Cal Amp Phantom II Operating Manual

Cal Amp Phantom II Operating Manual

Wireless ethernet bridge/serial gateway
Table of Contents

Advertisement

Operating Manual
Phantom II
Wireless Ethernet Bridge/Serial Gateway
PN 001-0000-600 Rev A
January 2016
299 Johnson Ave, Suite 110
Waseca, MN 56093
Phone: (800) 992-7774
Fax: (507) 833-6748
www.cal amp.c om

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Phantom II and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Cal Amp Phantom II

  • Page 1 Operating Manual Phantom II Wireless Ethernet Bridge/Serial Gateway PN 001-0000-600 Rev A January 2016 299 Johnson Ave, Suite 110 Waseca, MN 56093 Phone: (800) 992-7774 Fax: (507) 833-6748 www.cal amp.c om...
  • Page 2 Phantom II Important User Information Warranty CalAmp. warrants that each product will be free of defects in material and workmanship for a period of one (1) year for its prod- ucts. T he warranty commences on the date the product is shipped by CalAmp. CalAmp’s sole liability and responsibility under this warranty is to repair or replace any product which is returned to it by the Buyer and which CalAmp.
  • Page 3 Phantom II Important User Information (continued) About This Manual It is assumed that users of the products described herein have either system integration or design experience, as well as an understanding of the fundamentals of radio communications. Throughout this manual you will encounter not only illustrations (that further elaborate on the...
  • Page 4 This device has been modularly approved. The manufacturer, product name, and FCC and Industry Canada identifiers of this product must appear on the outside label of the end-user equipment. WARNING SAMPLE LABEL REQUIREMENT: For Phantom II FCCID: NS908P24 FCCID: NS908P25 IC: 3143A-08P24 IC: 3143A-08P25 This device complies with Part 15 of the FCC Rules.
  • Page 5 Phantom II CSA Class 1 Division 2 Option CSA Class 1 Division 2 is Available Only on Specifically Marked Units If marked this for Class 1 Division 2 – then this product is available for use in Class 1, Division 2, in the indicated Groups on the product.
  • Page 6 Phantom II Revision History Rev 0 Initial release March 2010 Rev 1 Changes made to properly reflect CalAmp branding. April 2010 Rev 2 Changes to section 2.0 and 6.0, Appendix B February 2011 Rev 3 Added IP Discovery Appendix A, Sec 3.1.2 Firmware Upgrade...
  • Page 7: Table Of Contents

    2.2.5 Remote Configuration..........................18 2.2.6 Check Connectivity ............................ 19 3.0 Hardware Features Overview..................................20 3.1.1 Phantom II Mechanical Drawings ......................21 3.1.2 Connectors & Indicators ..........................22 3. 1. 2. 1 Front ............................22 3. 1. 2. 2 Rear............................23 4.0 Operating Modes...
  • Page 8 Phantom II Table of Contents (continued) 6.0 Configuration Overview ..................................34 6.1.1 Logon Window.............................35 6.1.2 Welcome Window ............................37 6.1.3 System Configuration ..........................38 6.1.4 Network Configuration..........................42 6.1.4.1 Local IP Configuration ......................43 6.1.4.1.1 Bridge ........................43 6.1.4.1.2 Router ........................47 6.1.4.1.2.1 Wireless Port IP Configuration ..........48 6.1.4.1.2.2...
  • Page 9 Phantom II Table of Contents (continued) Appendices Appendix A: IP Discovery Utility .................... 154 Appendix B: Upgrade Procedure (DOS Prompt) ..............155 Appendix C: RS485 Wiring ....................158 Appendix D: Serial Interface ....................159 Appendix E: Customer Interface Schematic ................160 Appendix F: UL Certifications ....................
  • Page 10: Overview

    RS232, RS422, or RS485 interface. A ROUTER forwards data across internetworks (different subnets). The small size and superior performance of the Phantom II makes it ideal for many applications. Some typical uses for this modem: ...
  • Page 11 Optional Class 1 Div 2 Supporting co-located independent networks and with the ability to carry both serial and IP traffic, the Phantom II supports not only network growth, but also provides the opportunity to migrate from asynchronous serial devices connected today to IP-based devices in the future.
  • Page 12: Specifications

    TCP, UDP, TCP/IP, TFTP, ARP, ICMP, DHCP, HTTP, HTTPS*, SSH*, SNMP, FTP, DNS, Serial over IP, QoS (* Only available in –AES) Tip: Future enhancements of the Phantom II products may Operating Modes: Master, Remote, Repeater r equir e higher c ur r ent requirements than listed.
  • Page 13 Phantom II 1.0 Overview 1.2 Phantom II Specifications (Continued) Environmental Operation Temp: F(-40 C) to 170 F(75 Humidity: 5% to 95% non-condensing Mechanical 2.25” (57mm) X 3.75” (95mm) X 1.75” (45mm) Dimensio ns: Weigh t: Approx. 237 grams (8 oz)
  • Page 14: Quick Start

    CFG  button for 8 seconds - the Status Open a Web Browser and enter the IP Address of the Phantom II LED will initially blink, then be on into the URL address line ...
  • Page 15: Master Configuration

    Select Network Configuration > Local IP Config. Assign unit IP Address, Subnet Mask and Gateway. [Submit] NOTE: If the Local IP Address of the Phantom II is changed to a new network, the PC NIC IP Address must also be reassigned to the new network.
  • Page 16: Text User Interface

    Connect power adapters to 120 VAC outlets and to each Phantom II  Using a diagnostic serial cable, connect the DIAGNOSTICS port of the Phantom II that will be the MASTER device to an available COM port on the PC 2.2.3 Serial Configuration ...
  • Page 17: Master Configuration

    Address, Subnet Mask, Press [U] to SAVE the configuration changes Gateway for the Phantom II. Press [Esc] twice to return to the MAIN MENU (For basic testing, the Gateway value is not critical.) Select [C] Radio Configuration If a connection is being made to a...
  • Page 18: Remote Configuration

    2.0 Quick Start 2.2.5 Remote Configuration Remove the Serial connection from the MASTER device and connect it to the next Phantom II. Press [Enter] to open the log in prompt Enter default user name (admin). Press [Enter] Enter default password (admin). Press [Enter]...
  • Page 19: Check Connectivity

    With both units powered-on, in proximity to each other, their RSSI LEDs should be illuminated  With the PC connected to one of the Phantom II units with an Ethernet cable, open a web browser and enter the IP Address of ‘the other’ unit to verify a wireless connection ...
  • Page 20: Hardware Features

    The Phantom II provides a fully enclosed, stand alone modem, requiring only cabled connections. The Phantom II can be used on a table top like surface, or using the mounting holes provided can be mounted anywhere for a permanent solution.
  • Page 21: Phantom Ii Mechanical Drawings

    Phantom II 3.0 Hardware Description 3.1.1 Phantom II Mechanical Drawings Phantom II Nano IP Enclosed Top View Top View Front Image 3-2: Phantom II Top View microhard SYSTEMS INC. Phantom II STA TUS DIA GNOST I C RSSI TX RX CONFIG...
  • Page 22: Connectors & Indicators

    Phantom II 3.0 Hardware Description 3.1.2 Connectors and Indicators 3.1.2.1 Front On the front of the Phantom II is the USB port, DIAGNOSTIC port, CONFIG Button, and the RSSI, STATUS, TX and RX LED’s. microhard SYSTEMS INC. Phantom II STA TUS...
  • Page 23: Rear

    Phantom II 3.0 Hardware Description 3.1.2 Connectors and Indicators 3.1.2.2 Rear On the back of the Phantom II is the Data port, RS485/422 interface, Ethernet port, as well as the power connections. A N TENNA RS485/422 DA TA ETHER N E T...
  • Page 24: Operating Modes

    Phantom II 4.0 Operating Modes A Phantom II may be configured for any operating mode. This is very convenient for purposes of sparing and becoming familiar with their configuration menus. 4.1 Master One per network, the source of synchronization for the system. The Master controls the flow of data through the system.
  • Page 25: Network Topologies

    Phantom II 5.0 Network Topologies The Phantom II may be configured to operate in a number of different operating modes and participate in various network topologies. Note: This section describes radio network topologies in general The RADIO network topology and includes examples of corresponding Radio Configuration determines the paths available settings.
  • Page 26 Phantom II 5.0 Network Topologies Example 5.1.1 Image 5-1: PTP Example 5.1.1 Master Image 5-2: PTP Example 5.1.1 Remote © CalAmp...
  • Page 27: Point-To-Multipoint (Pmp)

    Phantom II 5.0 Network Topologies 5.2 Point-to-Multipoint (PMP) In a Point-to-Multipoint network, a path is created to transfer data between the Master modem and numerous remote modems. The remote modems may simply be Remotes with which the Master communicates directly, and/or Remotes which communicate via Repeaters.
  • Page 28 Phantom II 5.1 Network Topologies Example 5.2.1 (continued) Image 5-4: PMP Example 5.2.1: Repeater  The ROAMING address for the REPEATER is set to 1: the UNIT ADDRESS of the MASTER. This means that this REPEATER will synchronize to, and communicate directly with, the MASTER.
  • Page 29 Phantom II 5.0 Network Topologies Example 5.2.1 (continued) Image 5-5: PMP Example 5.2.1: Remote 20 Each modem in any network must have a unique Unit Address. Image 5-6: PMP Example 5.2.1: Remote 30 © CalAmp...
  • Page 30: Peer-To-Peer (P2P)

    A device located at a pump station must communicate bi- directionally with another device at a water tank. The MASTER Phantom II must reside in an office at a separate location. Image 5-7: P2P Example 5.3.1: Master All Phantom II modems within a particular network must be config- ured to have the same Network Type.
  • Page 31 Phantom II 5.0 Network Topologies Example 5.3.1 (continued) Image 5-8: P2P Example 5.3.1: Remote 25 Image 5-9: P2P Example 5.3.1: Remote 35 © CalAmp...
  • Page 32: Everyone-To-Everyone (E2E)

    Phantom II 5.1 Network Topologies 5.4 Everyone-to-Everyone (E2E) E2E mode is used for communications between all remote mo- dems. i.e. data from every modem is broadcast to every other modem in the network. Considering the amount of data re-broadcasting (via the Master), it An E2E network requires a is a very bandwidth-intensive network topology.
  • Page 33 Phantom II 5.0 Network Topologies Example 5.4.1 (continued) Each unit must have its own unique Unit Address. Image 5K: E2E Example 5.4.1: Remote The Remotes will all be configured as per the above screen cap- ture, with the exception of the UNIT ADDRESS. Each Remote (of the 3 in this example) must have its own unique UNIT ADDRESS, e.g.
  • Page 34: Configuration

     selecting and inputting the desired operational parameters All configuration of the Phantom II is accomplished with a PC as shown in Section 2.0 There are no DIP switches to set; switches which may subsequently become inadvertently misadjusted or intermittent.
  • Page 35: Logon Window

    Phantom II 6.0 Configuration 6.1.1 Logon Window Upon successfully accessing the Phantom II using a Web Browser, the Logon window will appear. For security, do not allow the web browser to remember the User Name or Password. Image 6-1: Logon Window...
  • Page 36 - particularly once the unit is deployed in the field - for one primary reason: security. Image 6-2: Logon Window With Password Input Soft Buttons  Inputs the selected values into the Phantom II for processing.  Cancel Cancels the logon process.
  • Page 37: Welcome Window

    Phantom II 6.0 Configuration 6.1.2 Welcome Window The Welcome window displays the specific Phantom II’ name (entered as the Radio Description in the System Configuration menu). This name quickly confirms the ’identity’ of the unit being perused and appears in all menu windows.
  • Page 38: System Configuration

    System Operation Mode The radio button options presented here determine whether the Phantom II unit will operate at a BRIDGE or a ROUTER. Only a MASTER unit should ever be configured as a router. Select the System Operation Mode ‘first’, i.e. prior to configuring other options within the unit.
  • Page 39 Radio Description The Radio Description is simply a convenient identifier for a specific Phantom II, e.g. Pump Station 5, 123 Main Street, etc. This feature is most welcome when accessing units from afar with large networks: a convenient cross-reference for the unit’s IP address.
  • Page 40 Phantom II 6.0 Configuration UTC Time Offset (+/-hh:mm) Input the Universal Coordinated Time offset in this field, if so desired. + indicates that local time is ahead of UTC time; - behind. Values 00:00 valid time values, where = 2-digit hours...
  • Page 41 System Default Button Enabled by default, when the CONFIG button on the front of the Phantom II is held down for 10s while the unit is powered up, the unit will reset and all settings will be reset to factory defaults. When disabled the unit will reset, but the setting will not be overwritten.
  • Page 42: Network Configuration

    (submenu) options need to be defined. Image 6-5: Network Configuration, Top Level Menu The Ethernet MAC address (as displayed above) is that of the ETHERNET interface located at the rear of the Phantom II. The Wireless MAC address is for internal purposes. © CalAmp...
  • Page 43: Local Ip Configuration

    Image 6-6: Network Configuration (Bridge), Local IP Configuration Submenu IP Address Mode If ‘static’ is selected, the three following fields (see Image 6F) are to be manually populated with values which will suit the network/ devices to which the Phantom II is connected. continued... © CalAmp...
  • Page 44 IP Address If DHCP is selected (see above), a unique IP address will be assigned to the Phantom II; if STATIC IP address mode has been selected, enter a suitable value for the specific network. Values Within any IP network, each device must have its own unique 192.168.1.254...
  • Page 45 Phantom II modems are being used, make the gateway of In typical networks, a router acts Phantom II No. 1 = IP address of Phantom II No. 2; gateway of as a gateway. Phantom II No. 2 = IP address of Phantom II No. 1. The idea behind this approach is: If a Phantom II at ‘one end’...
  • Page 46 Phantom II 6.1 Configuration DNS Mode The setting determines whether the Phantom II unit will have its DNS Server information entered manually (static) or if it will obtain the information (provided it is available) via the connected network. Values static...
  • Page 47: Router

    6.0 Configuration 6.1.4.1 Local IP Configuration 6.1.4.1.2 Router If the Phantom II unit has been configured as a Router (under the System Configuration menu), the Network Configuration will present some additional options to those presented if the unit was configured as a Bridge.
  • Page 48: Wireless Port Ip Configuration

    Phantom II 6.0 Configuration 6.1.4.1.2.1 Wireless Port IP Configuration Image 6-8: Network Configuration (Router), Wireless Port IP Configuration Submenu IP Address This address MUST be STATIC (i.e. DHCP is not applicable). Values Within any IP network, each 192.168.2.1 device must have its own unique IP address.
  • Page 49 LAN (the wireless subnet) in this field. Values 0.0.0.0 valid DNS Server IP address Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 50: Vpn Configuration

    Phantom II 6.0 Configuration 6.1.4.1.2.2 VPN Configuration VPN: Virtual Private Network. A communications path connecting a device on a WAN with a device on a LAN. Image 6-9: Network Configuration (Router), VPN Configuration Submenu A Virtual Private Network (VPN) may be configured to enable a direct communications link between one device on the WAN and another on the LAN.
  • Page 51 Values admin 32 characters maximum Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 52: Ntp Server Configuration

    NTP server available and its IP address or ’name’ is entered in the appropriate field. NTP may be used to synchronize the time in the Phantom II within a network to a reference time source. Image 6-10: Network Configuration, NTP Server Config. Submenu NTP Server Status Note that if NTP Server Status is ENABLED, the ‘Synchronize with...
  • Page 53 NTP Server Status is configured as ENABLED. Values 0.0.0.0 valid NTP server IP address or ‘name’ Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 54: Dhcp Server Configuration

    If this feature is to be utilized, it would be enabled on the Master Phantom II unit, noting that such a DHCP Server service must not be enabled on any other Phantom II units or devices which reside on the same network segment.
  • Page 55 - either wired (e.g. LAN) DHCP Server, must have their local IP settings set for ‘DHCP’ (as or wireless (e.g. another opposed to ‘static’) Phantom II) with an active DHCP SERVER service. (The Server issues IP address Values information at the request of a...
  • Page 56 Phantom II 6.0 Configuration Server Subnet Not to be confused with the Server Netmask (see below). Enter the network’s ‘root’ address, e.g. if devices are to be assigned addresses such as 192.168.1.5 and 192.168.1.6, enter 192.168.1.0 in this field. Values 192.168.2.0...
  • Page 57 Phantom II 6.0 Configuration Ending Address This is the ending (‘upper boundary’) IP address of the range of IP addresses to be issued by the DHCP Server to the applicable devices on the network. Values 192.168.2.239 IP address as per above Gateway Address Input the address of the desired gateway.
  • Page 58 IP address is to be bound. For the Phantom II, the MAC address of the unit may be found on the label on the bottom of the unit, or it may be viewed on the Network Configuration menu of that unit.
  • Page 59 Server Config. menu display, showing both the MAC and corresponding IP address. Note that the ADD action must be followed by SUBMIT for the changes to be written to the Phantom II’ memory.  Delete If binding relationships are present, the drop down box (to left of Delete soft button) may be used to select a particular binding, and the DELETE soft button used to delete it.
  • Page 60: Snmp Agent Configuration

    Phantom II 6.1 Configuration 6.1.4.4 SNMP Agent Configuration The Phantom II may be configured to operate as a Simple Network Management Protocol (SNMP) agent. Network management is most important in larger networks, so as to be able to manage resources and measure performance.
  • Page 61 Phantom II 6.0 Configuration Image 6-12: Network Configuration, SNMP Agent Config. SNMP Operation Mode If disabled, no SNMP service is provided from the device. Enabled, the device - now an SNMP agent - can support SNMPv1, v2, & v3. Values...
  • Page 62 Phantom II 6.0 Configuration Read Only Community Name (continued) Values public character string Read Write Community Name Effectively a plain-text password mechanism used to weakly authenticate SNMP queries. Being part of the community allows the SNMP agent to process SNMPv1 and SNMPv2c requests. This community name has only READ/WRITE priority.
  • Page 63 Phantom II 6.0 Configuration V3 User Authentication Level Defines SNMPv3 user’s authentication level. NoAuthNoPriv: No authentication, no encryption. AuthNoPriv : Authentication, no encryption. AuthPriv: Authentication, encryption. Values NoAuthNoPriv NoAuthNoPriv AuthNoPriv AuthPriv V3 Authentication Password SNMPv3 user’s authentication password. Only valid when V3 User Authentication Level set to AuthNoPriv or AuthPriv (see above).
  • Page 64 Phantom II 6.0 Configuration SNMP Trap Version Select which version of trap will be sent should a failure or alarm condition occur. Values V1 Traps V1 Traps V2 Traps V3 Traps V1&V2 Traps V1&V2&V3 Traps Auth Failure Traps If enabled, an authentication failure trap will be generated upon authentication failure.
  • Page 65 PC IP address). Values 0.0.0.0 applicable host’s IP address Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 66: Bridge Configuration

    In most deployments, Spanning Tree Protocol (STP) will not be required. It does consume a small amount of bandwidth. The default is ‘Off’. Note that this menu item will not appear if the Phantom II unit is configured to be a router. STP: Spanning Tree Protocol is...
  • Page 67: Quality Of Service

    6.0 Configuration 6.1.4.6 Quality of Service Quality of Service (QoS) may be applied to various data which enter the Phantom II. This section describes configuring QoS for data which enters via the Ethernet port. QoS: Quality of Service applied to networks where it is...
  • Page 68 Phantom II 6.1 Configuration Example 6.1.4.6.1 Assume that we want to add high priority to TCP traffic on Port 8080:  In the IP Port field, enter 8080.  Select the radio button for TCP.  Select the radio button for High Priority.
  • Page 69: L2 Mesh

    Values Disable Disable Enable Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 70: Radio Configuration

    Prior to configuration, the network topology must be known (see Section 5.0); the role (operating mode) of the specific Phantom II must also be known. Image 6-16: Radio Configuration Menu (upper portion)
  • Page 71 Phantom II 6.0 Configuration Network Search Mode (continued) Image 6-17: Radio Configuration Menu (upper portion), with Network Search Mode Enabled With Network Search Mode enabled, Master units with the same authentication key may be found by Remote units even if they have different network names.
  • Page 72 Operation Mode Select the mode of operation for the Phantom II: Master, Repeater, or Remote. A Phantom II may be configured for any role required within a radio network. This is convenient for reasons of familiarity with any/all units, as well as for hardware sparing purposes.
  • Page 73 Public Character string Network Name All Phantom II modems in a given network must have the same Network Name. This unique network address is not only a security feature for a particular network, but also allows other networks - with their own unique network address - to operate in the same area without the possibility of undesired data exchange between networks.
  • Page 74 RF Output Power This setting establishes the transmit power level which will be presented to the antenna connector at the rear of the Phantom II. Unless required, the RF Output Power should be set not for FCC regulations allow for up to...
  • Page 75 Remotes is divided by 1 plus the Type (below). Retransmissions value. PTP: Phantom II will retransmit to its counterpart only if necessary, and to a maximum number of the value specified in its Retransmissions field. Packet is discarded if retransmissions are not successful.
  • Page 76 Phantom II 6.0 Configuration Network Type (continued) Point-to-Multipoint with ACK is a configuration whereby the Network functions as a Point-to-Multipoint, but the Retransmissions behave Keep in mind that the Network as a combination of PTP and PMP in that: If retransmissions are...
  • Page 77 Values 1-65535 Tx Control This configuration option does not apply to a Master Phantom II. On (the default) permits the Phantom II to transmit, i.e. RF emissions are enabled. Off configures the Phantom II for RECEIVE ONLY. If ‘Off’ is selected, ‘On’...
  • Page 78 Remote and the Master; the Repeater will have a Roaming Address altogether. of 1 as it is to synchronize to the Master. The Roaming Address dictates to which Phantom II (by Unit Address (UA)) a Remote (or Repeater) will ’look’ or ’attach to’ for its upstream signal path.
  • Page 79 Exercising the option of back-to- back ‘Repeaters’ - which Values requires 2 Phantom II modems at a ‘Repeater’ site - eliminates the division of bandwidth. If there is more than one Repeater in a network, the Repeaters should be ‘registered’.
  • Page 80 Phantom II 6.0 Configuration Optimization This setting applies to the Master only. ‘Balanced’ is the default setting and is typically the best choice for ‘Optimization’. The other options are High Throughput (when throughput is a priority) and Low Latency (best suited to small packets).
  • Page 81 Phantom II 6.0 Configuration Zone Restriction (continued) Zone Restrict From Restrict To Restrict From Restrict to Start (MHz) End (MHz) Start (MHz) End (MHz) 923.200 927.600 902.400 902.800 924.000 927.600 902.400 903.600 924.800 927.600 902.400 904.400 925.600 927.600 902.400 905.200 926.400...
  • Page 82 Phantom II 6.0 Configuration Channel Number This setting applies only if the Link Rate is set to 1.2 Mbps. Channel Number defines the number of channels the unit will hop on. The minimum number is 4. (Digital Transmission System (DTS) technology is applied at the 1.2 Mbps link rate.)
  • Page 83 Defines how long the unit will keep awake. If set to 0, the radio will not wakeup until data is received from the serial or Ethernet port. The Phantom II will enter sleep Values mode after 60 seconds when the system is rebooted.
  • Page 84 Values 1-65535 (seconds) Frequency Restriction By default, the Phantom II will hop on frequencies across the entire 902-928 MHz ISM band. For some applications or within certain operating environments it may be desired to prohibit the modem from operating on specific frequencies or range(s) of frequencies.
  • Page 85 A number of input fields may be used, or a combination of restrictions input in one field. The image below shows an example of configuring a Phantom II (with 345 kbps as an available Link Rate) to not operate on Use the Radio Channels Noise channels 1 through 10.
  • Page 86 Phantom II 6.0 Configuration Frequency Restriction (continued) Channel Numbers can be calculated based on the frequency and link rate (determines channel spacing). For 900 MHz Models: Channel 1 is at 902.4MHz. Therefore, to calculate the frequency of channel n: Freq channel n = 902.4 + ((n-1) x CW) MHz.
  • Page 87 Phantom II 6.0 Configuration Frequency Restriction (continued) With the Phantom II having the option of, and configured for, a Link Rate of 1.2 Mbps, the Frequency Restriction input format remains the same (as for 345 kbps described previously), however, the Channel Number must be reduced by the number of channels restricted, i.e.
  • Page 88 In order to ensure that generated hopping patterns are orthogonal to each other (thereby minimizing possible interference between network segments), if there is more than 1 Repeater in a network, ALL Repeaters must be registered in EVERY Phantom II. The following image depicts an example: Image 6-21: Repeater Registration In the above example, there is a total of 3 Repeaters in the system, with Unit Addresses of 7, 18, and 25.
  • Page 89 Phantom II 6.1 Configuration Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 90: Com1 And Com2 Configuration

    COM2, the front DE9 connector, respectively. Serial device data may be brought into a LAN network through TCP, UDP, or multicast; it may also exit the Phantom II network on another Phantom II’ serial port. COM1 is a full-featured RS232 interface dedicated to serial data traffic.
  • Page 91 Phantom II 6.0 Configuration Image 6-23: COM1 Configuration Menu (including lower portion) Port Status Select operational status of port. Enabled by default. *COM2 is Disabled by default. If COM2 is Enabled and there is a desire to switch it back to Disabled (console mode) via the serial connection to it, the escape sequence of ‘+++’...
  • Page 92 Phantom II 6.0 Configuration Channel Mode (continued) Values RS232 RS232 RS485 RS422 Data Baud Rate The serial baud rate is the rate at which the modem is to communicate with the attached local asynchronous device. *COM2 data baud rate maximum is 115200 bps.
  • Page 93 ‘None’. When CTS Framing is selected, the Phantom II uses the CTS Software flow control (XON/ signal to gate the output data on the serial port. Figure 6A below XOFF) is not supported.
  • Page 94 This setting defines the serial output data framing. In Transparent mode (default), the received data will be output promptly from the Phantom II. When set to Seamless, the serial port server will add a gap between data frames to comply with the MODBUS protocol for example.
  • Page 95 Phantom II 6.0 Configuration Character Timeout (continued) Example: If the baud rate is 9600 bps, it takes approximately 1ms to move one character. With the Character Timeout set to 4, the timeout period is 4ms. When the calculated time is less than 3.5ms, the serial server will set the character timeout to a minimum...
  • Page 96 TCP Client: When TCP Client is selected and data is received on Protocol Config field will its serial port, the Phantom II takes the initiative to find and connect determine which configuration to a remote TCP server. The TCP session is terminated by this...
  • Page 97 IP address, the port essentially ‘fine tunes’ where the data is to go TCP Client/Server: In this mode, the Phantom II will be a ‘within the device’. combined TCP Client and Server, meaning that it can both initiate and serve TCP connection (session) requests.
  • Page 98 IP Protocol Config (continued) UDP Point-to-Point: In this configuration the Phantom II will send serial data to a specifically-defined point, using UDP packets. This same Phantom II will accept UDP packets from that same point.  Remote IP Address IP address of distant device to which UDP packets are sent when data received at serial port.
  • Page 99 UDP multicast, typically  Remote IP Address the MASTER would be The IP address of a distant device (Phantom II or, configured as ’(P)’ (the POINT) for example, a PC) to which the unit sends UDP and the REMOTES would be configured as ’(MP)’...
  • Page 100 UDP packets sent by another UDP Multipoint-to- Multipoint unit. Default: 20011 SMTP Client: If the Phantom II network has Internet access, this protocol may be used to send the data received on the serial port (COM1), in a selectable format (see Transfer Mode (below)), to an e-mail addressee.
  • Page 101 UDP Point-to-Point UDP Point-to-Multipoint (P) UDP Point-to-Multipoint(MP) UDP Multipoint-to-Multipoint SMTP Client Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 102: Usb Configuration

    6.1.7 USB Configuration The USB Device Port Mode allows a user to define the operation of the Phantom II‘s USB Port. The port can be configured to be used as any one of the following: Console Mode Provides support for the USB-to-Serial console port.
  • Page 103: Security Configuration

    Phantom II 6.0 Configuration 6.1.8 Security Configuration There is significant security inherent in the Phantom II’ proprietary design and technology implementation. There are additional security features available, both as standard and optional items. Image 6-24: Security Configuration Menu © CalAmp...
  • Page 104: Admin Password Configuration

    Do not forget the admin password as, if lost, it cannot be recovered. New Password/Repeat Password Values admin character string Soft Buttons  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 105: Upgrade Password Configuration

    Phantom II 6.1 Configuration 6.1.8.2 Upgrade Password Configuration The Upgrade Password protects the Phantom II from having a package upgrade performed by an unauthorized person. It is recommended that the default password be changed when the system is deployed. Image 6-25: Security Config., Upgrade Password Config. Submenu...
  • Page 106: Wireless Encryption Configuration

    Phantom II 6.0 Configuration 6.1.8.3 Wireless Encryption Configuration There are 2 encryption levels for the Phantom II:  Medium  High Medium and High levels are NOT AVAILABLE FOR EXPORT. High level is optional within North America: Contact CalAmp. for more information.
  • Page 107 Phantom II does require that the corresponding decryption algorithm be applied to the output data of the receiving Phantom II to make it meaningful. Compression requires processing time. Depending on the nature of the data, throughput may be either enhanced or not effected by the compression process.
  • Page 108 Generate Key soft button. Do the same for the remaining keys, using a different key phrase each time. Using the same Key Phrase(s) on all Phantom II modems in the network will generate the same Keys on all units. All units must operate with the same Key selected.
  • Page 109 Click to have a selected Key generated based upon a user-input Key Phrase.  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 110: Ui (User Interface) Access Configuration

    For security reasons, any or all may be disabled. the target device. If the above IP address is that of a Phantom II accessible via the network, the user will arrive at the unit’s LogOn window. For a secure connection, see ‘SSH’...
  • Page 111 HTTPS: HyperText Transfer Protocol Secure. HTTP over  Reset SSL. A protocol used for the Restore ‘currently’ modified parameter values to those secure (using encryption and which were previously written into Phantom II memory. decryption) transfer of Web pages. © CalAmp...
  • Page 112: Authentication Configuration

    Phantom II:  Local Using the Admin or Upgrade access and associated passwords - the authentication is done ‘locally’ within the Phantom II, and  RADIUS&Local RADIUS authentication (using a specific user name and password supplied by your RADIUS Server...
  • Page 113 Phantom II 6.0 Configuration Auth Mode Select the Authentication Mode: Local (default) or RADIUS&Local. For the latter selection, RADIUS authentication must be attempted FIRST; if unsuccessful, THEN Local authentication may be attempted. Values Local RADIUS&Local Local RADIUS Server IP In this field, the IP address of the RADIUS server is to be entered if RADIUS&Local has been selected as the Authorization Mode.
  • Page 114 Phantom II 6.1 Configuration RADIUS Secret If the Phantom II’ Authorization Mode has been set to RADIUS&Local, obtain the RADIUS Secret for his particular client from your RADIUS Server Administrator and enter it into this field, and the following field. (You will also want to obtain the applicable RADIUS User Name from your RADIUS Server Administrator.)
  • Page 115: Firewall Configuration

    This security feature differs from those discussed in the ‘UI Configuration’ section; the UI Configuration is specifically for configuring the Phantom II’ User Interface and related protocols. Image 6-30: Security Config. Menu, Firewall Configuration Submenu Firewall Status Disabled by default.
  • Page 116: Policies

    Source Zone Select the zone which is to be the source of the data traffic. WAN applies to the wired connection and LAN to the wireless, on all Phantom II units, whether a Master, Repeater, or Remote. Values © CalAmp...
  • Page 117 Destination Zone Select the zone which is the intended destination of the data traffic. WAN applies to the wired connection and LAN to the wireless, on all Phantom II units, whether a Master, Repeater, or Remote. Values Policy Select the policy (action) which is to apply. ACCEPT (traffic) is the default.
  • Page 118 Phantom II 6.0 Configuration If, in the Policy configuration, DROP or REJECT has been selected, this field may be defined as to how to tag associated messages. Values Emergency Alert Critical Error Warning Notice Information Debug © CalAmp...
  • Page 119: Rules

    Phantom II 6.0 Configuration 6.1.8.6.2 Rules Configuration They are configured to ‘fine Rules take precedence over Policies. tune’ firewall settings. Image 6-32: Firewall Configuration, Rules Config. Submenu Action Define the action which is to be taken by the defined rule.
  • Page 120 IP address Destination Zone Select the zone which is the intended designation of the data traffic. WAN applies to the wired connection and LAN to the wireless, on all Phantom II units, whether a Master, Repeater, or Remote. Values © CalAmp...
  • Page 121 Phantom II 6.0 Configuration Select Service This field allows for the rule to be applied to either a Custom Service (defined further down the menu) or for one of many predefined services available via a pull down menu. Values Custom Service...
  • Page 122 Phantom II 6.0 Configuration Protocol This field is configured if defining a Custom Service (ref. Select Service field). Values TCP:SYN ICMP IPP2P IPP2P:UDP IPP2P:all Comment This is simply a field where a convenient reference or description may be added to the rule.
  • Page 123: Port Forwarding

    6.1.8.6.3 Port Forwarding Configuration Image 6-33: Firewall Configuration, Port Forwarding Config. Submenu Internal Server IP Enter the IP address of the intended internal (i.e. on LAN side of Phantom II unit configured as a Router) server. Values 192.168.2.5 valid IP address Internal Port Target port number of internal server.
  • Page 124 Phantom II 6.0 Configuration Protocol Enter the protocol to be forwarded to the intended internal (i.e. on LAN side of Phantom II unit configured as a Router) server. Values TCP:SYN ICMP IPP2P IPP2P:UDP IPP2P:all External Port Port number of incoming request (from WAN-side device).
  • Page 125: Mac List

    Phantom II 6.0 Configuration 6.1.8.6.4 MAC List Configuration Image 6-34: Firewall Configuration, MAC List Config. Submenu WAN MAC List Status Enable or disable the WAN MAC list. List takes precedence over Rules. Values Disable Enable Disable LAN MAC List Status Enable or disable the LAN MAC list.
  • Page 126 Phantom II 6.0 Configuration MAC Address Specify the MAC Address to be added to the list. Values 00:00:00:00:00: 00 valid MAC address Disposition Determines the action to be taken on data traffic associated with the specified MAC address. Values ACCEPT...
  • Page 127: Blacklist

    Phantom II 6.0 Configuration 6.1.8.6.5 Blacklist Configuration Image 6-35: Firewall Configuration, Black list Configuration Submenu WAN Blacklist Status Enable or disable the WAN blacklist. List takes precedence over all other firewall settings. Values Disable Enable Disable LAN Blacklist Status Enable or disable the LAN blacklist.
  • Page 128: Reset Firewall To Factory Default

    Soft Buttons  Restart Firewall Now  Submit Write parameter values into Phantom II memory.  Reset Restore ‘currently’ modified parameter values to those which were previously written into Phantom II memory. © CalAmp...
  • Page 129: System Information

    Phantom II 6.0 Configuration 6.1.9 System Information The System Information menu affords a selection of a number of very useful tools for diagnostic and statistical purposes. The information accessible via this menu, particularly when accessed on remote units wirelessly, provides an excellent aid to troubleshooting and network management.
  • Page 130 Ethernet port (hardware interface) on the rear of the Phantom II. Received and Transmitted information are applicable to the local data traffic into and out of the Phantom II, respectively. Errors which are counted include alignment, frame check sequence (FCS), frame too long, and internal MAC.
  • Page 131 Phantom II 6.1 Configuration Radio Information The Radio Information window provides information related to the ‘radio’ (wireless) portion of the Phantom II.  Serial Number Serial number of radio (RF) module within Phantom  Version Firmware version within radio module.
  • Page 132 The Error counts reflect those having occurred on the wireless link. Lost Sync indicates how many times the Phantom II being viewed has lost synchronization with the Master Phantom II. © CalAmp...
  • Page 133 Phantom II 6.1 Configuration COM1 Connection Status This window displays information related to the primary RS-232 serial interface (COM1 on the rear of the Phantom II).  COM1 Port Status Enabled by default. Configure via COM1 Configuration menu.  COM1 Connect As Display of chosen protocol with respect to serial gateway function.
  • Page 134 Phantom II 6.1 Configuration COM2 Connection Status This window displays information related to the COM2 port located on the front of the Phantom II.  COM2 Port Status Disabled (for ‘data’ traffic) by default. Being ’disabled’ enables the port to be used for the Text User Interface.
  • Page 135 Phantom II 6.0 Configuration USB Connection Status This window displays information related to the USB port located on the front of the Phantom II.. USB Port Status Display the Status of USB Port. Configure via USB Configuration menu. USB Connect As Display of chosen protocol with respect to serial gateway function.
  • Page 136: System Tools

    This menu is used for performing system maintenance (upgrades), rebooting the system (locally or remotely), resetting the system to factory default settings, and for monitoring the radio channel noise within the operating frequency range of the Phantom II. Image 6-43: System Tools Menu © CalAmp...
  • Page 137: System Maintenance

    (firmware). Select the Browse button to locate the upgrade file provided by CalAmp. Using the Erase Settings checkbox tells the Phantom II not to store the current configuration settings, therefore once the upgrade process is complete the unit will have factory de-fault settings (Including the default IP).
  • Page 138: Reboot System

    Phantom II 6.0 Configuration 6.1.10.2 Reboot System This feature is particularly useful for rebooting remote units. It has the same effect as power cycling the unit. Image 6-45: System Tools Menu, Reboot System © CalAmp...
  • Page 139: Reset System To Default

    6.0 Configuration 6.1.10.3 Reset System to Default There are many configuration options for the Phantom II units. Should a unit reach a state where it is not performing as desired and it is possible that one or many configuration options may be...
  • Page 140: Radio Channels Noise Level

    Phantom II. When a Radio Channels Noise Level measurement is taken, the Phantom II goes ‘offline’ with respect to data transfer. Image 6-47: System Tools, Radio Channels Noise Level, Mean Value © CalAmp...
  • Page 141 Phantom II 6.1 Configuration Image 6-48: System Tools, Radio Channels Noise Level, Max Value Soft Buttons  Hold Do not refresh currently displayed values.  Clear Clear current values and take new measurements.  Show Mean Value (shown as green...
  • Page 142: Network Discovery

    6.1.10.5 Network Discovery This tool may be used to search the current network to find additional Phantom II units and report the IP Address, Unit Address and Description of each unit. The Refresh button will force the Phantom II to search the network.
  • Page 143 Phantom II 6.0 Configuration Power Saving Mode (continued) Serial Port Wakeup: Unit will wakeup from serial port or radio data if Radio Awak e Time is nonzero value. Power consumption is about 15-25mA @ 12VDC. Ethernet Port Wakeup: Unit will wakeup from Ethernet port or radio data if Radio Awak e Time is a nonzero value.
  • Page 144 Phantom II 6.0 Configuration Radio Sleep Time Defines how long the radio will sleep. If set to 0, the radio will not enter sleep mode. Values 0 - 65535 (seconds) Idle Time Defined the amount of system idle time required before going entering power saving mode cycle.
  • Page 145: Logout

    Phantom II 6.0 Configuration 6.1.10.8 Logout The Logout menu informs the user how to log out of the Web User Interface. Image 6-50: Logout Window © CalAmp...
  • Page 146: Installation

    Network Topology undertaken only by qualified and experienced personnel. Section 5.0 detailed the various network topologies which the Phantom II will support. Determine which topology is suited to your specific requirements. Throughput The Phantom II is capable of significant data throughput.
  • Page 147: 7.0 Installation

    Required transmit power is dictated pri- marily by distance, antenna type (specifically the ‘gain’ of the anten- nas being used), and the receive sensitivity of the distant Phantom II. Cable and connector losses (the physical path from the modem’s ‘antenna connector’...
  • Page 148: 7.0 Installation

    Power Requirements The Phantom II accepts a range of DC input voltages (keep in mind that supply current requirements must also be met). In some deploy- ments, power consumption is critical. Power consumption for the Phantom II may be minimized by reducing the transmit power, given the receive sensitivity of the distant modem.
  • Page 149: Path Calculation

    Phantom II 7.0 Installation 7.1 Path Calculation Assuming adequate antenna heights, a basic formula to determine if an adequate radio signal path exists (i.e. there is a reasonable fade FCC regulations allow for up to 36dBi effective isotropic margin to ensure reliability) is: radiated power (EIRP).
  • Page 150: Installation Of Antenna System Components

    Phantom II 7.0 Installation Once the equipment is deployed, average receive signal strength may be viewed in the System Information, Radio Information display. To satisfy FCC radio frequency (RF) exposure requirements for mobile transmitting 7.2 Installation of Antenna System Components...
  • Page 151: Antennas

    Direct human contact with the ’polarized’. antenna is potentially unhealthy when a Phantom II is generating A Yagi has a more focused antenna pattern, which results RF energy. Always ensure that in greater gain: commonly, 6-12dBi. The pattern of a Yagi...
  • Page 152: Coaxial Cable

    Phantom II 7.0 Installation The path calculation (see Section 7.1) will determine the antenna gain requirements. Refer to the beginning of this section to review the various factors which must be considering when deploying a net- work. Do not discount the importance of the REQUIRED HEIGHT for the antennas within your network.
  • Page 153: External Filter

    Phantom II 7.0 Installation 7.2.4 External Filter Although the Phantom II is capable of filtering-out RF noise in most environments, there are circumstances that require external filtering. Paging towers and cellular base stations in close proximity to the Phantom II antenna can desensitize the receiver. CalAmp’s external cavity filter eliminates this problem.
  • Page 154: Appendix A: Ip Discovery Utility

    In the sample, there is one Phantom II connected to same network to which the PC is connected. Activating the Refresh (IP) soft button results in the Phantom II being discovered by the utility:...
  • Page 155: Appendix B: Upgrade Procedure (Dos Prompt)

    Phantom II Appendix B: Upgrade Process (DOS Prompt) FTP Firmware Upgrade To logon, perform the following steps: Open a command prompt and type “ftp <ip address>” and <enter>. Login: type “upgrade” and <enter> Password: type “admin” and <enter> To upgrade the firmware, perform the following steps: Type “binary”...
  • Page 156 Phantom II Appendix B: Upgrade Procedure (DOS Prompt) Saving a Configuration File To logon, perform the following steps: Open a command prompt and type “ftp <ip address>” and <enter>. Login: type “upgrade” and <enter> Password: type “admin” and <enter> To download a Configuration File to your pc, perform the following steps: Type “ascii”...
  • Page 157 Phantom II Appendix B: Upgrade Procedure (DOS Prompt) Loading a Configuration File To logon, perform the following steps: Open a command prompt and type “ftp <ip address>” and <enter>. Login: type “upgrade” and <enter> Password: type “admin” and <enter> To upload a Configuration File to your pc, perform the following steps: Type “ascii”...
  • Page 158: Appendix C: Rs485 Wiring

    Figure C1 illustrates a typical 2-wire RS485 wiring configuration. The cable pair is shared for both transmit and receive data: it is very important that the Phantom II seize control of the line at the proper time when it is to transmit data.
  • Page 159: Appendix D: Serial Interface

    Phantom II Appendix D: Serial Interface Module Host (DCE) Microprocessor Arrows denote the direction that signals are asserted (e.g., DCD Signal (DTE) originates at the DCE, informing the DTE that a carrier is present). DCD  The interface conforms to standard RS-232 signals without level shifting, so direct connection to a host microprocessor is possible.
  • Page 160: Appendix E: Customer Interface Schematic

    Phantom II Appendix E: Customer Interface Schematic (1 of 3) © CalAmp...
  • Page 161 Phantom II Appendix E: Customer Interface Schematic (2 of 3) © CalAmp...
  • Page 162 Phantom II Appendix E: Customer Interface Schematic (3 of 3) © CalAmp...
  • Page 163: Appendix F: Ul Certifications

    Appendix F: UL Certifications This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D OR non-hazardous locations only. Combinations of equipment in your system are subject to investigation by the local Authority Having Jurisdiction at the time of installation.
  • Page 164 299 Johnson Ave, Suite 110 Waseca, MN 56093 Phone: (800) 992-7774 Fax: (507) 833-6748 www.cal amp.c om...

Table of Contents