User Manual

The host computer Usb network card device establishment process:
ifconfig usb0 192.168.43.58 up
ip route add default via 192.168.43.129 dev usb0
Module rndis network card establishment process
busybox ifconfig rndis0 192.168.43.129 up
iptables -t nat -A POSTROUTING -o lmi40 -j MASQUERADE
echo "1" > /proc/sys/net/ipv4/ip_forward
The module RNDIS network card is CONFIGURED by detecting the USB status
(CONFIGURED) or listening for the uevent event, and the IP address is queried by the AT
command to the module master slave mode setting.
The module LMI network card is established, and the bridge driver is set according to the
NVRAM configuration parameters.
4.Process
4.1 Summary
YUNOFDM is a module that supports point-to-point communication, so device types
distinguish between master and slave devices. There is a difference in the boot process
between the master and slave devices.
Taking the application of UAV industry as an example, the UAV end is the main device
end, and the remote control is the slave device end.
The current design is to take the main device as the initiator of the network, so the main
device first selects a clean frequency point to send the system message by sweeping,
and at the same time starts the monitoring of the access channel.
The slave device is the access end of the network, so the same step frequency point is
first found through the search network from the device end, the system message is
received, and then the corresponding frame to initiate the access process.
After the system tasks are initialized, some pre-configuration work needs to be done
before the system protocol is started.
The pre-configuration information may contain, but is not limited to, the device ID, the
opposing ID, the access secret key, the user's operating frequency band, and so on. This
information can be pre-configured in the file system according to product planning
requirements.
After successful device access, the user can change the Settings of power, frequency
band, rate and other parameters.
At the same time, after the completion of the chain can carry out data services such as
graph transmission.
The specific process is as follows: