background image

Weidmuller Wireless Ethernet Modem & Device Server WI-MOD-E-G/A User Manual 

Rev.

 

2.16

 

www.weidmuller.com

  

 

20

 

3.1 - Selecting a Channel 

802.11b/g (2.4GHz) 

The WI-MOD-E-G conforms to the IEEE 802.11b/g Wireless LAN specification. The WI-MOD-E-G supports 13 x 20MHz, 
12 x 10MHz and 13 x 5MHz radio channels in the 2412MHz to 2482MHz frequency range. Channels are country or region 
specific. Please check your local regulatory body for compliance and channel selection.  

You can see from the diagram below there are a limited number of channels available in the 2.4 GHz frequency range. 
Care must be taken when selecting an operating channel as some of the channels overlap. 

The 20M channels have a separation of 5MHz which means there is some overlap into the 
next channel, i.e. channel 1 will overlap into channel 2, 3 and 4; channel 6 will overlap into 
channels 3, 4, 5, 7, 8 and 9. If complete separation is required then you can use channels 1, 
6 and 11 without any interference between the channels.     

The 10M channels are also separated by 5MHz and overlap the adjacent channels by 5MHz 
forward and backward, i.e. Channel 41 will overlap with channel 42; channel 46 will overlap 
with channel 45 and 47.  

Lastly the 5MHz channels are separated by 5MHz and do not overlap at all so you can operate all 13 channels at the 
same time with minimal interference with the adjacent channel. 

Only one of these channels is used at a time and is configured at the Access Point, The Access Point then uses this 
channel to send out beacon transmissions and connections.   

Clients scan all channels for a suitable Access Point and then adopt the same channel as the AP when a connection is 
established.    

The following diagram shows the RF energy distribution for the 802.11b/g transmission: 

 

 

 

 

 

 

 

 

 

 

On the 20MHz channel (Green) most of the energy is transmitted within the channel however some of the energy is 
transmitted on the channels either side therefore causing interference on the these channels. The 10MHz channels 
(Orange) are similar with half of the energy overlapping into the next channel however you can configure up to 6 x non 
interfering channel at the one time. Lastly the 5 MHz channels (Blue) do not overlap and so all 13 channels can be used 
at the same time.  

There is also a single 40MHz Channel (Purple) which takes up over half of the full 2.4 GHz band and so it much more 
susceptible to interference from other channels. 

If there is more than one 802.11 AP within the same wireless range, then it is important that the AP’s are on channels as 
far apart as possible.   

If there are two 20MHz channel AP’s, then set them to channel 1 and 11.  If there are three, set them to 1, 6, and 11.  

 

 

11

6

1

11

1

6

11

1

6

Figure 11 - 2.4GHz Frequencies

Figure 10 - Channel 

Separation

 

Содержание WI-MOD-E-A

Страница 1: ...Rev 2 16 www weidmuller com 1 WI MOD E G WI MOD E A Wireless Ethernet Modem Device Server User Manual Read and Retain For Future Reference Version 2 16...

Страница 2: ...LL your connections with the user manual before turning the power on CAUTION To comply with FCC RF Exposure requirements in section 1 1310 of the FCC Rules antennas used with this device must be insta...

Страница 3: ...ain Part 15 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part15 of the FCC rules Code of Federal Regulations 47CFR Part 15 Operation is subj...

Страница 4: ...information on regulations 2 Operation is authorized by the radio frequency regulatory authority in your country on a non protection basis Although all care is taken in the design of these units ther...

Страница 5: ...exclusive of all other warranties This warranty does not indemnify the purchaser of products for any consequential claim for damages or loss of operations or profits and WEIDMULLER is not liable for a...

Страница 6: ...thentication Mode Open Shared 32 WPA WPA2 33 WPA Enterprise Authenticator AP Configuration 33 Supplicant Re authenticate Period 33 Enable Debug 33 WPA Enterprise Supplicant Client Configuration 33 Tru...

Страница 7: ...Utilisation 76 4 3 CUSTOM SURVEY 78 Example One 78 Example Two 79 4 4 THROUGHPUT TEST 80 Internal Throughput Test 80 Throughput and Repeaters 81 4 5 STATISTICS 83 Wireless Statistics 83 Access Point 8...

Страница 8: ...select appropriate channel transmit power etc allowable in that country Please check with your representative for the permitted channel usage in your country See Appendix C for channels selections Th...

Страница 9: ...configured as an Access Point and the other as a Client The second diagram shows an existing LAN being extended using WI MOD E s In this example the Access Point should be configured at the LAN end a...

Страница 10: ...r connects devices on different LAN s The IP addresses for the Ethernet and wireless sides are different In this example the wireless link is part of LAN A with the Client unit acting as a Router betw...

Страница 11: ...and a power supply Power the WI MOD E and make an Ethernet connection to your PC for further information on how to do this refer to section 3 2 Configuring the Unit for the first time Set the WI MOD E...

Страница 12: ...Australia 4W EIRP and 2km in Europe 100mW EIRP If using a WI MOD E A 5 GHz with a single antenna 5 km 3 miles can be achieved in USA Canada and Australia 1W EIRP and 3km in Europe 500mW EIRP however...

Страница 13: ...Therefore we can increase the antenna gain as long as overall system gain antenna Gain coax loss does not go above 10dB Example If using 10m 33ft of Cellfoil coax cable approximately 6dB of loss and...

Страница 14: ...nd Collinear antennas A dipole or collinear antenna transmits the same amount of radio power in all directions as such that are easy to install and use The dipole antenna with integral 15 ft 5m cable...

Страница 15: ...A 410mA 210mA A Ground Terminal is provided on the back of the module This Terminal should be connected to the Main Ground point of the installation in order to provide efficient surge protection for...

Страница 16: ...5 standard require some type of arbitration RS485 is a balanced differential standard but it is recommended that shielded twisted pair cable be used to interconnect modules to reduce potential RFI It...

Страница 17: ...t wetting current of approximately 5mA is provided to maintain reliable operation of driving relays The digital input is connected between the DIO terminal and common COM The I O circuit includes a LE...

Страница 18: ...l attempt to establish a link with an Access Point only if it has matching SSID Encryption method etc and other compatible capabilities as indicated by the beacon If more than one suitable Access Poin...

Страница 19: ...l This functionality permits a client to have mobility whilst maintaining a link with the most suitable AP LED Indication The following table details the status of the indicating LEDs on the front pan...

Страница 20: ...can operate all 13 channels at the same time with minimal interference with the adjacent channel Only one of these channels is used at a time and is configured at the Access Point The Access Point the...

Страница 21: ...and operational constraints see Appendix C for more details The example below shows the US power and operational constraints Group 1 5 15 5 25GHz 50mW Group 2 5 25 5 35GHz 250mW to 1 Watt Group 3 5 4...

Страница 22: ...annel that has been flagged as containing a radar signal either by a channel availability check or by in service monitoring is subject to a 30 min non occupancy period where it cannot be used by the d...

Страница 23: ...ill always start the WI MOD E with Ethernet IP address 192 168 0 1XX subnet mask 255 255 255 0 gateway IP 192 168 0 1 and the radio disabled Do not forget to set the switch back to the RUN position an...

Страница 24: ...off this behaviour in IE7 by selecting Tools Internet Options Advanced Security Warn about certificate address mismatch Method 2 Set WI MOD E Network address to match the local network For this metho...

Страница 25: ...C uses a proxy server ensure that Internet Explorer will bypass the Proxy Server for local addresses This option may be modified by opening Tools Internet Options Connections Tab LAN Settings Proxy Se...

Страница 26: ...al bridged network Ethernet or Wireless IP Address Subnet Mask IP Address and Subnet Mask for your application System Address ESSID The system address is a text string 1 to 31 characters in length use...

Страница 27: ...d netmask will no longer be editable See Section 3 23 VLAN for more details on VLAN configuration A system of WI MOD E s must have at least one Access Point configured as a master and have one or more...

Страница 28: ...tials can be entered for all Supplicants The WI MOD E supports WPA 1 TKIP WPA 1 AES and WPA 2 AES using a Pre Shared Key PSK WPA PSK TKIP Temporal Key Integrity Protocol enhances WEP by using 128 bit...

Страница 29: ...t is the Ethernet IP Address below Refer to section 3 18 Routing for more information Save Changes Save changes to non volatile memory The module will need to be restarted before the changes take effe...

Страница 30: ...The root node is typically the unit that handles the majority of traffic in the network The WI MOD E is configured with a Bridge Priority of 32768 by default The intention is to reduce traffic that th...

Страница 31: ...tion 2 and Ethernet Device The example shows the Access Point and the Station as both being WI MOD E modules which will happily communicate as both support 4 Address Mode However there are some instan...

Страница 32: ...2 AB EF 00 56 for 64bit encryption and 12 AB EF 00 56 15 6B E4 30 C8 05 F0 8D for 128bit encryption Encryption keys must not be all zeros i e 00 00 00 00 00 Default WEP Key One of the four keys may be...

Страница 33: ...maximum time a client will still have access to the network after its user credentials have been revoked Enable Debug Must only be used during commissioning and only if requested by WEIDMULLER Suppor...

Страница 34: ...ing to reduce broadcast traffic sent over the radio Refer to section 3 19 Filtering for how to configure a filter By default a transparent bridge does not handle loops within the network There must be...

Страница 35: ...the allowed setting for your country You can reduce the power for short range applications or to allow the use of high gain transmitter antennas while still complying with the emission requirements of...

Страница 36: ...ts will not transmit the System Address openly in Beacon messages This is particularly useful in unencrypted radio networks 3 Address Mode Allows compatibility with Layer 3 Bridge devices See section...

Страница 37: ...is page Figure 30 Advanced Radio TX Antenna Select which antenna port the module will transmit from Selections available are Main Port Only Messages are transmitted from the main TX RX port The Auxili...

Страница 38: ...ming Radio surveys or radio path testing See section 4 4 Throughput Test Fixed Noise Floor Allows the Radio Receiver Noise Floor and therefore sensitivity to be moved above any interference What this...

Страница 39: ...Proxy ARP is used to make the device visible on the network In this process the WI MOD E pretends that it holds the IP address on the network and responds on behalf of the remote device The result of...

Страница 40: ...any other WI MOD E serial ports including the corresponding port on the same WI MOD E Serial Gateway Modbus RTU to TCP When configured as Modbus will allow a serial Modbus Client Master to connect wit...

Страница 41: ...serial Slaves In this example the WI MOD E Access Point is configured with the RS232 Modbus TCP to RTU Gateway enabled Once enabled the gateway converts the Modbus TCP queries received from the Master...

Страница 42: ...net and Wireless ports Remote Device IP Address Select the IP address of the remote device Ensure this address is not the same as any other device on the Ethernet or Wireless networks RS 232 RS485 Ser...

Страница 43: ...before packet is sent via network Packet Size The number of received bytes that will be buffered before a packet is sent via the network Modbus Server Port Enter the TCP port number of the remote serv...

Страница 44: ...and port i e 224 0 1 1 5000 The Scada then communicates with the remotes using TCP via the IP address of the Multicast Manager and the port selected in the configuration i e 5001 Multicast Pipe Manag...

Страница 45: ...Registers is summarized in the table below Each register is internally saved as a 16 bit unsigned integer value A Modbus transaction may access the entire 16 bit value of any register or alternatively...

Страница 46: ...irected to from the onboard general purpose I O registers The Modbus TCP Server is shared with the Modbus TCP to RTU Gateway so that the Modbus Device ID is used to determine if a Modbus transaction i...

Страница 47: ...at C to the onboard digital output at B Local Register 4320 specifies the register for the onboard digital output at B since B is the local unit at which the mapping is configured I O Count 1 specifi...

Страница 48: ...e up the registers and also slightly increase processing resources Log background Noise RSSI BGND on Rx messages are made available in the diagnostic registers Section 4 9 Internal diagnostics Modbus...

Страница 49: ...Passive Scanning STA only Selecting this item stops a Client device from sending probe request messages when it is searching for an access point to connect to Instead the client waits for a beacon tr...

Страница 50: ...nd buffered for retransmission when complete It is therefore recommended the scan list is used to limit the number of channels the client needs to scan thus reducing the overall scan time During the b...

Страница 51: ...rks Since WDS bridge interfaces generally do not require IP address configuration they inherit the IP address of the standard wireless interface A WDS router interface allows traffic to be routed to a...

Страница 52: ...ntly selected entry in the WDS Connections table To select a row click anywhere in the row with the mouse to highlight the entire row Connection Mode Specify the connection mode for this link AP Downl...

Страница 53: ...s could be added to the chain in a similar way Figure 42 Site B WDS Configuration 1 The WDS configuration for unit B is shown above this page is accessible via the Repeaters link from the configuratio...

Страница 54: ...evious Access Point The diagram above shows a bridging network with a number of Access Points all with the same SSID network structure etc so as the Stations can freely roam between Access Points Each...

Страница 55: ...ssign higher priority values to interfaces that you want spanning tree to select first and lower priority values to interfaces that you want spanning tree to select last If all interfaces have the sam...

Страница 56: ...tions that do not require redundancy Figure 48 WDS Routed Each Modem has a different SSID This is done to limit broadcast traffic and to route data only were it needs to go Site B has two Virtual Clie...

Страница 57: ...opposed to an individual host IP The same rule specifies the address 192 168 0 3 as the gateway address The routing rule effectively tells the WI MOD E that any traffic destined for the network 192 1...

Страница 58: ...nly specify the Access Point as their default gateway i e they require no routing rules be configured However for the Access Point to be able to deliver traffic to LAN B and LAN C it needs to have rou...

Страница 59: ...e added to the wired Ethernet LAN in place of generating adding routing rules into the modems Name A name that describes the routing rule Max 32 characters Destination The destination network or host...

Страница 60: ...the wired Ethernet port of the configured WI MOD E The Filter comprises of three lists MAC Addresses IP Address Protocol Port and ARP Filters Each list may be set as either a Blacklist to block traffi...

Страница 61: ...intermediate WI MOD E units Whitelist filters may be required for correct operation If an erroneous configuration has prevented all access to the module SETUP mode can be used to restore operation MA...

Страница 62: ...requests for high use addresses Select Blacklist or Whitelist Blacklist will prevent all listed devices from accessing the module and using the radio link Whitelist will allow devices with the IP addr...

Страница 63: ...number of seconds the client is granted the assigned IP address The client should renew its lease within this time 3 22 DNS Server Configuration DNS Domain Name Service allows devices to be given hum...

Страница 64: ...acket is passed to a VLAN group a VLAN Tag is added When one or more VLAN Groups have been configured VLAN Pass through is disabled and VLAN Aware Mode is enabled VLAN Aware Routing Mode Same as VLAN...

Страница 65: ...descriptive only and serves no functional purpose VLAN ID A valid 12 bit IEEE802 1Q VID with a range of 1 4095 The VLAN ID will be added to all outgoing VLAN tagged frames for this VLAN Group All inco...

Страница 66: ...ged When tagged is specified all incoming frames must have a VLAN tag with VLAN ID matching the configured VLAN ID for the VLAN Group all outgoing frames on this interface will have a VLAN tag added w...

Страница 67: ...ge wi0 the second wi1 and third wi2 are virtual interfaces created on the Repeaters page Each interface is configured as an Access Point and can be setup with unique SSID s and Encryption settings etc...

Страница 68: ...lar VLAN s by assigning membership to one or more VLAN s groups virtually any possible topology can be achieved Shown below is the configuration for the Multi VLAN example above You will see there are...

Страница 69: ...Weidmuller Wireless Ethernet Modem Device Server WI MOD E G A User Manual Rev 2 16 www weidmuller com 69 Figure 61 Example 2 Configuration...

Страница 70: ...respectively configuration for these wireless bridges is done from the Repeaters page see example below You can see that all three wireless interfaces are setup as Access Points but are configured wi...

Страница 71: ...e if you are using DNS Owner A text field for owner name Contact A text field for owner phone number email address etc Description A text field used for a description of the purpose of the unit Locati...

Страница 72: ...Set the Operating Mode to Client Ensure the ESSID and Radio Encryption method match the Access Point If encryption is used ensure the encryption keys or passphrase match the Access Point Client 2 Con...

Страница 73: ...ncryption keys or passphrase if necessary Set dipswitch to RUN Click on button Save to Flash and Reset Webpage will display that message indicating details are being written to flash Wait for WI MOD E...

Страница 74: ...down until the fault is rectified During Module boot up the OK LED flashes RED GREEN until the boot sequence is complete Boot Status LED Indication during Start up The OK LED indicates the status of t...

Страница 75: ...802 11 Standard Site Survey Site Survey is a one off snapshot showing what Access Points are available for connection This list is only available on Clients and only available at start up of the modul...

Страница 76: ...sy and Percent Rx on the Custom Survey page If possible also temporarily disable all data transfer on the system and if the Channel Utilisation remains high this will confirm the presence of interfere...

Страница 77: ...dem is receiving valid data from another modem 3 The connected modem has detected RF noise or interference Channel Survey shows the Channel Utilisation and Noise Floor Graph with 1 second 1 minute and...

Страница 78: ...Percent Radio RX Any DSSS or OFDM messages received by the radio basically any Standard Wi Fi data packets from either WEIDMULLER or competitor radios Percent Busy CCA or Noise Clear Channel Assessmen...

Страница 79: ...the amount of other noise that is being received From this you can see that in the last 60 second period there was a 20 second interval with around 60 80 channel Utilisation in this case from a 2 4GH...

Страница 80: ...s long as you compare the measured result against the expected result in the table See APPENDIX D External Iperf Test for details on running this application externally Internal Throughput Test Before...

Страница 81: ...on a laptop or PC at both ends of the link The following table shows real world throughput estimates based on channel selection and receiver signal levels Throughput is calculated using the inbuilt I...

Страница 82: ...Ext 16 8 0 4 0 2 0 10 5 5 3 2 6 1 3 6 0 3 0 1 5 0 8 3000m Int 10 5 0 2 5 1 3 7 0 3 5 1 8 0 9 4 7 2 4 1 2 0 6 3000m Ext 15 7 5 3 8 1 9 9 0 4 5 2 3 1 1 6 0 3 0 1 5 0 8 5000m Int 9 4 5 2 3 1 1 6 0 3 0 1...

Страница 83: ...ntervals due to Interference or CCA Beacon Missed Reset Count After 15 Consecutive Beacon misses 1 5seconds will increment by 1 This will indicate high interference as AP is holding off sending Beacon...

Страница 84: ...File Menu for future reference and emailing module configuration details to Technical Support in the event of any configuration problems TCP Throughput Test Performs a Throughput Test See section 4 4...

Страница 85: ...perf Jperf application can be downloaded from http sourceforge net projects iperf All of the above applications measure the raw data throughput and from this we can determine the amount of interferenc...

Страница 86: ...gurable Throughput Low Threshold then the RS485 LED will be red if the measured throughput is less than the Throughput Low Threshold then the RS485 LED will be off Radio Path Test can be accesses by s...

Страница 87: ...ration connect a PC to the local module run Internet Explorer and enter the IP address of the remote unit or device name if using DNS the configuration page of the remote module will be shown and chan...

Страница 88: ...ess Adaptor wi0 Link Status Inverted 5012 Both Wireless Adaptor wi0 Number Associated Stations for this interface 5013 AP Only Wireless Adaptor wi0 Points to the starting register of the AP s Station...

Страница 89: ...al data packet sent on the interface 4520 Both Transmit frames with antenna 1 TX RX 4522 Both Transmit frames with antenna 2 RX 4524 Both Transmitter antenna switches 4526 Both Transmitter on chip ret...

Страница 90: ...n come up There will be a certain directory specified unique to your own PC with a flashing cursor at the end At the cursor type the word ping leaving a space and the default IP address for the WI MOD...

Страница 91: ...e command ipconfig all Ipconfig lists all of the commands and their usages available for use Arp Displays and modifies the IP to Physical address translation tables used by Address Resolution Protocol...

Страница 92: ...elow Access Point Router Settings Client Bridge Settings Gateway IP 192 168 0 1 Gateway IP 192 168 2 51 Ethernet IP 192 168 0 191 Ethernet IP 192 168 2 50 Subnet Mask 255 255 255 0 Subnet Mask 255 255...

Страница 93: ...t Output Discrete I O Input Voltage Free Contact 5 Output FET 30Vdc 500mA 5 Ethernet Port Ethernet Port 10 100baseT RJ45 Connector IEEE 802 3 Link Activity Linkc 100baseT via LED Serial Port RS232 DB9...

Страница 94: ...CSA Class I Division 2 ATEX IECEx nA IIC Safety IEC 60950 RoHS Compliant UL UL Listed General Size 114 x 140 x 30mm 4 5 x 5 5 x 1 2 Housing Powder Coated Aluminum Mounting DIN Rail Terminal Blocks Rem...

Страница 95: ...ink from other devices as much as possible If necessary create a temporary separate radio network to perform the upgrade to remote modules Web based Upgrade Web based firmware upgrade is available fro...

Страница 96: ...d so that the signals crossover connecting transmit signal on one side to receiver signals on the other CSMA CA Carrier Sense Multiple Access Collision Avoidance is a listen before talk method of mini...

Страница 97: ...ternational unit for measuring frequency equivalent to the older unit of cycles per second One megahertz MHz is one million hertz One gigahertz GHz is one billion hertz The standard US electrical powe...

Страница 98: ...and background noise Transmit Power The power usually expressed in mW or dBm that the wireless device transmits at MAC Address Media Access Control address A unique code assigned to most forms of netw...

Страница 99: ...hem individually to the IP program layer Although each packet has the same destination IP address it may get routed differently through the network At the other end TCP reassembles the individual pack...

Страница 100: ...8 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorithm that takes longer to decode it can provide better security than basic 40 bit 64 bit encryption Wi Fi Wirele...

Страница 101: ...s Yes Yes 3 2422 Yes Yes Yes Yes Yes 4 2427 Yes Yes Yes Yes Yes 5 2432 Yes Yes Yes Yes Yes 6 2437 Yes Yes Yes Yes Yes 7 2442 Yes Yes Yes Yes Yes 8 2447 Yes Yes Yes Yes Yes 9 2452 Yes Yes Yes Yes Yes 1...

Страница 102: ...5520 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 108 5540 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 112 5560 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 116 5580 26 dBm 20 dBm 24 dBm 20 dBm 24 dBm 120 5600 26 dBm 20 dBm n a...

Страница 103: ...100 mW 100 mW 3 5470 5725 500 mW 500 mW 250 mW 500 mW 4 5725 5825 4 W 4 W 4 W All Power levels are shown as EIRP Effective Isotropic Radiated Power dB to mWatt Conversion Watts dBm Watts dBm 10 mW 10...

Страница 104: ...ation on your PC Extract to zip file to the ROOT directory on your PC i e C This folder contains the main Iperf application as well as the Jperf graphical interface Copy this folder to the 2nd PC or d...

Страница 105: ...red Remembering that the theoretical calculations are best case possible results WI MOD E 100 WI MOD E G WI MOD E A WI MOD 945 E 20Mhz WI MOD 9 E WI MOD 805U E 54Mbps 27Mbps 27Mbps 27Mbps 11Mbps 5Mbps...

Страница 106: ...irectory and run the Jperf application as shown in Figure 4 The CMD screen will disappear and the Jperf Screen will appear as seen in Figure 5 Figure 4 Figure 5 When Jperf screen appears select Client...

Страница 107: ...r you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that ther...

Страница 108: ...the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Pr...

Страница 109: ...public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to th...

Страница 110: ...UTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT N...

Отзывы: