background image

Weidmuller Wireless Ethernet Modem & Device Server WI-MOD-E-G/A User Manual 

Rev.

 

2.16

 

www.weidmuller.com

  

 

107

 

APPENDIX E -   GNU Free Doc License 

 

Version 2, June 1991  

Copyright (C) 1989, 1991 Free Software Foundation, Inc.  
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA 
 
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. 
 
Preamble 
 
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU 
General Public License is intended to guarantee your freedom to share and change free software--to make sure the 
software is free for all its users. This General Public License applies to most of the Free Software Foundation's software 
and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered 
by the GNU Lesser General Public License instead.) You can apply it to your programs, too.  

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to 
make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that 
you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free 
programs; and that you know you can do these things.  

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender 
the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you 
modify it.  

For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the 
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them 
these terms so they know their rights.  

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal 
permission to copy, distribute and/or modify the software.  

Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty 
for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what 
they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.  

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a 
free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have 
made it clear that any patent must be licensed for everyone's free use or not licensed at all.  

The precise terms and conditions for copying, distribution and modification follow.  

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

0.  

This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be 
distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and 
a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a 
work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another 
language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as 
"you".  

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The 
act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a 
work based on the Program (independent of having been made by running the Program). Whether that is true depends on 
what the Program does.  
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided 
that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of 

Summary of Contents for WI-MOD-E-A

Page 1: ...Rev 2 16 www weidmuller com 1 WI MOD E G WI MOD E A Wireless Ethernet Modem Device Server User Manual Read and Retain For Future Reference Version 2 16...

Page 2: ...LL your connections with the user manual before turning the power on CAUTION To comply with FCC RF Exposure requirements in section 1 1310 of the FCC Rules antennas used with this device must be insta...

Page 3: ...ain Part 15 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part15 of the FCC rules Code of Federal Regulations 47CFR Part 15 Operation is subj...

Page 4: ...information on regulations 2 Operation is authorized by the radio frequency regulatory authority in your country on a non protection basis Although all care is taken in the design of these units ther...

Page 5: ...exclusive of all other warranties This warranty does not indemnify the purchaser of products for any consequential claim for damages or loss of operations or profits and WEIDMULLER is not liable for a...

Page 6: ...thentication Mode Open Shared 32 WPA WPA2 33 WPA Enterprise Authenticator AP Configuration 33 Supplicant Re authenticate Period 33 Enable Debug 33 WPA Enterprise Supplicant Client Configuration 33 Tru...

Page 7: ...Utilisation 76 4 3 CUSTOM SURVEY 78 Example One 78 Example Two 79 4 4 THROUGHPUT TEST 80 Internal Throughput Test 80 Throughput and Repeaters 81 4 5 STATISTICS 83 Wireless Statistics 83 Access Point 8...

Page 8: ...select appropriate channel transmit power etc allowable in that country Please check with your representative for the permitted channel usage in your country See Appendix C for channels selections Th...

Page 9: ...configured as an Access Point and the other as a Client The second diagram shows an existing LAN being extended using WI MOD E s In this example the Access Point should be configured at the LAN end a...

Page 10: ...r connects devices on different LAN s The IP addresses for the Ethernet and wireless sides are different In this example the wireless link is part of LAN A with the Client unit acting as a Router betw...

Page 11: ...and a power supply Power the WI MOD E and make an Ethernet connection to your PC for further information on how to do this refer to section 3 2 Configuring the Unit for the first time Set the WI MOD E...

Page 12: ...Australia 4W EIRP and 2km in Europe 100mW EIRP If using a WI MOD E A 5 GHz with a single antenna 5 km 3 miles can be achieved in USA Canada and Australia 1W EIRP and 3km in Europe 500mW EIRP however...

Page 13: ...Therefore we can increase the antenna gain as long as overall system gain antenna Gain coax loss does not go above 10dB Example If using 10m 33ft of Cellfoil coax cable approximately 6dB of loss and...

Page 14: ...nd Collinear antennas A dipole or collinear antenna transmits the same amount of radio power in all directions as such that are easy to install and use The dipole antenna with integral 15 ft 5m cable...

Page 15: ...A 410mA 210mA A Ground Terminal is provided on the back of the module This Terminal should be connected to the Main Ground point of the installation in order to provide efficient surge protection for...

Page 16: ...5 standard require some type of arbitration RS485 is a balanced differential standard but it is recommended that shielded twisted pair cable be used to interconnect modules to reduce potential RFI It...

Page 17: ...t wetting current of approximately 5mA is provided to maintain reliable operation of driving relays The digital input is connected between the DIO terminal and common COM The I O circuit includes a LE...

Page 18: ...l attempt to establish a link with an Access Point only if it has matching SSID Encryption method etc and other compatible capabilities as indicated by the beacon If more than one suitable Access Poin...

Page 19: ...l This functionality permits a client to have mobility whilst maintaining a link with the most suitable AP LED Indication The following table details the status of the indicating LEDs on the front pan...

Page 20: ...can operate all 13 channels at the same time with minimal interference with the adjacent channel Only one of these channels is used at a time and is configured at the Access Point The Access Point the...

Page 21: ...and operational constraints see Appendix C for more details The example below shows the US power and operational constraints Group 1 5 15 5 25GHz 50mW Group 2 5 25 5 35GHz 250mW to 1 Watt Group 3 5 4...

Page 22: ...annel that has been flagged as containing a radar signal either by a channel availability check or by in service monitoring is subject to a 30 min non occupancy period where it cannot be used by the d...

Page 23: ...ill always start the WI MOD E with Ethernet IP address 192 168 0 1XX subnet mask 255 255 255 0 gateway IP 192 168 0 1 and the radio disabled Do not forget to set the switch back to the RUN position an...

Page 24: ...off this behaviour in IE7 by selecting Tools Internet Options Advanced Security Warn about certificate address mismatch Method 2 Set WI MOD E Network address to match the local network For this metho...

Page 25: ...C uses a proxy server ensure that Internet Explorer will bypass the Proxy Server for local addresses This option may be modified by opening Tools Internet Options Connections Tab LAN Settings Proxy Se...

Page 26: ...al bridged network Ethernet or Wireless IP Address Subnet Mask IP Address and Subnet Mask for your application System Address ESSID The system address is a text string 1 to 31 characters in length use...

Page 27: ...d netmask will no longer be editable See Section 3 23 VLAN for more details on VLAN configuration A system of WI MOD E s must have at least one Access Point configured as a master and have one or more...

Page 28: ...tials can be entered for all Supplicants The WI MOD E supports WPA 1 TKIP WPA 1 AES and WPA 2 AES using a Pre Shared Key PSK WPA PSK TKIP Temporal Key Integrity Protocol enhances WEP by using 128 bit...

Page 29: ...t is the Ethernet IP Address below Refer to section 3 18 Routing for more information Save Changes Save changes to non volatile memory The module will need to be restarted before the changes take effe...

Page 30: ...The root node is typically the unit that handles the majority of traffic in the network The WI MOD E is configured with a Bridge Priority of 32768 by default The intention is to reduce traffic that th...

Page 31: ...tion 2 and Ethernet Device The example shows the Access Point and the Station as both being WI MOD E modules which will happily communicate as both support 4 Address Mode However there are some instan...

Page 32: ...2 AB EF 00 56 for 64bit encryption and 12 AB EF 00 56 15 6B E4 30 C8 05 F0 8D for 128bit encryption Encryption keys must not be all zeros i e 00 00 00 00 00 Default WEP Key One of the four keys may be...

Page 33: ...maximum time a client will still have access to the network after its user credentials have been revoked Enable Debug Must only be used during commissioning and only if requested by WEIDMULLER Suppor...

Page 34: ...ing to reduce broadcast traffic sent over the radio Refer to section 3 19 Filtering for how to configure a filter By default a transparent bridge does not handle loops within the network There must be...

Page 35: ...the allowed setting for your country You can reduce the power for short range applications or to allow the use of high gain transmitter antennas while still complying with the emission requirements of...

Page 36: ...ts will not transmit the System Address openly in Beacon messages This is particularly useful in unencrypted radio networks 3 Address Mode Allows compatibility with Layer 3 Bridge devices See section...

Page 37: ...is page Figure 30 Advanced Radio TX Antenna Select which antenna port the module will transmit from Selections available are Main Port Only Messages are transmitted from the main TX RX port The Auxili...

Page 38: ...ming Radio surveys or radio path testing See section 4 4 Throughput Test Fixed Noise Floor Allows the Radio Receiver Noise Floor and therefore sensitivity to be moved above any interference What this...

Page 39: ...Proxy ARP is used to make the device visible on the network In this process the WI MOD E pretends that it holds the IP address on the network and responds on behalf of the remote device The result of...

Page 40: ...any other WI MOD E serial ports including the corresponding port on the same WI MOD E Serial Gateway Modbus RTU to TCP When configured as Modbus will allow a serial Modbus Client Master to connect wit...

Page 41: ...serial Slaves In this example the WI MOD E Access Point is configured with the RS232 Modbus TCP to RTU Gateway enabled Once enabled the gateway converts the Modbus TCP queries received from the Master...

Page 42: ...net and Wireless ports Remote Device IP Address Select the IP address of the remote device Ensure this address is not the same as any other device on the Ethernet or Wireless networks RS 232 RS485 Ser...

Page 43: ...before packet is sent via network Packet Size The number of received bytes that will be buffered before a packet is sent via the network Modbus Server Port Enter the TCP port number of the remote serv...

Page 44: ...and port i e 224 0 1 1 5000 The Scada then communicates with the remotes using TCP via the IP address of the Multicast Manager and the port selected in the configuration i e 5001 Multicast Pipe Manag...

Page 45: ...Registers is summarized in the table below Each register is internally saved as a 16 bit unsigned integer value A Modbus transaction may access the entire 16 bit value of any register or alternatively...

Page 46: ...irected to from the onboard general purpose I O registers The Modbus TCP Server is shared with the Modbus TCP to RTU Gateway so that the Modbus Device ID is used to determine if a Modbus transaction i...

Page 47: ...at C to the onboard digital output at B Local Register 4320 specifies the register for the onboard digital output at B since B is the local unit at which the mapping is configured I O Count 1 specifi...

Page 48: ...e up the registers and also slightly increase processing resources Log background Noise RSSI BGND on Rx messages are made available in the diagnostic registers Section 4 9 Internal diagnostics Modbus...

Page 49: ...Passive Scanning STA only Selecting this item stops a Client device from sending probe request messages when it is searching for an access point to connect to Instead the client waits for a beacon tr...

Page 50: ...nd buffered for retransmission when complete It is therefore recommended the scan list is used to limit the number of channels the client needs to scan thus reducing the overall scan time During the b...

Page 51: ...rks Since WDS bridge interfaces generally do not require IP address configuration they inherit the IP address of the standard wireless interface A WDS router interface allows traffic to be routed to a...

Page 52: ...ntly selected entry in the WDS Connections table To select a row click anywhere in the row with the mouse to highlight the entire row Connection Mode Specify the connection mode for this link AP Downl...

Page 53: ...s could be added to the chain in a similar way Figure 42 Site B WDS Configuration 1 The WDS configuration for unit B is shown above this page is accessible via the Repeaters link from the configuratio...

Page 54: ...evious Access Point The diagram above shows a bridging network with a number of Access Points all with the same SSID network structure etc so as the Stations can freely roam between Access Points Each...

Page 55: ...ssign higher priority values to interfaces that you want spanning tree to select first and lower priority values to interfaces that you want spanning tree to select last If all interfaces have the sam...

Page 56: ...tions that do not require redundancy Figure 48 WDS Routed Each Modem has a different SSID This is done to limit broadcast traffic and to route data only were it needs to go Site B has two Virtual Clie...

Page 57: ...opposed to an individual host IP The same rule specifies the address 192 168 0 3 as the gateway address The routing rule effectively tells the WI MOD E that any traffic destined for the network 192 1...

Page 58: ...nly specify the Access Point as their default gateway i e they require no routing rules be configured However for the Access Point to be able to deliver traffic to LAN B and LAN C it needs to have rou...

Page 59: ...e added to the wired Ethernet LAN in place of generating adding routing rules into the modems Name A name that describes the routing rule Max 32 characters Destination The destination network or host...

Page 60: ...the wired Ethernet port of the configured WI MOD E The Filter comprises of three lists MAC Addresses IP Address Protocol Port and ARP Filters Each list may be set as either a Blacklist to block traffi...

Page 61: ...intermediate WI MOD E units Whitelist filters may be required for correct operation If an erroneous configuration has prevented all access to the module SETUP mode can be used to restore operation MA...

Page 62: ...requests for high use addresses Select Blacklist or Whitelist Blacklist will prevent all listed devices from accessing the module and using the radio link Whitelist will allow devices with the IP addr...

Page 63: ...number of seconds the client is granted the assigned IP address The client should renew its lease within this time 3 22 DNS Server Configuration DNS Domain Name Service allows devices to be given hum...

Page 64: ...acket is passed to a VLAN group a VLAN Tag is added When one or more VLAN Groups have been configured VLAN Pass through is disabled and VLAN Aware Mode is enabled VLAN Aware Routing Mode Same as VLAN...

