![Telit Wireless Solutions WE866E4-P Скачать руководство пользователя страница 17](http://html1.mh-extra.com/html/telit-wireless-solutions/we866e4-p/we866e4-p_at-commands-reference-manual_1083755017.webp)
WE866E4-P AT Commands Reference Guide
80572ST10887A Rev. 0.0
17
2018-02-16
PRELIMINAR
Y
3 Getting Started
This chapter describes how to get started.
•
•
3.1 System Overview
The Serial-to-WiFi stack is used to provide WiFi capability to any device having a serial
interface. This approach offloads WLAN, TCP/IP stack and network management
overhead to the WiFi chip, allowing a small embedded host (for example an MCU) to
communicate with other hosts on the network using a WiFi wireless link. The host
processor can use serial commands to configure the Serial-to-WiFi Application and to
create wireless and network connections.
The user will have to register on Telit website, sign the NDA and check with the local sales
team for any queries during this procedure. This gives access to all the respective
documentation according to the product purchased.
The following is the basic application development sequence for a Serial-to-WiFi user.
1. Evaluate GainSpan hardware and firmware
–
Download the software, program, and execute.
–
To download the software, go to SDK builder (www.gainspan.com/secure/login),
and download all the latest packages including the binary (Refer WE866E4-P
SDK Builder User Guide).
–
Flash the binary using module programmer user guide on the custom hardware or
–
GS evaluation board and execute in RUN mode. (Refer “WE866E4-P Module
Programming User Guide”).
2. Design the custom hardware by following the design guidelines. (Refer WE866E4-P
Hardware Design Guidelines)
3. Develop Host firmware
–
Interface host application using AT commands. (Refer WE866E4-P S2W AT
Command Reference Guide)
–
Configure the serial interface (UART/SPI/SDIO) as required for mode,
polarity.For software interface, choose Command & Response, Byte
stuffing/de-stuffing as “None” for UART and SDIO options.
–
Issue general, power save, and security related commands as required.
–
Start connection to an Access Point or do provisioning as required.