Design Specificationread.pudn.com/downloads161/sourcecode/unix_linux/network/725331... · Web...
Transcript of Design Specificationread.pudn.com/downloads161/sourcecode/unix_linux/network/725331... · Web...
Design Specification
AN-1521
Software Design
Specification v2.0.1
Version 0.3
Editor:
Cres/ Div. of Software engineer
Approved by:
Content
51Revision History
52Introduction
53Abbreviations
54Operation Scenario
55Hardware Resource Configuration
55.1Summary
55.2Flash
55.3GPIO
55.4LED
56Software Architecture
57Software Function
57.1Feature List
57.2Default Value
58User Interface
58.1WEB UI
58.1.1WEB UI Design
58.1.2Profile Design
58.1.3Traffic Logging
58.1.4HTTPS
58.2SNMP
58.2.1Privately MIB
58.2.2Network Management Tools
58.2.3SNMPv3 Management
58.2.4SNMPv3 OIDMIB
59Major Function
59.1Multiple BSSID
59.2Universal repeater
59.3AP client Enterprise
59.3.1Overview
59.3.2Test Environment
59.3.3WPA/WPA2 enterprise design
59.4Bridge mode
510Major Module
510.1Boot Loader
510.1.1U-boot Command
510.1.2TFTP Upgrade
510.1.3Art Firmware load
510.1.4U-boot Environment Variables
510.1.5DDR
510.1.6memory, u-boot
510.2ART Firmware
510.2.1Art firmware
510.2.2EEPROM data
510.2.3ART FW
510.3Wireless driver
510.3.1WLAN driver architecture (AP83fus driver)
510.3.2Wlan Config file
510.3.3I/O Control
10.3.4Implemented 802.11 Standard MIB ID
510.3.5IGMP snooping
510.4Configserver
510.4.1Configserver API Related Data Structure
510.4.2MIB ID Definition for Configserver
510.5Hostapd & WPA_Supplicant Modules
510.5.1Logic Idea
510.5.2Interface
510.6WSC (WPS APUT and WPS STAUT)
510.6.1Wsc Overview
510.6.2WPS GUI Disign
510.6.3WSC
510.7ZVlan
510.8Multiclient
510.9AnyIP
510.9.1ARP Request
510.9.2IP packet
510.9.3AnyIPNAT
510.10Zcommisc(GPIO/LED)
510.11System Log
510.11.1Format
510.11.2Definition
510.11.3Syslog proc file
510.11.4Syslog API
511Performance
512Appendix
512.1MIB ID Definition for Configserver
512.2Implemented 802.11 Standard MIB ID
Figures
9FIGURE 51 Flash layout Graphical
9FIGURE 52 Configuration Example view
11FIGURE 61 Software Diagram of AN-1521
22FIGURE 81 Logging Graphical view
23FIGURE 82 Logging Idea
25FIGURE 83 Open SSL certificate Create step1
25FIGURE 84 Open SSL certificate Create step2
29FIGURE 85 SNMPv3 examlpe MG-SOFT SNMPv3 MIB Browser
31FIGURE 86 ZCOM SNMP Agent OID Struck
32FIGURE 87 SNMP MIB
33FIGURE 88 OID and MIB
36FIGURE 91 AP client enterprise test Environment
37FIGURE 101 U-boot normal startup
38FIGURE 102 Uboot command line
62FIGURE 103 Hostapd & WPA_Supplicant Modules Flow Chart
66FIGURE 104 Zvlan Module Flow Chart
68FIGURE 105 Multi-client Module Flow Chart
73FIGURE 106 Anyip Arp data flow chart
74FIGURE 107 Anyip IP DNAT flow chart
74FIGURE 108 Anyip IP NAT flow chart
78FIGURE 109 System Log Format
81FIGURE 1010 Syslog Module
TABLES
8Table 51 Flash memory layout
9Table 52 Configuration (config.bin)
10Table 53 GPIO assigned table
15Table 71 Feature list Table
19Table 72 Default Value
21Table 81 Logging statistic
43Table 101 DDR Registers definition
1 Revision History
Date
Version
Editor
Description
Aug. 26,2008
V0.1
Cres
1st Draf
Sep. 2,2008
V0.2
Yangpeng
Add WEB GUI/SNMP/Syslog/Zcommisc
Guilent
Add Hostapd/WPA_supplicant/WSC
Cres
Add U-repeater/WLAN driver
Sep. 8,2008
V0.3
Yangpeng
Add Multiclient/AnyIP/zvlan/Dhcp server/Wins/Ntp client
Cres
Modified some Major modules
2 Introduction
The product is base on Atheros AP83 chipset solution, consisted of a processer, a RF module, a MDIX 10/100 Fast Ethernet port. It is an IEEE 802.11 a/b/g/n Wireless Video Bridge, high throughput and dual Band AP.
Contributor:
Cres
Guilent
Kevin Shieh
Meidelin
Limingqiang
Yangpeng
Zhouhaiya
3 Abbreviations
// Definition for WIFI
4 Operation Scenario
Scenario 1: AP mode
Scenario 2 :Ap+repeater mode
Scenario 3 :AP client mode
Scenario 4 :Universal repeater mode
Scenario 5 :Bridge mode
5 Hardware Resource Configuration
5.1 Summary
1. Atheros AR9130 AP SoC
CPU Core: 400MHz MIPS32 24Kc
Two 10/100 Fast Ethernet MAC Controllers
One High Speed USB 2.0 Host/OTG Port
2. Radio
(AN-1521) Atheros AR9104 2x2 MIMO Radio for 2.4/5GHz
3. Attansic(Atheros) F2 10/100 Fast Ethernet PHY
4. SDRAM: 32MB (DDR)
5. Flash: 8MB
5.2 Flash
Flash memory size: 8M Bytes
Flash memory layout:
Image
Start Addr
End Addr
Oftser
Size
U-boot
0xbf000000
0xbf03ffff
0x0000
0x40000
U-boot-env
0xbf040000
0xbf04ffff
0x40000
0x10000
Rootfs
0xbf050000
0xbf65ffff
0x50000
0x610000
Uimage
0xbf660000
0xbf7cffff
0x660000
0x170000
Configuration
0xbf7d0000
0xbf7dffff
0x7d0000
0x10000
Mfg
0xbf7e0000
0xbf7effff
0x7e0000
0x10000
Veserved/EEPROM
0xbf7f0000
0xbf7fffff
0x7f0000
0x10000
Table 51 Flash memory layout
Flash layout Graphical view:
FIGURE 51 Flash layout Graphical
config.bin definition:
Address
Item
Default value
0x00~0x01
ID
0xaaaa
0x02~0x03
length
0x3e
0x04~0x09
LAN MAC Address
00:60:b3:00:00:00
0x0a~0x0f
WAN MAC Address
00:60:b3:00:00:01
0x10~0x13
Local IP Address
192.168.0.35
0x14~0x17
Local IP Address Mask
255.255.255.0
0x18~0x1b
Host IP Address
192.168.0.36
0x1c~0x2b
firmware name
"firmware.img"
0x2c~0x3b
Config File Name
"config.bin"
0x3c~0x3d
Domain/Country
0x8348 (United States)
0x3e
checksum
Table 52 Configuration (config.bin)
Example:
FIGURE 52 Configuration Example view
5.3 GPIO
LED/Button
AN-1521 GPIO#
Direction
POWER LED()
(, Vcc)
Output
INITIAL LED()
19
Output
ETHERNET LED
(, Ethernet PHY)
N/A
WLAN LED
6
Output
WPS(USB) LEDOTIST(USB) LED
3
Output
WPS ButtonOTIST Button
12
Input
RESET Button
21
Input
MFG TEST Jumper
12(WPS)
Input
Table 53 GPIO assigned table
5.4 LED
1. AN-1521POWER LEDVcc, .
2. INITIAL LED()
Power on, u-boot.
Linux booting. (: ).
WLAN driver ready. .
3. MFG TEST Jumper
WPS ButtonMFG TEST Jumper
u-bootMFG TEST Jumper. , TFTP ServerART FWRAM.
6 Software Architecture
FIGURE 61 Software Diagram of AN-1521
7 Software Function
7.1 Feature List
Feature / Certification
AN-1521Access Point
Standard Networking
Standard Networking
Compatibility
IEEE 802.11N @2.4GHz
Y
IEEE 802.11N @5GHz
Y
IEEE 802.11G
Y
IEEE 802.11A
phase 1
IEEE 802.11B
phase 1
Security
IEEE 802.11i
WPA
phase 1
WPA-PSK
phase 1
WPA2
phase 1
WPA2-PSK
phase 1
WEP
64 bit Encryption
phase 1
128 bit Encryption
phase 1
Passphrase
phase 1
Manual Key - Hex
phase 1
Manual Key - ASCII
phase 1
SSID (Service Set Identifier)
SSID Broadcast Disable
phase 1
Multiple SSIDs + VLAN Support
phase 2
Restrict Access by MAC (ACL)
phase 1
Wireless Isolation
phase 1
WiFi Protected Setup (WPS), PIN & PBC
phase 1
QoS (802.11e) / WMM
phase 1
Roaming (IAPP, 802.1f)
TBD
Access Point Mode
phase 1
AP Client (Station Mode)
phase 1
MAC Clone for 1st Ethernet-PC
phase 1
Multi-client Mapping for 2nd and more Ethernet-PCs
phase 1
WPA/WPA2 Supplicant
phase 2
Station Mode WPS Support (PIN, PBC)
phase 2
Universal Repeater
phase 1
Wireless Distribution System (WDS)
phase 1
Point to Point Bridge
phase 1
Point to Point Multi-bridge
phase 1
Bridge Mode WPS Support (Proprietary PBC)
phase 1
Repeater
phase 1
Automatic Channel Selection
phase 1
Output Power Control
phase 1
Layer 3 / Layer 4 Routing
IP Protocol (RFC 791)
phase 1
Address assignment
phase 1
Static
phase 1
Dynamic
phase 1
DHCP
phase 1
Subnet Capability
Y
Number of subnet IP addresses
Y
DHCP
DHCP Server (RFC 2131-2132)
phase 1
Any IP
phase 1
DNS
Y
ARP (RFC 826) / RARP (RFC 903)
N/A
ICMP (RFC792)
N/A
Layer 2 Ethernet Bridging
phase 1
Transparent, learning bridge (IEEE 802.1d)
phase 1
Spanning Tree Protocol (IEEE 802.1d)
phase 1
Learning for minimum of 128 MAC addresses
phase 1
Auto MAC Address Cloning(AP-client mode)
Y
Security
RADIUS Client (RFC2865-2866)
phase 1
EAP-MD5
phase 1
EAP-TLS
phase 1
EAP-TTLS
phase 1
EAP-LEAP
phase 1
EAP-PEAP
phase 1
System Management
Management Protocols
Embedded Web Server for web based management
phase 1
Multi-session support
phase 1
Upgrade firmware via Web Browser
phase 1
Multi-language support
No
FTP Server
phase 1
upload for software
phase 1
upload and download for configuration
phase 1
Configuration Management
Capability to store configuration backup
phase 1
Configuration changes via:
phase 1
Web interface
phase 1
Capability to load factory (or service provider) - defaults
phase 1
via Web
phase 1
via push button
phase 1
SNMP for status and event notification
phase 2
LAN SNMP Read Capabilities (Read Community)
phase 2
LAN SNMP Write Capabilities (Write Community)
phase 2
SNMP v1 (RFC 1157)
phase 2
SNMP v2c (RFC 2011-2013)
phase 2
SNMP v3 (RFC 2571-2576)
phase 2
MIBs
MIB II for IP (RFC 1213)
phase 2
802.11 MIB with traps
phase 2
Private MIB
phase 2
Fault Management
System Self Test
phase 1
Flash memory
phase 1
RAM
phase 1
LAN port
phase 1
Event Logging
phase 1
Traffic Logging
phase 2
Automatic Hard Reset (no user intervention)
phase 1
(bootloader) TFTP firmware upgrade via push button
phase 1
Performance Management Statistics
Ethernet
phase 1
Wireless
phase 1
Wireless Signal Strength
phase 1
Connection State Management Statistics
PPP state / errors
N/A
LAN Port state / errors
N/A
Security Management
Password protected configuration or management - sessions for web or console access
phase 1
User Authentication & Accounting
802.1x support
phase 1
Other Features
Installation/Setup Wizard
Phase1
Router OS
Linux
Radiotest Function (ART)
phase 1
Continuous RX
phase 1
Continuous TX - with modulation
phase 1
Continuous TX - carrier only
phase 1
Intelligent enough to automatically hard reset itself (no user intervention)
phase 1
Table 71 Feature list Table
7.2 Default Value
Item
Value
System
About
Wireless Device Name
N/A
ETH Mac Address
N/A
WLAN Mac Address
Firmware
N/A
Basic Setup
Wireless Device Name
apXXXXXX
Ethernet Data Rate
Auto
Spanning Tree Protocol (STP)
Enable
IP Type
Static
IP Address
192.168.1.1
IP Subnet Mask
255.255.255.0
Default Gateway
0.0.0.0
Primary DNS Server
0.0.0.0
Secondary DNS Server
0.0.0.0
Any IP
Disable
DHCP Server
Disable
DHCP IP Address Range
192.168.1.1-192.168.1.200
DHCP Subnet Mask
255.255.255.0
DHCP Gateway IP Address
0.0.0.0
WINS1
0.0.0.0
WINS2
0.0.0.0
Primary DNS Server
0.0.0.0
Secondary DNS Server
0.0.0.0
Time Server
Null
Time Server Port
123
Time Zone
GMT
Radius Settings
Auth
primary
server
IP
0.0.0.0
Port
Null
Secret
Null
Auth secondary server
IP
0.0.0.0
Port
Null
Secret
Null
Advanced WPA / 802.1X Parameters
Re-auth
3600
Global-Key Update
Disable
Account primary
server
IP
0.0.0.0
Port
Null
Secret
Null
Account secondary server
IP
0.0.0.0
Port
Null
Secret
Null
Wireless Setup
Radio
Operating Mode
AP
Site Survey
N/A
Base Station ID
N/A
Modulation
802.11b/g/n
Channel / Frequency
Auto
Data Rate
Auto
Output Power
Full
Channel mode
20MHz
HT protect
Disable
A-MPDU aggregation
Enable
A-MSDU aggregation
Disable
Short GI
Enable
IGMP Snooping
Enable
Preamble Type
Short Preamble
RTS Threshold (0-2346)
2346
Fragmentation Length (256-2346)
2346
Beacon Interval (2-1000)
100
Space In Meters (0-100000)
10000
Extension channel protection mode:
RTS-CTS
WDS
Remote Mac Address
Manual
Wireless Security Separator
Disable
Security
SSID
Wireless0
Broadcast SSID
Enable
Network Authentication
Open
Date Encryption
None
Wep Passphrase
None
Wep key
None
Wireless Client Security Separation
Disable
WPS
Wi-Fi Protected Setup(WPS) Enable
Enable
WPS Configuration Mode
AP's PIN
PIN
14611056
Access Control
Disable
Antenna Alignment Tools
Null
Link Test
Null
Status
Connections
N/A
Statistics
Ethernet
N/A
Wireless Statistic for VBS
N/A
Management
Change password
List
N/A
Restore default password
N/A
Remote management
Secure Shell (SSH)
Enable
SNMP
Enable SNMP
Enable
Protocol Version
V3
Server Port
163
Get Community
public
Set Community
private
Trap Destination
0.0.0.0
Trap Community
public
Enable SNMPv3Admin
Enable
Admin name
SNMPv3Admin
Admin Password
12341234
Access Type
R/W
Authentication Protocol
MD5
Privacy Protocol
None
Enable SNMPv3User
Enable
User Name
SNMPv3User
User Password
12341234
Access Type
RO
Authentication Protocol
MD5
Privacy Protocol
MD5
Upgrade Firmware
Browse to locate the firmware file
N/A
Backup/Restore settings
file
ap.cfg
Traffic Log
Port
Wlan
Log period
5Min.
Refresh Time
5Sec.
Reboot Base Station
Reboot DUT
Disable
Logout
Disable
Table 72 Default Value
8 User Interface
8.1 WEB UI
8.1.1 WEB UI Design
Webui.zip
8.1.2 Profile Design
profileMultiple BSSID
Profile
Profile 1+3
Profile 1: 4In1 AP(No multiple SSIDs)configurationProfile 1operation modeitemProfile 1
Profile 2/3/4ApAP+repeater modeoperation mode
Basic setting page:
Basic setting page Operation Mode Operation ModeAP Ap-client Bridge AP+repeater
Universal repeater Basic setting pageSSIDProfile 1SSIDProfile
Encryption and Authentication
Profile Multi_SSIDSSIDSSID
Profile 1base operation modeoperation modeProfile 1WEP24
WEPOpen System ,Shared Key802.1x,profileprofileWEP2
Profile WEPWEP
ProfileWEPWEPWEPProfileWEPWEP
Profile 2/3/4AP/AP+repeater mode
WEPWEPProfileKEYTYPEData EncryptionProfileWEPNetwork AuthenticationWEP OPEN SYSTEMSHARED KEY802.1XKEYTYPEWEPProfile
UrepeaterProfile 2 VAP
APWPSWPSVAP 0Profile 2/3/4OPEN SYSTEM/SHARED KEYNONE/WEP
8.1.3 Traffic Logging
Traffic Log,
8.1.3.1
Wireless
Ethenet-LAN
Ethenet-WAN, if exist
(Y)
Number of Packets In
Number of Packets Out
Number of Bytes In
Number of Bytes - Out
(X)
5
1, (0-24). NTP, 24
1, (Mon, Tue, Web, Thu, Fri, Sat, Sun). NTP, 7
8.1.3.2
5
1
300
1
5
288
1
0.5
336
Table 81 Logging statistic
8.1.3.3 Logging Graphical
FIGURE 81 Logging Graphical view
(Y) X5 WLANYX5
8.1.3.4 Logic Idea
Traffic Log2configserverTrafficGD2 socket
Start
Traffic
Log
Start Sysmon
Module
Create socket to
transfer info
with Sysmon
module
Start Drawpic
Module
Loop to get data
from configerver
Create socket to
transfer info
with Drawpic
module
Use GD LIB to
Draw Pic
Traffic Log Idea
FIGURE 82 Logging Idea
8.1.4 HTTPS
HTTPSHypertext Transfer Protocol over Secure Socket LayerHTTPHTTPHTTPSSLHTTPSSSL HTTPS(SSL)(TLS)HTTPHTTPS URLTCP443HTTP80
8.1.4.1 AN-1521HTTPS
AN-1521OPENSSLHTTPSweb
go-aheadweb,HTTPS,OPENSSLMatrixSSLMocana SSL HTTPS WEBMatrixSSLOPENSSLLINUX-NB-AN1521MakefileOPENSSL = 1
SSLINC = $(TOPDIR)/apps/wpa/wsc/lib/openssl-0.9.8a/include
SSLLIB = $(TOPDIR)/apps/wpa/wsc/lib/openssl-0.9.8a/libssl.a $(TOPDIR)/apps/wpa/wsc/lib/openssl-0.9.8a/libcrypto.a
#SSLLIB = /opt/build/gcc-3.4.4-2.16.1/build_mips_nofpu/lib/libssl.a -lcrypto $(TOPDIR)/apps/wpa/wsc/lib/openssl-0.9.8a/crypto/bf/bf_enc.o
websSSL.c/WEB-NB-AN1521/webcert//var/webpages/webcert/
8.1.4.2
SSL(P1,V1),(P2,V2)ABBAB
A->B: hello
B->A: V2P1AP2P1
A->B: ok
B->A: V1
A->B: P1KP1B
B->A: KK
P23CAKK(P2,V2)certificate authority
(CA)(P1,V1)CACA(P2,V2)(P1,V1)V2CAP2CAV2P1
OPENSSLopenssl.confCAP1cacert.pem, V1private/cakey.pem
openssl.conf
mkdir newcerts private
echo '01' > serial
touch index.txt
openssl req -new -nodes -out req.pem -config ./openssl.cnf
P2,V2Certificate Signing Request (CSR)
FIGURE 83 Open SSL certificate Create step1
P2 : req.pem
V2 : key.pem
CAV1P2
openssl ca -out cert.pem -config ./openssl.cnf -infiles req.pem
cert.pem key.pem
FIGURE 84 Open SSL certificate Create step2
cert.pem key.pem web
PSopenssl.conf
dir = .
[ req ]
default_bits = 1024 # Size of keys
default_keyfile = key.pem # name of generated keys
default_md = md5 # message digest algorithm
string_mask = nombstr # permitted characters
distinguished_name = req_distinguished_name
req_extensions = v3_req
[ req_distinguished_name ]
# Variable name Prompt string
#---------------------- ----------------------------------
0.organizationName = Organization Name (company)
organizationalUnitName = Organizational Unit Name (department, division)
emailAddress = Email Address
emailAddress_max = 40
localityName = Locality Name (city, district)
stateOrProvinceName = State or Province Name (full name)
countryName = Country Name (2 letter code)
countryName_min = 2
countryName_max = 2
commonName = Common Name (hostname, IP, or your name)
commonName_max = 64
# Default values for the above, for consistency and less typing.
# Variable name Value
#------------------------------ ------------------------------
0.organizationName_default = rd3-radius
localityName_default = NAN JING
stateOrProvinceName_default = JIANGSU
countryName_default = CN
[ v3_ca ]
basicConstraints = CA:TRUE
subjectKeyIdentifier = hash
authorityKeyIdentifier = keyid:always,issuer:always
[ v3_req ]
basicConstraints = CA:FALSE
subjectKeyIdentifier = hash
[ ca ]
default_ca = CA_default
[ CA_default ]
serial = $dir/serial
database = $dir/index.txt
new_certs_dir = $dir/newcerts
certificate = $dir/cacert.pem
private_key = $dir/private/cakey.pem
default_days = 3650
default_md = md5
preserve = no
email_in_dn = no
nameopt = default_ca
certopt = default_ca
policy = policy_match
[ policy_match ]
countryName = match
stateOrProvinceName = match
organizationName = match
organizationalUnitName = optional
commonName = supplied
emailAddress = optional
8.1.4.3 Notecfg
IE6/7cfgIEInternet Explorer *** ( ***)Internet ExplorerInternet ("Unable to download. Internet Explorer was unable to open this site. The requested site is either unavailable or cannot be found. Please try again later.")
Microsoft KB 815313 316431 812935 323308
HTTP response headerPragma: no-cache( MS KB316431More Information)
fmmgmt.c,
websWrite(wp, "Pragma: public\n");
websWrite(wp, "Cache-Control: no-cache\n");
#ifdef WEBS_SSL_SUPPORT
websWrite(wp, "Pragma: public\n");
websWrite(wp, "Cache-Control: max-age=30\n");
#else
websWrite(wp, "Pragma: public\n");
websWrite(wp, "Cache-Control: no-cache\n");
#endif
8.2 SNMP
8.2.1 Privately MIB
Bridge.mib
8.2.2 Network Management Tools
Features of network management system solutions:
1. Support protocols opened within industries currently
2. Support standard network transmission and network management protocols
3. Open and modularized architecture with ideal extensibility and powerful heterogametic network management ability.
4. Plenty of graphics operation interfaces dynamically reflect network topology structure, which include auto-monitor various network resources change and network operation status surveillance convenient for administrator. Every product within network management system adopts identical graphics operation interface, and can auto-reflect or dynamically reflect based on settings the network topology structure and monitor system resources.
5. Auto-detect network node, auto-generate network topological graph and manage network events
6. Flexible settings, e.g. threshold setting, of monitoring network fault
7. Various application interfaces, for users to develop own network management routines conveniently
8. Dynamic network monitoring. To know the operation status of peripherals through MIB browser; while for those which can not be monitored, extending SNMP agent on managed node and installing MIB on management station can monitor them. Pre-defining MIB application or establishing MIB query application can both monitor the communication rate and information flow of network link.
9. Network diagnosis can test basic link, link passed through router, and SNMP link by ping, remote ping, and etc.
10. Flexible password management to be realized with user account management
e.g.:
We are able to get device name through the device name OID of SNMP; and by operation OID, operation mode of device could be set, such as base station, CPE, bridge, etc.
8.2.3 SNMPv3 Management
1. SNMPv3
User Name/Password:user,user nameaccess mode: readonlyreadwrite;
Authentication( + password ): none, MD5, SHA
Encryption( + key ): none, DES, AES-128
2. SNMPv3 Manager: MG-SOFT SNMPv3 MIB Browser
FIGURE 85 SNMPv3 examlpe MG-SOFT SNMPv3 MIB Browser
3. SNMPv3 Agent
users snmpv3 accessmode
This command specifies the snmpv3 access privileges for the specified login user. The valid accessmode values are readonly or readwrite. The is the login user name for which the specified access mode applies. The default is readwrite for theadmin user and readonly for all other users
no users snmpv3 accessmode
This command sets the snmpv3 access privileges for the specified user as readwrite for the admin user and readonly for all other users. The value is the user name for which the specified access mode will apply
users snmpv3 authentication
This command sets the authentication protocol to be used for the specified user to none. The is the user name for which the specified authentication protocol is used.
users snmpv3 encryption
1. This command specifies the encryption protocol used for the specified user. The valid encryption protocols are des or none
2. If you select des, you can specify the required key on the command line. The encryption key must be 8 to 64 characters long. If you select the des protocol but do not provide a key, the user is prompted for the key. When you use the des protocol, the login password is also used as the snmpv3 encryption password, so it must be a minimum of eight characters. If you select none, you do not need to provide a key.
3. The value is the login user name associated with the specified encryption
no users snmpv3 encryption
This command sets the encryption protocol to none. The is the login user name for which the specified encryption protocol will be used
e.g.:
We are able to get device name through the device name OID of SNMP; and by operation OID, operation mode of device could be set, such as base station, CPE, bridge, etc.
8.2.4 SNMPv3 OIDMIB
Nban1521.c AN1521.mib(system),MIBMG-SOFT SNMPv3 MIB BrowserOIDMIB2
Nban1521.cstatic ZComOidInfo_t AN1521OidInfos[]
ZCOM_OID_FIX_INFO(0,
MIB_FIRMWARE_VERSION,ASN_OCTET_STR,
RONLY, , ZComOidAccessGeneric, 1, 1),
ZCOM_OID_FIX_
INFO
OID
ZCOM_OID_CO
NTINUE_INFO
OID
ZCOM_OID_SUB
_END_INFO
OID
MIB_FIRMWAR
E_VERSION
configserver
MIB
ASN_OCTET_STR
RONLY
ZComOidAccessGeneric
1,1
OID
Nban1521.c
FIGURE 86 ZCOM SNMP Agent OID Struck
AN1521OidInfos[]ZCOM_OID_FIX_INFOZCOM_OID_CONTINUE_INFOZCOM_OID_SUB_END_INFOAN1521.mib system OBJECT IDENTIFIER ::= { an1521 1 }an1521mibsystementryname1OIDAN1521OidInfos[]AN1521.mib
swversion OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION"Current
software version."
::= { system 1 }
Swversion
MG-SOFT SNMPv3
MIB Browser
DisplayString
AN1521OidInfos[]
Read-only
AN1521OidInfos[]
1
AN1521OidInfos[]
ZCOM_OID_FIX_INFO
FIGURE 87 SNMP MIB
2
ZCOM_OID_FIX_INFO
(0, MIB_FIRMWARE_VERSION,
ASN_OCTET_STR,RONLY , ,
ZComOidAccessGeneric, 1, 1),
ZCOM_OID_CONTINUE_INFO(0,
MIB_VLAN_MANAGE_ID,
ASN_INTEGER,RWRITE, ,
ZComOidAccessGeneric),
ZCOM_OID_SUB_END_INFO (0,
MIB_DHCPS_ANYIP,
ASN_INTEGER, RWRITE, ,
ZComOidAccessBoolean, 1),
system OBJECT IDENTIFIER ::= {
an1521 1 }
swversion OBJECT-TYPE
SYNTAX DisplayString
MAX-ACCESS read-only
STATUS current
DESCRIPTION
"Current software version."
::= { system 1 }
managementVlanID OBJECT-TYPE
SYNTAX INTEGER (1..4094)
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This attribute shall indicate the
Management VLAN ID (1~4094). "
::= { system 11 }
anyip OBJECT-TYPE
SYNTAX INTEGER {
disabled(0),
enabled(1)
}
MAX-ACCESS read-write
STATUS current
DESCRIPTION
"This attribute shall indicate the anyip status. "
::= { system 21 }
AN1521OidInfos[]AN1521.mib
FIGURE 88 OID and MIB
9 Major Function
9.1 Multiple BSSID
Support up to 4 BSSID, the detail feature please refers to Profile Design.
9.2 Universal repeater
Universal Repeater Mode" provides the function to act as AP client and AP at the same time. It can use AP client function to connect to a Root AP and use AP function to service all wireless stations within its coverage. All the stations within the coverage of this access point can be bridged to the Root AP
Not like WDS repeater, the universal repeater dont required AP support WDS, so it can work with most standard AP
AP mode provided the AP service for Local wireless station, it has standard AP function same as the alone AP mode, it can support all security same as alone AP mode.
The AP-Client Mode provided a wireless adapter function. Connect with another AP. AP-client mode can support WEP/WPA-PSK/WPA2-PSK security.
The Attachment below is detail idea about the Universal repeater.
Universal
repeater.ppt
In this product:
1 Auto channel only, AP service start after connected to root AP. The Universal repeater AP service will not work until associated with root AP.
2 Security support: Open system, shared key, WPA-PSK, WPA2-PSK.
3 Universal repeater loop avoid not supported.
9.3 AP client Enterprise
9.3.1 Overview
AP ClientWPA-PersonalWPA-Enterprise:
IEEE 802.1X Authentication
TLS
TTLS
PEAP
LEAP
Inner Authentication Protocol
(for TTLS)
PAP
CHAP
MSCHAP
MSCHAPv2
(for PEAP)
MSCHAPv2
GTC
User Certificate
Upload
Remove
Login/User Name
Anonymous Login/User Name
Password
Encryption
None
WEP40
WEP104
TKIP (WPA)
AES (WPA2)
9.3.2 Test Environment
FIGURE 91 AP client enterprise test Environment
9.3.3 WPA/WPA2 enterprise design
WPA_WPA2_Enterpri
se_design.ppt
9.4 Bridge mode
1. Support 4 MAC addresses.
2. Compatible with legacy WDS AP.
3. Auto detects HT station.
4. 802.11N full throughput support with WDS link.
10 Major Module
10.1 Boot Loader
This product uses the u-boot to load the kernel image.
When booting, u-boot would detect the button. If push the button more than 3 seconds, u-boot would upgrade FW via the Ethernet port from tftp server. Else, u-boot would wait for users input 3 seconds, if get the signal of any key hit, u-boot would enter the UI of configuration; if not, u-boot would load the Linux kernel into SDRAM and go to the enter point.
10.1.1 Normal bootup
FIGURE 101 U-boot normal startup
10.1.2 U-boot Command
FIGURE 102 Uboot command line
u-bootLED:
ar7100> mm 18040000
18040000: 0000047f? 00080048 (GPIO 3,6,19output)
18040004: 003fff97? (current value, )
18040008: 00080400? 00000000 (0, LED)
1804000c: 00000400? ()
ar7100> mm 18040000
18040000: 00080048? ()
18040004: 0037ff97? ()
18040008: 00000400? 00080048 (1, LED)
1804000c: 00080448? ()
ar7100>
u-boot
1. READ DDR SDRAM(0x82100000, 128K)
ar7100> loop 82100000 20000
2. READ Flash ROM(0xbf050000, 128K)
ar7100> loop bf050000 20000
3.READ/WRITE DDR SDRAM(0x82100000, 128K)
ar7100> mtest 82100000 82120000
4.READ/WRITE Flash(0xbf040000, 64K(u-boot env))
ar7100> setenv ftest save\;run ftest
ar7100> run ftest
10.1.3 TFTP Upgrade
Pressing default button more than 3 second, simultaneously power on device, this event will cause TFTP upgrade process. U-boot will firstly download, upgrade config.bin, whether config.bin upgrade successful or not, u-boot will continue to download and upgrade firmware, it will enter into normal start-up after firmware upgrade.
10.1.4 Art Firmware load
u-bootMFG TEST Jumper. , TFTP ServerART FWRAM
10.1.5 U-boot Environment Variables
bootargs=console=ttyS0,115200 root=31:02 rootfstype=jffs2 init=/sbin/init mtdparts=ar7100-nor0:256k(u-boot),64k(u-boot-env),6208k(rootfs),1472k(uImage),64k(configure),64k(mfg),64k(reserved)
bootcmd=bootm 0xbf660000
bootdelay=4
baudrate=115200
ethaddr=0x00:0xaa:0xbb:0xcc:0xdd:0xee
ipaddr=192.168.0.35
erase_uboot=erase bf000000 bf03ffff
erase_uboot_env=erase 0xbf040000 0xbf04ffff
erase_cfg=erase 0xbf7d0000 0xbf7dffff
erase_mfg=erase 0xbf7e0000 0xbf7effff
erase_uimg=erase 0xbf660000 0xbf7cffff
erase_rimg=erase 0xbf050000 0xbf65ffff
mfg=tftp 0x82100000 config.bin;run erase_mfg;cp.b 0x82100000 0xbf7e0000 0x10000
rimage=tftp 0x82100000 ap81fus-jffs2;run erase_rimg;cp.b 0x82100000 0xbf050000 $filesize
uimage=tftp 0x82100000 vmlinux.gz.uImage;run erase_uimg;cp.b 0x82100000 0xbf660000 $filesize
upgrade_uboot=tftp 82100000 u-boot.bin;protect off bf000000 bf03ffff;run erase_uboot;cp.b 82100000 bf000000 3ffff;protect on bf000000 bf03ffff;run erase_uboot_env
ethact=eth0
serverip=192.168.0.7
stdin=serial
stdout=serial
stderr=serial
The related settings (e.g. local/server IP, firmware file name) used for upgrade are set by config.bin partition, if this config.bin partition is invalid, then will be set according to U-boot-env partition:
10.1.6 DDR
U-BootDDRboot/u-boot/include/configs/ap81.h:
#define CFG_DDR_REFRESH_VAL 0x5f00
#define CFG_DDR_CONFIG_VAL 0x77bc8cd0
#define CFG_DDR_MODE_VAL_INIT 0x131
#define CFG_DDR_EXT_MODE_VAL 0x0
#define CFG_DDR_MODE_VAL 0x31
#define CFG_DDR_TRTW_VAL 0x1f
#define CFG_DDR_TWTR_VAL 0x1e
#define CFG_DDR_CONFIG2_VAL
0x83d1f6a2
#define CFG_DDR_RD_DATA_THIS_CYCLE_VAL 0xffff
ar7100> md 18000000 8
18000000: 77bc8cd0 83d1f6a2 00000031 00000000 w..........1....
18000010: 00000000 00005f00 0000ffff 00000000 ......_.........
:
DDR_CONFIG (1800_0000) = 0x77bc8cd0
Bit
Name
Reset
AP81 uboot
4:0
TRAS
0x10
0x10
8:5
TRCD
0x6
0x6
12:9
TRP
0x6
0x6
16:13
TRRD
0x04
0x04
22:17
TRFC
0x1E
0x1E
26:23
TMRD
0xF
0xF
29:27
CAS_LATENCY
0x6
0x6
30
OPEN_PAGE
0x1
0x1
31
RES
0x0
0x0
DDR_CONFIG2 (1800_0004) = 0x83d1f6a2
Bit
Name
Reset
AP81 uboot
3:0
BURST_LENGTH
0x8
0x2
4
BURST_TYPE
0x0
0x0
5
CNTL_OE_EN
0x1
0x1
6
PHASE_SELECT
0x0
0x0
7
CKE
0x1
0x1
11:8
TWR
0x6
0x6
16:12
TRTW
0x10
0x1F
20:17
TRTP
0x8
0x8
25:21
TWTR
0xE
0x1E
31:26
RES
0x0
0x20
DDR_MODE (1800_0008) = 0x00000031
Bit
Name
Reset
AP81 uboot
12:0
VALUE
0x133
0x31
31:13
RES
0x0
0x0
DDR mode register:
Bit
Name
Description
AP81 uboot
2:0
Burst Length
0=reserved1=2 words2=4 words3=8 wordsother=reserved
1=2 words (BL=2)
3
Addressing Mode
0=sequential1=interleave
0=sequential
6:4
CAS Latency
2=23=36=2.5other=reserved
3=3 (CAS=3)
8
DLL Reset
1=DLL reset
0 (Normal)
DDR_EXTENDED_MODE (1800_000C) = 0x00000000
Bit
Name
Reset
AP81 uboot
12:0
VALUE
0x2
0x0
31:13
RES
0x0
0x0
DDR_CONTROL (1800_0010) = 0x00000000
Bit
Name
Reset
AP81 uboot
0
MRS
0x0
0x0
1
EMRS
0x0
0x0
2
REF
0x0
0x0
3
PREA
0x0
0x0
31:4
RES
0x0
0x0
DDR_REFRESH (1800_0014) = 0x00005f00
Bit
Name
Reset
AP81 uboot
13:0
PERIOD
0x2000
0x1f00
14
ENABLE
0x0
0x1
31:13
RES
0x0
0x0
DDR_RD_DATA_THIS_CYCLE (1800_0018) = 0x0000ffff
Bit
Name
Reset
AP81 uboot
23:0
VALUE
0xff
0xffff
31:24
RES
0x0
0x0
Table 101 DDR Registers definition
10.2 ART Firmware
10.2.1 Art firmware
AN-1521SoC, miniPCIcalibrationEMI. , firmware, AN-1521(DUT)ART Client. ART FW:
1. IP192.168.0.35
2. LANWAN Bridge
3. /dev/dk* (mknod dk0 c 63 0; mknod dk1 c 63 1)
4. ART client (art.ko and mdk_client.out)
(ROM)web, login, FW. DUTAN-1521 FW
10.2.2 EEPROM data
10.2.2.1 EEPROM
u-boot: md bf7f1000 ()
LSDK 7.1.2.32, driver code: #define AR5416_EEPROM_START_ADDR 0x1fff1000
ART Client(art_client/src/dk/mdk/client/owl/soc_linux/hw.c: flash_read()):
unsigned int val;
fn = "/dev/mtdblock4";
if ((fd = open(fn, O_RDWR)) < 0) {
perror("Could not open flash");
exit(1);
}
lseek(fd, -blk_size+offset, SEEK_END);
AP83 Art ARTmtdblock4sector(64K)
AN-1521 Flash mtdblock4
Art clientMTD EEPROM data mtdblock64Kbyte
EEPROM mtdblock64k.
static int parse_mtd_block(unsigned char mtd_buf[])
{
struct stat st;
unsigned char *buff = NULL;
int state, imtd = -2;
FILE *fp;
int buf_len = 80;
buff = (char*)malloc(buf_len);
fp = fopen("/proc/mtd", "r");
if (!fp)
return -1;
memset(buff, 0, buf_len);
while (getline(&buff, &buf_len, fp)!= -1) {
imtd++;
}
fclose(fp);
strcpy(buff, "/dev/mtdblock");
if ((state = stat(buff, &st)) < 0) {
sprintf(buff, "/dev/mtdblock%d", imtd);
if ((state = stat(buff, &st)) < 0) {
free(buff);
return -1;
}
strcpy(mtd_buf, buff);
} else {
sprintf(mtd_buf, "/dev/mtdblock/%d", imtd);
}
free(buff);
return 0;
}
flash_read:
if (mtd_path[0] == 0)
parse_mtd_block(mtd_path);
if ((fd = open(mtd_path, O_RDWR)) < 0) {
perror("Could not open flash");
exit(1);
}
lseek(fd, -blk_size+offset, SEEK_END);
10.2.2.2 EEPROM
wlan/linux/common/hal/ar5416/ar5416.h
bf7f_1100 +---------------------------------------------------------
|
| BASE_EEP_HEADER baseEepHeader; // 64 B
|
| u_int16_t length;
| u_int16_t checksum;
| u_int16_t version;
| u_int8_t opCapFlags;
| #define AR5416_OPFLAGS_11A 0x01 /* if set, allow 11a */
| #define AR5416_OPFLAGS_11G 0x02 /* if set, allow 11g */
| #define AR5416_OPFLAGS_N_5G_HT40 0x04 /* if set, disable 5G HT40 */
| #define AR5416_OPFLAGS_N_2G_HT40 0x08 /* if set, disable 2G HT40 */
| #define AR5416_OPFLAGS_N_5G_HT20 0x10 /* if set, disable 5G HT20 */
| #define AR5416_OPFLAGS_N_2G_HT20 0x20 /* if set, disable 2G HT20 */
| u_int8_t eepMisc;
| u_int16_t regDmn[2];
| u_int8_t macAddr[6];
| u_int8_t rxMask;
| u_int8_t txMask;
| u_int16_t rfSilent;
| u_int16_t blueToothOptions;
| u_int16_t deviceCap;
| u_int32_t binBuildNumber;
| u_int8_t deviceType;
| u_int8_t futureBase[33];
|
bf7f_113f +---------------------------------------------------------
|
| u_int8_t custData[64]; // 64 B
|
bf7f_117f +---------------------------------------------------------
|
| MODAL_EEP_HEADER modalHeader[2]; // 200 B
|
bf7f_1247 +---------------------------------------------------------
| u_int8_t calFreqPier5G[AR5416_NUM_5G_CAL_PIERS];
| u_int8_t calFreqPier2G[AR5416_NUM_2G_CAL_PIERS];
| CAL_DATA_PER_FREQ calPierData5G[AR5416_MAX_CHAINS][AR5416_NUM_5G_CAL_PIERS];
| CAL_DATA_PER_FREQ calPierData2G[AR5416_MAX_CHAINS][AR5416_NUM_2G_CAL_PIERS];
| CAL_TARGET_POWER_LEG calTargetPower5G[AR5416_NUM_5G_20_TARGET_POWERS];
| CAL_TARGET_POWER_HT calTargetPower5GHT20[AR5416_NUM_5G_20_TARGET_POWERS];
| CAL_TARGET_POWER_HT calTargetPower5GHT40[AR5416_NUM_5G_40_TARGET_POWERS];
| CAL_TARGET_POWER_LEG calTargetPowerCck[AR5416_NUM_2G_CCK_TARGET_POWERS];
| CAL_TARGET_POWER_LEG calTargetPower2G[AR5416_NUM_2G_20_TARGET_POWERS];
| CAL_TARGET_POWER_HT calTargetPower2GHT20[AR5416_NUM_2G_20_TARGET_POWERS];
| CAL_TARGET_POWER_HT calTargetPower2GHT40[AR5416_NUM_2G_40_TARGET_POWERS];
| u_int8_t ctlIndex[AR5416_NUM_CTLS];
| CAL_CTL_DATA ctlData[AR5416_NUM_CTLS];
| u_int8_t padding;
bf7f_17ff +---------------------------------------------------------
ArtEEPROM
=======================Header Information======================
| Major Version 14 | Minor Version 8 |
|-------------------------------------------------------------|
| Checksum 0x791F | Length 0x0CB8 |
| RegDomain 1 0x0030 | RegDomain 2 0x1F00 |
| MacAddress: 0x03:00:BE:7F:F4:F0 |
| TX Mask 0x0005 | RX Mask 0x0005 |
| OpFlags: 5GHz 1, 2GHz 0, Disable 5HT40 0, Disable 2HT40 0 |
| OpFlags: Disable 5HT20 0, Disable 2HT20 0 |
| Misc: Big Endian 1 |
| Cal Bin Maj Ver 24 Cal Bin Min Ver 0 Cal Bin Build 0 |
| Device Type: UNKNOWN [0] |
| Customer Data in hex |
| = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =|
| = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =|
| = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =|
| = 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =|
|======================5GHz Modal Header======================|
| Ant Chain 0 0xFFC00003 | Ant Chain 1 0xBFC00001 |
| Ant Chain 2 0xBFC00001 |
| Antenna Common 0x11200000 | Antenna Gain Chain 0 0 |
| Antenna Gain Chain 1 0 | Antenna Gain Chain 2 45 |
| Switch Settling 0 | TxRxAttenuation Ch 0 46 |
| TxRxAttenuation Ch 1 46 | TxRxAttenuation Ch 2 11 |
