Programming The Cl4790 - Laird CL4790 User Manual

Hide thumbs Also See for CL4790:
Table of Contents

Advertisement

CL4790 User Guide
Version 2.0
The RF Channel Number represents a specific hopping sequence and provides physical separation between
collocated networks. Thus, all transceivers in a network must use the same RF Channel Number. There are a
total of 56 Channel Numbers.
Note:
RF Channels 16-47 are restricted to US/Canada, RF Channels 48-55 restrict operation to 915-928
MHz and are normally only used in Australia.
System ID is similar to a password character or network number and makes network eavesdropping more
difficult. A receiving radio will not go in session (communicate) with another radio on a different System ID.
There are a total of 256 System ID values.
In FHSS technology, RF Channel Number and System ID are still not enough to secure your data. The CL4790
supports the Data Encryption Standard (DES), which is the third level of security. Encryption is the process of
encoding an information bit stream to secure the data content. The algorithm described in this standard
specifies both encrypting and decrypting operations which are based on a binary number called a key.
A key of 56 bits encrypts and decrypts the data. The encryption algorithm specified in this standard is
commonly known among those using the standard. The unique key chosen for particular application makes
the results of encrypting data using the algorithm unique. Selection of a different key causes the encrypted
data that is produced for any given set of inputs to differ. The cryptographic security of the data depends on
the security provided for the key which encrypts and decrypts the data.
Recover data from the encryption by using exactly the same key which encrypts it. Unauthorized recipients of
the encrypted data who know the algorithm but do not have the correct key cannot derive the original data
algorithmically. However, anyone who does have the key and algorithm can easily decrypt the encrypted data
and obtain the original data. A standard algorithm based on a secure key thus provides a basis for
exchanging encrypted data by issuing the encryption key to those authorized to have the data.
P
ROGRAMMING THE
Laird provides the easy-to-use CL4790
based software does not require any hardware configuration and works by itself. The software is compatible
with Microsoft® Windows. CL4790s are plug-and-play devices that work with minimal or no configuration.
This section provides instructions for quick and simple setup of CL4790 networks. The Laird Configuration
Utility User Manual provides a full description of the software tool's functionality and features.
CL4790 customers who need advanced features and functionality like Transmit/Receive API can unlock these
and other features in the Laird Configuration Utility software using the
note. The Info Center located on the Configure tab of the Laird Configuration Utility provides a quick
explanation of all CL4790 features. Detailed descriptions for all available 4790 features are found in the
AC4790 Embedded Module User
To program the CL4790, follow these steps:
Start the Laird Configuration Utility.
1.
Connect a CL4790 unit to the serial port on the PC (refer to the
2.
Attach the antenna to the CL4790 unit; make sure the connection is secure.
3.
Connect the power supply to the CL4790 unit. Make sure the Pwr LED is on.
4.
In the PC Settings tab in the Configuration Utility, select Connex4790 from the Product drop-down.
5.
Click Find Port.
6.
From the Port drop-down menu, select the COM port that is connected to the CL4790.
7.
Select the Baud Rate from the drop-down menu.
8.
Americas: +1-800-492-2320 Option 2
Europe: +44-1628-858-940
Hong Kong: +852-2923-0610
www.lairdtech.com/ramp
CL4790
Configuration Utility
Manual.
Click here
software for programming the CL4790. The GUI
Enabling the Security Pane
to download.
Serial Interface
12
application
section).
CONN-GUIDE_CL4790

Advertisement

Table of Contents
loading

Table of Contents