background image

 

 

 
 
 
 
 

Operating Manual

 

Phantom II

 

Wireless  Ethernet Bridge/Serial Gateway

 

PN 001-0000-600  Rev A

 

 
 

January 2016

 

 
 
 
 
 
 

 

 

 
 
 
 
 
 
 

 

 

 

299  Johnson  Ave,  Suite 110 

Waseca, MN 56093 

 

Phone:  (800)  992-7774 

Fax: (507)  833-6748 

www.cal amp.c om 

Summary of Contents for Phantom II

Page 1: ...Operating Manual Phantom II Wireless Ethernet Bridge Serial Gateway PN 001 0000 600 Rev A January 2016 299 Johnson Ave Suite 110 Waseca MN 56093 Phone 800 992 7774 Fax 507 833 6748 www calamp com ...

Page 2: ...ser shall indemnifyCalAmp andits respective directors officers employees successors andassigns includingany subsidiaries relatedcorporations or affiliates shall be releasedanddischargedfromany andall manner of action causes of action liability losses damages suits dues sums ofmoney expenses includinglegal fees general damages special damages includingwithout limitation claims forpersonal injuries ...

Page 3: ...which could result in undesired or detrimental consequences Point to Remember Highlights a key feature point or step which is noteworthy Keeping these in mind will simplify or enhance device usage Tip An idea or suggestion to improve efficiency or enhance usefulness Information Information regarding a particular technology or concept UL Listed Models Only When operating at elevated temperature ext...

Page 4: ...nsmitted power in dBm the cabling loss and the antenna gain cannot exceed 36dBm WARNING EQUIPMENT LABELING This device has been modularly approved The manufacturer product name and FCC and Industry Canada identifiers of this product must appear on the outside label of the end user equipment SAMPLE LABEL REQUIREMENT For Phantom II Please Note These are only sample labels different products contain ...

Page 5: ... feed line DC power cable and interface cable must be routed through conduit in accordance with the National Electrical Code Do not connect or disconnect equipment unless power has been switched off or the area is known to be non hazardous Installation operation and maintenance of the transceiver should be in accordance with the transceiver s installation manual and the National Electrical Code Ta...

Page 6: ...ase March 2010 Rev 1 Changes made to properly reflect CalAmp branding April 2010 Rev 2 Rev 3 Changes to section 2 0 and 6 0 Appendix B Added IP Discovery Appendix A Sec 3 1 2 Firmware Upgrade February 2011 May 2011 Rev A Added UL Certifications January 2016 ...

Page 7: ...2 2 2 Device Connections 16 2 2 3 Serial Configuration 16 2 2 4 Master Configuration 17 2 2 5 Remote Configuration 18 2 2 6 Check Connectivity 19 3 0 Hardware Features 20 3 1 Overview 20 3 1 1 Phantom II Mechanical Drawings 21 3 1 2 Connectors Indicators 22 3 1 2 1 Front 22 3 1 2 2 Rear 23 4 0 Operating Modes 24 4 1 Master 24 4 2 Repeater 24 4 3 Remote 24 5 0 Network Topologies 25 Note This sectio...

Page 8: ...dmin Password Configuration 104 6 1 8 2 Upgrade Password Configuration 105 6 1 8 3 Wireless Encryption Configuration 106 6 1 8 4 UI User Interface Access Configuration 110 6 1 8 5 Authentication Configuration 112 6 1 8 6 Firewall Configuration 115 6 1 8 6 1 Policies 116 6 1 8 6 2 Rules 119 6 1 8 6 3 Port Forwarding 123 6 1 8 6 4 MAC List 125 6 1 8 6 5 Blacklist 127 6 1 8 6 6 Reset Firewall to Fact...

Page 9: ... continued Appendices Appendix A IP Discovery Utility 154 Appendix B Upgrade Procedure DOS Prompt 155 Appendix C RS485 Wiring 158 Appendix D Serial Interface 159 Appendix E Customer Interface Schematic 160 Appendix F UL Certifications 163 ...

Page 10: ...an RS232 RS422 or RS485 interface The small size and superior performance of the Phantom II makes it ideal for many applications Some typical uses for this modem A SERIAL GATEWAY allows asynchronous serial data to enter as through a gate the realm of IP communications The serial data is encapsulated within UDP or TCP packets SCADA Remote telemetry Traffic control Industrial controls Remote monitor...

Page 11: ...21 kbps Advanced serial port supports legacy serial devices including RTS CTS DSR DTR and DCD Easy to manage through web or text based user interface or SNMP Wireless firmware upgrades System wide remote diagnostics 32 bit CRC selectable retransmission Advanced security features Industrial temperature specifications DIN rail mountable Optional Class 1 Div 2 Supporting co located independent networ...

Page 12: ... a pow er supply that does not provide proper voltage or current may damage the modem Tip Future enhancements of the Phantom II products may require higher current requirements than listed It is good design practice to over spec pow er supplies to allow for future design options Serial Baud Rate 300 bps to 921 kbps USB USB 2 0 Ethernet 10 100 BaseT Auto MDI X IEEE 802 3 Link Rate 345 kbps or 1 2 M...

Page 13: ...onmental Operation Temp 40o F 40o C to 170o F 75o C Humidity 5 to 95 non condensing Mechanical Dimensions 2 25 57mm X 3 75 95mm X 1 75 45mm Weight Approx 237 grams 8 oz Antenna Reverse Polarity TNC RP TNC connector Data etc AVX Kyocera 5046 Series 60 pin board to board connectors ...

Page 14: ...IP Address 192 168 1 254 Subnet Mask 255 255 255 0 Gateway 192 168 1 1 PC with NIC Ethernet card Ethernet cable If your PC does not support Auto MDIX you will need to use a crossover cable 2 1 2 Device Connections To ensure that the Phantom II unit is at its DEFAULT factory settings once it has powered up and the Status LED is ON after 1 minute press and hold the front CFG button for 8 seconds the...

Page 15: ... Operation Mode Select Point to Point as the Network Type Submit 2 1 5 Remote Configuration Repeat the above for the other Phantom II giving it a new unique IP Address By default the Operation Mode is already configured as a Remote Change the Destination Unit on the Master radio to match the Unit Address of the Remote radio Submit 2 1 6 Check Connectivity With both units powered on in proximity to...

Page 16: ...SB adapter Diagnostic serial cable DB9 DB9 Ethernet cable If your PC does not support Auto MDIX you will need to use a crossover cable 2 2 2 Device Connections Connect Rubber Ducky to the antenna port of each Phantom II Connect power adapters to 120 VAC outlets and to each Phantom II Using a diagnostic serial cable connect the DIAGNOSTICS port of the Phantom II that will be the MASTER device to an...

Page 17: ... a network LAN check with the Network Administrator for an available static IP address es so as not to potentially create an IP address conflict Select C Enter Subnet Mask Select D Enter IP Gateway Press Enter Press U to SAVE the configuration changes Press Esc twice to return to the MAIN MENU Select C Radio Configuration Select B Operation Mode Select A Master Select I Network Type Select B Point...

Page 18: ...n Press Enter Select B Network Configuration Select A Local IP Config Select B Enter IP Address Select C Enter Subnet Mask Select D Enter IP Gateway Press Enter Press U SAVE the configuration changes Press Esc twice to return to the MAIN MENU Select C Radio Configuration Select F Unit Address Enter number 20 Press Enter Select I Network Type Select B Point to Point Press U to SAVE the configuratio...

Page 19: ...ld be illuminated With the PC connected to one of the Phantom II units with an Ethernet cable open a web browser and enter the IP Address of the other unit to verify a wireless connection To simulate data traffic over the radio network connect a PC to the Ethernet port of the Phantom II and PING each unit in the network multiple times ...

Page 20: ... be mounted anywhere for a permanent solution Power Data Serial Interface Ethernet Interface USB Interface Indicators Antenna Any Phantom II may be configured as a Master Repeater or Repeater Remote or Remote This versatility is very convenient from a sparing perspective as well for convenience in becoming very familiar and proficient with using the module if you are familiar with one unit you wil...

Page 21: ...m II Mechanical Drawings Image 3 2 Phantom II Top View Image 3 3 Phantom II Front View Back View Image 3 4 Phantom II Back View Notes The dimension unit is inches Phantom II STATUS USB DIAGNOSTI C RSSI TX RX CONFIG Front View PhantomII Top View Front ANTENNA RS485 422 DATA ETHERNET TxB TxA RxB RxA G N D Vin ...

Page 22: ...tion Note If the unit has been powered up for some time 1 minute depressing the CFG Button for 8 seconds will resultin FACTORY DEFAULTS being restored including a static IP address of 192 168 1 254 This IP address is useable in a Web Browser for accessing the Web User Interface TX LED Red RX LED Green When illuminated the TX LED indicates that the modem is transmitting data over the air and the RX...

Page 23: ...ot provide proper voltage may damage the modem The RS422 485 Port is used to interface the Phantom II to a DTE with the same interface type Either the RS232 or RS422 485 interface is used for data traffic Vin Vin is used to power the unit The inputVoltage range is 7 30 VDC Table 3 2 Data RS232 Pin Assignment Green Conn Pin No Name Input or Output 1 TxB D O 2 TxA D O 3 RxB R I 4 RxA R I 5 Vin 6 Vin...

Page 24: ...r more Repeaters within a network will HALVE the throughput the throughput is halved only once i e it does not decrease with the addition of more Repeaters If there is a radio signal path requirement to provide Repeater functionality but throughput is critical the repeating function may be accomplished by placing two Phantom II modems at the Repeater site in a back to back configuration One Phanto...

Page 25: ...Point B a Remote Such a PTP network may also involve one or more Repeaters in a store and forward capacity should the radio signal path dictate such a requirement A PTP configuration may also be used in a more dynamic sense there may be many Remotes and Repeaters within such a network however the Master may have its Destination Address changed as and when required to communicate with a specific re...

Page 26: ...Phantom II CalAmp 26 5 0 Network Topologies Example 5 1 1 Image 5 1 PTP Example 5 1 1 Master Image 5 2 PTP Example 5 1 1 Remote ...

Page 27: ...uch Repeaters may be referred to as Repeater Remotes Example 5 2 1 A 4 node network consisting of a Master 1 Repeater and 2 Remotes 1 Remote is to communicate with the Master through a Repeater the other is to communicate directly with the Master Image 5 3 PMP Example 5 2 1 Master Refer to Section 6 1 5 for importantinformation regarding the configuration of a PMP Master s Retransmissions There is...

Page 28: ...ther The ROAMING address for the REPEATER is set to 1 the UNIT ADDRESS of the MASTER This means that this REPEATER will synchronize to and communicate directly with the MASTER There is no DESTINATION UNIT field for remote units in a PMP network the destination is predefined as 1 the MASTER point On the following page are the configurations for the REMOTES Remote 20 s ROAMING ADDRESS is set to 2 th...

Page 29: ...Phantom II CalAmp 29 5 0 Network Topologies Example 5 2 1 continued Each modem in anynetwork musthave a unique Unit Address Image 5 5 PMP Example 5 2 1 Remote 20 Image 5 6 PMP Example 5 2 1 Remote 30 ...

Page 30: ...P2P mode is transferred via the Master The Master will resend the data incoming to it from both Remotes to both all Remotes one Remote s data has a Destination Unit being the other Remote and vice versa Example 5 3 1 A device located at a pump station must communicate bi directionally with another device at a water tank The MASTER Phantom II must reside in an office at a separate location Image 5 ...

Page 31: ...Phantom II CalAmp 31 5 0 Network Topologies Example 5 3 1 continued Image 5 8 P2P Example 5 3 1 Remote 25 Image 5 9 P2P Example 5 3 1 Remote 35 ...

Page 32: ...mitted from remote units in an E2E network travels to the Master and is then re broadcast to all other remotes Considering the amount of data re broadcasting via the Master it is a very bandwidth intensive network topology Example 5 4 1 1 Master and 3 remote units must all communicate with each other Image 5 10 E2E Example 5 4 1 Master There is no DESTINATION UNIT configuration option as the DESTI...

Page 33: ...unit must have its own unique Unit Address Image 5K E2E Example 5 4 1 Remote The Remotes will all be configured as per the above screen cap ture with the exception of the UNIT ADDRESS Each Remote of the 3 in this example must have its own unique UNIT ADDRESS e g 50 51 and 52 ...

Page 34: ...e network data interface requirements Components involved in the configuration process of the Phantom II interfacing with the modem and selecting and inputting the desired operational parameters All configuration of the Phantom II is accomplished with a PC as shown in Section 2 0 There are no DIP switches to set switches which may subsequently become inadvertently misadjusted or intermittent ...

Page 35: ...remember the User Name or Password Image 6 1 Logon Window The factory default User Name is admin The default password is admin It is advisable to change the login Password see Section6 1 6 1 Do not FORGET the new password as itcannotbe recovered Note that the password is case sensitive It may be changed discussed further along in this section but once changed if forgotten may not be recovered ...

Page 36: ...rd The Remember my password checkbox may be selected for purposes of convenience however it is recommended to ensure it is deselected particularly once the unit is deployed in the field for one primary reason security Image 6 2 Logon Window With Password Input Soft Buttons OK Inputs the selected values into the Phantom II for processing Cancel Cancels the logon process ...