Page 65: ...descriptive only and serves no functional purpose VLAN ID A valid 12 bit IEEE802 1Q VID with a range of 1 4095 The VLAN ID will be added to all outgoing VLAN tagged frames for this VLAN Group All inco...

Page 66: ...ged When tagged is specified all incoming frames must have a VLAN tag with VLAN ID matching the configured VLAN ID for the VLAN Group all outgoing frames on this interface will have a VLAN tag added w...

Page 67: ...ge wi0 the second wi1 and third wi2 are virtual interfaces created on the Repeaters page Each interface is configured as an Access Point and can be setup with unique SSID s and Encryption settings etc...

Page 68: ...lar VLAN s by assigning membership to one or more VLAN s groups virtually any possible topology can be achieved Shown below is the configuration for the Multi VLAN example above You will see there are...

Page 69: ...Weidmuller Wireless Ethernet Modem Device Server WI MOD E G A User Manual Rev 2 16 www weidmuller com 69 Figure 61 Example 2 Configuration...

Page 70: ...respectively configuration for these wireless bridges is done from the Repeaters page see example below You can see that all three wireless interfaces are setup as Access Points but are configured wi...

Page 71: ...e if you are using DNS Owner A text field for owner name Contact A text field for owner phone number email address etc Description A text field used for a description of the purpose of the unit Locati...

Page 72: ...Set the Operating Mode to Client Ensure the ESSID and Radio Encryption method match the Access Point If encryption is used ensure the encryption keys or passphrase match the Access Point Client 2 Con...

Page 73: ...ncryption keys or passphrase if necessary Set dipswitch to RUN Click on button Save to Flash and Reset Webpage will display that message indicating details are being written to flash Wait for WI MOD E...

Page 74: ...down until the fault is rectified During Module boot up the OK LED flashes RED GREEN until the boot sequence is complete Boot Status LED Indication during Start up The OK LED indicates the status of t...

Page 75: ...802 11 Standard Site Survey Site Survey is a one off snapshot showing what Access Points are available for connection This list is only available on Clients and only available at start up of the modul...

Page 76: ...sy and Percent Rx on the Custom Survey page If possible also temporarily disable all data transfer on the system and if the Channel Utilisation remains high this will confirm the presence of interfere...

Page 77: ...dem is receiving valid data from another modem 3 The connected modem has detected RF noise or interference Channel Survey shows the Channel Utilisation and Noise Floor Graph with 1 second 1 minute and...

Page 78: ...Percent Radio RX Any DSSS or OFDM messages received by the radio basically any Standard Wi Fi data packets from either WEIDMULLER or competitor radios Percent Busy CCA or Noise Clear Channel Assessmen...

Page 79: ...the amount of other noise that is being received From this you can see that in the last 60 second period there was a 20 second interval with around 60 80 channel Utilisation in this case from a 2 4GH...

Page 80: ...s long as you compare the measured result against the expected result in the table See APPENDIX D External Iperf Test for details on running this application externally Internal Throughput Test Before...

Page 81: ...on a laptop or PC at both ends of the link The following table shows real world throughput estimates based on channel selection and receiver signal levels Throughput is calculated using the inbuilt I...

Page 82: ...Ext 16 8 0 4 0 2 0 10 5 5 3 2 6 1 3 6 0 3 0 1 5 0 8 3000m Int 10 5 0 2 5 1 3 7 0 3 5 1 8 0 9 4 7 2 4 1 2 0 6 3000m Ext 15 7 5 3 8 1 9 9 0 4 5 2 3 1 1 6 0 3 0 1 5 0 8 5000m Int 9 4 5 2 3 1 1 6 0 3 0 1...

Page 83: ...ntervals due to Interference or CCA Beacon Missed Reset Count After 15 Consecutive Beacon misses 1 5seconds will increment by 1 This will indicate high interference as AP is holding off sending Beacon...

Page 84: ...File Menu for future reference and emailing module configuration details to Technical Support in the event of any configuration problems TCP Throughput Test Performs a Throughput Test See section 4 4...

Page 85: ...perf Jperf application can be downloaded from http sourceforge net projects iperf All of the above applications measure the raw data throughput and from this we can determine the amount of interferenc...

Page 86: ...gurable Throughput Low Threshold then the RS485 LED will be red if the measured throughput is less than the Throughput Low Threshold then the RS485 LED will be off Radio Path Test can be accesses by s...

Page 87: ...ration connect a PC to the local module run Internet Explorer and enter the IP address of the remote unit or device name if using DNS the configuration page of the remote module will be shown and chan...

Page 88: ...ess Adaptor wi0 Link Status Inverted 5012 Both Wireless Adaptor wi0 Number Associated Stations for this interface 5013 AP Only Wireless Adaptor wi0 Points to the starting register of the AP s Station...

Page 89: ...al data packet sent on the interface 4520 Both Transmit frames with antenna 1 TX RX 4522 Both Transmit frames with antenna 2 RX 4524 Both Transmitter antenna switches 4526 Both Transmitter on chip ret...

Page 90: ...n come up There will be a certain directory specified unique to your own PC with a flashing cursor at the end At the cursor type the word ping leaving a space and the default IP address for the WI MOD...

Page 91: ...e command ipconfig all Ipconfig lists all of the commands and their usages available for use Arp Displays and modifies the IP to Physical address translation tables used by Address Resolution Protocol...

Page 92: ...elow Access Point Router Settings Client Bridge Settings Gateway IP 192 168 0 1 Gateway IP 192 168 2 51 Ethernet IP 192 168 0 191 Ethernet IP 192 168 2 50 Subnet Mask 255 255 255 0 Subnet Mask 255 255...

Page 93: ...t Output Discrete I O Input Voltage Free Contact 5 Output FET 30Vdc 500mA 5 Ethernet Port Ethernet Port 10 100baseT RJ45 Connector IEEE 802 3 Link Activity Linkc 100baseT via LED Serial Port RS232 DB9...

Page 94: ...CSA Class I Division 2 ATEX IECEx nA IIC Safety IEC 60950 RoHS Compliant UL UL Listed General Size 114 x 140 x 30mm 4 5 x 5 5 x 1 2 Housing Powder Coated Aluminum Mounting DIN Rail Terminal Blocks Rem...

Page 95: ...ink from other devices as much as possible If necessary create a temporary separate radio network to perform the upgrade to remote modules Web based Upgrade Web based firmware upgrade is available fro...

Page 96: ...d so that the signals crossover connecting transmit signal on one side to receiver signals on the other CSMA CA Carrier Sense Multiple Access Collision Avoidance is a listen before talk method of mini...

Page 97: ...ternational unit for measuring frequency equivalent to the older unit of cycles per second One megahertz MHz is one million hertz One gigahertz GHz is one billion hertz The standard US electrical powe...

Page 98: ...and background noise Transmit Power The power usually expressed in mW or dBm that the wireless device transmits at MAC Address Media Access Control address A unique code assigned to most forms of netw...

Page 99: ...hem individually to the IP program layer Although each packet has the same destination IP address it may get routed differently through the network At the other end TCP reassembles the individual pack...

Page 100: ...8 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorithm that takes longer to decode it can provide better security than basic 40 bit 64 bit encryption Wi Fi Wirele...

Page 101: ...s Yes Yes 3 2422 Yes Yes Yes Yes Yes 4 2427 Yes Yes Yes Yes Yes 5 2432 Yes Yes Yes Yes Yes 6 2437 Yes Yes Yes Yes Yes 7 2442 Yes Yes Yes Yes Yes 8 2447 Yes Yes Yes Yes Yes 9 2452 Yes Yes Yes Yes Yes 1...

Page 102: ...5520 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 108 5540 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 112 5560 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 116 5580 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 120 5600 26 dBm 20 dBm n a...

Page 103: ...100 mW 100 mW 3 5470 5725 500 mW 500 mW 250 mW 500 mW 4 5725 5825 4 W 4 W 4 W All Power levels are shown as EIRP Effective Isotropic Radiated Power dB to mWatt Conversion Watts dBm Watts dBm 10 mW 10...

Page 104: ...ation on your PC Extract to zip file to the ROOT directory on your PC i e C This folder contains the main Iperf application as well as the Jperf graphical interface Copy this folder to the 2nd PC or d...

Page 105: ...red Remembering that the theoretical calculations are best case possible results WI MOD E 100 WI MOD E G WI MOD E A WI MOD 945 E 20Mhz WI MOD 9 E WI MOD 805U E 54Mbps 27Mbps 27Mbps 27Mbps 11Mbps 5Mbps...

Page 106: ...irectory and run the Jperf application as shown in Figure 4 The CMD screen will disappear and the Jperf Screen will appear as seen in Figure 5 Figure 4 Figure 5 When Jperf screen appears select Client...

Page 107: ...r you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that ther...

Page 108: ...the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Pr...

Page 109: ...public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to th...

Page 110: ...UTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT N...

Reviews: