
Antenna
To support two chip antenna or external two antenna via connector
UART INTERFACE
Baud Rate
230,400
Bits
Parity
None
Stop bits
Flow Control
CTS/RTS (Hardware)
PROTOCOL
Internet
DHCP Client, HTTP, HTTPS, TELNET, FTP, ARP, ICMP, SNMP, IPv4,
TCP, UDP
Open Connection
Shared Key (WEP encryption 64 and 128 bit options)
Security
WPA1/2-Personal (PSK)
WPA1/2-Enterprise (EAP-TLS, EAP-TTLS, PEAP, LEAP, FAST)
SSL2 / SSL3 / TLS1
OTHERS
Management
Configuration Tool, HTTP, HTTPS, TELNET, FTP
Software Update
Firmware upgradeable via UART and Wireless LAN
PHYSICAL DIMENSION
Power
200mA * 3.3V
Dimensions
27mm × 36mm × 4.7mm
Weight
5g (Approx.)
Power Consumption
660mW
MCU
400MHz
Environmental
Humidity
ARM9 with SRAM 64M and Flash 16M
-5℃ ~ 55℃
-20℃ ~ 70℃
Operation: 10% to 90%, Non-Condensing
Storage: 5% to 90%, Non-Condensing
[Table 1.4.1] Specification
2. Installation
2.1 Fundamentals of wireless LAN
CMAX Module supports IEEE802.11b/g/n. This module support 11/54/72Mbps transmission
rate respectively. There are two types of wireless LAN networks – infrastructure and ad-hoc.
[Figure 2.1.1] Reference Network Architecture
2.1.1 Infrastructure Mode
The wireless LAN stations communicate through an Access Point (AP). So, at least one AP
is needed to make the infrastructure network. The wireless LAN station can talk to wired
network hosts because AP relays between wireless LAN stations as well as between
wireless LAN station and wired LAN (Ethernet) host.
[Figure 2.1.1.1] Infrastructure
2.1.2 Ad-hoc Mode
Wireless stations communicate each other without the AP. So user can make a system
more simply. It is proper if there’s no wired LAN requirement and it is a small network.
Some people call it peer-to-peer mode.
[Figure 2.1.2.1] Ad-Hoc
2.1.3 Basic Requisites
SSID
It is an identifier to identify the particular wireless LAN. So the same SSID should be
configured to all stations to communicate in the same wireless network. In case of
infrastructure mode, user has to set his station’s SSID as same as AP’s.
Channel
IEEE802.11b/g/n wireless LAN stations communicate through the ISM (Industrial,
Scientific, and Medical) band whose frequency is about 2.4GHz. IEEE802.11 specification
divides this band into 14 channels every 5MHz. If user installs more than one wireless
10
LAN networks in the same area, the channels should be apart more than 4 channels to
avoid interferences.
2.1.4 Authentication and Security
Authentication
A wireless LAN station should get authentication from the AP in the infrastructure mode.
There are the Open system and the Shared key for the authentication methods.
WEP (Wired Equivalent Privacy)
The WEP is a secure protocol for wireless LAN. There are two kinds of WEP method - 64
bits and 128 bits key.
WPA (Wi-Fi Protected Access)
WPA is a security standard for users of device equipped with Wi-Fi wireless connection.
It is an improvement on and is expected to replace the original Wi-Fi security standard,
Wired Equivalent Privacy (WEP). There are two modes about the user authentication in
WPA security. The one is Enterprise which has authentication server and the other one is
PSK (Pre-Shared Key) which dosen’t have any server. CMAX Module supports both
Enterprise mode and Personal mode (WPA-PSK).
WPA 2
To final security of Wireless LAN, IEEE 802.11i, a standard about Wireless LAN, has
suggested the Counter Mode with Cipher Block Changing Message Authentication Code
Protocol (CCMP) for replacing the TKIP. CCMP uses Advanced Encryption Standard (AES),
it is the WPA 2 that adopts the using the method. WPA 2 has also both Enterprise and
PSK mode. CMAX Module supports also both them.
2.2 Installation
Before testing, users should connect the CMAX Module. There are two methods for
connecting. The first method is to connect a target device with the serial port and the other
method is to connect by wireless LAN card on your PC.
11
[Figure 2.2.1] Connect between CMAX Module and a PC
2.2.1 Making Wireless LAN Network
Even though you connect an AP on your network, wireless LAN network could not be
made automatically. You should configure values of items which related with wireless
network. Please follow the below steps.
Connect the CMAX Module through serial port
Start the WLAN Module Manager on your PC. Push the “Connect” button after
Selecting a COM port, User ID and User Password as the same values with the your COM
port.
[Figure 2.2.1.1] Connect through serial port
Connect the CMAX Module through WLAN
Start the WLAN Module Manager on your PC. Click the “Connect” button after inserting
12
IP Address, User ID and User Password as the same values with the CMAX Module.
[Figure 2.2.1.2] Connect through WLAN
Configuring Wireless LAN Parameters
Move to the [Network] menu and setting SSID as the same values with the AP’s. Then,
move to the [Authentication] menu and setting security options. Finally, Click the
“Update” button. Please ask the manufacturer of the AP, when you want to know about
setting the AP’s value.
[Figure 2.2.1.3] Configuring Wireless LAN Parameters
If you want to make an Ad-hoc network, choose the [Ad-hoc] as the value of [WLAN
Topology] and set a value of [SSID]. Then, try to connect your PC to the network.
2.2.2 Setting Network Area
13
This step is for setting both CMAX Module and your PC to be located the same network.
If only they are, the TCP connection between them can be established.
Setting of the PC
Add or change the IP address of the network adapter on your PC like following.
Get into the menu of [Windows Control Panel] >> [Network Connections] >> [Properties
of the Network Adapter - with right click of your mouse]. Then, you can show the
properties of [Internet Protocol (TCP/IP). In there, press the [Advanced] button for adding
an IP Address like the below figure.
[Figure 2.2.2.1] Adding / Changing the IP address of users’ PC (example)
Setting of CMAX Module
CMAX Module uses WLAN Module Manager as it’s a configuration program. WLAN
Module Manager is for MS Windows, and this is comfortable to use because it doesn’t
need installation. First, search your WLAN Module via network. All the values of
parameters are set the default values in the factory. To apply it to your system, proper
values should be set via WLAN Module Manager. Major parameter’s default values are
listed on below table. To implement this simple test, keep these values without any
changes.
DISTRIBUTION
System
FUNCTION
VALUE
User ID
admin
User Password
password
FTP
Disable
TELNET
Disable
HTTP
Enable / HTTPS is disable
Disable
Community Name (Read) : Public
Protocol
Community Name (Write) : Private
SNMP
Trap Destination IP Address : 0.0.0.0
Trap Destination Community Name : Public
Trap Mode : 1 (Enable), 0 (Disable)
Network
Locality
Disable
14
Network Mode
Ad-hoc, channel 1
SSID
PRINTER_adhoc
IP Assignment Method
Manual Allocation
IP : 192.168.1.1
IP, Subnet, Gateway
Subnet : 255.255.255.0
Gateway : 192.168.1.2
Authentication
Open System
None
Shared key
None
[Table 2.2.1.1] Default values of Major parameters
3. Configuration
3.1 Configuration with WLAN Module Manager
[Figure 3.3.1] initial appearance of WLAN Module
3.1.1 Configuration via WLAN
Checklists
Make sure the WLAN connection between your PC and WLAN Module Manager. If they
are the same network, [search] button can be used. If they aren’t, [IP Address] should be
inserted to use.
Procedures
15
1)
Printer Address : Set the values of the CMAX Module’s IP Address properly
2)
User ID : Set the values of the User ID
3)
User Password : Set the values of the Password
4)
Connect : Connect through Wireless LAN to CMAX Module
5)
Next : Move to System Configuration page.
Note : If you want to save [ID/Password], it choose the checkbox.
3.1.2 Configuration via Serial
Checklists
Make sure the connection between your PC and WLAN Module Manager using RS232
direct cable. To use this, WLAN Module Manager has to be operating in the [Serial
Configuration] mode. You press the “Connect” button after Selecting a COM port, User ID
and User Password as the same values with the your COM port. Then, You can enter the
[Serial Configuration] mode.
Procedures
1)
Serial Port : Select a COM port as the same values with the your COM port.
2)
User ID : Set the User ID
3)
User Password : Set the User Password
4)
Connect : Connect through Serial communication to CMAX Module
5)
Next : Move to the configuration page of system
Note : If you want to save [ID/Password], it choose the checkbox. After changing the
configuration, you must be rebooted CMAX Module.
3.1.3 Printer Search
: Provide information of CMAX Module in the network.
16
[Figure 3.1.3.1] Printer Search
Reset : Delete the printer information
Search : Search active printers in the network. If a network problem occurs, the printers
will not scan. Then, you press the [Search] button again.
Select : After selecting a printer to connect, you should press [Select] button.
3.1.4 System
: Set the Printer Name, Printer Port Num, User ID and User Password. User ID and
password will be used to set the configuration.
[Figure 3.1.4.1] System Setting
Printer Name : Set the [Printer Name]
Print Port Num : Set the [Print Port Num]
User ID : Set the [User ID]
User Password : Set the [User Password]
Confirm Password : Set correct values of [Confirm Password]
Next : Move to the configuration page of protocol
Back : Move to the configuration page of connection
3.1.5 Protocol
: Select to use ftp, http and snmp that is application. For a description of each feature in
the manual can be found at.
17
[Figure 3.1.5.1] Protocol Setting
Task State
- Set the HTTPS, TELNET, FTP and SNMP that are applications if you use.
SNMP
- To perform SNMP sets for each item.
Next : Move to the configuration page of BSS Information
Back : Move to the configuration page of System
3.1.6 BSS Info
: After Searching on AP(Access Point), user can select to connect at the AP. Then, AP’s
SSID will be inserted automatically.
18
[Figure 3.1.6.1] BSS Setting
Reset : Delete current information of BSSID
Get BSS Information : Scanning information of BSSID. If the problem of network occurs,
the printers will not scan. Then, you press the [Get BSS Information] button again.
Select : Select BSS that searched.
Next : Move to the configuration page of Network
Back : Move to the configuration page of Protocol
3.1.7 Network
: Set the network parameter of CMAX Module
[Figure 3.1.7.1] Network Setting
Network Mode : Select the Infra Network or Adhoc mode.
Note : If adhoc mode user selects to connect a adhoc-channel (1~14).
SSID : Set the SSID that user is going to connect. SSID Can set up maximum of 32 bytes.
Inactivity Time : After connecting to the server of printer, It is time to maintain a
connection with the server. Default setting : Disable, Maximum time : 32767(sec)
IP Assignment Method : Supported Automatic Allocation(DHCP Client) or Manual
Allocation. Default setting : Manual Allocation
Automatic Allocation(DHCP Client) : Assigns the IP Address that is assigned in the
DHCP server automatically
Manual Allocation : Does not assign the IP address in the AP(Access Point)’s DHCP
server. User should insert the IP Address that is such as IP Address of AP.
19
l
IP Address : Insert the [IP Address] of AP : Default IP Address : 192.168.192.168
Subnet Mask : Insert the [Subnet Mask] of AP : Default subnet Mask : 255.255.255.0
Gateway : Insert the [Gateway] of AP : Default Gateway : 192.168.192.1
Next : Move to the configuration page of Authentication
Back : Move to the configuration page of BSS Information
3.1.8 Authentication
: Set a security configuration of the CMAX Module
[Figure 3.1.8.1] Authentication Setting
Authentication : It is security configuration between CMAX Module and AP(Access Point)
FIELD
DESCRIPTION
Cryptograph
Open System
It should be select NONE or WEP64/128 as the setting of AP to
be access
You can input the max 26charater,. It Configure to WEPB64/18 if
WEP Key
you input it like the following format.
Cryptograph
Shared Key
WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX)
Select a WEP64/128 same AP’s configuration to be access.
You can input the max 26charater,. It Configure to WEPB64/18 if
WEP Key
you input it like the following format.
WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX)
WPA-PSK /
Cryptograph
You should same to configure a TKIP/AES with AP to be access.
WPA2-PSK
PSK Key
You should same to input a TKIP/AES with AP to be access.
Cryptograph
You should same to configure a cryptograph with AP to be access.
WPA-TKIP /
EAP
You should same to configure a EAP Mode with AP to be access.
WPA2-AES
ID
You should Input the ID with configured certificate Server
Password
You should Input the Password with configured certificate Server
20
However, If EAP Configuration is a EAP-TLS, you should input the
private_key_password that is certificate password that generated
for CMAX module.
[Table 3.1.8.2] Security setting
Save : It is function to Save the configuration information that you have set
Saved file can set through uploading with FTP
Update : User will save the configuration information to CMAX Module
Back : Move to the configuration page of Network
Note : To upload a file must be named “config” should be
3.1.9 Certification
: Can upload Certificates to CMAX Module for EAP-TLS certification
[Figure 3.1.9.1] Upload Certificate
Upload Certification
- Open file : Select the Certificate
- Update : Save the Selecting a certificate to CMAX Module
3.1.10 Firmware
: It has been supporting the firmware upgrade. If It does not connect from CMAX
Module, can not update the firmware. To stable firmware upgrade, we are not supported
doing all of the features. After updating the firmware, CMAX Module must be rebooted.
21
[Figure 3.1.10.1] Upgrade Firmware
Open file : Select a firmware type of [WLAN_M*.Bin]
Update : Update a firmware to CMAX Module
Stop : Stop the firmware upgraded
Note :
Emergency mode :
If an error occurs while firmware upgrade, CMAX module will be started to
the emergency mode. Emergency mode does not support the security
features. So You must update the full firmware to operate normal mode.
3.1.11 Information
: Product and firmware information is displayed
22
[Figure 3.1.11.1] Information
Product Information : Product name
Firmware Version : Firmware version
Update Date : Updated date
Mac Address : CMAX Module’s Mac Address
3.2 Web Configuration
Set the CMAX Modules’s configuration through web connecting
3.2.1 Web Connection
: CMAX Module can Set configuration using the HTTP, HTTPS protocol. HTTP and HTTPS
settings are same. Only, HTTPS secure connection is supported. Default setting is HTTP
HTTP Connection : Start internet explorer through “http://192.168.192.168”
Default : ID : admin
Password : password
23
[Figure 3.2.1.1] Sign in with your
HTTPS Connection : Start internet explorer through https://192.168.1.1
Default : ID : admin
Password : password
Note : When establishing a HTTP connection, to continue to ignore security warnings.
Web Server Security feature
- Supported the SSL 2.0, SSL 3.0 and TLS 1.0
- For HTTPS connections, if you want to access from the computer, security
protocol should be checked.
3.2.2 Home
: Display the system, protocol and network information in the CMAX Module
24
[Figure 3.2.2.1] Home
3.2.3 System
: After inserting the [Pinter Name], [Printer Port], [User Name] and [User Password], user
should press the “SUBMIT” button to set system configuration
[Figure 3.2.3.1] System Setting
Printer Name : Set the [Printer Name]
Print Port Num : Set the [Print Port Number]
User ID : Set the [User ID]
User Password : Set the [User Password]
25
l
Confirm Password : Set correct values of [Confirm Password]
Default : User ID : admin , User Password : password
3.2.4 Protocol
: Set the HTTPS, TELNET, FTP and SNMP that are applications if you use. Then To perform
SNMP sets for each item. After inserting, user should press the “SUBMIT” button to set
Protocol configuration
[Figure 3.2.4.1] Protocol Setting
Setup
HTTPS (Default setting is HTTP)
TELNET (Default setting is disable)
FTP (Default is disable)
SNMP (Default is disable)
SNMP
Community Name (Read) : Read Community
Community Name (Write) : Write Community
Default : Private
Trap IP Address : Trap IP Address.
Default : Public
Default : 0.0.0.0
Trap Community : Trap Community
Default : Public
3.2.5 Network
26
: After inserting the network configuration, user should press the “SUBMIT” button to set.
[Figure 3.2.5.1] Network Setting
Network Mode : Select the Infra Network or Adhoc mode.
Note : If adhoc mode user selects to connect a adhoc-channel (1~14).
SSID : Set the SSID that user is going to connect. SSID Can set up maximum of 32
bytes.
Inactivity Time : After connecting to the server of printer, It is time to maintain a
connection with the server. Default setting : Disable, Maximum time : 3600(sec)
IP Assignment Method : Supported Automatic Allocation(DHCP Client) or Manual
Allocation. Default setting : Manual Allocation
Automatic Allocation(DHCP Client) : Assigns the IP Address that is assigned in the DHCP
server automatically
Manual Allocation : Does not assign the IP address in the AP(Access Point)’s DHCP server.
User should insert the IP Address that is such as IP Address of AP.
IP Address : Insert the [IP Address] of AP : Default IP Address : 192.168.1.1
Subnet Mask : Insert the [Subnet Mask] of AP : Default subnet Mask : 255.255.255.0
Gateway : Insert the [Gateway] of AP : Default Gateway : 192.168.1.2
3.2.6 Authentication
: After inserting the security features, user should press the “SUBMIT” button
to apply on the system.
27
[Figure 3.2.6.1] Authentication Setting
Authentication : It is security configuration between CMAX Module and AP(Access Point)
FIELD
DESCRIPTION
Cryptograph
Open System
It should be select NONE or WEP64/128 as the setting of AP to
be access
You can input the max 26charater,. It Configure to WEPB64/18 if
WEP Key
you input it like the following format.
Cryptograph
Shared Key
WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX)
Select a WEP64/128 same AP’s configuration to be access.
You can input the max 26charater,. It Configure to WEPB64/18 if
WEP Key
you input it like the following format.
WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX)
WPA-PSK /
Cryptograph
You should same to configure a TKIP/AES with AP to be access.
WPA2-PSK
PSK Key
You should same to input a TKIP/AES with AP to be access.
Cryptograph
You should same to configure a cryptograph with AP to be access.
EAP
You should same to configure a EAP Mode with AP to be access.
ID
You should Input the ID with configured certificate Server
WPA-TKIP /
You should Input the Password with configured certificate Server
WPA2-AES
Password
However, If EAP Configuration is a EAP-TLS, you should input the
private_key_password that is certificate password that generated
for CMAX module.
[Table 3.2.6.2] Security setting
3.2.7 Wizard
28
: Provides that user can easily insert the configuration of system. After inserting the
configurations, user should press the “NEXT” button to apply on the system.
[Figure 3.2.7.1] Wizard start page
[Figure 3.2.7.2] Wizard result page
29
3.3 TELNET
You can configure the CMAX module by TELNET
Note :
TELNET : TELNET is Text-based remote access service and based TCP/IP Protocol.
CMAX module configuration : Input the number provided on the left side of the menu and
then enter the "Enter" to enter the next entry.
Menu move example
Menu number : move to next menu.
$ : go to the previous menu.
# : Go to the main menu.
3.3.1 TELNET Connection
: Connect by Telnet Client.( Microsoft Windows xp based on the description.)
Windows command execution.
Windows’s Beginning – Run – input “command”.
Input “TELNET 192.168.1.1 (IP Address of CMAX module)” to command windows.
Default : IP Address : 192.168.1.1
[Figure 3.3.1.1] TELNET Configuration Server Connection Screen
Input “User ID, User Password” and then enter the “Enter”
Default : User ID : admin User Password : password
[Figure 3.3.1.2] TELNET Configuration major menu
[1] System: Configure System information.
[2] Protocol: You can select to Enable(1) or disable(0) the application of the activities.
And configure SNMP access information. (Default setting HTTP)
[2] Protocol: You can select to Enable(1) or disable(0) the application of the activities. And
configure SNMP access information. (Default setting HTTP)
30
l
Network: Configure Network parameter of CMAX module.
Authentication: Configure security parameter of CMAX module.
Save: You can store the configuration information that input so far to the CMAX module
Exit : Terminate TELNET connection.
3.3.2 System
: You can configure Printer Name, Print Port Number, ID and User Password. User ID and
User Password is applied to all application of CMAX module.
Select “[1]System” to “configuration main menu”.
[Figure 3.3.2.1] TELNET System information menu
[0] System Name : Configure CMAX Module name
[1] TCP Server Port Num: Configure TCP Server port number.
[2] User ID: Configure user ID.
[3] User Password : Configure user password.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
3.3.3 Protocol
: You can select to enable or disable the application(HTTP, HTTPS, TELNET, FTP, SNMP) of
the use and configure SNMP Parameter(Community, Trap IP Address, Trap Community).
Select [2]Protocol to “Configuration main menu.”
[Figure 3.3.3.1] TELNET Protocol menu
31
[Figure 3.3.3.2] TELNET Task State Protocol menu
Select “[0]Task State” to “Protocol menu.”
[0] HTTPS : Configure to Enable(1) or Disable(0) to HTTPS. ( default HTTP )
[1] TELNET : Configure to Enable(1)/Disable(0) to TELNET.
[2] FTP : Configure to Enable(1)/Disable(0) to FTP
[3] SNMP : Configure to Enable(1)/Disable(0) to SNMP.
[Figure 3.3.3.3] TELNET SNMP Connection Information menu
Select “[1] SNMP” to Protocol menu.
[0] Community Name (Read) :If SNMP is Enable(1) state, you can configure to
accessed community of read mode..
[1] Community Name (Write) : If SNMP is Enable(1) state, you can configure to
accessed community of write mode.
[2] Trap IP Address : If SNMP is Enable(1) state, you can configure to IP Address that
received Trap message.
[3] Trap Community : If SNMP is Enable(1) state, you can configure to Trap
community.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
3.3.4 Network
: Configure Network parameter of CMAX module.
Select “[3] Network” to Configuration main menu.
32
[Figure 3.3.4.1] TELNET Network menu
[0] Network Mode : Select a network mode( Infra Network(0) / Adhoc(1) / P2P(2)).
[1] Adhoc Channel : Configure Adhoc Channel(1~14) to Connection.
[2] SSID : It should be configured the SSID same as AP's SSID to be access.
[3] Inactivity Time : It means a time limit keeping connection that without data
communication between client and server.
[4]
IP
Assignment
Method
Select
IP
Assignment
method(
DHCP(0)/Manual
Alloccation(1) ).
[5] IP Address : If you selected Manual Alloccation(1), configure IP Address.
[6] Subnet Mask : If you selected Manual Alloccation(1), configure Subnet Mask.
[7] Gateway : If you selected Manual Alloccation(1), configure Gateway.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
3.3.5 Authentication
: Configure CMAX Module Security. It should be configured the Security same as AP's
Security to be access.
Select “[4]Authentication” to “configuration main menu”.
[Figure 3.3.5.1] TELNET Security main menu
[0] Authentication : You configure a security method.. Reference [Table 2.2.1.6.1]
[1] Cryptograph : Configure an encryption method according to security methods.
[2] Key : Configure a key of WEP or PSK.
[3] EAP : Configure an EAP Mode according to WPA/WPA2
33
l
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.2] TELNET Open System Security main menu
[0~5] Authentication : Configure a Security Mode. Reference [Table 2.2.1.6.1]
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
“Authentication" is a function that CMAX module does authenticate to AP through to
wireless
FIELD
DESCRIPTION
Cryptograph
Open System
It should be select NONE or WEP64/128 as the setting of AP to
be access
You can input the max 26charater,. It Configure to WEPB64/18 if
WEP Key
you input it like the following format.
Cryptograph
Shared Key
WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX)
Select a WEP64/128 same AP’s configuration to be access.
You can input the max 26charater,. It Configure to WEPB64/18 if
WEP Key
you input it like the following format.
WEP64 (5 ASCII, 10 HEX), WEP128 (13 ASCII, 26 HEX)
WPA-PSK /
Cryptograph
You should same to configure a TKIP/AES with AP to be access.
WPA2-PSK
PSK Key
You should same to input a TKIP/AES with AP to be access.
Cryptograph
You should same to configure a cryptograph with AP to be access.
EAP
You should same to configure a EAP Mode with AP to be access.
ID
You should Input the ID with configured certificate Server
WPA-TKIP /
You should Input the Password with configured certificate Server
WPA2-AES
Password
However, If EAP Configuration is a EAP-TLS, you should input the
private_key_password that is certificate password that generated
for CMAX module.
[Table 3.3.5.1] Security setting
34
[Figure 3.3.5.3] TELNET Open System Cryptograph menu
[0] Open System : You should select ‘NONE[0]’ or ‘WEP64/128[1]’
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.4] TELNET Shared Key Crypto graph menu
[1] Shared Key : You should select ‘WEP64’ or ‘WEP128’
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.5]TELNET WPA-PSK/WPA2-PSK a detailed menu.
[0] Authentication : you should configure a authentication mode.
reference [Table
2.2.1.6.1]
[1] Cryptograph : You should configure a Cryptograph mode according to authentication
mode
[2] Key : You should a WEP key of PSK Key.
[3] EAP : You should configure a EAP Mode according to WAP/WAP2
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
35
[Figure 3.3.5.6] TELNET WPA-PSK/WPA2-PSK Cryptograph menu
[2] WPA-PSK : You should select a ‘TKIP[0]’ or ‘AES[1]’
[3] WPA2-PSK : You should select a ‘TKIP[0]’ or ‘AES[1]’
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 3.3.5.7]TELNET WPA/WPA2 a detailed menu.
[0] Authentication : You should configure a authentication method. Reference [Table
2.2.1.6.1]
[1] Cryptograph : Configure an encryption method according to security methods.
[2] Key : Configure a key of WEP or PSK.
[3] EAP : Configure an EAP Mode according to WPA/WPA2
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
[Figure 2.2.3.5.8 ]TELNET WPA/WPA2 Cryptograph menu
Cryptograph : It should be configured a cryptograph method with ‘TKIP[0]’ or ‘AES[1]’
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
36
[Figure 3.3.5.9] TELNET EAP Configuration Menu.
[0] EAP Mode: It should be selected same as AP’s EAP mode
[1] EAP ID/PASSWORD: it should be configured same as AP’s EAP ID and password.
[$] Back: Go to the previous menu.
[#] Main Menu : Go to the main menu.
3.3.6 Save
: To save a changed configuration information on CMAX module, select the ‘[5]Save’ in
the configuration main menu.
3.3.7 Exit
: To terminate a TELNET connection, select the ‘[6] Exit’ in the configuration main menu.
3.4 FTP
It is function to Upload or Download 'Configuration file' for CMAX module configuration by
FTP. If you modify the 'Configuration file' and upload that, it will be changed CMAX module
setup.
Note :
FTP : File Transfer Protocol (FTP) is a standard network protocol used to exchange and
manipulate files over a TCP/IP-based network(between server and client).
Supported FTP command
ls : List contents of remote directory
Get: : Receive configuration file
Put : Send configuration file
CAUTION : To Upload a file, don’t use file-extension and use “config” to filename.
3.4.1 FTP Connection
: It should be executed to Microsoft Windows xp Command line.
Execute Windows command
Microsoft Windows xp’s beginning – run – input ‘command’
37
-
It should be input command ‘FTP 192.168.1.1 (CMAX module’s IP Address)’
Default : IP Address : 192.168.1.1
[Figure 3.4.1.1] FTP Connection Screen
It should be input User ID and User password.
Default : User ID : admin User Password : password
3.4.2 Configuration File list view
: It should be confirmed a file as you input ‘ls’.
[Figure 3.4.2.1] FTP ‘ls’ command executed screen
3.4.3 Configuration File download
:It should be downloaded a file as you input ‘get config’.
[Figure 3.4.3.1] FTP ‘get config’ command screen
3.4.4 Configuration File Upload
: It should be uploaded a file as you input ‘put config’. you must use file name as
‘config’.
[Figure 3.4.4.1] FTP ‘put config’ command screen
38
3.4.5 Configuration File Specification
: Table 3.4.5.1 is downloaded file’s content from CMAX module by ‘get config’
command. To change a configuration value, input without blank in ‘bracket’([ ]).
** Caution!!!
** Do not change the order or contents of the menu.
** Only need to change the settings, please.
[1] System
1. Printer Name: [unknown]
2. Printer Port Num: [9100]
3. User ID: [admin]
4. User Password: [password]
[2] Protocol
1. Task State
1) HTTPS: [0]
2) TELNET: [0]
3) FTP: [0]
4) SNMP: [0]
2. SNMP
1) Community Name (Read): [public]
2) Community Name (Write): [private]
3) Trap IP Address: [0.0.0.0]
4) Trap Community: [public]
[3] Network
1. Network Mode
1) Infra Network(0) / Adhoc(1) / P2P(2): [1]
2) Adhoc Channel: [1]
2. SSID: [PRINTER_adhoc]
3. Inactivity Time: [0]
4. IP Assignment Method: [1]
5. IP Address: [192.168.1.1]
6. SubnetMask: [255.255.255.0]
7. Gateway: [192.168.1.2]
[4] Authentication
1. Authentication: [0]
2. Cryptograph: [0]
3. EAP Mode: [0]
4. WEP Key: []
5. PSK Key: []
6. Authentication ID: []
7. Authentication Password: []
[Table 3.4.5.1] FTP ‘config’ file’s content
39
l
Describes in detail how the file should be configure.
[1] System: Configure the system information.
1. Printer Name: Configure the system name.
2. Printer Port Num: Configure the TCP server port.
3. User ID: Configure the user ID.
4. User Password: Configure the user password.
[2] Protocol: Configure the Application (HTTPS, TELNET, FTP, SNMP) as Enable(1) or Disable(0).
And configure the SNMP connect information.
1. Task State
1) HTTPS: Configure the HTTPS as Enable(1) or Disable(0).(default
configuration is HTTP)
2) TELNET: Configure the TELNET as Enable(1) as Disable(0).
3) FTP: Configure the FTP as Enable(1) as Disable(0).
4) SNMP: Configure the SNMP as Enable(1) or Disable(0).
2. SNMP
1) Community Name (Read): Configure the Read mode community..
2) Community Name (Write): Configure the Write mode community.
3) Trap IP Address: If SNMP’s state is Enable(1), Configure the IP address for
Trap message received.
4) Trap Community: If SNMP’s state is Enable(1), Configure the Trap community.
[3] Network: Configure the CMAX module’s Network parameter.
1. Network Mode
1) Infra network(0) / Adhoc(1) : Select a network mode to connect
2) Adhoc Channel: If you selected Adhoc, you select channel(1~11) .
2. SSID: CMAX_adhoc: It should be input SSID as the setting of AP to be access
3. Inactivity Time: It should be configured a time limit keeping connection that without
data communication between client and server.
4. IP Assignment Method: Select DHCP(0) or Manual Allocation(1)
5. IP Address: If you selected Manual Allocation(1), you configure a IP Address.
6. SubnetMask: If you selected Manual Allocation(1), you configure a Subnet Mask.
7. Gateway: If you selected Manual Allocation(1), you configure a Gateway.
[4] Authentication: It should be configured the Security same as AP's Security to be access.
1. Authentication: Open System(0), Shared Key(1), WPA-PSK(2), WPA-PSK2(3), WPA(4),
WPA2(5)
2. Cryptograph: NONE(0), WEP64/128(1), TKIP(2), AES(3)
3. EAP Mode: EAP-PEAP(0), EAP-TTLS(1), EAP-TLS(2), EAP-LEAP(3)
4. WEP Key: It should be configure the WEB key same as AP’s WEP key.
5. PSK Key: It should be configure the PSK key same as AP’s PSK key.
40
6. Authentication ID: It should be configure the Authentication ID same as AP’s
Authentication ID.
7. Authentication Password: It should be configured the Authentication password same as
AP's Authentication password to be access.
3.5 SNMP
It is managed a network information through SNMP (supported SNMPv1).
Note :
SNMP stands for 'Simple Network Management Protocol' and it is used for network
management.
SNMP is only a protocol to transfer messages so it need the Application program to get Network
management information using SNMP. SNMP has SNMP manager and agent, as in common network
application is composed server and client model. SNMP agent is a part of SNMP module and it is
installed in managed system to collect the network or system information. SNMP manager is also part
of the SNMP module and it request the network information to SNMP agent.
3.5.1 SNMP Connection
: It should be connect a SNMP Agent through SNMP Manager. It is introduced a SNMP
operation at this manual as used SNMP-JManger-v1.0.
SNMP-JManager-v1.0 running
- Input the address(192.168.1.1 , CMAX module’s IP Address) to ‘Agent IP Address’.
Default : IP Address : 192.168.1.1
- Input the Read Community, Write Community and then click “Apply Changes” button.
Default : Read Community : public Write Community : private
41
[Figure 3.5.1.1] SNMP Connection configuration screen
3.5.2 SNMP Manager operation test: it is description of basic SNMP operation.
If you selected terminal node to ‘Get Tree’, get this value(client note value).
[Figure 3.5.2.1] SNMP ‘get’ message operation screen
42
l
Get Next : You can bring the value at trees as selected a terminal node.
[Figure 3.5.2.2] SNMP ‘getnext’ message operation screen
You can configure the terminal node value to ‘set tree’. (You can set only the contents
had set on "Write")
[Figure 3.5.2.3] SNMP ‘set’ message operation screen
43
n
Walk: It can get the all item that terminal node of tree or terminal node of node.
[Figure 3.5.2.4] SNMP ‘walk’ message operation screen
Traps: If a specific event occurs, relevant(in the event) message is transmitted to trap address.
- ColdStart: when a terminal rebooting works, coldstart message is transmitted to trap
address.
[Figure 3.5.2.5] SNMP coldStart message received screen
- AuthenticationFailure: If ‘Read’, ‘Write’ Community is not correct, AuthenticationFailure
message is transmitted to trap address.
44
[Figure 3.5.2.6] SNMP AuthenticationFailure message received screen
4. Hardware Block Diagram
[Figure 4.1] Hardware Block Diagram
45
4.1 Hardware Pin Array
BIXOLON 보드 (=B 보드)
WIDI 보드 (=W 보드)
WIDI
Pin
No
신호명
신호방향
DGND
전압 Level
BB_JIG 보드 (=J 보드)
기능
비고
GND
USB D- 신호
USB_DM
J 보드 ↔ W 보드
W 보드 CPU F/W
업데이트용
USB D+ 신호
USB_DP
J 보드 ↔ W 보드
W 보드 CPU F/W
업데이트용
DGND
GND
LED_GREEN
B 보드 ← W 보드
3.3V
11
LED_YELLOW
B 보드 ← W 보드
3.3V
green LED 동작신호
High active
yellow LED 동작신호
High active
B 보드 : SPI
13
SPI_MISO
B 보드 → W 보드
3.3V
SPI Master input Slave
slave mode
output
W 보드 : SPI
master mode
B 보드 : SPI
15
SPI_CLK
B 보드 ← W 보드
3.3V
SPI Clock
slave mode
W 보드 : SPI
master mode
46
B 보드 : SPI
17
SPI_CS_N
B 보드 ← W 보드
3.3V
SPI Chip select
slave mode
Low active
W 보드 : SPI
master mode
B 보드 : SPI
19
SPI_MOSI
B 보드 ← W 보드
3.3V
SPI Master output Slave
slave mode
input
W 보드 : SPI
master mode
W 보드 CPU Debug 용
21
SAMBA_DEBUG_TXD
J 보드 ← W 보드
GND
UART
Transmit Data
23
Pin
DGND
GND
신호명
신호방향
전압 Level
기능
VDD_3V3
B 보드 → W 보드
3.3V
W 보드 입력전원
VDD_3V3
B 보드 → W 보드
3.3V
W 보드 입력전원
WIDI_RST_N
B 보드 → W 보드
3.3V
LED_RED
B 보드 ← W 보드
3.3V
10
CPU_CTS
B 보드 ← W 보드
3.3V
UART Clear To Send
12
CPU_RXD
B 보드 → W 보드
3.3V
UART Receive data
14
CPU_TXD
B 보드 ← W 보드
3.3V
UART Transmit Data
16
CPU_RTS
B 보드 → W 보드
3.3V
UART Request To Send
No
W 보드 system RESET 신호
Low active
red LED 동작신호
High active
W 보드 CPU Debug 용
18
SAMBA_DEBUG_RXD
J 보드 → W 보드
GND
UART
Receive Data
47
비고
20
SPI_UART/_SEL
B 보드 → W 보드
3.3V
22
EXT_FACTORY_RST_N
B 보드 → W 보드
3.3V
24
DGND
Low : UART 통신
High : SPI 통신
WIDI 보드 Factory reset
Low active 신호
GND
5. Demo and Test
This chapter explains several examples that it can be used for functional testing of CMAX module.
Test environment is as follows.
5.1 Test environment
5.1.1 Hardware
RS232 serial port with a PC
CMAX module & CMAX test board
PC's COM port and CMAX for the module's serial port to connect the serial cable is required.
5.1.2 Software
Configuration Tool of CMAX module
Hyper Terminal( or other Terminal program)
5.2 Start Test
5.2.1 STEP1.
It should be connect to CMAX Test board and PC’s Serial port.
It should be turn on the CMAX test board.
It should be connected the PC to CMAX module through serial interface.
It should be run a Terminal program of PC by connected Serial(ex, HyperTerminal)
5.2.2 STEP2. (Wireless Configuration to between CMAX module and PC).
It should be connected the PC to CMAX module through wireless LAN.
It should be configured the PC’s Network to next value. IP( 192.168.1.XXX),
subnet(255.255.255.0), gateway(192.168.1.2)
It should be confirmed wireless connection of CMAX module and PC by Ping response.
5.2.3 STEP3. (Data Transfer)
It should be run a Terminal program of PC by connected WLAN(ex, HyperTerminal)
It should be input a character to HyperTerminal.
It should be confirmed a Receive Data on serial Terminal.
48
[Figure 5.2.3.1] Wireless LAN to Serial
6. Configuration Tool Command List
It should be explained the command for CMAX module and PC through Serial interface and
WLAN.
6.1 Configuration Tool Protocol
6.1.1 Serial Operation Specification
OPERATION
Configuration Data Get
Configuration Data Set
Firmware Upload
Certificate Upload
BSS Info Request
BSS Info Response
SPECIFICATION
Baud Rate : 230,400
Hardware Handshaking : CTS/RTS
Baud Rate : 230,400
Hardware Handshaking : CTS/RTS
Baud Rate : 230,400
Hardware Handshaking : CTS/RTS
Baud Rate : 230,400
Hardware Handshaking : CTS/RTS
Baud Rate : 230,400
Hardware Handshaking : CTS/RTS
Baud Rate : 230,400
Hardware Handshaking : CTS/RTS
[Table 6.1.1.1] Serial Operation Specification
6.1.2 WLAN Operation Protocol & Port
OPERATION
PROTOCOL & PORT
Configuration Data Get
TCP , 3318
Configuration Data Set
TCP , 3318
Firmware Upload
TCP , 3318
Certificate Upload
TCP , 3318
BSS Info Request
TCP , 3318
BSS Info Response
TCP , 3318
Printer Search
Request
UDP , 3337
Printer Search
Response
UDP , 9000
49
[Table 6.1.2.1] WLAN Operation Protocol & Port
6.2 Serial & WLAN Command
6.2.1 Serial Operation
Serial mode Configuration Tool work should need ‘Start Message’ before sending real
command.
Serial mode Configuration Tool command should change all ‘byte’ to ASCII code. And next
transmit.
Ex : Command Frame
If it changes hexadecimal code to ‘__[I_F]__[IF__GET]’. It is ‘0x5F, 0x5F, 0x49, 0x49, 0x5F,
0x46, 0x47, 0x5F, 0x5F, 0x5B, 0x49, 0x46, 0x5F, 0x5F, 0x5D, 0x45, 0x54, 0x47’.
It should be transmitted ASCII value that the above hexadecimal value changed
‘0x5F’ is separated ASCII ‘5’(==0x35) and ASCII’F’(==0x46). and then WLAN module send
them by serial interface.
ASCII
HEX
0x5F
0x5B
0x49
0x46
0x47
0x5D
0x45
0x54
[Table 6.2.1.1] Serial Command ASCII, HEX
Serial Command Sequence
[Figure 6.2.1.1] Serial Command Sequence
50
Serial Start Message Format
SERIAL START MESSAGE
VALUE
DIRECTION
Configuration Start Message
[0x7f, 0x1D, 0x1F, 0x03]
Host → Device
Configuration Start Response
[0x7f]
Device → Host
Firmware Update Start Message
[0x80, 0x1D, 0x1F, 0x03]
Host → Device
Firmware Update Start Response
['S', 'T', 'R', 'T']
Device → Host
CA_CER Update Start Message
[0x81, 0x1D, 0x1F, 0x03]
Host → Device
CA_CER Update Start Response
['S', 'T', 'R', 'T']
Device → Host
CL_KEY Update Start Message
[0x82, 0x1D, 0x1F, 0x03]
Host → Device
CL_KEY Update Start Response
['S', 'T', 'R', 'T']
Device → Host
CL_PEM Update Start Message
[0x83, 0x1D, 0x1F, 0x03]
Host → Device
CL_PEM Update Start Response
['S', 'T', 'R', 'T']
Device → Host
RSSI Request Message
[0x85, 0x1D, 0x1F, 0x03]
[0x1D, 0x49, 0x02]
RSSI response Message
Device → Mobile Printer
Mobile Printer → Device
+ RSSI[2Byte]
COMMENT
RSSI value is a
negative number
- if end of data is '0x03', 'Printer Server' send bypass at serial port(no
ETC
data operation).
- if ‘printer socket’’s state is ‘close’, received data is dumped.
[Table 6.2.1.2] Serial Start Message Format
6.2.2 Wireless LAN Operation
Wireless LAN Command Sequence
[Figure 6.2.2.1] Wireless LAN Command Sequence
6.2.3 Serial & Wireless LAN Command Format
Request Frame Format
DESCRIPTOR
STX (COMMAND CODE)
PARAMETER
ETX
Length(bytes)
18
Variable
51
[Table 6.2.3.1] Request Frame Format (Serial & WLAN)
Response Frame Format
DESCRIPTOR
STX (COMMAND CODE)
PARAMETER
ETX
Length(bytes)
18
Variable
[Table 6.2.3.2] Response Frame Format (Serial & WLAN)
ETX Frame Format
SETTING
FORMAT
ETX
ETXETX = 0x030x03
[Table 6.2.3.3] ETX Frame Format (Serial & WLAN)
STX (Command Code) Frame Format
FUNCTION
OPERATION
MESSAGE VALUE
PRINTER
SIZE
COMMENT
WLAN MODE ONLY
SEARCH
Search Request
Search Request
(Host→Device)
CMD("__[I_F]__[PRT_REG]")
Check sum
unsigned char[18]
unsigned char[2]
Search Response
CMD("__[I_F]__[PRT_RSP]")
unsigned char[18]
Maximum Message
PrinterType
unsigned char[32]
SystemName
unsigned char[32]
SystemVersion
unsigned char[9]
information(Printer
IP Address
unsigned char[4]
Type to Printer Port)
MAC Address
unsigned char[6]
is able to added
Printer Port
unsigned char[2]
Check sum
unsigned char[2]
Size : 9KByte below
Search
Response
(Device→Host)
Message FAIL
(Host↔Device)
FAIL
CMD("__[I_F]__[___FAIL]")
Check sum
unsigned char[18]
unsigned char[2]
GET
SERIAL & WLAN
CONFIGURATI
Connect
System Request
ON
Request
CMD("__[I_F]__[SYS_REQ]")
(Host→Device)
Check sum
unsigned char[18]
unsigned char[2]
Connect
Search Request
Request
CMD("__[I_F]__[SYS_RSP]")
(Device→Host)
Check sum
Configuration
Configuration Get Value
Get Value
CMD("__[I_F]__[IF__GET]")
unsigned char[18]
unsigned char[2]
unsigned char[18]
(Host→Device)
Check sum
unsigned char[2]
Configuration
Configuration Current Value
unsigned char[18]
52
Device
repeatedly (MAX
Device : 100)
Fail response
Current Value
CMD("__[I_F]__[IF__CUR]")
(Device→Host)
SystemName
unsigned char[32]
Region
unsigned char
NetworkMode
unsigned char
Infra/Adhoc/P2P
IpConfigMode
unsigned char
Static/DHCP
IP Address
unsigned char[4]
SubNetMask
unsigned char[4]
Gateway
unsigned char[4]
SSID
unsigned char[32]
AUTH Mode
unsigned char
Region
information(RF)
Open, Shared,
WPA1PSK, WPA2PSK,
WPA1EAP, WPA2EAP
WEP64/128, TKIP,
Crypto Mode
unsigned char
WEP Key_0
unsigned char[26]
WEP Key_1
unsigned char[26]
WEP Key_2
unsigned char[26]
WEP Key_3
unsigned char[26]
PSK Key
unsigned char[64]
Adhoc channel
unsigned char
EAP Mode
unsigned char
EAP ID
unsigned char[32]
EAP PASSWORD
unsigned char[32]
USER NAME
unsigned char[32]
System ID
USER PASSWORD
unsigned char[32]
System Password
PRINTER Port
unsigned char[2]
Dummy
unsigned char
SysContact
unsigned char[64]
SysLocation
unsigned char[64]
ipDefaultTTL
unsigned char
Dummy
unsigned char
isWebSSL
unsigned char
isTelnet
unsigned char
isFTP
unsigned char
isSNMP
unsigned char
isSNMPTrap
unsigned char
SNMPSetCommunity
unsigned char[16]
SNMPGetCommunity
unsigned char[16]
SNMPTrapCommunity
unsigned char[16]
TrapIP
unsigned char[4]
IncativityTime
unsigned char[2]
Check sum
unsigned char[2]
53
AES
It use one only.
TLS, TTLS, PEAP,
LEAP
Channel Search
Power save
Message FAIL
(Host↔Device)
FAIL
CMD("__[I_F]__[___FAIL]")
Check sum
unsigned char[18]
Fail response
unsigned char[2]
SET
SERIAL & WLAN
CONFIGURATI
Connect
System Request
ON
Request
CMD("__[I_F]__[SYS_REQ]")
(Host→Device)
Check sum
unsigned char[2]
Connect
Search Request
Request
CMD("__[I_F]__[SYS_RSP]")
(Device→Host)
unsigned char[18]
Check sum
unsigned char[18]
unsigned char[2]
Configuration Set Value
CMD("__[I_F]__[IF__SET]")
unsigned char[18]
SystemName
unsigned char[32]
Region
unsigned char
NetworkMode
unsigned char
Infra/Adhoc/P2P
IpConfigMode
unsigned char
Static/DHCP
IP Address
unsigned char[4]
SubNetMask
unsigned char[4]
Gateway
unsigned char[4]
SSID
unsigned char[32]
AUTH Mode
unsigned char
Region
information(RF)
Open, Shared,
WPA1PSK, WPA2PSK,
WPA1EAP, WPA2EAP
Configuration
Set Value
(Host→Device)
WEP64/128, TKIP,
Crypto Mode
unsigned char
WEP Key_0
unsigned char[26]
WEP Key_1
unsigned char[26]
WEP Key_2
unsigned char[26]
WEP Key_3
unsigned char[26]
PSK Key
unsigned char[64]
Adhocchannel
unsigned char
EAP Mode
unsigned char
EAP ID
unsigned char[32]
EAP PASSWORD
unsigned char[32]
USER NAME
unsigned char[32]
System ID
USER PASSWORD
unsigned char[32]
System Password
PRINTER Port
unsigned char[2]
Dummy
unsigned char
SysContact
unsigned char[64]
SysLocation
unsigned char[64]
ipDefaultTTL
unsigned char
Dummy
unsigned char
54
AES
It use one only.
TLS, TTLS, PEAP,
LEAP
Channel Search
Power save
isWebSSL
unsigned char
isTelnet
unsigned char
isFTP
unsigned char
isSNMP
unsigned char
isSNMPTrap
unsigned char
SNMPSetCommunity
unsigned char[16]
SNMPGetCommunity
unsigned char[16]
SNMPTrapCommunity
unsigned char[16]
TrapIP
unsigned char[4]
IncativityTime
unsigned char[2]
Check sum
unsigned char[2]
Message
SUCCESS
SUCCESS
CMD("__[I_F]__[IF__SUC]")
(Device→Host)
Message FAIL
(Host↔Device)
Check sum
unsigned char[2]
FAIL
CMD("__[I_F]__[___FAIL]")
Check sum
unsigned char[18]
Fail response
unsigned char[2]
BSS
INFORMATIO
unsigned char[18]
SERIAL & WLAN
BSS Information
Request
(Host→Device)
BSS Info Request
CMD("__[I_F]__[BSS_REQ]")
Check sum
unsigned char[2]
BSS Info Response
CMD("__[I_F]__[BSS_RSP]")
Response
(Device→Host)
Message FAIL
(Host↔Device)
unsigned char[18]
SSID Type
unsigned char
Maximum Message
SSID Length
unsigned char
Size : 5KByteb
variable
below(WLAN)
(MAX 32)
10Kbyte
BSSID Type
unsigned char
below(Serial) AP
BSSID length
unsigned char
information(‘SSID’ to
BSSID Value
unsigned char[6]
‘Security’) is able to
NetworkMode
unsigned char
added repeatedly
RSSI
unsigned char[2]
(MAX Device : 100)
Security
unsigned char
Check sum
unsigned char[2]
SSID Value
BSS Information
unsigned char[18]
FAIL
CMD("__[I_F]__[___FAIL]")
Check sum
unsigned char[18]
WEP64 0, WEP128 1,
WPA1 2, WPA2 3
Fail response
unsigned char[2]
FIRMWARE
SERIAL & WLAN
UPLOAD
FW Data
Message
(Host→Device)
FW Data
CMD( "__[I_F]__[FW_DATA]")
unsigned char[18]
FW Data Length
unsigned char[8]
FW Data
variable
55
MAX Size :
20Kbyte(WLAN),
15Kbyte(Serial)
Check sum
unsigned char[2]
Message
SUCCESS
SUCCESS
CMD("__[I_F]__[IF__SUC]")
(Device→Host)
Check sum
FW END
FW END
CMD("__[I_F]__[FW__END]")
Check sum
Message
SUCCESS
CMD("__[I_F]__[IF__SUC]")
Message FAIL
(Host↔Device)
response
unsigned char[18]
End of Firmware
transmit
unsigned char[2]
SUCCESS
(Device→Host)
Receive Success
unsigned char[2]
Message
(Host→Device)
unsigned char[18]
Check sum
unsigned char[18]
Success response
unsigned char[2]
FAIL
CMD("__[I_F]__[___FAIL]")
Check sum
unsigned char[18]
Fail response
unsigned char[2]
FW CRC
FW CANCEL
Request
(Host→Device)
FW CANCEL
Response
(Device→Host)
FW CRC ERR
Message
(Host↔Device)
ERROR("__[I_F]__[FW_XREQ]"
Check sum
unsigned char[2]
FW CRC
ERROR("__[I_F]__[FW_XRSP]")
Check sum
unsigned char[18]
unsigned char[2]
FW CRC
ERROR("__[I_F]__[CRC_ERR]")
Check sum
unsigned char[18]
Verify does ‘FW
Data’ after Flash
unsigned char[2]
CERTIFICATE
write one.
SERIAL MODE ONLY
(CA, CLIENT
Certificate Data
KEY, CLIENT
CMD("__[I_F]__[FW_CERT]")
PEM,
FAST PAC)
UPLOAD
unsigned char[18]
unsigned char[18]
In serial Mode
‘Certificate Data
Certificate Size
unsigned char[8]
Message’ is
Certificate Data
variable
performed only by
Certificate Data
using the ‘Certificate
Message
Upload’.
(Host→Device)
(Certificate is
Check sum
unsigned char[2]
classified by using
the ‘ Serial Start
command)
Max Size : 500byte
Certificate Data END
Certificate Data
CMD("__[I_F]__[CERTEND]")
unsigned char[18]
End Message
Certificate Size
unsigned char[8]
(Device→Host)
Certificate Data
variable
Check sum
unsigned char[2]
SUCCESS
unsigned char[18]
Message
56
Max Size : 500byte
Success response
SUCCESS
(Device→Host)
CMD("__[I_F]__[IF__SUC]")
Check sum
unsigned char[2]
CA
WLAN MODE ONLY
UPLOAD
CA Data
unsigned char[18]
CA Data
CMD("__[I_F]__[CA_CERT]")
Message
CA Data Size
unsigned char[8]
CA Data
variable
Check sum
unsigned char[2]
(Host→Device)
Certificate Data END
Certificate Data
CMD("__[I_F]__[CERTEND]")
unsigned char[18]
End Message
Certificate Size
unsigned char[8]
(Device→Host)
Certificate Data
variable
Check sum
unsigned char[2]
Message
SUCCESS
SUCCESS
CMD("__[I_F]__[IF__SUC]")
(Device→Host)
Check sum
Max Size : 500byte
unsigned char[18]
Max Size : 500byte
Success response
unsigned char[2]
CLIENT KEY
WLAN MODE ONLY
UPLOAD
Client Key Data
Client Key Data
Message
(Host→Device)
CMD("__[I_F]__[CK_CERT]")
Client Key Data Size
unsigned char[8]
Client Key Data
variable
Check sum
unsigned char[2]
Certificate Data END
Certificate Data
unsigned char[18]
CMD("__[I_F]__[CERTEND]")
unsigned char[18]
End Message
Certificate Size
unsigned char[8]
(Device→Host)
Certificate Data
variable
Check sum
unsigned char[2]
Message
SUCCESS
SUCCESS
CMD("__[I_F]__[IF__SUC]")
(Device→Host)
Check sum
Max Size : 500byte
unsigned char[18]
Max Size : 500byte
Success response
unsigned char[2]
CLIENT PEM
WLAN MODE ONLY
UPLOAD
Client PEM Data
Client PEM Data
Message
(Host→Device)
CMD("__[I_F]__[CP_CERT]")
Client PEM Data Size
unsigned char[8]
Client PEM Data
variable
Check sum
unsigned char[2]
Certificate Data END
Certificate Data
unsigned char[18]
CMD("__[I_F]__[CERTEND]")
unsigned char[18]
End Message
Certificate Size
unsigned char[8]
(Device→Host)
Certificate Data
variable
Check sum
unsigned char[2]
Message
SUCCESS
SUCCESS
CMD("__[I_F]__[IF__SUC]")
(Device→Host)
Check sum
unsigned char[18]
unsigned char[2]
57
Max Size : 500byte
Max Size : 500byte
Success response
[Table 6.2.3.4] STX Command Frame Format (Serial & WLAN)
7. Technical Support, Warranty, and Precaution
7.1 Technical Support
If you have any question regarding operation of the product, visit the message board on
CMAX Wireless’s web site or send us an email at the following address:
E-mail: ursus@cmaxwireless.com
For more information, visit our website at http://www.cmaxwireless.co.kr
7.2 Warranty
7.2.1 Refund
Upon the customer’s request to refund the product within two weeks after purchase,
CMAX Wireless will refund the product.
7.2.2 Free Repair Services
For product failures occurring within one year after purchase, CMAX Wireless provides
free repair services or exchange the product. However, if the product failure is due to
user’s fault, repair service fees will be charged or the product will be replaced at user’s
expense.
7.2.3 Charged Repair Services
For product failures occurring after the warranty period (one year) or resulting from
user’s fault, repair service fees will be charged and the product will be replaced at user’s
expense.
7.3 Precaution
CMAX Wireless is not responsible for product failures occurring due to user’s alternation
of the product.
Specifications of the product are subject to change without prior notice for performance
improvement.
58
l
CMAX Wireless does not guarantee successful operation of the product if the product
was used under conditions deviating from the product specifications.
Reverse engineering of firmware and applications provided by CMAX Wireless is
prohibited.
Use of firmware and applications provided by CMAX Wireless for purposes other than
those for which they were designed is prohibited.
Do not use the product in an extremely cold or hot place or in a place where vibration is
severe.
Do not use the product in an environment in which humidity is high or a lot of oil exists.
Do not use the product where there is caustic or combustible gas.
CMAX Wireless does not guarantee normal operation of the product under the
conditions a lot of noise exists.
Do not use the product for a purpose that requires exceptional quality and reliability
relating to user’s injuries or accidents - aerospace, aviation, health care, nuclear power,
transportation, and safety purposes.
CMAX Wireless is not responsible for any accident or damage occurring while using the
product.
This device complies with part 15 of the FCC Rules. Operation is subject to the following
two conditions: (1) This device may not cause harmful interference, and (2) this device
must accept any interference received, including interference that may cause undesired
operation.
Any changes or modifications not expressly approved by the party responsible for
compliance could void the user’s authority to operate the equipment.
59
7.4 Labeling
FCC ID: U5MWD-MSB
The proposed with FCC ID label format is to be placed on the module. If FCC ID is not
visible when the module is installed into the system, “Contains FCC ID:U5MWD-MSB ”
shall be placed on the outside of final host system.
Caution: Exposure to Radio Frequency Radiation.
To comply with FCC RF exposure compliance requirements, a separation distance of at
least 20 cm must be maintained between the antenna of this device and all persons.
*The module is limited to OEM installation only.
OEM integrators must ensure that the end-user has no manual instructions to remove or install the
module. OEM's must comply with FCC marking regulation part 15 declaration of conformity
(Section 2.925(e)).
This module is to be installed only in mobile or fixed applications (Please refer to FCC CFR 47 Part
2.1091(b) for a definition of mobile and fixed devices).
The separate approval is required for all operating configurations, including portable configurations
with respect to FCC CFR 47 Part 2.1093 and different antenna configurations.
The WD-MSB Module has been designed to operate with the following antenna and gains. Use with
other antenna types or with these antenna types at higher gains is strictly prohibited.
Manufacturer
Type of
Model
Gain (dB)
Type of Connector
Antenna
Nice Korea
Chip Antenna
NKCBTF-F02
3.91
Permanent
Components Co.,
integral
Ltd
COPYRIGHT NOTICE
Copyright ⓒ CMAX Wireless co., Ltd. All rights Reserved.
For more information, visit our website at http://www.cmaxwireless.co.kr
60

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
Linearized                      : No
Page Count                      : 60
Tagged PDF                      : No
Language                        : ko-KR
Page Layout                     : SinglePage
XMP Toolkit                     : Adobe XMP Core 4.0-c316 44.253921, Sun Oct 01 2006 17:14:39
PDF Version                     : 1.4
Producer                        : Haansoft PDF 1.3.0.437
Creator Tool                    : Haansoft PDF 1.3.0.437
Create Date                     : 2013:12:03 13:59:45+09:00
Modify Date                     : 2013:12:03 13:59:45+09:00
Metadata Date                   : 2013:12:03 13:59:45+09:00
Format                          : application/pdf
Creator                         : 이영택
Title                           : Microsoft Word - Wi-Fi P2P Module User Manual Ver1.1
Date                            : 2013:12:03 13:59:45+09:00
Document ID                     : E9B661BA-F0D3-48AB-AE85-9F3702515C67
Instance ID                     : uuid:31CD337D-7974-4B46-923B-D2505E6DB187
Part                            : 1
Conformance                     : B
Author                          : 이영택
EXIF Metadata provided by EXIF.tools
FCC ID Filing: U5MWD-MSB

Navigation menu