background image

CL4790 User Guide

 

 

Version 2.0 

 

 

Americas: +1-800-492-2320 Option 2 
Europe: +44-1628-858-940 
Hong Kong: +852-2923-0610 

www.lairdtech.com/ramp

 

11

 

CONN-GUIDE_CL4790 

 

Security 

The 4790 product family utilizes a Frequency Hopping Spread Spectrum (FHSS) technology, which provides 
the foundation for secure digital wireless communications. The purpose of this section is to take a brief look 
at how spread spectrum technology works and explain how an OEM enables specific security features 
available in the CL4790. 

Spread Spectrum History 

Spread Spectrum, or SS, dates back to World War II, when actress Hedy Lamarr and composer George 
Antheil were granted a U.S. patent on a simple frequency hopping continuous wave (CW) system. These early 
research and development efforts tried to provide countermeasures for radar, navigation beacons, and 
communications.  

How Spread Spectrum Works 

SS radio communication has long been a favourite technology of the military because it resists jamming and 
is hard for an enemy to intercept. And now, this very same technology is widely used in the commercial, 
industrial and even consumer markets. The reason: SS signals distribute over a wide range of frequencies and 
then collect onto their original frequency at the receiver, making them so inconspicuous they are almost 
transparent. Just as they difficult to intercept by a military opponent, so are they unlikely to interfere with 
other signals intended for business and consumer users – even ones transmitted on the same frequencies. 

Spread signals are intentionally made to have a much wider band than the information they are carrying and 
use special pseudo noise codes to make them more noise-like. It is this very characteristic that makes SS 
signals difficult to detect, intercept, and demodulate. SS signals are hard to detect on narrowband equipment 
because the signal's energy spreads over a much wider bandwidth. Further, SS signals are harder to jam 
(interfere with) than narrowband signals and have a much lower probability of being intercepted, which is 
why the military has used SS for so many years. 

The spread of energy over a wide band makes SS signals less likely to interfere with narrowband 
communications. Narrowband communications, conversely, cause little to no interference to SS systems 
because the receiver effectively integrates the signal over a wide bandwidth to recover it. 

Besides being hard to intercept and jam, spread spectrum signals are also difficult to exploit or imitate. Signal 
exploitation is the ability of a non-network member to listen to a network and use information from the 
network without being a valid network member or participant. Imitation is the act of falsely or maliciously 
introducing false traffic or messages into a network. SS signals also are naturally more secure than 
narrowband radio communications. Thus SS signals can have any degree of message privacy that is desired. 
Messages can also be encrypted to any level of secrecy desired. The very nature of SS allows military or 
intelligence levels of privacy and security with minimal complexity. While these characteristics may not be very 
important to everyday business or consumer needs, these features are important to understand. 

Frequency Hopping Spread Spectrum 

An FHSS radio does just what its name implies – that is, it “hops” from frequency to frequency over a wide 
band. The specific order in which it occupies frequencies is a function of a code sequence, and the rate of 
hopping from one frequency to another is a function of the information rate. 

CL4790 Security Features 

In addition to FHSS technology, Laird has implemented three levels of security in the CL4790. All three levels 
associate with their own EEPROM parameter that you may program for permanent operation or change 
during system operation in volatile memory using On-the-Fly commands (download the 

AC4790 Embedded 

Module User Manual).

 The first two levels of security configure and establish a network of transceivers and 

are defined as the RF Channel Number and System ID. 

Summary of Contents for CL4790

Page 1: ...CL4790 USER GUIDE VERSION 3 0 Americas 1 800 492 2320 Option 2 Europe 44 1628 858 940 Hong Kong 852 2923 0610 www lairdtech com ramp ...

Page 2: ... Installation Instructions WARNING To satisfy FCC RF exposure requirements for mobile transmitting devices this equipment must be professionally installed such that the end user is prevented from replacing the antenna with a non approved antenna The end user should also be prevented from being within 20cm of the antenna during normal use with the exception of hands feet wrists and ankles The prece...

Page 3: ...com ramp 3 CONN GUIDE_CL4790 REVISION HISTORY Version Date Changes 1 0 Initial Release 1 1 Changes and Revisions 2 0 02 Aug 2013 Major changes and revisions updated format and data 3 0 18 Dec 2013 Separated Hardware Integration Guide HIG from User Guide information created two separate documents Add Related Documents section ...

Page 4: ...ion History 3 Contents 4 CL4790 RF Transceiver 5 Overview 5 Features 5 Theory of Operation 6 RF Architecture 6 Network Topologies 6 Modes of Operation 6 Security 11 Spread Spectrum History 11 How Spread Spectrum Works 11 Frequency Hopping Spread Spectrum 11 CL4790 Security Features 11 Programming the CL4790 12 Appendix I Troubleshooting 14 Force 9600 Baud Recovery 14 ...

Page 5: ...eral transceiver pairs to carry on simultaneous conversations on the same network CL4790s implement a proprietary communication protocol to provide secure data transmissions Using FHSS technology ensures data reliability over long distances The CL4790 transceivers use the 900 MHz ISM license free frequency band which requires no additional certifications when designing into a new or legacy data sy...

Page 6: ...ransmit or Command mode when the OEM host sends data over the serial interface The contents of the data on the serial interface determine which of two modes the radio enters Transmit Mode All packets sent over the RF are either Addressed or Broadcast packets You may dynamically control Broadcast and Addressed delivery with the API Control byte which can be modified during operation with On the Fly...

Page 7: ...g data the transceivers update their Session Count every time data or an RF acknowledge is received The SLock0 and SLock1 settings control Session Count as shown below Table 1 Session Count Truth Table Case Slock0 Slock1 Transceiver Receiving an Addressed Packet Transceiver Receiving a Broadcast Packet 1 0 0 Radio loads its Current Session Count with its Session Count Refresh Radio loads its Curre...

Page 8: ...he remote radio s Session Count Refresh This is suitable for full duplex applications as the Session is extended as long as there is communication Note This is the default case with which the radio ships and may not work well for all applications Use Case 4 when a large number of data packets are lost during operation Case 4 In this case a radio loads its Session Count with the remote radio s curr...

Page 9: ...CL4790 User Guide Version 2 0 Americas 1 800 492 2320 Option 2 Europe 44 1628 858 940 Hong Kong 852 2923 0610 www lairdtech com ramp 9 CONN GUIDE_CL4790 Figure 1 Pending RF data in buffer flow ...

Page 10: ...CL4790 User Guide Version 2 0 Americas 1 800 492 2320 Option 2 Europe 44 1628 858 940 Hong Kong 852 2923 0610 www lairdtech com ramp 10 CONN GUIDE_CL4790 Figure 2 Pending RF data in buffer flow ...

Page 11: ...re harder to jam interfere with than narrowband signals and have a much lower probability of being intercepted which is why the military has used SS for so many years The spread of energy over a wide band makes SS signals less likely to interfere with narrowband communications Narrowband communications conversely cause little to no interference to SS systems because the receiver effectively integr...

Page 12: ... of the encrypted data who know the algorithm but do not have the correct key cannot derive the original data algorithmically However anyone who does have the key and algorithm can easily decrypt the encrypted data and obtain the original data A standard algorithm based on a secure key thus provides a basis for exchanging encrypted data by issuing the encryption key to those authorized to have the...

Page 13: ...point to multipoint based on the radio s current settings If the Destination Address field is set to any value other than FF FF FF FF FF FF the radio sends data only to the radio whose MAC matches that specified in the Destination Address field point to point If the Destination Address field is set to FF FF FF FF FF FF it is set to Broadcast mode and transmits to all transceivers in range with the...

Page 14: ...he correct COM port Check the COM port settings for correct baud rate parity and either Hardware or No Flow Control May be caused by Flow Control set to Xon Xoff Try increasing the Maximum Transmit Attempts clients and or Broadcast Attempts servers in small increments until communication is established Connect a Null Modem adapter between the client and its host device Check the Destination Addres...

Page 15: ...Handshaking Hardware Data Bits 8 Stop Bits 1 9 Under Options ensure the Read Write with AT Commands check box is selected 10 Ensure the Port Status is open 11 On the Configure tab click Read Radio 12 Set the Interface Baud Rate to the appropriate value and click Write Radio 13 Power off the radio 14 Remove the jumper 15 Power on the radio 16 Set the Baud Rate on the PC Settings tab to the baud rat...

Reviews: