ProST IEEE802.11b/g WiFi Board Preliminary Reference Guide Rev: 1.
Total Manufacturing Test Process Overview: In general the following steps are considered part of a manufacturing (test) flow: 1. PCBA assembly 2. Inspection(visual, automated visual, X-ray, ) 3. Structural test of the digital circuitry(Boundary Scan Test (BST), or other methods) 4. Functional test of the analog circuitry (radio test). 5. Calibration of the radio (for optimal performance within legal bounds); storing the results to non-volatile memory. 6.
Manufacturing Test Plan Overview for IMT tool 1. Test initialization and Product identification PCB serial number, product part number, and MAC address are established. A bar code scanner or the keyboard can be used to enter this information By default the information is divided between two codes. The first (bar) code contains the PCB serial number. The second bar code contains the product part number and half the Mac address. 2.
8. RSSI calibration (linear approximation) Linear curve fitting is performed on the result, and PDR 0x1902, 0x1905, or 0x1908 is calculated, depending on the platform type. 9. PA control loop calibration The PA control loop behavior is measured as a function of modulation type (bit rate) and channel (frequency). Depending on the platform, PDR 0x1901 or 0Xpdr1903 and 0x1904 are calculated. There are two implementations for this step: 1. PA Calibration 2.
10. TX IQ Calibration For the platforms that require it, ZIF TX IQ Calibration is performed. 11. NV initialize By default this test will (re-)initialize and therefore erase the non-volatile memory. 12. Upload files to flash Files can be uploaded to AP based products. These files can contain firmware images, boot loaders or custom made images. 13. Write PDA The PDRs that were generated by the other test modules are written to the PDA that resides in the non-volatile memory of the DUT.
802.11b/g WiFi Module Features The features supported by the ProST 802.11g WLAN Access Point are outlined below: Interfaces directly to 10/100Mbps IEEE 802.3 Ethernet networks Supports IEEE 802.11 WLAN functions Supported WLAN Bridge function (WDS: Wireless Distribution System) Firmware is stored in a flash memory and can be upgraded remotely. Configurable through Web based management. Power, Ethernet and wireless activity LED indicators.
802.11b/g WiFi Module Service Set Identification (SSID) The Service Set Identification (SSID) is a thirty-two alphanumeric character (maximum) string identifying the wireless local area network (WLAN). Some vendors refer to the SSID as network name. For stations to communicate with each other, all stations must be configured with the same SSID. Authentication and WEP Encryption The absence of a physical connection between nodes makes the wireless links vulnerable to information theft.
02.11b/g WiFi Module Note: The available channels supported by the wireless products in various countries are different by firmware. The preferred channel separation between the channels in neighboring wireless networks is 25 MHz (5 channels). This means that you can apply up to three different channels within your wireless network. There are only 11 usable wireless channels in the United States. It is recommended that you start using channel 1 and grow to use channel 6, and 11 when necessary.
802.11b/g WiFi Module Region Define the regulatory domain of the operation area (default: US) Firmware Version 2.6.4.0 IP Address Assign Internet Protocol (IP) address to the access point. Subnet Mask Assign IP Subnet Mask to the access point. Default Gateway Assign default Gateway to the access point if needed DHCP Client Dynamic Host Configuration Protocol, it allows to request the IP from DHCP server for all wireless clie nts.
802.11b/g WiFi Module Apply Means once you change the parameters and save the values Cancel Means you leave it un-changed Wireless Settings Wireless Settings MODEL ProST WLAN Device Wireless Network Name (SSID) Enter a 32-character (maximum) extended service set ID in this field. The characters are case sensitive. With an access point, the wireless network always functions in infrastructure mode.
802.11b/g WiFi Module wireless channel is 1. Mode B or/and G mode can be selected. With “ B only” , the speed is under 11Mbps; with “ G mode” or “ B and G mode” , the speed is up to 54Mbps. Enable Features When choose “ WMM with VLAN PassThru” , you can have this function, but you can’ t gain the function of “ Virtual AP with VLAN Aware AP” . Vice versa. Radio Off When enable it, means the radio is off and the AP won’ t be scanned. Otherwise, you can find it.
802.11b/g WiFi Module Access Control List (ACL) Security Settings Enable access control list Default is disabled. Choose it to enable items below. Default Access Choose the default access policy is “ Accept” or “ Reject” Specific Clients Configure specific clients. You can add or delete these clients. Click “ Add” and a window will pop up. Enter the MAC address and choose the access types (accept or reject). Then click OK to add that MAC Address to the system, or Cancel it.
802.11b/g WiFi Module RADIUS Servers Security Settings RADIUS RADIUS can enables remote access servers to communicate with a central server to authenticate dial- in users and authorize their access to the requested system or service. RADIUS Accounting Interim Interval How often should the RADIUS Account function take place RADIUS NAS Identifier Enter the IP Address of NAS, which is used for accounting. Reauthentication How often should the AP authentication again Add Used to add RADIUS Server(s).
802.11b/g WiFi Module Change Security Security Settings Wired Equivalent Privacy (WEP) Configure WEP security settings. Wired Equivalent Privacy (WEP) is a security protocol, which designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN. WEP seeks to establish similar protection to that offered by the wired network's physical security measures by encrypting data transmitted over the WLAN. 802.
802.11b/g WiFi Module WEP Security Setting Use WEP security Choose it to enable the WEP function. Pre-shared Key To define the encryption strength Passphrase Used to generate the keys. Enter a passphrase and click the "Generate Keys" button. You can also enter the keys directly. These keys must match the other wireless stations. Key 1/2/3/4 It is produced after clicking “ Generate Keys” . The stations need these keys to connect this AP. Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi Module 802.1X Security Security Setting Use 802.1X security Choose it to enable the 802.1X function. Key Size How many bits will be provided to 802.1X. Group Key Rekey Settings Rekey means “ re-generate key” ; You can choose “ No rekeying” , or give an number for rekey by time or by packets. Back Back to the “ Wireless Security Settings” .
802.11b/g WiFi Module Security Setting Wi-Fi Protected Access (WPA) You can choose “ Disable WPA security” or “ Use WPA with pre-shared key” or “ Use WPA with RADIUS server” . Use WPA with pre-shared key If AP shares a key earlier with stations, enter it below. The key should between 8 and 63 characters. Use WPA with RADIUS server Rekey means “ re-generate key” ; You can choose “ No rekeying” , or give a number for rekey by time or by packets.
802.11b/g WiFi Module Wi-Fi Protected Access 2 (WPA2) Security Setting Wi-Fi Protected Access 2 (WPA2) You can choose “ Disable WPA2 security” , “ Use WPA2 with pre-shared key” , “ Use WPA2 with RADIUS server” or “ Use WPA2 with pre-shared key and RADIUS server” . Use WPA2 with pre-shared key If AP shares a key earlier with stations, enter it below. The key should between 8 and 63 characters.
802.11b/g WiFi Module Firewall Firewall Firewall Default is “ Disable” . You should choose “ Enable” to make it works. Default policies Accept sends the traffic through; Discard stops the traffic. Input: all traffic with the Access Point as destination; Output: all traffic with the Access Point as origin; Forward: all traffic between LAN and WAN (see Manual) that passes through the Access Point. Once you have set the default policies, you can create rules.
802.11b/g WiFi Module Firewall Rule Rule Used to identify the rule and the order in which rules are applied. Chain The direction of traffic. Rule enabled Choose it to enable this firewall rule. Target This tells the firewall what to do with the traffic that meets the conditions in this rule. Accept: traffic will be allowed. Drop: traffic will be stopped, with no response to the sender. Reject: traffic will be stopped, and a response will be returned to the sender.