| RxTxMargin Chain 0 46 | RxTxMargin Chain 1 11 |
| RxTxMargin Chain 2 11 | adc desired size -74 |
| pga desired size -30 | tx end to rx on 14 |
| xlna gain Chain 0 14 | xlna gain Chain 1 14 |
| xlna gain Chain 2 0 | tx end to xpa off 14 |
| tx frame to xpa on 2 | thresh62 202 |
| noise floor thres 0 15 | noise floor thres 1 -54 |
| noise floor thres 2 -54 | Xpd Gain Mask 0x1 | Xpd 10 |
| IQ Cal I Chain 0 0 | IQ Cal Q Chain 0 0 |
| IQ Cal I Chain 1 0 | IQ Cal Q Chain 1 0 |
| IQ Cal I Chain 2 0 | IQ Cal Q Chain 2 0 |
| pdGain Overlap 2.5 dB | Analog Output Bias (ob) 6 |
| Analog Driver Bias (db) 3 | Xpa bias level 5 |
| | Xpa bias freq 0x0000 |
| | Xpa bias freq 0x0000 |
| | Xpa bias freq 0x0000 |
| pwr dec 2 chain 0.0 dB | pwr dec 3 chain 0.0 dB |
| txFrameToDataStart 14 | txFrameToPaOn 14 |
| ht40PowerIncForPdadc 0 | bswAtten Chain 0 0 |
| bswAtten Chain 1 0 | bswAtten Chain 2 0 |
| bswMargin Chain 0 0 | bswMargin Chain 1 0 |
| bswMargin Chain 2 45 | switch settling HT40 0 |
|=============================================================|
============================Spur Information===========================
| 11A Spurs in MHz (Range of 0 defaults to channel width) |
| NO SPUR | NO SPUR | NO SPUR | NO SPUR | NO SPUR |
| | | | | |
|=====================================================================|
===============Power Calibration Information Chain 0 =======================
| 5240 | 5180 | 5500 | 5320 | 5745 |
|==============|==============|==============|==============|==============|
|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|
| | | | | |
| PD_Gain 0 | | | | |
| 22 3.75 | 24 3.75 | 23 3.75 | 23 3.50 | 19 3.25 |
| 18 0.25 | 18 0.25 | 18 0.25 | 19 0.00 | 16 0.00 |
| 51 10.75 | 49 10.75 | 52 10.75 | 44 10.50 | 34 10.25 |
| 33 7.25 | 33 7.25 | 33 7.25 | 31 7.00 | 26 6.75 |
| 13 10.25 | 12 10.25 | 11 10.25 | 12 10.50 | 09 10.25 |
| | | | | |
|==============|==============|==============|==============|==============|
| 5700 | 0255 | 5825 |
|==============|==============|==============|==============|==============|
|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|
| | | | | |
| PD_Gain 0 | | | | |
| 18 3.50 | 18 3.25 | 00 0.00 |
| 16 0.00 | 15 0.00 | 00 0.00 |
| 34 10.50 | 33 10.25 | 00 0.00 |
| 25 7.00 | 24 6.75 | 00 0.00 |
| 08 10.50 | 09 10.25 | 00 0.00 |
| | | | | |
|==============|==============|==============|==============|==============|
|
===============Power Calibration Information Chain 2 =======================
| 5240 | 5180 | 5500 | 5320 | 5745 |
|==============|==============|==============|==============|==============|
|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|
| | | | | |
| PD_Gain 0 | | | | |
| 12 3.50 | 12 3.75 | 12 3.50 | 15 3.75 | 15 3.25 |
| 08 0.00 | 08 0.25 | 08 0.00 | 09 0.25 | 09 0.00 |
| 33 10.50 | 38 10.75 | 38 10.50 | 43 10.75 | 43 10.25 |
| 19 7.00 | 22 7.25 | 22 7.00 | 25 7.25 | 26 6.75 |
| 09 10.50 | 09 10.25 | 10 10.50 | 10 10.25 | 11 10.25 |
| | | | | |
|==============|==============|==============|==============|==============|
| 5700 | 0255 | 5825 |
|==============|==============|==============|==============|==============|
|pdadc pwr(dBm)|pdadc pwr(dBm)|pdadc pwr(dBm)|
| | | | | |
| PD_Gain 0 | | | | |
| 15 3.25 | 20 3.25 | 00 0.00 |
| 09 0.00 | 14 0.00 | 00 0.00 |
| 41 10.25 | 48 10.25 | 00 0.00 |
| 24 6.75 | 35 6.75 | 00 0.00 |
| 11 10.25 | 12 10.25 | 00 0.00 |
| | | | | |
|==============|==============|==============|==============|==============|
|
============================Target Power Info===============================
| 5G OFDM | 4970 | 4930 | 4970 | 4930 |
|==============|==============|==============|==============|==============|
| 6-24 | 38.0 | 16.0 | 90.0 | 16.0 |
| 36 | 15.0 | 17.0 | 15.0 | 17.0 |
| 48 | 16.0 | 13.0 | 16.0 | 13.0 |
| 54 | 52.0 | 15.0 | 102.5 | 15.0 |
|==============|==============|==============|==============|==============|
| 5G OFDM | 4800 | 4800 | 4800 | 4800 |
|==============|==============|==============|==============|==============|
| 6-24 | 127.5 | 0.0 | 127.5 | 0.0
| 36 | 0.0 | 0.0 | 0.0 | 0.0 |
| 48 | 0.0 | 0.0 | 0.0 | 0.0 |
| 54 | 127.5 | 0.0 | 127.5 | 0.0
|==============|==============|==============|==============|==============|
============================Target Power Info===============================
| 5G HT20 | 4970 | 4900 | 4970 | 4900 |
|==============|==============|==============|==============|==============|
| HT MCS0 | 38.0 | 17.0 | 52.0 | 17.0 |
| HT MCS1 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS2 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS3 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS4 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS5 | 12.0 | 17.0 | 12.0 | 17.0 |
| HT MCS6 | 17.0 | 10.0 | 17.0 | 10.0 |
| HT MCS7 | 44.0 | 12.0 | 70.0 | 12.0 |
|==============|==============|==============|==============|==============|
| 5G HT20 | 4970 | 4900 | 4970 | 4900 |
|==============|==============|==============|==============|==============|
| HT MCS0 | 90.0 | 17.0 | 102.5 | 0.0 |
| HT MCS1 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS2 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS3 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS4 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS5 | 12.0 | 17.0 | 12.0 | 0.0 |
| HT MCS6 | 17.0 | 10.0 | 17.0 | 0.0 |
| HT MCS7 | 94.5 | 12.0 | 127.5 | 0.0 |
|==============|==============|==============|==============|==============|
============================Target Power Info===============================
| 5G HT40 | 4970 | 4900 | 4970 | 4900 |
|==============|==============|==============|==============|==============|
| HT MCS0 | 38.0 | 17.0 | 52.0 | 17.0 |
| HT MCS1 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS2 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS3 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS4 | 17.0 | 17.0 | 17.0 | 17.0 |
| HT MCS5 | 12.0 | 17.0 | 12.0 | 17.0 |
| HT MCS6 | 17.0 | 10.0 | 17.0 | 10.0 |
| HT MCS7 | 44.0 | 12.0 | 70.0 | 12.0 |
|==============|==============|==============|==============|==============|
| 5G HT40 | 4970 | 4900 | 4970 | 4900 |
|==============|==============|==============|==============|==============|
| HT MCS0 | 90.0 | 17.0 | 102.5 | 0.0 |
| HT MCS1 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS2 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS3 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS4 | 17.0 | 17.0 | 17.0 | 0.0 |
| HT MCS5 | 12.0 | 17.0 | 12.0 | 0.0 |
| HT MCS6 | 17.0 | 10.0 | 17.0 | 0.0 |
| HT MCS7 | 94.5 | 12.0 | 127.5 | 0.0 |
|==============|==============|==============|==============|==============|
=======================Test Group Band Edge Power========================
10.2.2.3 Sub systemID
: ART, DUTXN-2521AN-1521, DUT Sub systemID0xa081, DUTEEPROM template.
: ART ClientSub systemIDhard-coded. art_client/src/dk/mdk/common/linux_hw.c:
A_UINT32 hwCfgRead32
(
A_UINT16 devIndex,
A_UINT32 offset /* the address to read from */
)
{
struct cfg_op co;
A_UINT32 data;
MDK_WLAN_DEV_INFO *pdevInfo;
pdevInfo =globDrvInfo.pDevInfoArray[devIndex];
co.offset=offset;
co.size = 4;
co.value = 0;
#ifdef OWL_PB42
if(!isHowlAP(devIndex)){
if (ioctl(pdevInfo->hDevice,DK_IOCTL_CFG_READ,&co) < 0) {
uiPrintf("Error::PCI Config read32 failed::co.value=%x\n", co.value);
data = 0xdeadbeef;
} else {
data = co.value;
}
return data;
}
else{//howlAP
if(offset==0){
return 0xa027168c;// hwDevID; it will be right shifted by 16
}
if(offset==0x2c){
return 0xa0810000;// subsystemID
}
if(offset==0x2e){
return 0xa0810000;// subsystemID
}
}
#else
// For OB42 and AP71 platforms
if (ioctl(pdevInfo->hDevice,DK_IOCTL_CFG_READ,&co) < 0) {
uiPrintf("Error::PCI Config read32 failed::co.value=%x\n", co.value);
data = 0xdeadbeef;
} else {
data = co.value;
}
return data;
#endif
return 1; // will not take this return anyway
}
: XN-2521ARTsubsystemIDreturn 0xa0820000; AN-1521ARTsubsystemIDreturn 0xa0830000; artsetup.txt:
CFG_TABLE = 0xa083 ar5008apnx_ap83.eep
CFG_TABLE = 0xa081 ar5008apnx_ap81_3x3.eep
CFG_TABLE = 0xa082 ar5008apnx_ap81_2x2.eep
10.2.3 ART FW
10.2.3.1 ROM
webTFTP. EMI.
10.2.3.2 RAM Art firmware
u-bootTFTPRAM(: flash ROM). .
ART FW. ART FWv1.0.0.0.
10.2.3.3 Howto build RAMArt firmware
10.2.3.3.1
Atheros LSDK 7.1.2.32
10.2.3.3.2
1. config(LSDK(kernelpath)/arch/mips/configs /ap81fus_depconfig)CONFIG_BLK_DEV_RAMCONFIG_BLK_DEV_RAM_SIZECONFIG_BLK_DEV_INITRDCONFIG_BLK_DEV_RAM_SIZE=8192
2. configCONFIG_CMDLINEroot=01:00rd_start0x80260000rd_size0x800000(CONFIG_BLK_DEV_RAM_SIZE)
3. make uimagevmlinux.bin
4. ARTart_ap81.komdk_client.outV0_5build21cprootfs/common/libsbin(bin)ext2.shinitrd.bin
5. merge.ramvmlinux.bininitrd.binRAMFirmwarerd_startinitrd.binART Firmwaremerge.rampadkernelvmlinux.bin2MFW16M
MFG buttondownload RAMARTDeviceu-bootMFG button:
tftp 0x80060000 ap81fus-art.bin;go 0x80210000
0x80210000kernelEntry pointmake uimage
10.2.3.3.3 buildMakefile
1Wlan driver:
include scripts/$(BOARD_TYPE)/Makefile.$(BOARD_TYPE)
2ethernet driver:
enet_build: uimage
cd $(ENETDIR) && rm -f *.o *.ko *.mod.*
$(MAKEARCH) -C $(KERNELPATH) SUBDIRS=$(ENETDIR) modules
test -d $(MODULEPATH) || mkdir -p $(MODULEPATH)
cp $(ENETDIR)/ag7100_mod.ko $(MODULEPATH)
3
all: rootfs_prep busybox_build image_prep enet_build
$(TOPDIR)/build/util/ext2.sh $(INSTALL_ROOT) $(IMAGEPATH)/initrd.bin
$(TOPDIR)/build/util/merge.ram -r $(IMAGEPATH)/initrd.bin \
-u $(IMAGEPATH)/vmlinux.bin --padtotal 0xa00000 -o $(IMAGEPATH)/ap81fus-art.bin
@rm $(IMAGEPATH)/initrd.bin -f
@echo ART image name: $(IMAGEPATH)/ap81fus-art.bin
Note
10.2.3.3.4 ext2.sh
#!/bin/bash
ROOT_DIR=$1
mkdir $IMAGEPATH/tmp
sudo mknod --mode=644 $ROOT_DIR/dev/console c 5 1
sudo mknod --mode=644 $ROOT_DIR/dev/null c 1 3
sudo mknod --mode=644 $ROOT_DIR/dev/ttyS0 c 4 64
sudo mknod --mode=644 $ROOT_DIR/dev/dk0 c 63 0
sudo mknod --mode=644 $ROOT_DIR/dev/dk1 c 63 1
dd if=/dev/zero of=$IMAGEPATH/ext2img bs=1k count=8000
/sbin/mke2fs -F -v -m0 $IMAGEPATH/ext2img
sudo mount -o loop $IMAGEPATH/ext2img $IMAGEPATH/tmp
sudo cp -a $ROOT_DIR/* $IMAGEPATH/tmp
sudo umount $IMAGEPATH/tmp
#gzip -9 < ./ext2img > ./initrd.img
mv $IMAGEPATH/ext2img $2
rm -rf $IMAGEPATH/tmp
Ext2.sh
Notesudo
10.2.3.3.5 merge.ram
merge.ramvmlinux.bininitrd.bin
build/util
g++ -I./ -o merge.ram merge.ram.cpp
merge.ram.src.rar
EMBED Package
Merge.ram
10.3 Wireless driver
The wireless driver would use the modules of Atheros AP83fus driver code.
10.3.1 AP83fus driver
Fusion
Programmer's Guide.doc
10.3.2 Wlan Config file
Configserver wlan driverwlan config file/tmp/config.datreset wireless driverwlan config file
BSSVAP
vap0 vap3
wds_enable
current_channel
txpower
wir_mode
preamble
ampdu_enable
amsdu_enable
shortgi_enable
cwm_mode
rifs_enable
ext_chan_protmode
sta_num_allowed
htprot_enable
txrate
bcn_intvl
dtim_intvl
domain
rts_thres
frag_thres
wds_entry
wds_key
VAP
vap [vap_cfg[i]] [vap_def_end]vapi
opmode
vap_enable
hidden_ssid
intra_bss_enable
auth_type
encrypt
privacy
wep_def_no
wmm_enable
acl_policy
ssid
wep_key
vap_name
vlanid
acl_addr
10.3.3 PSMP
The detail content descript in appendix
10.3.4 DFS
The detail content descript in appendix
10.3.5 I/O Control
The wireless extensions are for now a set of standard ioctl call. Ioctl are used to configure the driver and issue commands. The IO control details define in linux/include/wireless.h
10.3.6 IGMP snooping
10.3.6.1
AP or Bridge should run in full 802.11n throughput (cloned unicast) to deliver IPTV "multicast" packets.
APIGMP, clientmulticastMulticast(clone)nUnitcast, unitcastclientMulticast Media11n.
10.3.6.2 IGMP snooping
stationAP basic rateLANmulti-cast Vedio/Audio stream
IGMPVedio/Audio multi-cast stream
ifnot IGMP packet && no station jion this group
drop Multi-cast packet;
else
continue to do IGMP snooping or forward IGMP packet
10.4 Configserver
APIs are provided by Config server, which could be called by other processes to configure or get current system configuration (include configuration of WLAN drivers)
10.4.1 Configserver API Related Data Structure
The primary API function of Configserver is ConfigExchange(). Its prototype is:
ExchangeResult_t ConfigExchange(
ExchangeRequestType_tRequest,
uint8_t
uchIndex,
uint32_t
ulMIB,
uint8_t
*pData,
uint32_t
ulSndSize,
uint32_t
ulRcvSize
);
Detailed information for each parameter:
1. RequestEnumerate type ExchangeRequestType_tits definition is
typedefenum ExchangeRequestType_t
{
// Exchange Request Type
CONF_REQUEST_FIELD_INFO = 0,
CONF_REQUEST_READ,
CONF_REQUEST_WRITE,
CONF_REQUEST_REMOVE,
CONF_REQUEST_HIT
} ExchangeRequestType_t;
2. uchIndex
Under client mode, ulMIB represents number of wireless network card with 0 for the first card and 1 for the second one. (Under vap mode, the lower four bits of uchIndex represents the number of vap, the value is 0-7, while the higher four bits represents the number of card.)
Under bridge or router mode, ulMIB represents the number of network port with 0 for bridge, 1 for wired port under router mode and 2 for wireless port under router mode.
uchIndex must be 0 when the ulMIB is set to other value.
3. ulMIB: Represents the only identifier for each config of configserver API. Please refer to 6.2 for details.
4. pDataSet MIB of configserver to the pointer of data in ulMIB interface. If the Request is CONF_REQUEST_READ or CONF_REQUEST_FIELD_INFO, then the data of this pointer will be filled when the function returns; if the Request is CONF_REQUEST_WRITE or CONF_REQUEST_REMOVE, then the data pointed by this pointer will be set into configserver.
5. ulSndSize: If the Request is CONF_REQUEST_WRITE or CONF_REQUEST_REMOVE, ulSndSize represents the data pointed by pData; if the Request is CONF_REQUEST_READ or CONF_REQUEST_FIELD_INFO, ulSndSize means nothing.
6. ulRcvSizeIf the Request is CONF_REQUEST_READ or CONF_REQUEST_FIELD_INFO, ulRcvSize represents the size of data pointed by pData; if the Request is CONF_REQUEST_WRITE or CONF_REQUEST_REMOVE, ulRcvSize means nothing.
Besides, there are other API functions ConfigRequestFieldInfo(), ConfigReadInteger(), ConfigWriteInteger(), ConfigReadString(), ConfigWriteString(),ConfigRemoveString(), ConfigReadStruct(), ConfigWriteStruct(); all these are the encapsulations of function ConfigExchange(), refer to /work/oem/public/include/wag302client.h for details.
10.4.2 MIB ID Definition for Configserver
MIB stands for management information base. Please refer to /work/oem/public/include/wag302mib.h and /work/oem/public/include/wag302def.h for the MIB ID and definition on related data structure of Configserver. The following is the definition of MIB and corresponding dada structure of Configserver.
The detail content descript in appendix.
10.5 Hostapd & WPA_Supplicant Modules
Hostapd & Supplicant modules mainly are used for 802.1x, WPA and WPA2 authentication and encryption.
Hostapd & Supplicant modules contain authenticator and supplicant.
Authenticator supports the following modes:
802.1X
WPA
WPA-PSK
WPA2
WPA2-PSK
The Supplicant supports please refer to AP client Enterprise.
10.5.1 Logic Idea
FIGURE 103 Hostapd & WPA_Supplicant Modules Flow Chart
10.5.2 Interface
Hostapd & Supplicant modulesDriverdriverIO Control.
Hostapd & Supplicant modules.
Supplicant
Supplicant_conf.t
xt
Hostapd
Hostapd_conf.txt
10.6 WSC (WPS APUT and WPS STAUT)
10.6.1 Wsc Overview
WSCDUTwscAP / StationClients PINPBCStationAP.
WPS
PIN
Push Button
10.6.2 WPS GUI Disign
WPS APUT GUI
Design v8.ppt
10.6.3 WSC
WPS.doc
10.7 DHCP server
AN-1521DHCP SERVERDHCP SERVER
1 /DHCP Server
2 DHCP ServerIP
3 DHCP Server
4 DHCP ServerGateway
5 DHCP ServerWins
6 DHCP ServerDNS
10.8 NTP client
NTP Client
1
2
3 NTPNTP
4 IPNTP
10.9 Wins
WINSWindows Internet Name ServerWindowsWINSNetBIOSWINSNetBIOSIP
NetBIOSnn-1WINS
"wins -p %s>/dev/null"%swinsIPdefault"killall -9 wins""wins -p %s>/dev/null"%swinsIP
10.10 ZVlan
Zvlan module is a simple idea for replace the Linux 802.1Q stack. Make it easy to configure VLAN management ID for special application.
10.10.1
vlanTagvlanTag2hookZvlan,
static struct nf_hook_ops s_HookZvlanIn =
{{ NULL, NULL }, ZcomVlanPacketRx, THIS_MODULE ,PF_BRIDGE, NF_BR_PRE_ROUTING, -100};
static struct nf_hook_ops s_HookZvlanOut =
{{ NULL, NULL }, ZcomVlanPacketTx,THIS_MODULE , PF_BRIDGE, NF_BR_POST_ROUTING, -99};
10.10.2 Logic Idea
Start
module
nf_register_hook
IN/OUT
8021Q
VlanTag
VlanID
ManagementID
VlanTag
ManagementID
VlanTag
ManagementID
VlanTag
FIGURE 104 Zvlan Module Flow Chart
10.11 Multiclient
10.11.1
AP-Client//MulticlientARPIPMACMACIP-MACARPIPIP-MACMACMAC AP-Client
10.11.2 Detail Functions
1. Multi Ethernet PC support. Up to 128 MAC addresses.
2. Layer2 protocol support: IP/ARP/IPX.
3. Layer3/4 protocol support: DHCP.
4. Auto Cloned MAC address within first Ethernet ARP/IP packet
10.11.3 Logic Idea
2hookMulticlient,
static struct nf_hook_ops s_HookMultiCliIn =
{{ NULL, NULL }, PacketInMultiCli, THIS_MODULE ,PF_BRIDGE, NF_BR_PRE_ROUTING, -100};
static struct nf_hook_ops s_HookMultiCliOut =
{{ NULL, NULL }, PacketOutMultiCli,THIS_MODULE , PF_BRIDGE, NF_BR_POST_ROUTING, -99};
Start
Module
nf_register_hooK
IN/OUT
ath0/WIFI0
ath0/WIFI0
MAC
MAC
eth0
Multiclient
eth0
Multiclient
Multi Client
FIGURE 105 Multi-client Module Flow Chart
ARP/IP
ARP
IP
ARP
IP
IPX
IPX
MAC
eth0
MACIP-MACMACIP
IP
IP
IP
IP-MACMAC
MAC
MAC
IP
ARP
IP
ARP
IP
IPXIPX
MAC
eth0
IPDHCPIP
IP
IP
IPMAC
IPMACIP-MAC
MAC
MAC
IP
DHCP
DHCP
5. .
10.12 AnyIP
1 PCIPIPMASKGatewayDNS and so onPC
AnyIPPCPCDHCP ClientDHCP ServerAnyIP
PCPCMACPC
10.12.1 ARP Request
ARP Request IPAPIP ,MAC
ARP Request ethernet bridge ARPAnyIpARP Request ARPAnyIPARPbridgeARP ARPRequestbridgeARP RequestARP option
ARP from Wireless
ARP Response(SMAC + SIP + DIP)
ARP Request (SMAC + SIP + DIP)
FIGURE 106 Anyip Arp data flow chart
10.12.2 IP packet
IP
IP
NAT Table
IP Data PacketSMAC + SIP + DMAC + DIP
NAT
NAT
FIGURE 107 Anyip IP DNAT flow chart
IP data Packet
NAT Table
IP Data PacketSMAC + SIP +
DMAC + DIP
NAT
FIGURE 108 Anyip IP NAT flow chart
1) ICMP
ICMPpingICMPAnyIP
AnyIPICMP NAT ping request IPIPIPethernetMACICMPAnyIPICMP
ping requestIPIP icmp_nat_tblNATNATNAT
a NATICMPICMP
b ICMPAnyIP
c IPIPAPIP
d IPICMP
ping replyICMPICMP NAT NATNAT
a natICMP
b natIPIPIP
c natMACethernetMAC
d IPICMP
2 UDP
UDPUDPUDPUDPNATAnyIPUDPTCPNATUDPIPIPIPUDPethernetMAC
UDPIP,IPMACnat_tblNAT
a natUDP
b APIPIPIP
c UDP
UDPDNSUDP53DNSAnyIPIPIPAPDNSIP
d IPUDP
UDPAnyIPNATNATNAT
a NATUDP
b NATIPIPIP
c NATMACethernetMAC
d NATDNSUDP53NATIPIPIP
e IPUDP
3TCP
UDPTCPTCPUDPNATUDPTCPUDPNATTCPNAT32AnyIPNATNATTCP
TCPUDPNATNAT
a NAT
b FTP21FTPFTPFTPPORTFTPPORT
A PORT
B PORTFTP
C BNAT
D FTPPORTLinuxNATset_ftp_data_port()
1 PORT160DH0AH
2 TCP
3 PORTPORT
If skb_put()skb---taillenLinuxbridgedriverbridgeskbdriverdriverdrivercode,skbIPIP
If skb_trim()skblentail, IPIP
4 TCP
5 PORTFTP PORT
6 skb
7
c natTCP
d APIPIPIP
e TCPsyn
If (th->syn) TCP32TCP1NAT
Else TCP32TCPNAT
fIPTCP
TCPNATNATNAT
a NATUDP
b NATIPIPIP
c NATMACethernetMAC
d NATTCP
e IPTCP
10.12.3 AnyIPNAT
AnyIPNATICMP NATUDP/TCP NATbridge AnyIPNATbridge_timer()anyip_tbl_aged(),5NAT
10.13 Zcommisc(GPIO/LED)
AN-1521GPIOZCOMMISCGPIOLINE
static ZComGpioInfo_t s_GpioInfoCache[GPIO_PIN_MAX+1] =
{
{{GPIO_OUT | GPIO_WPS_LED,GPIO_LED_OFF, {0}}},
{{GPIO_IN | GPIO_WPS_BTN,GPIO_BTN_RELEASED, {0}}},
{{GPIO_OUT | WLAN_INIT_LED,GPIO_LED_OFF, {0}}},
{{GPIO_IN | GPIO_RESET_BTN,GPIO_BTN_RELEASED, {0}}}
};
ZComGpioInfo_t
typedefstructZComGpioInfo_t
{
struct ZComGpioIoReq_t req;
uint32_t ulLedDuration;// in jiffies
} ZComGpioInfo_t;
ZComGpioIoReq_t
typedefstruct ZComGpioIoReq_t
{
uint32_tulGpioLine;
uint32_tulStatus;
union
{
uint32_tulBtnDuration;// Button Status Duration in millisecond.
LedBlinkInfo_t LedBlinkInfo;
};
} ZComGpioIoReq_t;
static void ZComGpinLineUpdate(ZComGpioInfo_t *pGpioInfo)
static void ZComGpoutLineUpdate(ZComGpioInfo_t *pGpioInfo)
ZComMiscIoctl(COMMAND_GPIOLINE_STATUS_SET, &GpioReq); GPIOCOMMAND_GPIOLINE_STATUS_SETioctrl
GPIO_LINEs_GpioInfoCache[]GPIO_LINE
typedef enum ZComGpioLine
{
GPIO_LINE_WPS_LED,
GPIO_LINE_WPS_BTN,
GPIO_LINE_WLAN_INIT_LED,
GPIO_LINE_RESET_BTN,
} ZComGpioLine_t; s_GpioInfoCacheGPIO_LINEindexZComMiscIoctl(COMMAND_GPIOLINE_STATUS_SET, &GpioReq);GPIO_LINEset
10.14 System Log
10.14.1 Format
FIGURE 109 System Log Format
10.14.2 Definition
AP
1. WLAN service started
2. WLAN service stopped
3. AP MIC failed
4. AP MIC attacked
5. Station authenticated
6. Station authentication failed
7. Station deauthenticated
8. Station provide a wrong key
9. Station associated
10. Station reassociated
11. Station association failed
12. Station disassociated
13. Station refused
Client
1. WLAN service started
2. WLAN service stopped
3. AP MIC failed
4. AP MIC attacked
5. Station authenticated
6. Station authentication failed
7. Station deauthenticated
8. Station provide a wrong key
9. Station associated
10. Station reassociated
11. Station association failed
12. Station disassociated
13. Station refused
Bridge & Repeater
1. WLAN service started
2. WLAN service stopped
3. AP MIC failed
4. AP MIC attacked
5. Remote Bridge AP configured
6. Remote Bridge AP deleted
10.14.3 Syslog proc file
ConfigserverWEB Server/proc/syslogIOCTRLSyslogSyslog
void sysLogList(int eid, webs_t wp, int argc, char_t **argv)
/proc/syslogweb
void formSysLog(webs_t wp, char_t *path, char_t *query)
IOCTRLSyslog
10.14.4 Syslog API
SyslogSyslog
void ZComLogAppendWlan(
unsigned shortusIdentification,// refer to ZComLogID
unsigned charpuchMacAddress[6]
)
syslog/proc/syslog
Syslog
Start
Syslog
Y
N
Exit
Syslog
Y
/proc/syslog
/proc/
syslog
Syslog
UI
Get
GPIO_Module
Clear
Clear log
FIGURE 1010 Syslog Module
void ZComLogAppendWlan(
unsigned shortusIdentification,// refer to ZComLogID
unsigned charpuchMacAddress[6]
)
static int zcom_log_read(char *buf, char **start, off_t offset,
int length, int *eof, void *data)
static int zcom_log_write(struct file *file, const char *buf,
unsigned long len, void *data)
voidZComLogClear(void)
Syslog
11 Performance
Test Structure:
Pair 1: DUT1->DUT2
Pair 2: DUT2->DUT1
Software:Ixia Chariot 5.4
Test Script: Throughput
12 Appendix
12.1 MIB ID Definition for Configserver
1. MIB_PRODUCT
Type: INT
Access: Read
Default:
Description: Diversify different products.
2. MIB_HOST_NAME
Type: string
Access: Read/Write
Default:
Description: Identify AP name to support wins protocol.
3. MIB_FIRMWARE_VERSION
Type: string
Access: Read
Default: 1.1.11.0
Description: Identify firmware version.
4. MIB_USER_NAME
Type: string
Access: Read
Default: admin
Description: Identify the username of administrator, this option and the password below help to login and manage the device.
5. MIB_PASSWORD
Type: string
Access: Read/Write
Default: password
Description: Identify the password of administrator, this option and the username above help to login and manage the device.
6. MIB_TIME_SERVER
Type: string
Access: Read/Write
Default:
Description: Identify that AP could synchronize domain name or IP with current time server.
7. MIB_TIME_SERVER_PORT
Type: INT
Access: Read/Write
Default: 123
Description: Identify the port number of the time server above.
8. MIB_TIME_ZONE
Type: STRUCT
Access: Read
Default:
Description: Identify the time zone supported by AP.
9. MIB_TIME_ZONE_INDEX
Type: INT
Access: Read/Write
Default: 0xF8F80001UL
Description: Identify the time zone currently selected.
10. MIB_TIME_DAYLIGHT_SAVING
Type: INT
Access: Read/write
Default: 0
Description: Identify the Daylight properties of current time zone, namely daylight saving time.
11. MIB_TIME
Type: string
Access: Read
Default:
Description: Identify current time of device (obtain by time server synchronization).
12. MIB_REBOOT
Type: INT
Access: write
Default:
Description: This is for reboot the device.
13. MIB_RESTORE_FACTORY
Type: INT
Access: read/write
Default:
Description: Introduce or deduce the factory file (device configuration file) of device.
14. MIB_CLEAR_SYSLOG
Type: INT
Access: write
Default:
Description: Clear up system log information
15. MIB_FILE_ACCESS_START
Type: INT
Access: read/write
Default:
Description: Identify the file to be uploaded from or downloaded to the device, e.g. upload and upgrade firmware, upload or download factory file, download MIB file of SNMP.
Note: It is required to co-use with MIB_FILE_ACCESS_FINISH when using this MIB and uchIndex must be the following (except FILE_ACCESS_CONFIG and FILE_ACCESS_LAST)
//MIB_FILE_ACCESS_START && MIB_FILE_ACCESS_FINISH
typedefenum FileAccessIndex_t
{
FILE_ACCESS_CONFIG = 0,
// read/write
FILE_ACCESS_FIRMWARE,
// write-only
FILE_ACCESS_VERSION,
// read-only
FILE_ACCESS_CLIENT_LIST,// read-only
FILE_ACCESS_SNMP_MIB,
// read-only
FILE_ACCESS_FACTORY_SETTING,// read/write
FILE_ACCESS_STATUS,
// read-only
FILE_ACCESS_LOGOCONFIG, // write-only
FILE_ACCESS_LAST
} FileAccessIndex_t;
16. MIB_FILE_ACCESS_FINISH
Type: INT
Access: read/write
Default:
Description: Identify file upload to or download from the device has been finished, see above for details.
17. MIB_SYS_MAC_ADDRESS
Type: string
Access: read
Default:
Description: Identify MAC of system network card.
18. MIB_SYS_COUNTRY
Type: string
Access: read/write
Default: Unite State
Description: Identify the country that the AP is using, channel varies with countries.
19. MIB_BRIDGE_SPANNING_TREE
Type: INT
Access: read/write
Default: 1
Description: Identify whether the STP of bridge is enabled
20. MIB_ROUTE_MODE
Type: INT
Access: read/write
Default: 0
Description: Identify current mode, bridge or router (WAN could be at either wired or wireless port under router mode).
21. MIB_NAT_ENABLE
Type: INT
Access: read/write
Default: 0
Description: Identify whether NAT is enabled, NAT must be enabled if under router mode.
22. MIB_ANYIP_ON_ROUTE
Type: INT
Access: read/write
Default: 0
Description: Identify whether Any IP is enabled under router mode.
Note: With any IP enabled, devices at LAN associating with AP could access IP network at WAN through this AP with any IP address entered
23. MIB_NET_TYPE
Type: INT
Access: read/write
Default: 0
Description: Identify IP type of system network port.
Bridge port could be set to static IP or DHCP Client under bridge mode.
Under router mode, WAN could be static IP or DHCP Client, while LAN could be static IP or DHCP Server.
Note: Set uchIndex to the following:
typedefenum DevPortIndex_t
{
DEV_PORT_BRIDGE= 0,
DEV_PORT_ETH,
DEV_PORT_WLAN,
DEV_PORT_LAST
} DevPortIndex_t;
24. MIB_NET_IP
Type: string
Access: read/write
Default: 192.168.1.1
Description: Identify IP of network port. It represents IP addresses of different ports when uchIndex is set to the following:
typedefenum DevPortIndex_t
{
DEV_PORT_BRIDGE= 0,
DEV_PORT_ETH,
DEV_PORT_WLAN,
DEV_PORT_LAST
} DevPortIndex_t;
25. MIB_NET_MASK
Type: string
Access: read/write
Default: 255.255.255.0
Description: Represents IP mask of network port with uchIndex set same as above.
26. MIB_NET_GATEWAY
Type: string
Access: read/write
Default: 255.255.255.0
Description: Represents gateway of network port with uchIndex set same as above.
27. MIB_NET_DNS_PRIMARY
Type: string
Access: read/write
Default: 0.0.0.0
Description: Represents the first DNS address of network port with uchIndex set same as above.
28. MIB_NET_DNS_SECONDARY
Type: string
Access: read/write
Default: 0.0.0.0
Description: Represents the second DNS address of network port with uchIndex set same as above.
29. MIB_IP_RANGE_START
Type: string
Access: read/write
Default:
Description: Represents the begin address of IP pool managed by DHCP Server when the network port is set to DHCP Server, uchIndex must be LAN of router.
30. MIB_IP_RANGE_END
Type: string
Access: read/write
Default: 0.0.0.0
Description: Represents the end address of IP pool managed by DHCP Server when the network port is set to DHCP Server, uchIndex must be LAN of router.
31. MIB_IP_RANGE_NETMASK
Type: string
Access: read/write
Default: 255.255.255.0
Description: Represents the mask of IP pool managed by DHCP Server when the network port is set to DHCP Server, uchIndex must be LAN of router.
32. MIB_IP_RANGE_GATEWAY
Type: string
Access: read/write
Default: 255.255.255.0
Description: Represents the gateway of IP pool managed by DHCP Server when the network port is set to DHCP Server, uchIndex must be LAN of router.
33. MIB_DHCPS_LEASE
Type: string
Access: read/write
Default: 255.255.255.0
Description: Represents the longest IP life of IP pool managed by DHCP Server when the network port is set to DHCP Server, uchIndex must be LAN of router.
34. MIB_VLAN_ENABLE
Type: INT
Access: read/write
Default: 0
Description: Represents whether VLAN is enabled under AP mode.
35. MIB_VLAN_MANAGE_ID
Type: INT
Access: read/write
Default: 0
Description: Represents manage ID of VLAN.
36. MIB_ETHERNET_DATARATE
Type: INT
Access: read/write
Default: 0
Description: To set data rate of wired network card.
37. MIB_ETHERNET_STATS
Type: STRUCT
Access: read
Default:
Description: To get status of current wired network card.
38. MIB_RADIUS_IP
Type: string
Access: read/write
Default:0.0.0.0
Description: Represents IP address of radius server.
39. MIB_RADIUS_PORT
Type: INT
Access: read/write
Default:1812
Description: Represents port number of radius server.
40. MIB_RADIUS_SECRET
Type: string
Access: read/write
Default:
Description: Represents access password of radius server.
41. MIB_SSH_DAEMON
Type: INT
Access: read/write
Default:1
Description: Represents whether SSH is enabled.
42. MIB_SNMP_DAEMON
Type: INT
Access: read/write
Default:1
Description: Represents whether SNMP is enabled.
43. MIB_SNMPD_TRAP_SERVER
Type: string
Access: read/write
Default:1
Description: Represents trap server address of SNMP.
44. MIB_SNMPD_READ_COMMUNITY
Type: string
Access: read/write
Default:
Description: Represents read community of SNMP.
45. MIB_SNMPD_WRITE_COMMUNITY
Type: string
Access: read/write
Default:
Description: Represents write community of SNMP.
46. MIB_SYSLOG_DAEMON
Type: INT
Access: read/write
Default: 1
Description: Represents whether log service is enabled.
47. MIB_SYSLOG_SERVER_IP
Type: string
Access: read/write
Default: 0.0.0.0
Description: Represents log server address of AP.
48. MIB_SYSLOG_SERVER_PORT
Type: INT
Access: read/write
Default: 514
Description: Represents log server port of AP.
49. MIB_HTTP_REDIRECT
Type: INT
Access: read/write
Default: 0
Description: Represents whether HTTP redirect is enabled.
50. MIB_HTTP_REDIRECT_URL
Type: string
Access: read/write
Default:
Description: Represents URL parameters of HTTP redirect.
Note: By enabling HTTP Redirect and entering an IP address in URL, then when other devices associating with this AP attempt to login the internet for browsing web via it for the first time, the first page is forced to be what the specified IP address shows
51. MIB_WLAN_VERSION
Type: string
Access: read/write
Default:
Description: Represents version of WLAN driver.
52. MIB_WLAN_LOCAL_MAC
Type: string
Access: read
Default:
Description: Represents MAC of wireless network card.
53. MIB_WLAN_OPERATION_MODE
Type: INT
Access: read/write
Default: 0
Description: Represents Operation Mode of wireless network card, its value is:(Imcomplete)
typedefenum WlanOperationMode_t
{
WLAN_OPERATION_AP = 0,
WLAN_OPERATION_AP_CLIENT,
WLAN_OPERATION_P2P,
WLAN_OPERATION_P2P_AP,
WLAN_OPERATION_P2MP,
WLAN_OPERATION_P2MP_AP,
WLAN_OPERATION_REPEATER,
WLAN_OPERATION_AUTOWDS,
WLAN_OPERATION_INTERBUILD,
} WlanOperationMode_t;
54. MIB_WLAN_WIRELESS_MODE
Type: INT
Access: read/write
Default:
Description: Represents Wireless Mode of wireless network card, its value is:(Imcomplete)
typedefenum WlanWirelessMode_t
{
WIRELESS_MODE_AUTO = 0,
// 11b/g auto
WIRELESS_MODE_11A,
WIRELESS_MODE_11B_ONLY,
WIRELESS_MODE_11G_ONLY,
WIRELESS_MODE_11A_TURBO,
} WlanWirelessMode_t;
55. MIB_WLAN_SSID
Type: string
Access: read/write
Default: wireless
Description: Represents SSID of wireless network card driver
56. MIB_WLAN_MAXSTANUM
Type: INT
Access: read/write
Default: 255
Description: Represents the most stations coould be connected with wireless network card under AP mode.
57. MIB_WLAN_SSID_BROADCAST
Type: INT
Access: read/write
Default: 1
Description: Represents whether broadcast SSID is enabled on wireless network card under AP mode.
58. MIB_WLAN_CHANNEL
Type: INT
Access: read/write
Default:
Description: Represents current channel of wireless network card driver
59. MIB_WLAN_TRANSMIT_RATE
Type: INT
Access: read/write
Default:
Description: Represents transmission rate of wireless network card driver
60. MIB_WLAN_TRANSMIT_POWER
Type: INT
Access: read/write
Default:
Description: Represents transmission power of wireless network card driver
61. MIB_WLAN_WMM
Type: INT
Access: read/write
Default: 0
Description: Represents whether WMM card is enabled on wireless network.
62. MIB_WLAN_RTS_THRESHOLD
Type: INT
Access: read/write
Default: 2346
Description: Represents when wireless packet sent by wireless network card is larger than this value, RTS/CTS handshake communication is required to ensure secure transmission of this packet.
63. MIB_WLAN_FRAGMENT_THRESHOLD
Type: INT
Access: read/write
Default: 2346
Description: Represents when wireless packet sent by wireless network card is larger than this value, packet division is required to send this big packet.
64. MIB_WLAN_BEACON_INTERVAL
Type: INT
Access: read/write
Default: 100
Description: Represents beacon time interval of wireless network card.
65. MIB_WLAN_DTIM_INTERVAL
Type: INT
Access: read/write
Default: 1
Description: Represents DTIM time interval of wireless network card.
66. MIB_WLAN_SPACE_IN_METER
Type: INT
Access: read/writ