Supervisory Messages Occurrence; Security And Encryption; Session Key; Provisioning Key - Radio Bridge RBM101 User Manual

Table of Contents

Advertisement

the supervisory message will be sent automatically back to the coordinator on this periodic
interval.
When the timeout is set on a coordinator, this indicates the interval in which it expects a
supervisory to have arrived from all endpoints. The timers used for supervisory messages are
low power RC timers which have significant drift, and thus the coordinator period must be set
at a longer period than the endpoints.
A typical configuration is to set the timeout of all endpoints to one hour and the coordinator
to be set at 1.5 hours. If the coordinator does not see a supervisory message from an endpoint
within the timeout period, it will send a message back to the host. See the section on
Messages
for more detail.

6.2.2. Supervisory Messages Occurrence

The supervisory messages occur automatically in the background and do not require periodic
commands from a host after the initial timeout periods have been set. The coordinator will
send messages back to a host on an as-needed basis to indicate that an endpoint has not
reported within the last window, if an endpoint has started reporting again after a period of
not reporting, or if a supervisor message has arrived from a sleepy endpoint. See the
Messages
and
The supervisory messages also signal a window of time that a coordinator can communicate
back to a sleepy endpoint. See the section

6.3. Security and Encryption

For systems that require higher levels of security, the SubGig standard allows for messages to
be AES encrypted.

6.3.1. Session Key

The "session" key is the key that is used to encrypt normal traffic and this can be written to
each device prior to deployment in the field, or the key can be broadcast from the coordinator
to the endpoint during installation.

6.3.2. Provisioning Key

In the case of a key broadcast in the field, the session key itself would be encrypted by a
"provisioning" key that is assigned prior to deployment in the field.

6.3.3. Encryption Requirements

The SubGig standard does not allow for unencrypted keys to be broadcast over a wireless link.
Thus, either the session key itself or a provisioning key must be programmed into each device
prior to deployment in the field using the associated AT commands.
C
© 2017, R
OPYRIGHT
ADIO
Status Messages
sections for more detail.
B
I
.
RIDGE
NC
R
B
ADIO
RIDGE
Sleep Modes
for more detail.
R
B
RBM101 U
ADIO
RIDGE
RBM101 U
G
SER
UIDE
Error
Error
G
P
27
35
SER
UIDE
AGE
OF

Advertisement

Table of Contents
loading

Table of Contents