Ed (Energy Detect); Ee (Encryption Enable) - Digi XBee S2C 802.15.4 User Manual

Radio frequency module
Table of Contents

Advertisement

AT commands
Parameter range
0 - 6
Default
N/A

ED (Energy Detect)

Starts an energy detect scan. This command accepts an argument to specify the time in milliseconds
to scan all channels. The device loops through all the available channels until the time elapses. It
returns the maximal energy on each channel, a comma follows each value, and the list ends with a
carriage return. The values returned reflect the energy level that ED detects in -dBm units.
Parameter range
0 - 6
Default
N/A

EE (Encryption Enable)

Enables or disables 128-bit Advanced Encryption Standard (AES) encryption.
Set this command parameter the same on all devices in a network.
The firmware uses the 802.15.4 Default Security protocol and uses AES encryption with a 128-bit key.
AES encryption dictates that all devices in the network use the same key, and that the maximum RF
packet size is 95 bytes if Tx compatibility is enabled (you set bit 0 of C8). If C8, bit 0 is not set, see
Maximum
payload.
When encryption is enabled, the device always uses its 64-bit long address as the source address for
RF packets. This does not affect how the MY (Source Address), DH (Destination Address High) and DL
(Destination Address Low) parameters work.
If MM (MAC Mode) is set to 1 or 2 and AP (API Enable) parameter > 0:
With encryption enabled and a 16-bit short address set, receiving devices can only issue RX
(Receive) 64-bit indicators. This is not an issue when MM = 0 or 3.
If a device with a non-matching key detects RF data, but has an incorrect key:
When encryption is enabled, non-encrypted RF packets received are rejected and are not sent out the
UART.
Parameter range
0 - 1
Parameter
0
1
Default
0
XBee/XBee-PRO S2C 802.15.4 RF Module User Guide
Description
Encryption Disabled
Encryption Enabled
Networking and security commands
80

Advertisement

Table of Contents
loading

This manual is also suitable for:

Xbee-pro s2c 802.15.4

Table of Contents