Page 37: ...tem Configuration menu This name quickly confirms the identity of the unit being perused and appears in all menu windows Image 6 3 Welcome Window Also displayed is various version information Hardware Version applicable to the motherboard of the Phantom II Software Version this software resides on the motherboard and is also referred to as the unit s firmware ...

Page 38: ...configuration options Image 6 4 System Configuration Window System Operation Mode The radio button options presented here determine whether the Phantom II unit will operate at a BRIDGE or a ROUTER Only a MASTER unit should ever be configured as a router Select the System Operation Mode first i e prior to configuring other options within the unit Values Bridge Bridge Router ...

Page 39: ...s a convenient cross reference for the unit s IP address This name appears in all menu windows It has no bearing on the unit s operation User up to 30 characters Date yyyy mm dd The calendar date may be entered in this field Note that the entered value is lost should the Phantom II lose power for some reason Values valid date values where yyyy 4 digit year mm 2 digit month dd 2 digit day Time hh m...

Page 40: ...00 00 valid time values where hh 2 digit hours mm 2 digit minutes ConsoleTimeout s This value determines when the console connection made via COM2 will timeout after becoming inactive Values 60 0 65535 seconds Traffic Watchdog Timer s The Traffic Watchdog Timer will reset the unit if there has been no RF activity in the configured time 0 Disabled default Values 0 0 65535 seconds Values ...

Page 41: ...ut the setting will not be overwritten Enable Disable Soft Buttons Synchronize with NTP Server Useable to have related parameters on this page updated with current time values when valid NTP Server information has been configured and the service is enabled within the modem see Section 6 1 4 2 for additional information Submit Write parameter values into Phantom II memory Reset Restore currently mo...

Page 42: ...munications network aspect of the system however be mindful of the Network Type Radio Configuration menu as that dictates the possibilities for the flow of network data For a basic implementation only the Local IP Configuration submenu options need to be defined Image 6 5 Network Configuration Top Level Menu The Ethernet MAC address as displayed above is that of the ETHERNET interface located at t...

Page 43: ...es unique IP addresses are assigned from a central point DHCP server within a network Disadvantage The address of a particular device is not known and is also subject to change STATIC addresses mustbe tracked to avoid duplicate use yet they may be permanently assigned to a device given a static unchanging IP address Once the above is ascertained the items within this submenu may be configured Imag...

Page 44: ...ssigned to the Phantom II if STATIC IP address mode has been selected enter a suitable value for the specific network Within any IP network each device musthave its own unique IP address Values 192 168 1 254 valid value is specific to the network Subnet Mask A SUBNET MASK is a bit mask that separates the network and host device portions ofan IP address The unmasked portion leaves available the inf...

Page 45: ... II modems are being used make the gateway of Phantom II No 1 IP address of Phantom II No 2 gateway of Phantom II No 2 IP address of Phantom II No 1 The idea behind this approach is If a Phantom II at one end of a wireless link receives a packet it is unsure where to send send it to the other end of the wireless link i e the other Phantom II where it was quite likely destined A simple way of looki...

Page 46: ...red DNS Server If DNS Mode is static enter valid IP Address of accessible Preferred DNS Server in this field Values 0 0 0 0 valid DNS Server IP address Alternate DNS Server If DNS Mode is static enter valid IP Address of accessible Alternate DNS Server in this field Values 0 0 0 0 valid DNS Server IP address Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently ...

Page 47: ...rt at rear of Phantom II unit which may also be considered as the WAN Wide Area Network port The Wireless Port IP Configuration applies to the LAN Local Area Network the LAN consists of the devices and Phantom II units connected to each other via the wireless radio network Image 6 7 Network Configuration Router Local IP Configuration Submenu Refer to the preceding section for configuring the Ether...

Page 48: ...DHCP is not applicable Within any IP network each device musthave its own unique IP address 192 168 2 1 valid value is specific to the network typically a Class C private IP Subnet Mask For a small private network with IP addresses appearing similar to 192 168 1 x Class C address the standard 255 255 255 0 subnet mask may be applicable Values 255 255 255 0 valid value is specific to the network Va...

Page 49: ...0 0 valid DNS Server IP address Alternate DNS Server If applicable enter valid IP address of Alternate DNS Server which exists within the LAN the wireless subnet in this field Values 0 0 0 0 valid DNS Server IP address Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 50: ...guration Router VPN Configuration Submenu A Virtual Private Network VPN may be configured to enable a direct communications link between one device on the WAN and another on the LAN VPN Status Enable default enables the service Disable disables it Values Enable Enable Disable VPN Admin Password Select a unique password of 32 characters maximum case sensitive Values admin 32 characters maximum ...

Page 51: ...f 32 characters maximum case sensitive which was entered in the preceding above field Values admin 32 characters maximum Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 52: ...ENABLED provided there is an NTP server available and its IP address or name is entered in the appropriate field Image 6 10 Network Configuration NTP Server Config Submenu NTP Server Status Note that if NTP Server Status is ENABLED the Synchronize with NTP Server soft button on the System Configuration menu will be available for use Leave as DISABLED default if a server is not available Values Dis...

Page 53: ...Internet access is available is to be entered in this field if the NTP Server Status is configured as ENABLED Values 0 0 0 0 valid NTP server IP address or name Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 54: ... devices which are connected to them If this feature is to be utilized it would be enabled on the Master Phantom II unit noting that such a DHCP Server service must not be enabled on any other Phantom II units or devices which reside on the same network segment With this service enabled on the Master it can assign IP addresses as well as subnet mask and gateway to the LAN radios and IP de vices at...

Page 55: ...e requestof a DHCP Client which receives the information Server Status Choose to enable or disabled the DHCP Server service Note that there can only be one such service residing on a network segment otherwise duplicate IP addresses could be assigned and exist on a network which would result in problems Devices on the network which are intended to receive IP address information from this DHCP Serve...

Page 56: ...specific network Server Netmask In this field input the subnet mask which is to be applied to the network For basic small private networks a Class C subnet mask such as 255 255 255 0 could be used Values 255 255 255 0 valid subnet mask value for specific network Starting Address This is the starting lower boundary IP address of the range of IP addresses also known as IP address pool to be issued b...

Page 57: ...ain name www calamp com for example into the URL line of a web browser the website couldnot be found Input the address of the desired gateway 192 168 2 1 IP address as per above Input the IP address of the Domain Name Service DNS to be provided by this DHCP Server Values WINS Windows Internet Naming Service keeps track of which IP address is assigned to which computer on a Windows network a proces...

Page 58: ...ion menu of that unit An address binding is a mapping between a specific IP address and the MAC address of a specific client 00 00 00 00 00 00 MAC address of target device New Binding IP Enter the IP address from within the range identified with the Starting Address and Ending Address parameters input previously which is to be bound to the MAC address identified in the New Binding MAC field descri...

Page 59: ...enu display showing both the MAC and corresponding IP address Note that the ADD action must be followed by SUBMIT for the changes to be written to the Phantom II memory Delete If binding relationships are present the drop down box to left of Delete soft button may be used to select a particular binding and the DELETE soft button used to delete it Submit Write parameter values into Phantom II memor...

Page 60: ...response to predefined events Objects specific to the Phantom II are hosted under private enter prise number 21703 An object is a variable in the device and is defined by a Management Information Database MIB Both the management system and the device have a copy of the MIB The MIB in the management system provides for identification and processing of the information sent by a device either respons...

Page 61: ...the device Enabled the device now an SNMP agent can support SNMPv1 v2 v3 Values Disable Disable V1 V2 V3 Read Only Community Name Effectively a plain text password mechanism used to weakly authenticate SNMP queries Being part of the community allows the SNMP agent to process SNMPv1 and SNMPv2c requests This community name has only READ priority continued ...

Page 62: ...s SNMPv1 and SNMPv2c requests This community name has only READ WRITE priority Values private character string SNMP V3 User Name Defines the user name for SNMPv3 Values V3user character string V3 User Read Write Limit Defines accessibility of SNMPv3 select either Read Only or Read Write priority If Read Only is selected the SNMPv3 user may only read information if Read Write is selected the SNMPv3...

Page 63: ...tion encryption Values NoAuthNoPriv NoAuthNoPriv AuthNoPriv AuthPriv V3 Authentication Password SNMPv3 user s authentication password Only valid when V3 User Authentication Level set to AuthNoPriv or AuthPriv see above Values 00000000 character string V3 Authentication Password SNMPv3 user s encryption password Only valid when V3 User Authentication Level set to AuthPriv see above Values 00000000 ...

Page 64: ...arm condition occur Values V1 Traps V1 Traps V2 Traps V3 Traps V1 V2 Traps V1 V2 V3 Traps Auth Failure Traps If enabled an authentication failure trap will be generated upon authentication failure Values Disable Disable Enable Trap Community Name The community name which may receive traps Values TrapU ser character string ...

Page 65: ...ere traps will be sent to e g SNMP management system PC IP address Values 0 0 0 0 applicable host s IP address Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 66: ...of a loop being created a loop could create endless traffic around a LAN consuming much of the bandwidth Note that this menu item will not appear if the Phantom II unit is configured to be a router Image 6 13 Network Configuration Bridge Config Submenu Spanning Tree Protocol Status Selection of STP operational status within the Phantom II On or Off Values Off On Off Soft Buttons Submit Write param...

Page 67: ...ous data which enter the Phantom II This section describes configuring QoS for data which enters via the Ethernet port Image 6 14 Network Configuration Quality of Service Submenu Quality of Service Status If Enabled the defined protocols and ports will have the QoS service applied to them Values Disable Disable Enable To define particular ports protocol and priority to be assigned see the example ...

Page 68: ...ton Click the SUBMIT soft button The following screen capture shows the result of the above actions Image 6 15 Network Configuration QoS Example The mini window shows port 8080 TCP traffic as having High Priority To apply the configuration select Enable and SUBMIT As ports are defined the mini window and list boxes specific to Priority become populated To DELETE any defined port simply select it v...

Page 69: ...back to the wireless interface Packets that contain the master unit destination MAC address are forwarded to the master unit s Ethernet port not the wireless interface In comparison to Everyone to Everyone mode this mode consumes less bandwidth and therefore is more efficient Values Disable Disable Enable Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently mod...

Page 70: ... configuration the network topology must be known see Section 5 0 the role operating mode of the specific Phantom II must also be known Image 6 16 Radio Configuration Menu upper portion Network Search Mode The above screen capture depicts Radio Configuration menu option with Network Search Mode disabled The screen capture shows what configuration options are available when Network Search Mode is e...

Page 71: ...tion with Network Search Mode Enabled With Network Search Mode enabled Master units with the same authentication key may be found by Remote units even if they have different network names This feature which must be enabled on all participating units allows for roaming between networks Values Disable Disable Enable ...

Page 72: ...g when there is a long distance between the latter units or may act as a Repeater Remote in which case the above function is performed AND the unit may also exchange data as a Remote within the network If 1 or more repeaters are to be in a network on the Master only the Repeater s YES configuration must be selected If 2 or more repeaters are to be in a network the above YES setting applies as does...

Page 73: ...th their own unique network address to operate in the same area without the possibility of undesired data exchange between networks The Network Name can also be used as the single parameter to change when a Remote is to switch from operating between distinct networks The Network Name is also taken into consideration in the frequency hopping algorithm change the Network Name and the hopping pattern...

Page 74: ...ues number varies 2 65534 RF Output Power This setting establishes the transmit power level which will be presented to the antenna connector at the rear of the Phantom II FCC regulations allow for up to 36dBi effective isotropic radiatedpower EIRP The sum in dBm of the transmitted power the cabling loss and the antenna gain cannot exceed36dBm Unless required the RF Output Power should be set not f...

Page 75: ...uccessful See also PMP with ACK described in the Network Type below PTP Phantom II will retransmit to its counterpart only if necessary and to a maximum number of the value specified in its Retransmissions field Packet is discarded if retransmissions are not successful Values 1 0 255 Network Type Defines the type of RADIO network see Section 5 0 for a detailed description of network topologies ALL...

Page 76: ...d the packets it sends to the Remotes result in an ACK being received by each of the Remotes in the network the Master will not send the data again refer to the PMP behavior described in the preceding Retransmissions section If however the Master does NOT receive an ACK from all Remotes in the network it will then revert to sending the data again to the maximum number of Retransmissions specified ...

Page 77: ...r a Remote the Master in the Master s Radio Configuration specify the Unit Address of the Remote Unit to which it is to send its data In Peer to Peer the Remotes are configured with the target peer s UA as the Destination Address the Master with 65535 In Everyone to Everyone the Destination Address for ALL units is 65535 the broadcast address as every unit sends its data to every other unit throug...

Page 78: ...is ability is particularly well suited to mobile applications 1 254 In most static fixed networks where there are no Repeaters the default value of 1 is maintained All Remotes synchronize to the Master whose unit address is 1 In networks where Repeaters are present the value of a Remote s Roaming Address typically corresponds to the particular upstream modem with which a particular Remote is inten...

Page 79: ...epeater site eliminates the division ofbandwidth If there is more than one Repeater in a network the Repeaters should be registered See Repeater Registration further along in this section re how to accomplish this This setting applies to the Master only The default value is No stating there are no Repeaters in the network If there are 1 or more Repeaters in the network configure this setting as Ye...

Page 80: ...ction dictates within which band zone of frequencies that a particular unit will operate Using zones simplifies network deployment by providing a convenient reference e g Zone 1 within which a given network can operate thereby minimizing the potential for internetwork interference This is particularly useful when used in conjunction with Network Search Mode to facilitate minimal interference among...

Page 81: ...06 000 927 200 927 600 7 902 400 906 800 8 912 800 917 200 Table 6 1 Restricted Bands for UA1 at 345 kbps Link Rate Zone No Restrict From Start MHz Restrict To End MHz Restrict From Start MHz Restrict to End MHz 1 909 750 926 250 2 902 400 905 250 912 750 926 250 3 902 400 908 250 915 750 926 250 4 902 400 911 250 918 750 926 250 5 902 400 914 250 921 750 926 250 6 902 400 917 250 924 750 926 250 ...

Page 82: ...does not apply if the Link Rate is 345 kbps because of the 64 channels that are available the unit must hop on exactly 50 there is not option to either increase or decrease this amount Values 16 4 16 Scrolling down the Radio Configuration menu on a remote reveals further configuration options Frequency Restriction and Repeater Registration Typically the former is not required the latter only appli...

Page 83: ...ll wakeup from Ethernet port or radio data if Radio Awake Time is a nonzero value Power consumption is about 30 40mA 12VDC Power Shutdown Timer control shutdown mode Controlled by Radio Awake Time and Radio Sleep Time parameters System will reboot when the radio wakes up Power consumption is about 1mA 12 VDC Values No Sleep No Sleep Auto Wakeup Serial Port Wakeup Ethernet Port Wakeup Power Shutdow...

Page 84: ...II will hop on frequencies across the entire 902 928 MHz ISM band For some applications or within certain operating environments it may be desired to prohibit the modem from operating on specific frequencies or range s of frequencies All modems in the network must have the same frequency restriction configured within them The modem will not allow too many frequencies to be restricted it requires a...

Page 85: ...l range of channels or a combination thereof A number of input fields may be used or a combination of restrictions input in one field Use the Radio Channels Noise Level tool see Section 6 1 10 4 to help identifythe frequency range of possible interfering signals within the 902 928MHz ISM band and then use the FrequencyRestriction feature to configure the Phantom II to avoid them The image below sh...

Page 86: ...2 4MHz Therefore to calculate the frequency of channel n Freq channel n 902 4 n 1 x CW MHz Use the provided table below to calculate the channel number Link Rate Star Freq MHz Channel Space MHz of Channels 345 kbps 902 400 400 63 1 2 Mbps 903 750 1 500 15 Example The frequency of channel 78 of a unit using a link rate of 230kbps is Freq channel 78 902 4 78 1 x 0 280 902 4 77 x 0 280 902 4 21 56 92...

Page 87: ...he Channel Number is to be decreased from 16 to 13 as per the following example image below Image 6 20 Frequency Restriction 1 2 Mbps The Frequency Restriction value must be input into EVERY MODEM in a network Oftentimes the applicable Unit Address as input in the format detailed previously will be 1 indicating that that the Master modem to which other units synchronize will not be transmitting on...

Page 88: ...s if there is more than 1 Repeater in a network ALL Repeaters must be registered in EVERY Phantom II The following image depicts an example Image 6 21 Repeater Registration In the above example there is a total of 3 Repeaters in the system with Unit Addresses of 7 18 and 25 Again these Repeater UAs must be added into each every Phantom II Repeater Registration field Format x y z where x y and z ar...

Page 89: ... II CalAmp 89 6 1 Configuration Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 90: ...e Phantom II network on another Phantom II serial port COM1 is a full featured RS232 interface dedicated to serial data traffic It supports hardware handshaking By default this port is enabled COM2 is by default disabled In this state it may be used as the console port for the text user interface Enabled it becomes another serial port for data traffic It is a 3 wire TxD RxD and SG interface and do...

Page 91: ...abled console mode via the serial connection to it the escape sequence of may be entered at the Data Baud Rate for which the port is configured Values Enable Enable Disable ChannelMode Determines which rear of unit serial interface shall be used to connect to external devices RS232 RS485 or RS422 This option applies only to COM1 When an interface other than RS232 is selected the DE9 port will be i...

Page 92: ...o communicate with the attached local asynchronous device COM2 data baud rate maximum is 115200 bps 9600 bps 230400 115200 57600 38400 28800 19200 14400 9600 7200 4800 3600 2400 1200 600 300 460800 and 921600 may be selected for RS422 or RS485 Channel Modes Data Format This setting determines the format of the data on the serial port The default is 8 data bits No parity and 1 Stop bit Values 8N1 8...

Page 93: ...rdware handshaking leave this setting at the default value of None When CTS Framing is selected the Phantom II uses the CTS signal to gate the output data on the serial port Figure 6A below illustrates the timing of framed output data COM2 does not support Flow Control Drawing 6 1 CTS Output Data Framing Values None None Hardware CTS Framing Pre Data Delay ms Refer to Figure b on the preceding pag...

Page 94: ... MODBUS protocol for example See Character Timeout on the next page for related information Values Transparent Transparent Seamless Character Timeout In Seamless mode this setting determines when the serial server will consider the recently received incoming data as being ready to transmit As per the MODBUS standard Frames will be marked as bad if the time gap between frames is greater than 1 5 ch...

Page 95: ...rate is greater than 19200 bps the minimum character timeout is internally set to 750us microseconds Values 20 0 65535 Maximum Packet Size Defines the buffer size that the serial server will use to receive data from the serial port When the server detects that the Character Timeout criteria has been met or the buffer is full it packetizes the received frame and transmits it Values 1024 1 2048 byte...

Page 96: ...tablished the serial port data is discarded Remote Server Address IP address of a TCP server which is ready to accept serial port data through a TCP connection For example this server may reside on a LAN network server Default 0 0 0 0 Remote Server Port A TCP port which the remote server listens to awaiting a session connection request from the TCP Client Once the session is established the serial...

Page 97: ...cation type e g HTTP uses port 80 IP Protocol Config continued Incoming Connection Timeout Established when the TCP Server will terminate the TCP connection is the connection is in an idle state Default 300 seconds TCP Client Server In this mode the Phantom II will be a combined TCP Client and Server meaning that it can both initiate and serve TCP connection session requests Refer to the TCP Clien...

Page 98: ... ofdata over an IP network It is an efficientmethod of transmitting the same data to manyrecipients The recipients mustbe members ofthe specific multicastgroup TTL Time to Live is the number of hops a packetcan travel before being discarded In the context of multicast a TTL value of 1 restricts the range of the packetto the same subnet Multicast IP Address A valid multicast address this unit uses ...

Page 99: ...ort Most often this is the IP address of the Master Phantom II Default 0 0 0 0 Remote Port The UDP port associated with the Remote IP Address above In the case of this Remote being the Master Phantom II the value in this field should match the Listening Port of the Master see UDP Point to Multipoint P Default 20011 Multicast IP Address A valid MULTICAST address that this unit will use to receive m...

Page 100: ...UDP packets sent by another UDP Multipoint to Multipoint unit Default 224 1 1 1 Listening Multicast Port UDP port that the unit will listen to for multicast UDP packets sent by another UDP Multipoint to Multipoint unit Default 20011 SMTP Simple Mail Transport Protocol is a protocol used to transfer mail across an IP network SMTP Client If the Phantom II network has Internet access this protocol ma...

Page 101: ...tely upon reaching Message Max Size Default 10 Transfer Mode Select how the data received on COM1 is to be sent to the email addressee Options are Text Attached File Hex Code Default Text Note COM2 does not support this mode Values UDP Point to Multipoint MP TCP Client TCP Server TCP Client Server UDP Point to Point UDP Point to Multipoint P UDP Point to Multipoint MP UDP Multipoint to Multipoint ...

Page 102: ... by default If USB Data Mode is selected and there is a desire to switch it back to Disabled console mode via the USB to Serial connection to it the escape sequence of may be entered at the Data Baud Rate for which the port is configured NDIS Mode Provides support for sending and receiving Ethernet frames Mini USB port can be used as a network interface card NDIS Mode is disabled by default This s...

Page 103: ...curityConfiguration There is significant security inherent in the Phantom II proprietary design and technology implementation There are additional security features available both as standard and optional items Image 6 24 Security Configuration Menu ...

Page 104: ...etaining the factory default value of admin Image 6 25 Security Config Admin Password Config Submenu Do not forget the admin password as if lost it cannot be recovered New Password Repeat Password Values admin character string Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II me...

Page 105: ...person It is recommended that the default password be changed when the system is deployed Image 6 25 Security Config Upgrade Password Config Submenu New Password Repeat Password Values admin character string Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 106: ...T High level is optional within North America Contact CalAmp for more information Medium and High levels are discussed further in this section Image 6 26 Security Config Wireless Encryption Config Submenu Encryption Status By default the Encryption Status is Disabled If Enabled a number of Encryption Types are available requiring varying amounts of configuration Values Disable Enable Disable ...

Page 107: ...t effected by the compression process WEP 64 bit Wired Equivalency Protocol WEP encryption adds some overhead to the data thereby negatively effecting throughput to some degree WEP Wired Equivalency Privacy is a securityprotocol defined in 802 11b It is commonlyavailable for Wi Fi networks and was intended to offer the equivalentsecurityofa wired network however it has been found to be notas secur...

Page 108: ...000 Key Phrase These Keys are used to encrypt and decrypt the data Leave selected via radio button the Key number that the network is to use Default 0000000000 WEP 128 bit 128 bit encryption offers stronger encryption that 64 bit but adds more overhead on the data The configuration for WEP 128 bit is the same as for 64 bit see the preceding text WPA Wi Fi Protected Access provides stronger encrypt...

Page 109: ...y strong encryption with a Key length double that of 128 bit AES Basically the same configuration as for WEP applies Input up to 4 unique Keys of 32 characters each Values Compression WEP 64 bit WEP 128 bit WPA AES 128 bit AES 256 bit optional for North America Soft Buttons Generate Key applicable to WEP and AES modes Click to have a selected Key generated based upon a user input Key Phrase Submit...

Page 110: ...tocol for transferring data between a Web server and a Web browser The Phantom II has a built in Web server SSH Secure Shell A protocol used to create a secure connection between two devices It provides authentication and encryption Designedas a replacementfor Telnet which is notsecure 6 1 8 4 UI User Interface Access Configuration User Interface UI Access Configuration By default all UI access op...

Page 111: ...ure HTTP over SSL A protocol used for the secure using encryption and decryption transfer ofWeb pages Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II memory ...

Page 112: ...te Authentication Dial In User Service An authentication authorization and accounting protocol which may be used in network access applications A RADIUS server is used to verifying that information is correct RADIUS authentication using a specific user name and password supplied by your RADIUS Server Administrator this authentication would be done remotely by a RADIUS Server if this authentication...

Page 113: ...al RADIUS Server IP In this field the IP address of the RADIUS server is to be entered if RADIUS Local has been selected as the Authorization Mode Values 0 0 0 0 Valid RADIUS server IP address RADIUS Server Port In this field the applicable Port number for the RADIUS Server is to be entered if RADIUS Local has been selected as the Authorization Mode Normally a RADIUS Server uses Port 1812 for the ...

Page 114: ...e applicable RADIUS User Name from your RADIUS Server Administrator Values nosecret Specific RADIUS Server secret Repeat RADIUS Secret See above Re enter RADIUS Secret in this field Values nosecret Specific RADIUS Server secret RADIUS Timeout Amount of time to wait for RADIUS authentication Values 10 1 65535 seconds Soft Buttons Submit Write parameter values into Phantom II memory Reset Restore cu...

Page 115: ... the network This security feature differs from those discussed in the UI Configuration section the UI Configuration is specifically for configuring the Phantom II User Interface and related protocols Image 6 30 Security Config Menu Firewall Configuration Submenu Firewall Status Disabled by default When enabled the firewall settings are in effect Values Disable Enable Disable ...

Page 116: ...age 6 31 Firewall Configuration Policies Config Submenu Source Zone Select the zone which is to be the source of the data traffic WAN applies to the wired connection and LAN to the wireless on all Phantom II units whether a Master Repeater or Remote Values WAN LAN FW VPN all ...

Page 117: ... II units whether a Master Repeater or Remote Values WAN LAN FW VPN all Policy Select the policy action which is to apply ACCEPT traffic is the default DROP results in a silent drop of the traffic whereas REJECT will result in a message e g destination unreachable being sent from the intended destination back to the source Values ACCEPT DROP REJECT QUEUE future use CONTINUE future use NONE future ...

Page 118: ... 6 0 Configuration Log If in the Policy configuration DROP or REJECT has been selected this field may be defined as to how to tag associated messages Values No Emergency Alert Critical Error Warning Notice Information Debug ...

Page 119: ...Policies They are configured to fine tune firewall settings Image 6 32 Firewall Configuration Rules Config Submenu Action Define the action which is to be taken by the defined rule Values ACCEPT ACCEPT future NONAT future DROP REJECT DNAT SAME future REDIRECT future CONTINUE future LOG QUEUE future ...

Page 120: ...IP If a valid IP address is specified the action will apply against that address otherwise leaving the default value of 0 0 0 0 in this field results in the action applying to all source IP addresses Values 0 0 0 0 valid IP address Destination Zone Select the zone which is the intended designation of the data traffic WAN applies to the wired connection and LAN to the wireless on all Phantom II uni...

Page 121: ...stom Service or select from a long listing of predefined services Destination IP If a valid IP address is specified the action will apply against that address otherwise leaving the default value of 0 0 0 0 in this field results in the action applying to all destination IP addresses Values 0 0 0 0 valid IP address Destination Port This field is configured if defining a Custom Service ref Select Ser...

Page 122: ... is configured if defining a Custom Service ref Select Service field Values TCP TCP SYN UDP ICMP IPP2P IPP2P UDP IPP2P all All Comment This is simply a field where a convenient reference or description may be added to the rule Values Rule 1 descriptive comment ...

Page 123: ...ewall Configuration Port Forwarding Config Submenu Internal Server IP Enter the IP address of the intended internal i e on LAN side of Phantom II unit configured as a Router server Values 192 168 2 5 valid IP address Internal Port Target port number of internal server Values 0 valid port number ...

Page 124: ...antom II unit configured as a Router server Values TCP TCP SYN UDP ICMP IPP2P IPP2P UDP IPP2P all All External Port Port number of incoming request from WAN side device Values 0 valid port number Comment This is simply a field where a convenient reference or description may be added to the rule Values Forward 1 descriptive comment ...

Page 125: ...4 Firewall Configuration MAC List Config Submenu WAN MAC List Status Enable or disable the WAN MAC list List takes precedence over Rules Values Disable Enable Disable LAN MAC List Status Enable or disable the LAN MAC list List takes precedence over Rules Values Disable Enable Disable ...

Page 126: ...be added to the list Values 00 00 00 00 00 00 valid MAC address Disposition Determines the action to be taken on data traffic associated with the specified MAC address Values ACCEPT DROP REJECT Interface Select which interface the defined MAC address is connected to Values WAN LAN ...

Page 127: ...cklist Configuration Submenu WAN Blacklist Status Enable or disable the WAN blacklist List takes precedence over all other firewall settings Values Disable Enable Disable LAN Blacklist Status Enable or disable the LAN blacklist List takes precedence over all other firewall settings Values Disable Enable Disable ...

Page 128: ...2 168 1 5 valid IP address 6 1 8 6 6 Reset Firewall to Default Image 6 36 Reset Firewall to Default This menu provides a soft button which when selected will reset the firewall settings to factory defaults Soft Buttons Restart Firewall Now Submit Write parameter values into Phantom II memory Reset Restore currently modified parameter values to those which were previously written into Phantom II me...

Page 129: ...remote units wirelessly provides an excellent aid to troubleshooting and network management Image 6 37 System Information Menu The five selectable System Information options provide information which refreshes automatically Detailed statistical and status information about Ethernet Packets Radio COM 1 2 and USB ports can be found in the submenu s accessed from this screen If desired your browsers ...

Page 130: ...antom II respectively Errors which are counted include alignment frame check sequence FCS frame too long and internal MAC The dropped packet count could increment if for example the network layer was too busy to accept the data The FIFO errors are related to interface specific hardware Collisions occur on all Ethernet networks being that Ethernet operates as a logical bus The amount of collisions ...

Page 131: ... Phantom II Serial Number Serial number of radio RF module within Phantom II Version Firmware version within radio module Temperature C Temperature as measured within the radio module Voltage V Supply voltage as measured on motherboard Image 6 39 System Information Menu Radio Information RSSI dBm Receive Signal Strength Indicator measurement continued ...

Page 132: ...plicable The Received and Transmitted bytes and packets indicate the respective amount of data which has been moved through the radio The Error counts reflect those having occurred on the wireless link Lost Sync indicates how many times the Phantom II being viewed has lost synchronization with the Master Phantom II ...

Page 133: ... COM1 Connect As Display of chosen protocol with respect to serial gateway function Configure via COM1 Configuration menu COM1 Connect Status If port is enabled and there is data traffic this will display Active Image 6 40 System Information Menu COM1 Connection Status The other displayed parameters are not all applicable Of most use are the transmitted and received bytes packets these will indica...

Page 134: ...Configure via COM2 Configuration menu COM2 Connect As Display of chosen protocol with respect to serial gateway function Configure via COM2 Configuration menu COM2 Connect Status If port is enabled and there is data traffic this will display Active Image 6 41 System Information Menu COM2 Connection Status The other displayed parameters are not all applicable Of most use are the transmitted and rec...

Page 135: ...ration menu USB Connect As Display of chosen protocol with respect to serial gateway function Configure via USB Configuration menu USB Connect Status If port is enabled and there is data traffic this will display Active The other displayed parameters are not all applicable Of most use are the transmitted and received bytes packets these will indicate if data is coming into and out of the USB port ...

Page 136: ...u is used for performing system maintenance upgrades rebooting the system locally or remotely resetting the system to factory default settings and for monitoring the radio channel noise within the operating frequency range of the Phantom II Image 6 43 System Tools Menu ...

Page 137: ... System Maintenance FTP Upgrade Refer to Appendix A HTTP Upgrade is another option to upgrade the Phantom II s system software firmware Select the Browse button to locate the upgrade file provided by CalAmp Using the Erase Settings checkbox tells the Phantom II not to store the current configuration settings therefore once the upgrade process is complete the unit will have factory de fault setting...

Page 138: ...II CalAmp 138 6 0 Configuration 6 1 10 2 Reboot System This feature is particularly useful for rebooting remote units It has the same effect as power cycling the unit Image 6 45 System Tools Menu Reboot System ...

Page 139: ...ts Should a unit reach a state where it is not performing as desired and it is possible that one or many configuration options may be improperly set resetting the system to default essentially back to factory settings will enable one to take a fresh start in reprogramming the unit Image 6 46 System Tools Menu Reset System to Default ...

Page 140: ... used to measure and observe the mean average and peak noise levels in the operating frequency range of the Phantom II When a Radio Channels Noise Level measurement is taken the Phantom II goes offline with respect to data transfer Image 6 47 System Tools Radio Channels Noise Level Mean Value ...

Page 141: ... Value Soft Buttons Hold Do not refresh currently displayed values Clear Clear current values and take new measurements Show Mean Value shown as green line Display the mean average values of noise level measurements Show Max Value shown as red line Display the maximum peak measured noise levels ...

Page 142: ...y sleep configuration parameterssent from a Master unit will overwrite any existing sleep settings in the remote unit 6 1 10 7 Local Power Saving Master When the unit is configured as a Master in the Radio Configuration menu settings for Local Power Saving will be listed under the System Tools Menu The Local Power Saving Modes provide power saving options for when the Master unit is not transmitti...

Page 143: ...consumption is about 30 40mA 12VDC Power Shutdown Timer control shutdown mode Controlled by Radio Awake Time and Radio Sleep Time parameters System will reboot when the radio wakes up Power consumption is about 1mA 12 VDC Values Disable Disable Auto Wakeup Serial Port Wakeup Ethernet Port Wakeup Power Shutdown Radio Awake Time Defines how long the radio will keep awake If set to 0 the radio will n...

Page 144: ...eep Time Defines how long the radio will sleep If set to 0 the radio will not enter sleep mode Values 30 0 65535 seconds Idle Time Defined the amount of system idle time required before going entering power saving mode cycle Values 60 0 65535 seconds ...

Page 145: ...Phantom II CalAmp 145 6 0 Configuration 6 1 10 8 Logout The Logout menu informs the user how to log out of the Web User Interface Image 6 50 Logout Window ...

Page 146: ...red between all nodes on the network Distance The physical distance between the Phantom II mo dems dictates such things as required antenna per formance and heights and whether or not a Re peater s is required When contemplating antenna types and Repeater sites keep in mind the directivity omnidirectional or directional of the antennas being used and also recall the effect of a Repeater on through...

Page 147: ...t greater distances for a given distant trans mitter power perhaps negating the requirement for a Repeater site Distance antenna gain transmit power and receive sensitivity are critical numbers for radio path calculations Fortunately the Phan tom II features the maximum available transmit power combined with exceptional receive sensitivity two numbers which will produce the most favorable path cal...

Page 148: ...lt in unreliable communications Power Requirements The Phantom II accepts a range of DC input voltages keep in mind that supply current requirements must also be met In some deploy ments power consumption is critical Power consumption for the Phantom II may be minimized by reducing the transmit power given the receive sensitivity of the distant modem Interference The frequency hopping spread spect...

Page 149: ...re expressed in dB As discussed on the previous page a desired fade margin is 20dB System gain is calculated as follows System Gain Transmitter Power Transmitter Antenna Gain Transmitter Cable and Connector Losses Receiver Antenna Gain Receiver Cable and Connector Losses Receiver Sensitivity where all values are expressed in dB dBi or dBm as applicable Assuming a path loss of 110dB for this exampl...

Page 150: ...e is not recommended The antenna used for this transmitter must not be co locatedin conjunction with any other antenna or transmitter Never work on an antenna system when there is lightning in the area Once the equipment is deployed average receive signal strength may be viewed in the System Information Radio Information display 7 2 Installation of Antenna System Components The installation remova...

Page 151: ...icular to the ground most common orientation the radiated signal will be vertically polarized if parallel to the ground the polarization is horizontal The network topology application and path calculation are all taken into consideration when selecting the various antenna types to be used in a radio network deployment In a long range PTP network Yagi antennas should be considered There antennas wi...

Page 152: ... long cable run is required and in particular within networks where there is not a lot of margin available a cable with lower loss should be considered When installing cable care must be taken to not physically damage it be particularly careful with respect to not kinking it at any time and to secure it properly Care must also be taken to affix the connectors properly using the proper crimping too...

Page 153: ...nvironments there are circumstances that require external filtering Paging towers and cellular base stations in close proximity to the Phantom II antenna can desensitize the receiver CalAmp s external cavity filter eliminates this problem All installation maintenance and removal work must be done in accordance with applicable codes ...

Page 154: ... made to the PC on which it is running It will discover units that are wired or have wireless connectivity Upon launching the application the following is displayed In the sample there is one Phantom II connected to same network to which the PC is connected Activating the Refresh IP soft button results in the Phantom II being discovered by the utility ...

Page 155: ...enter Password type admin and enter To upgrade the firmware perform the following steps Type binary and enter The firmware should be saved in your C Documents and Settings user folder Type put filename and enter Allow 1 2 minutes for the upgrade to complete The Status LED on the front panel can be monitored to de termine when the upgrade is complete Type bye and enter to terminate the FTP session ...

Page 156: ... your pc perform the following steps Type ascii and enter Type get system conf The file will be named system conf and it will be downloaded into your C Documents and Settings user folder This file can be renamed after it is downloaded however must be changed back to system conf be fore uploading The file can also be modified by opening the file using WordPad and changing the parame ters Remember t...

Page 157: ...nd type ftp ip address and enter Login type upgrade and enter Password type admin and enter To upload a Configuration File to your pc perform the following steps Type ascii and enter Type put system conf NOTE THE FILE MUST BE NAMED SYSTEM CONF They upload can take up to a minute including the auto reboot Type bye and enter to terminate the FTP session ...

Page 158: ...le pair is shared for both transmit and receive data it is very important that the Phantom II seize control of the line at the proper time when it is to transmit data Figure C 1 2 Wire RS485 Wiring 4 Wire In a 4 wire network one node will be the master and all other nodes will be remotes The master node may talk to all remote nodes yet each remote may only communicate with the one master Since the...

Page 159: ...nce for all signals transmitted byboth DTE and DCE DSR Data Set Ready Output from Module Asserted TTL low by the DCE to inform the DTE that it is alive and ready for communications DSR is the module s equivalentof the DTR signal RTS Request to Send Inputto Module A handshaking signal which is asserted bythe DTE TTL low when it is ready When hardware handshaking is used the RTS signal indicates to ...

Page 160: ...Phantom II CalAmp 160 Appendix E Customer Interface Schematic 1 of 3 ...

Page 161: ...Phantom II CalAmp 161 Appendix E Customer Interface Schematic 2 of 3 ...

Page 162: ...Phantom II CalAmp 162 Appendix E Customer Interface Schematic 3 of 3 ...

Page 163: ...e routed through conduit per requirements in Article 501 of the NEC Cet équipement convient pour utilisation en environnements de classe 1 division 2 groupes A B C ou D OU non dangereux seulement Les combinaisons d équipements dans vos systèmes sont sujettes à inspection par les autorités locales ayant juridiction au moment de l installation AVERTISSEMENT RISQUE D EXPLOSION Ne pas débrancher cet é...

Page 164: ...299 Johnson Ave Suite 110 Waseca MN 56093 Phone 800 992 7774 Fax 507 833 6748 www calamp com ...

Reviews: