User guide

Redpine Signals, Inc. Proprietary and Confidential. Page 118
R
R
S
S
9
9
1
1
1
1
0
0
-
-
N
N
-
-
1
1
1
1
-
-
2
2
2
2
/
/
2
2
4
4
/
/
2
2
8
8
S
S
o
o
f
f
t
t
w
w
a
a
r
r
e
e
P
P
r
r
o
o
g
g
r
r
a
a
m
m
m
m
i
i
n
n
g
g
R
R
e
e
f
f
e
e
r
r
e
e
n
n
c
c
e
e
M
M
a
a
n
n
u
u
a
a
l
l
V
V
e
e
r
r
s
s
i
i
o
o
n
n
4
4
.
.
1
1
5
5
Figure 26: Set-up with TCP/IP Enabled
4.7.2 Using the Wi-Fi module with TCP/IP stack bypassed
The TCP/IP stack in the WiFi module can be bypassed by sending a
software command from the Host to the module.
The “TCP bypass command” should be issued to convert the RS9110-N-
11-22/24/28 from a TCP/IP enabled module to a TCP/IP bypassed
module. The following should be taken care of:
1. The reference driver that the user should use for this mode is placed
inside RS.CN.xx.GENR.SP.x.x.x/Driver/Driver_TCP_Bypass
2. The API manual that should be used is placed in
RS.CN.GENR.SP.x.x.x/Driver/Driver_TCP_Bypass/Documentation/
3. In this mode, the WiFi module presents itself as a standard network
interface, which would talk to the Host TCP/IP stack through the network
driver in the Host. For transmitting data to the air interface, the data
should be framed by the TCP/IP stack in the Host as an Ethernet frame,
and the WiFi module does only the WLAN framing on top of it. The
interface is according to standard networking protocols. For example :
http://www.makelinux.com/ldd3/chp-17-sect-3 describes the structure for
Linux. For successful sending and receiving of data, the MAC ID of the
module should be assigned to a field inside the net_device structure
dev_addr of the network driver on the Host OS. Once this is stored after
association with AP, the user can bring the wlan interface up
In Linux, this is usually done by: