background image

CL4790 User Guide

 

 

Version 2.0 

 

 

Americas: +1-800-492-2320 Option 2 
Europe: +44-1628-858-940 
Hong Kong: +852-2923-0610 

www.lairdtech.com/ramp

 

12

 

CONN-GUIDE_CL4790 

 

The RF Channel Number represents a specific hopping sequence and provides physical separation between 
collocated networks. Thus, all transceivers in a network must use the same RF Channel Number. There are a 
total of 56 Channel Numbers. 

Note:    RF Channels 16-47 are restricted to US/Canada, RF Channels 48-55 restrict operation to 915-928 

MHz and are normally only used in Australia. 

System ID is similar to a password character or network number and makes network eavesdropping more 
difficult. A receiving radio will not go in session (communicate) with another radio on a different System ID. 
There are a total of 256 System ID values. 

In FHSS technology, RF Channel Number and System ID are still not enough to secure your data. The CL4790 
supports the Data Encryption Standard (DES), which is the third level of security. Encryption is the process of 
encoding an information bit stream to secure the data content. The algorithm described in this standard 
specifies both encrypting and decrypting operations which are based on a binary number called a key. 

A key of 56 bits encrypts and decrypts the data. The encryption algorithm specified in this standard is 
commonly known among those using the standard. The unique key chosen for particular application makes 
the results of encrypting data using the algorithm unique. Selection of a different key causes the encrypted 
data that is produced for any given set of inputs to differ. The cryptographic security of the data depends on 
the security provided for the key which encrypts and decrypts the data. 

Recover data from the encryption by using exactly the same key which encrypts it. Unauthorized recipients of 
the encrypted data who know the algorithm but do not have the correct key cannot derive the original data 
algorithmically. However, anyone who does have the key and algorithm can easily decrypt the encrypted data 
and obtain the original data. A standard algorithm based on a secure key thus provides a basis for 
exchanging encrypted data by issuing the encryption key to those authorized to have the data. 

P

ROGRAMMING THE 

CL4790 

Laird provides the easy-to-use CL4790 

Configuration Utility

 software for programming the CL4790. The GUI 

based software does not require any hardware configuration and works by itself. The software is compatible 
with Microsoft® Windows. CL4790s are plug-and-play devices that work with minimal or no configuration.  

This section provides instructions for quick and simple setup of CL4790 networks. The Laird Configuration 
Utility User Manual provides a full description of the software tool’s functionality and features. 

CL4790 customers who need advanced features and functionality like Transmit/Receive API can unlock these 
and other features in the Laird Configuration Utility software using th

Enabling the Security Pane 

application 

note. The Info Center located on the Configure tab of the Laird Configuration Utility provides a quick 
explanation of all CL4790 features. Detailed descriptions for all available 4790 features are found in the 

AC4790 Embedded Module User Manual

. 

To program the CL4790, follow these steps: 

1.

 

Start the Laird Configuration Utility

Click here 

to download. 

2.

 

Connect a CL4790 unit to the serial port on the PC (refer to the 

Serial Interface

 

section). 

3.

 

Attach the antenna to the CL4790 unit; make sure the connection is secure. 

4.

 

Connect the power supply to the CL4790 unit. Make sure the Pwr LED is on.  

5.

 

In the PC Settings tab in the Configuration Utility, select Connex4790 from the Product drop-down. 

6.

 

Click Find Port. 

7.

 

From the Port drop-down menu, select the COM port that is connected to the CL4790. 

8.

 

Select the Baud Rate from the drop-down menu. 

Summary of Contents for CL4790

Page 1: ...CL4790 USER GUIDE VERSION 3 0 Americas 1 800 492 2320 Option 2 Europe 44 1628 858 940 Hong Kong 852 2923 0610 www lairdtech com ramp ...

Page 2: ... Installation Instructions WARNING To satisfy FCC RF exposure requirements for mobile transmitting devices this equipment must be professionally installed such that the end user is prevented from replacing the antenna with a non approved antenna The end user should also be prevented from being within 20cm of the antenna during normal use with the exception of hands feet wrists and ankles The prece...

Page 3: ...com ramp 3 CONN GUIDE_CL4790 REVISION HISTORY Version Date Changes 1 0 Initial Release 1 1 Changes and Revisions 2 0 02 Aug 2013 Major changes and revisions updated format and data 3 0 18 Dec 2013 Separated Hardware Integration Guide HIG from User Guide information created two separate documents Add Related Documents section ...

Page 4: ...ion History 3 Contents 4 CL4790 RF Transceiver 5 Overview 5 Features 5 Theory of Operation 6 RF Architecture 6 Network Topologies 6 Modes of Operation 6 Security 11 Spread Spectrum History 11 How Spread Spectrum Works 11 Frequency Hopping Spread Spectrum 11 CL4790 Security Features 11 Programming the CL4790 12 Appendix I Troubleshooting 14 Force 9600 Baud Recovery 14 ...

Page 5: ...eral transceiver pairs to carry on simultaneous conversations on the same network CL4790s implement a proprietary communication protocol to provide secure data transmissions Using FHSS technology ensures data reliability over long distances The CL4790 transceivers use the 900 MHz ISM license free frequency band which requires no additional certifications when designing into a new or legacy data sy...

Page 6: ...ransmit or Command mode when the OEM host sends data over the serial interface The contents of the data on the serial interface determine which of two modes the radio enters Transmit Mode All packets sent over the RF are either Addressed or Broadcast packets You may dynamically control Broadcast and Addressed delivery with the API Control byte which can be modified during operation with On the Fly...

Page 7: ...g data the transceivers update their Session Count every time data or an RF acknowledge is received The SLock0 and SLock1 settings control Session Count as shown below Table 1 Session Count Truth Table Case Slock0 Slock1 Transceiver Receiving an Addressed Packet Transceiver Receiving a Broadcast Packet 1 0 0 Radio loads its Current Session Count with its Session Count Refresh Radio loads its Curre...

Page 8: ...he remote radio s Session Count Refresh This is suitable for full duplex applications as the Session is extended as long as there is communication Note This is the default case with which the radio ships and may not work well for all applications Use Case 4 when a large number of data packets are lost during operation Case 4 In this case a radio loads its Session Count with the remote radio s curr...

Page 9: ...CL4790 User Guide Version 2 0 Americas 1 800 492 2320 Option 2 Europe 44 1628 858 940 Hong Kong 852 2923 0610 www lairdtech com ramp 9 CONN GUIDE_CL4790 Figure 1 Pending RF data in buffer flow ...

Page 10: ...CL4790 User Guide Version 2 0 Americas 1 800 492 2320 Option 2 Europe 44 1628 858 940 Hong Kong 852 2923 0610 www lairdtech com ramp 10 CONN GUIDE_CL4790 Figure 2 Pending RF data in buffer flow ...

Page 11: ...re harder to jam interfere with than narrowband signals and have a much lower probability of being intercepted which is why the military has used SS for so many years The spread of energy over a wide band makes SS signals less likely to interfere with narrowband communications Narrowband communications conversely cause little to no interference to SS systems because the receiver effectively integr...

Page 12: ... of the encrypted data who know the algorithm but do not have the correct key cannot derive the original data algorithmically However anyone who does have the key and algorithm can easily decrypt the encrypted data and obtain the original data A standard algorithm based on a secure key thus provides a basis for exchanging encrypted data by issuing the encryption key to those authorized to have the...

Page 13: ...point to multipoint based on the radio s current settings If the Destination Address field is set to any value other than FF FF FF FF FF FF the radio sends data only to the radio whose MAC matches that specified in the Destination Address field point to point If the Destination Address field is set to FF FF FF FF FF FF it is set to Broadcast mode and transmits to all transceivers in range with the...

Page 14: ...he correct COM port Check the COM port settings for correct baud rate parity and either Hardware or No Flow Control May be caused by Flow Control set to Xon Xoff Try increasing the Maximum Transmit Attempts clients and or Broadcast Attempts servers in small increments until communication is established Connect a Null Modem adapter between the client and its host device Check the Destination Addres...

Page 15: ...Handshaking Hardware Data Bits 8 Stop Bits 1 9 Under Options ensure the Read Write with AT Commands check box is selected 10 Ensure the Port Status is open 11 On the Configure tab click Read Radio 12 Set the Interface Baud Rate to the appropriate value and click Write Radio 13 Power off the radio 14 Remove the jumper 15 Power on the radio 16 Set the Baud Rate on the PC Settings tab to the baud rat...

Reviews: