Application Note: JN-AN-1155 JenNet Home Alarm System

Size: px
Start display at page:

Download "Application Note: JN-AN-1155 JenNet Home Alarm System"

Transcription

1 Application Note: JN-AN-1155 JenNet Home Alarm System This Application Note provides software to demonstrate a Home Alarm System, operating as a JenNet wireless network, with the following features: Controller device (with LCD panel) to manage the alarm system Multiple alarm devices for sounding alarms Multiple sensor devices reacting to digital inputs for monitoring contacts or PIR sensors All devices include tamper detection reporting The Application Note also incorporates features from the following Application Notes, demonstrating their use in a complete system: JN-AN-1116 JenNet Controlled Network Membership : Allows Coordinator node to exert control over which new devices are able to join its network JN-AN-1086 JenNet Over Network Download : Allows device software to be updated by transmitting it through the network while network continues to run Application Overview The JenNet Home Alarm System uses boards from the NXP JN5148-EK010 Evaluation Kit to build a typical alarm system comprising a control panel, motion sensors and alarms, as illustrated in the diagram below. The devices of the system are then described. Alarm Motion Sensor Motion Sensor Control Panel Motion Sensor Motion Sensor Alarm JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

2 Controller Device JenNet Home Alarm System The controller device acts as the control panel providing the user interface for the system via an LCD panel and buttons. These can be used to monitor the status of the system and arm or disarm it. The controller device also features a piezo-sounder to generate warning tones while the system is being armed and disarmed, in addition to a local alarm indication. The controller device also acts as the network Coordinator node, forming the JenNet network for the other devices to join. The controller device needs to be permanently powered. The LCD panel and button interface is used to control other devices joining the network - this ensures that alarm and sensor devices only join the correct network. The device application runs on the evaluation kit controller board which provides the LCD panel and buttons for the user interface, with the piezo-sounder being added via the 40-pin expansion connector on the board. Alarm Devices An alarm device is responsible for sounding the alarm using a piezo-sounder when motion or tampering is detected in the system under control of the controller device. There may be more than one alarm device in a system. The alarm devices act as network Router nodes extending the JenNet network for other nodes to join. An alarm device therefore needs to be permanently powered. The device application runs on evaluation kit sensor boards with the piezo-sounder being added via the 40-pin expansion connector on a board. Sensor Devices A sensor device is used to monitor contact points or a PIR detector, and to report activity to the controller device. The sensor devices act as End Device nodes in the JenNet network, entering sleep mode to preserve power when not active. A sensor device may therefore be battery-powered. The device application runs on evaluation kit sensor boards. 2 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

3 Hardware Configuration The Application Note software is written to run on the controller board and sensor boards included in the JN5148-EK010 evaluation kit. For the purposes of this Application Note, some pins on each board s 40-pin expansion connector (J4) need to be connected together for example, to add a piezo-sounder. The required pin connections are detailed below. Controller Device Configuration The controller device application runs on the evaluation kit controller board (with LCD panel). The following modifications should be made on the board s 40-pin expansion connector: The tamper detection circuit is formed by connecting pins 15 and 16 together. The piezo-sounder ground should be connected to pin 40 with the input connected to pin 14. This configuration is illustrated in the following diagram: Alarm Device Configuration The alarm device application runs on evaluation kit sensor boards. The 40-pin expansion connector of each of these boards should be configured in an identical fashion to the controller device (described above). Sensor Device Configuration The sensor device application runs on evaluation kit sensor boards. The following modifications should be made on the 40-pin expansion connector of each of these boards: The tamper detection circuit operates on pulse counter 0 of the JN5148 microcontroller. For the purposes of this Application Note, pulse counter 0 can be connected to switch SW1 by connecting together pins 2 and 10 of the 40-pin expansion connector. The motion sensor detection circuit operates on pulse counter 1 of the JN5148 microcontroller. For the purposes of this Application Note, pulse counter 1 should be connected to switch SW2 by connecting together pins 9 and 11 of the 40-pin expansion connector. This configuration is illustrated in the following diagram: JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

4 Running the Application The application is best demonstrated by programming the pre-built binary files into the evaluation kits boards as described in the Building and Loading the Application section at the end of this document. Controller Device Initialisation When the controller device is started, the Initialisation screen will be displayed: Home Alarm System NXP OK LED1 will flash rapidly while the system controller establishes the network in its role as the Coordinator. Pressing switch SW1 below OK will display the Status screen, which is the main screen of the application. This screen displays the current status of the devices in the system while the system is unarmed. Until additional devices are allowed to join the network, it will only display an entry for the controller device (the dash indicates normal status for the controller device): Control - Arm Det Pin Sys Adding Additional Devices In order to allow the additional alarm and sensor devices into the network, the network must be opened by means of the System screen. Pressing switch SW4 below Sys on the Status screen will prompt for a PIN before allowing access to the System screen: SYSTEM Enter current PIN The 4-digit PIN can be entered by pressing the switches SW1 through SW4 below the corresponding numbers on the display. The default PIN for a new system is Once 4 digits have been entered, the display will update to allow the number to be accepted: 4 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

5 SYSTEM Enter current PIN OK Clear Cancel Pressing SW3 below Cancel will abort the attempt to access the System screen and return to the Status screen. Entering an incorrect PIN or pressing SW2 below Clear will clear the entered PIN to allow another attempt to enter the correct PIN. Pressing SW1 below OK will accept the entered PIN and, if correct, display the System screen: SYSTEM Network closed OK Open Rst Rst Pressing SW1 below OK will return to the Status screen. Pressing SW2 below Open will open the network, allowing other nodes to request permission to join. The network remains open for a limited time, as indicated on the display in seconds: SYSTEM Network open 120 OK Close Rst Rst The network may be closed at any time by pressing SW2 below Close on the display. Note: The Rst options in the System screen will be described later in this document. An alarm or sensor device may then be started. When a device detects the network and attempts to join, the Authorisation screen will be displayed on the controller device: AUTHORISE Address 00158d00 000e69c2 Accept Reject The MAC address of the device requesting authorisation will be displayed on the screen. The MAC address is a 64-bit number which is unique to each device. To accept the node into the network, press SW1 below Accept on the display. To reject the node, press SW3 below Reject. The display will then return to the System screen. JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

6 Once the Authorisation screen has been displayed for a device, the network is automatically closed - only one device may be accepted into the system at a time. Additional devices can be added by opening the network once again from the System screen. While devices are attempting to join the network, they will flash their LED1 rapidly. On sensor devices, LED1 may stop flashing from time-to-time as End Device nodes sleep between network scan attempts. When all devices have been added to the system, pressing OK will return to the Status screen. System Operation Once alarm and sensor devices have been added to the network, the system can be controlled in the following way. Status Screen The Status screen shows the status of all devices in the network. A fully configured system will appear as follows: Control - Landing T Alarm1 Alarm2 - Bed1 - Bed2 - - Hall - Bed3 - Dining Lounge L M Kitchen - Arm Det Pin Sys Each device s status is indicated by a letter: - indicates that the device is operating normally L indicates that the device has been lost and is no longer reporting to the controller device T indicates that the device has been tampered with and should be investigated M indicates that motion has been detected by a sensor node j indicates that the device has just joined or re-joined the network x indicates that the device has just received new software via the UART s indicates that the device has started downloading software over the radio f indicates that the device has finished downloading software over the radio Pressing a switch will change the display screen as follows: Arm displays the Arming screens that allow the system to be armed Det displays the Detail screens, allowing device details to be reviewed Pin displays the PIN screen, allowing the PIN to be changed Sys displays the System screen for advanced system operations 6 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

7 Arming Screens These screens allow the system to be armed. The first screen will request the current PIN before arming the system: DISARMED Enter PIN to arm OK Clear Cancel Pressing Cancel will return to the Status screen without arming the system. Pressing Clear will clear the PIN, if entered incorrectly. Pressing OK for the correct PIN will display the Arming screen or for an incorrect pin will request that the PIN be re-entered. ARMING 30 Enter PIN to disarm The Arming screen displays a countdown during which the alarm will not be sounded. The system can be disarmed again during this time by entering the correct PIN. Once the countdown reaches 0, the Armed screen is displayed: ARMED Enter PIN to disarm In the Armed screen, the PIN may be entered to disarm the system. If motion is detected while the system is armed, the Activating Alarm screen will be displayed with a countdown. If the correct PIN is not entered before the countdown reaches 0, the alarm will be sounded: ACTIVATING ALARM 30 Enter PIN to disarm JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

8 If the alarm sounds, the Alarm screen will be displayed. Entering the correct PIN will silence the alarm: ALARM Enter PIN to disarm Note: There is a short period after arming the system during which an alarm will not be raised if motion is detected (see Arming screen above). This period allows motion detected when exiting the building to be cleared from the system. Detail Screens The Detail screens provide detailed information on each device in the system: 07 of 11 Sensor Address 00158d00 000e69c2 Name Bed2 Sw Snsr Snsr Ver OK Next Num Name The top row displays the number of the device in the system and its device type. The second and third rows display the device s address. The fourth row displays the name assigned to the device. The fifth and sixth rows display the software and version information loaded into the device. Three data columns span these two rows but only one or two columns are ever displayed. The left-most column indicates the software currently running on the device, the centre column indicates the software that has been downloaded to the device (which it may update to) and the right-most column (not shown) indicates the software currently being downloaded to the device. Pressing the switches will perform the following actions: OK: Returns to the Status screen Next: Displays the details for the next device in the system Num: Allows the numeric part of the name to be changed for alarm and sensor devices (the value may be in the range 1 to 9, or there may be no numeric part) Name: Allows the name of a sensor device to be changed to indicate its location. Changing the name automatically removes the numeric part of the name. The name may be one of the following: Bath, Bed, Dining, Garage, Hall, Kitchen, Lounge, Sensor, Study, Toilet 8 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

9 Set PIN Screens The Set PIN screens allow the PIN to be changed. The system will first prompt for the current PIN: SET PIN Enter current PIN OK Clear Cancel Once the correct PIN has been entered, a new PIN can be provided: SET PIN Enter new PIN OK Clear Cancel The system will then return to the System screen. System Screen The System screen allows access to system configuration options. The current PIN must be entered to access this screen: SYSTEM Network closed OK Open Rst Rst The buttons below the options perform the following tasks: OK: Returns to the status screen. Open/Close: Opens and closes the network to control whether new nodes are able to join, as described in the section Adding Additional Devices. Rst: Pressing both buttons marked Rst together will fully reset the controller to a factory condition, removing all nodes in the system from memory. Nodes will need to be reauthorised in order to rejoin the network. JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

10 Tamper Detection If tampering is detected on a device, an alarm will be sounded on the controller device. If the system is armed, the alarm devices will also sound an alarm. If an alarm device detects it has been tampered with, it will sound an alarm locally. The controller device will request the current PIN in order to silence the tamper alarm: TAMPER Enter PIN to disarm While the tamper circuit is broken, the Status screen will display a T next to the device. However, the alarm will not be sounded again for that device while the tamper circuit remains broken. Lost Device Detection If the controller device does not receive regular communications from a device, it will consider the device to be lost from the system. An alarm will be sounded on the controller device. If the system is armed, the alarm devices will also sound an alarm. The controller device will request the current PIN in order to silence the lost device alarm: TAMPER Enter PIN to disarm While the device is lost, the Status screen will display an L next to the device. However, the alarm will not be sounded again for that device while it remains lost. Lost Controller Detection If an alarm device detects that it is no longer in communication with the controller device, it will sound an alarm for a period of time. When alarm or sensor devices lose contact with the network, they will only attempt to re-join the network that they originally joined and will do this for a limited period of time. If the controller device needs to be replaced in a system, it may be necessary to wait for this period until the alarms and sensors can be re-introduced to the system. 10 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

11 Device Indicators The devices in the system also indicate their status locally using LEDs as follows: Controller Device LED1 is flashed rapidly while the network is being formed. LED1 then lights briefly whenever data is transmitted or received over the radio. LED2 is lit whenever the controller device is sounding its alarm. Alarm Device LED1 is flashed rapidly while the alarm device is attempting to join the network. LED1 then lights briefly whenever data is transmitted or received over the radio. LED2 is lit whenever the alarm device is sounding its alarm. Sensor Device LED1 is flashed rapidly while the alarm device is attempting to join the network, but it may stop while sleeping between scan attempts. LED1 then lights briefly whenever data is transmitted or received over the radio. LED2 is lit (while awake) whenever the sensor device detects motion. System Update The software in the devices can be updated using the Over Network Download features of the application. These features are accessed via UART0 on the controller device running at baud, 8 data bits, no parity, one stop bit. A standard terminal application such as HyperTerminal can be used for this. Software Download The process is initiated by entering Ctrl-r into the terminal application. The message XMODEM erasing software... will be displayed while the Flash memory is erased in preparation for the new software. This will be followed by the message XMODEM receive (Ctrl-x to cancel)... when the controller device is ready to receive the software image. This can be cancelled at any time by pressing Ctrl-x and will automatically cancel after approximately 4 minutes if no data is transferred. Once in receive mode, updated sensor software may be transferred using the XMODEM protocol in CRC or 1K mode via the terminal application. When the software has been transferred into the controller device, from there it will begin to be downloaded through the network as indicated by the frequent flashing of LED1 on all devices. The sensor software must be downloaded into all devices in the system including the alarm devices. The progress of the download can be monitored on the Detail screens of the controller device. The process should then be repeated with the new alarm device software - this software will not be downloaded by sensor devices. JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

12 Finally, new controller device software can be transferred which will not be transferred through the network to any devices. The alarm system will continue to operate as normal while software is downloaded (although sensor devices will stay awake while downloading). Software Activation When all devices have downloaded their new software, it can be activated by pressing Ctrl-y in the terminal window. The message ACTIVATING will be output together with a countdown time to the activation. When the time is reached to activate the software, the devices will begin to leave the network, reboot running their new software and then re-join the network. 12 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

13 Software Design This Application Note makes use of the Jenie API used to construct JenNet network applications. This API is centred around the use of a standard set of callback functions. The Application Note JenNet Tutorial (JN-AN-1085) provides a step-by-step introduction to creating JenNet applications using the Jenie API. Network Operation The network is formed and maintained automatically by the JenNet networking stack. Once the stack is started, nodes automatically form and join the JenNet tree network. If nodes detect that their position in the network is lost, they automatically attempt to re-join the network using the self-healing features of JenNet. Messages transmitted by the application make use of the end-to-end acknowledgements provided by JenNet. The application implements re-try mechanisms if an ack is not received when expected. For an introduction to programming JenNet networks using the Jenie APIs, refer to the Application Note JenNet Tutorial (JN-AN-1085). Controlled Network Membership Operation The software design used to exert control over which nodes are permitted to join the network is based upon the Application Note JenNet Controlled Network Membership (JN-AN-1116), which contains more detailed documentation on this functionality. Coordinator Node The Coordinator node of the JenNet network is able to exert control over which other nodes are able to join the network. This is done by using vapi_regnwkauthorisecallback() to register a function with JenNet that will be called each time a node attempts to join the network. The callback function bcoordinator_cbauthorisenetwork() then allows the application to accept or reject a node s request to join the network. The Coordinator stores a table of node addresses that have been authorised to join the network in both RAM and Flash memory. Any node requesting to join that is already recorded in the authorisation table is always allowed to re-join. Unauthorised nodes requesting to join while the network is closed (as controlled from the System screen) are always rejected. Once the network is opened from the System screen, the next node that attempts to join is initially rejected and the network closed again. However the address of this node is retained and presented to the user on the Authorisation screen to accept or reject. When the user accepts a node, its address is added to the authorisation table - the next time it attempts to join, it will be automatically accepted. The Coordinator also includes additional information in the beacon responses that it issues to nodes which are attempting to discover a network to join. This data comprises the least significant 16 bits of the Coordinator s address and is set using the JenNet function vapi_setuserbeaconbits(). Devices authorised to join the network retain this value as described in the next section. JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

14 Router and End Device Nodes Routers and End Device nodes access the beacon response data by using the vapi_regbeaconnotifycallback() function to register a callback function with JenNet that will be called each time a beacon response is received while the node is trying to find a network to join. The benddevice_cbbeaconnotify() and brouter_cbbeaconnotify() functions are registered according to the node type. If the node has never been authorised to join a network, all the beacon responses are accepted in the callback function and the beacon data is retained to be used if the node succeeds in joining a network. When a node first succeeds in joining a network, as indicated by the NETWORK_UP event, it loops through the previously retained beacon responses looking for the response that came from the node s new parent. When found, the 16 bits from the Coordinator s address are stored in RAM and Flash memory, to be used if the node ever needs to re-join the network. Router nodes then set this same value in their beacon responses using the function vapi_setuserbeaconbits(), so that nodes joining Routers have access to the same data. If an authorised node needs to re-join its network, it will reject any beacon responses from nodes that are not in the network which the authorised node previously belonged to. This streamlines the joining process and reduces the risk of the node being picked up by a different alarm system operating within radio range. This feature is time-limited - if the node fails to join within a certain period of time, the 16-bit value is erased from RAM and Flash memory, allowing the node to join any network once again. This allows nodes to be recovered if the Coordinator node needs to be replaced. Implementation Differences The main differences between this implementation and that of the Application Note Controlled Network Membership (JN-AN-1116) are as follows: JN-AN-1116 JenNet Controlled Network Membership New nodes are accepted into the network for a short timeperiod following a button press. Joining devices use the scan sort callback to access beacon responses. Authorised devices retain the joined network ID until the node is reset with a button held. The Coordinator node retains the authorised device table until reset with a button held. JN-AN-1155 JenNet Home Alarm System The user accepts new nodes into the network using the LCD and button interface. Joining devices use the beacon notify callback to access beacon responses. Authorised devices retain the joined network ID until the node fails to re-join the network within a certain time period. The Coordinator node retains the authorised device table until reset via the System screen. 14 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

15 Alarm System Operation The general operation of the system is based upon that of the Application Note JenNet Over Network Download (JN-AN-1086), which was used as a template for this Application Note. The documentation for JenNet Over Network Download includes detailed information on the design of that software. The following sections describe how this Application Note makes use of the features of JenNet Over Network Download. Task Management JenNet Over Network Download provides a simple task system allowing tasks to be scheduled on a single or repeating basis together with a re-try mechanism. The tasks are mostly used to generate communications between nodes at regular intervals or in response to certain events. The following tasks provide the core of the Alarm System operation: Report Task The report task is scheduled to occur at regular intervals allowing each device to report its current status to the controller device. In JenNet Over Network Download, this task allows each node to inform the Coordinator node of the software currently being run and downloaded. This Application Note adds to this report the current state of the motion and tamper sensors, together with flags for changed values. If sensor readings change, the report task is immediately activated so that the controller device is updated and can react appropriately at the earliest opportunity. The controller device retains the most recent report from each device in the network and also records the time when the report was received. This is used by the controller device to detect lost devices - if a report is not received from a device for a multiple of the report interval, the controller device considers the device to be lost. Similarly if the sending device s report task fails, due to no acknowledgement being received from the controller device, it will consider the network to be lost. In the case of the alarm device, this will cause the alarm to be sounded locally. The task system has been extended in this Application Note to allow failed tasks to be reported to the application. The controller device s response indicates whether the system is armed to the other devices in the network. Sensor devices use this information to optimise their battery life. Alarm Task This task is not present in JenNet Over Network Download. The controller device activates this task when the alarm devices need to sound or silence their alarms. Once activated, the controller device works through the alarm devices sending commands to control the alarm sound to each alarm device in turn. JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

16 Sensor Operation This section describes how the sensors are operated. Motion Sensor The sensor devices use pulse counter 1 of the JN5148 microcontroller to sense motion. It is possible to connect this digital input to a PIR detector or simple contact switch. While the system is armed and no motion is previously detected, the pulse counter is configured to generate an interrupt when new motion is detected. This will immediately wake the sensor device, if it is asleep. While the system is unarmed or motion has already been detected, the pulse counter is configured to continue counting pulses but without waking from sleep. Upon waking, the pulse counter is read. If motion has begun or ceased, the report task is activated to inform the controller device. Using the pulse counter in this way allows the device to sleep for regular periods for the majority of its operation. The sensor device will only be woken immediately from sleep if motion is detected while the system is armed. This allows the battery life of the sensor devices to be predictable and efficient. Tamper Sensor In the sensor devices, the tamper detection works in a similar way to the motion detection but operates on pulse counter 0 and will always wake immediately upon detecting tampering, even when the system is not armed. In the controller and alarm devices, the tamper detection works by connecting two DIO pins together - one operates as an input and one as an output. Each time vjenie_cbmain() is called, the output pin is toggled and then the input pin is read. If the value on the input pin does not match that set by the output then the tamper connection has been broken. When tampering is detected or ended, the report task is activated to inform the controller device. In practice, the tamper detection circuit could be connected to electrical contacts or a microswitch in the casing for the various devices. 16 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

17 Over Network Download Operation The Over Network Download features of the application closely follow those of the Application Note JenNet Over Network Download (JN-AN-1086), which contains detailed information for the software design. The general principle of the Over Network Download is as follows: 1. The End Device software is transferred into the Flash memory of the Coordinator node using the XMODEM protocol over a UART, creating an inactive software image. 2. This End Device software image is downloaded via the network by all other nodes in the network from parent to child. The Routers download this software so that they can make it available for any End Device children to download. 3. Next the Router software is transferred and downloaded in a similar fashion, but End Devices will not download this software. 4. The Coordinator software is then transferred, but Routers and End Devices will not download this software. 5. Finally, the Coordinator is issued with a command to activate the new software images. This activation is scheduled at a point in the future and the countdown passed to all nodes in the system. When the activation time is reached, the nodes leave the network, transfer the inactive software image to the active image and then reset to run the downloaded software. The following tasks are used to control this process: Report Task When nodes send their report message to the Coordinator, the Coordinator s response indicates which inactive software image is currently held by the Coordinator. If the reporting node finds that the Coordinator node has software which it needs to download then a query task is activated. The Coordinator s report response also includes the current value of the activation countdown timer that allows nodes to synchronise the activation of new software across the network. Query Task The query task generates a message to a node s parent to query the inactive software held by the parent. If the parent has software which the child needs to download, the download task is scheduled to download the software from the parent over the air, otherwise the sequence will be repeated the next time the node reports until its parent does have the software available. Download Task The download task regularly requests a chunk of the software image from its parent until the download is completed. The download task repeats at regular intervals. The gaps between the requests allow the normal operation of the Alarm System to function even while software is being downloaded. JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

18 Implementation Differences In JenNet Over Network Download (JN-AN-1086), the report task plays no part in controlling the download process but the query task is always running. This means that End Devices are expending energy by transmitting both report and query messages on a regular basis. The query response also includes the activation countdown timer used to synchronise the activation of new software. In this Application Note, the Coordinator s report reply message indicates if there is new software available to download. Child devices only run the query task when this is the case. This extends battery life in End Devices and reduces radio traffic throughout the network. On-Air Security All packets transmitted on-air are automatically encrypted by JenNet using a 128-bit security key. 18 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

19 Module Overview The software is built from the following modules: Coordinator Controller Modules These modules are specific to the Coordinator/Controller device and are located in the Coordinator_Controller\Source folder of the Application Note. Coordinator.c/h This is the main module for the Coordinator node containing the standard set of Jenie API callback functions and provides the following functionality: Forms the network used by the application Controls which nodes are allowed into the network Monitors the status of other nodes in the network reacting to motion, tampering and lost nodes Controls the sounding of alarms on alarm devices Controls the LCD panel, buttons and sounds used to provide the user interface Provides the UART XMODEM interface used to update software using the over network download mechanism. Display.c/h This module provides code used to maintain the LCD panel with functions to display text and numeric values on the screen. This module is constructed in such a way as to allow the screens to be output to a UART (though this functionality is not currently implemented). Button.c/h This module provides code used to monitor the buttons so that the Coordinator node can react to button presses. Router Alarm Modules These modules are specific to the Router/Alarm devices and are located in the Router_Alarm\Source folder of the Application Note. Router.c/h This is the main module for the Router node containing the standard set of Jenie API callback functions and provides the following functionality: Joins the network formed by the Coordinator, extending the network for other nodes to join Reports tampering to the Coordinator and sounds a local alarm if tampered with or contact with the network is lost Sounds alarm tones as controlled by the Coordinator node JN-AN-1155 (v1.0) 14-Mar-2011 NXP Laboratories UK

20 End Device Sensor Modules JenNet Home Alarm System These modules are specific to the End Device/Sensor devices and are located in the EndDevice_Sensor\Source folder of the Application Note. EndDevice.c/h This is the main module for the End Device node containing the standard set of Jenie API callback functions and provides the following functionality: Joins the network formed by the Coordinator Sleeps for the majority of the time, waking on a regular basis or upon pulse counter changes to report the motion and tamper sensor states to the Coordinator. Common Modules The modules are shared by one or more of the devices and are located in the Common\Source folder of the Application Note: Application.h This header file contains many defines used throughout the application, including defines for: Specifying the parameters of the network to join UARTs to be used by the application Timing values for various functions and tasks Child.c/h This module contains code used by devices that act as children in the network (Routers and End Devices). It provides the following functionality: Regularly reports current status to the Coordinator node Downloads new software from its parent device when available Flash.c/h This module is used to read and write data to the Flash memory during over network download while preserving the device s MAC address. Node.c/h This module contains the code that is common to all the node types. It provides the following functionality: Tracks the status of the node in the network Handles the control of LED0 to indicate network activity Provides debugging functions when enabled 20 NXP Laboratories UK 2011 JN-AN-1155 (v1.0) 14-Mar-2011

Application Note: JN-AN-1115 Protocol Analysis with Wireshark

Application Note: JN-AN-1115 Protocol Analysis with Wireshark Application Note: JN-AN-1115 Protocol Analysis with Wireshark The tasks of commissioning a wireless network and debugging wireless network applications are often much easier to perform with the aid of

More information

In-System Programmer USER MANUAL RN-ISP-UM RN-WIFLYCR-UM-.01. www.rovingnetworks.com 1

In-System Programmer USER MANUAL RN-ISP-UM RN-WIFLYCR-UM-.01. www.rovingnetworks.com 1 RN-WIFLYCR-UM-.01 RN-ISP-UM In-System Programmer 2012 Roving Networks. All rights reserved. Version 1.1 1/19/2012 USER MANUAL www.rovingnetworks.com 1 OVERVIEW You use Roving Networks In-System-Programmer

More information

QSG105 GETTING STARTED WITH SILICON LABS WIRELESS NETWORKING SOFTWARE

QSG105 GETTING STARTED WITH SILICON LABS WIRELESS NETWORKING SOFTWARE GETTING STARTED WITH SILICON LABS WIRELESS NETWORKING SOFTWARE This quick start guide provides basic information on configuring, building, and installing applications using the Thread, EmberZNet RF4CE,

More information

WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide

WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide Version 2.1, 4/2010 Disclaimer While every effort has been made to ensure that the information in this guide is accurate

More information

SIM900 Eclipse environment install Application Note_V1.00

SIM900 Eclipse environment install Application Note_V1.00 SIM900 Eclipse environment install Application Note_V1.00 Document Title: Note Version: V1.00 Date: 2011-01-11 Status: Document Control ID: Edit SIM900_Eclipse_environment_install_Application_Note _V1.01

More information

GIVE WINGS TO YOUR IDEAS TOOLS MANUAL

GIVE WINGS TO YOUR IDEAS TOOLS MANUAL GIVE WINGS TO YOUR IDEAS TOOLS MANUAL PLUG IN TO THE WIRELESS WORLD Version: 001 / 1.0 Date: October 30, 2001 Reference: WM_TOO_OAT_UGD_001 confidential Page: 1 / 22 (THIS PAGE IS INTENTIONALY LEFT BLANK)

More information

MeshBee Open Source ZigBee RF Module CookBook

MeshBee Open Source ZigBee RF Module CookBook MeshBee Open Source ZigBee RF Module CookBook 2014 Seeed Technology Inc. www.seeedstudio.com 1 Doc Version Date Author Remark v0.1 2014/05/07 Created 2 Table of contents Table of contents Chapter 1: Getting

More information

Keep it Simple Timing

Keep it Simple Timing Keep it Simple Timing Support... 1 Introduction... 2 Turn On and Go... 3 Start Clock for Orienteering... 3 Pre Start Clock for Orienteering... 3 Real Time / Finish Clock... 3 Timer Clock... 4 Configuring

More information

Device Installer User Guide

Device Installer User Guide Device Installer User Guide Part Number 900-325 Revision B 12/08 Table Of Contents 1. Overview... 1 2. Devices... 2 Choose the Network Adapter for Communication... 2 Search for All Devices on the Network...

More information

RN-XV-RD2 Evaluation Board

RN-XV-RD2 Evaluation Board RN-XV-RD2 Evaluation Board 2012 Roving Networks. All rights reserved. -1.01Version 1.0 9/28/2012 USER MANUAL OVERVIEW This document describes the hardware and software setup for Roving Networks RN-XV-RD2

More information

Lab Experiment 1: The LPC 2148 Education Board

Lab Experiment 1: The LPC 2148 Education Board Lab Experiment 1: The LPC 2148 Education Board 1 Introduction The aim of this course ECE 425L is to help you understand and utilize the functionalities of ARM7TDMI LPC2148 microcontroller. To do that,

More information

NetworX Series. NX- 4/8 Code Pad. User Manual (Australian Version)

NetworX Series. NX- 4/8 Code Pad. User Manual (Australian Version) NetworX Series NX- 4/8 Code Pad User Manual (Australian Version) Table Of Contents Code Pad Diagram... Inside Front Glossary of Terms...2 Understanding the Code Pad lights...3 Code Pad Tones...4 Fully

More information

IDS X-Series User Manual 700-398-01D Issued July 2012

IDS X-Series User Manual 700-398-01D Issued July 2012 1 2 Contents 1. Introduction to the IDS X-Series Panels... 7 2. Before Operating Your Alarm System... 7 3. Understanding the Keypad LEDs... 8 3.1 Viewing Data on an LED Keypad... 12 3.1.1 LED Status Indicators...

More information

Tutorial: Configuring GOOSE in MiCOM S1 Studio 1. Requirements

Tutorial: Configuring GOOSE in MiCOM S1 Studio 1. Requirements Tutorial: Configuring GOOSE in MiCOM S1 Studio 1. Requirements - Two (2) MiCOM Px4x IEDs with Version 2 implementation of IEC 61850 - Two (2) Cat 5E Ethernet cable - An Ethernet switch 10/100 Mbps - MiCOM

More information

Identikey Server Getting Started Guide 3.1

Identikey Server Getting Started Guide 3.1 Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

MONITOR ISM / AFx Multi-Tenant Security System User Guide V1.3

MONITOR ISM / AFx Multi-Tenant Security System User Guide V1.3 MONITOR ISM / AFx Multi-Tenant Security System User Guide V.3 Multi-Tenant Security System User Guide Welcome New Users! There are two types of suite security keypads. Follow the instructions in the proceeding

More information

ABUS WIRELESS ALARM SYSTEM

ABUS WIRELESS ALARM SYSTEM ABUS WIRELESS ALARM SYSTEM These installation instructions are published by Security-Center GmbH & Co. KG, Linker Kreuthweg 5, D-86444 Affing/Mühlhausen. All rights including translation reserved. Reproductions

More information

GIVE WINGS TO YOUR IDEAS TUTORIAL

GIVE WINGS TO YOUR IDEAS TUTORIAL GIVE WINGS TO YOUR IDEAS TUTORIAL PLUG IN TO THE WIRELESS WORLD Tutorial Version: 001 / 1.0 Date: October 30, 2001 Reference: WM_SW_OAT_UGD_001 confidential Page: 1 / 18 (THIS PAGE IS INTENTIONALY LEFT

More information

ZigBee Home Automation User Guide

ZigBee Home Automation User Guide ZigBee Home Automation JN-UG-3076 Revision 1.3 20 February 2015 ZigBee Home Automation 2 NXP Laboratories UK 2015 JN-UG-3076 v1.3 ZigBee Home Automation Contents Preface 13 Organisation 13 Conventions

More information

USER S MANUAL. SMDC-16 Digital Control Communicator and SMPC-32 Personal Control

USER S MANUAL. SMDC-16 Digital Control Communicator and SMPC-32 Personal Control SMDC-16 USER S MANUAL SMDC-16 Digital Control Communicator and SMPC-32 Personal Control Table of Contents General Descriptions Page Description of Your Alarm System 3 Description of Keypads 3 Keypad Maintenance

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

SKP16C62P Tutorial 1 Software Development Process using HEW. Renesas Technology America Inc.

SKP16C62P Tutorial 1 Software Development Process using HEW. Renesas Technology America Inc. SKP16C62P Tutorial 1 Software Development Process using HEW Renesas Technology America Inc. 1 Overview The following tutorial is a brief introduction on how to develop and debug programs using HEW (Highperformance

More information

Board also Supports MicroBridge

Board also Supports MicroBridge This product is ATmega2560 based Freeduino-Mega with USB Host Interface to Communicate with Android Powered Devices* like Android Phone or Tab using Android Open Accessory API and Development Kit (ADK)

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

HARDWIRED CONTROL PANELS

HARDWIRED CONTROL PANELS USER GUIDE 9651 HARDWIRED CONTROL PANELS Contents 1. Introduction...3 The Alarm System...3 The Keypad...3 About This Guide...5 2. Everyday Operation...6 How Do I Know if the System is Working?...6 Setting

More information

OfficeServ Link. User Guide. Version 2.1 June 2005

OfficeServ Link. User Guide. Version 2.1 June 2005 OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This

More information

CP2110-EK CP2110 EVALUATION KIT USER S GUIDE. 1. Kit Contents. 2. Relevant Documentation. 3. Software Setup

CP2110-EK CP2110 EVALUATION KIT USER S GUIDE. 1. Kit Contents. 2. Relevant Documentation. 3. Software Setup CP2110 EVALUATION KIT USER S GUIDE 1. Kit Contents The CP2110 Evaluation Kit contains the following items: CP2110 Evaluation Board RS232 Serial Cable USB Cable DVD Quick Start Guide 2. Relevant Documentation

More information

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS

More information

Block 3 Size 0 KB 0 KB 16KB 32KB. Start Address N/A N/A F4000H F0000H. Start Address FA000H F8000H F8000H F8000H. Block 2 Size 8KB 16KB 16KB 16KB

Block 3 Size 0 KB 0 KB 16KB 32KB. Start Address N/A N/A F4000H F0000H. Start Address FA000H F8000H F8000H F8000H. Block 2 Size 8KB 16KB 16KB 16KB APPLICATION NOTE M16C/26 1.0 Abstract The following article describes using a synchronous serial port and the FoUSB (Flash-over-USB ) Programmer application to program the user flash memory of the M16C/26

More information

IPRS-7 IP/GPRS PC Receiver Software Quick Start V1.2

IPRS-7 IP/GPRS PC Receiver Software Quick Start V1.2 IPRS-7 IP/GPRS PC Receiver Software Quick Start V1.2 Overview Introduction Before You Begin Installation The IPRS-7 Main Page Configuring the IPRS-7 (IPRS-7 splash screen pictured) Introduction The IPRS-7

More information

AN655 R ANGE TEST APPLICATION FOR EZRADIO AND EZRADIOPRO. 1. Introduction. 2. Supported Radio Types

AN655 R ANGE TEST APPLICATION FOR EZRADIO AND EZRADIOPRO. 1. Introduction. 2. Supported Radio Types R ANGE TEST APPLICATION FOR EZRADIO AND EZRADIOPRO 1. Introduction The range evaluation demo provides an easy way to evaluate the link budget of EZRadio and EZRadioPRO devices by performing a range test

More information

Elite 8D/Lite Version 8 Zone Controller. Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand

Elite 8D/Lite Version 8 Zone Controller. Arrowhead Alarm Products Ltd. Operating Guide. Proudly Designed and Manufactured in New Zealand Elite 8D/Lite Version 8 Zone Controller 8 Arrowhead Alarm Products Ltd Operating Guide 1 Proudly Designed and Manufactured in New Zealand 2 CONTENTS Page No. INTRODUCTION 4 About your Alarm 4 OPERATING

More information

Moxa Device Manager 2.3 User s Manual

Moxa Device Manager 2.3 User s Manual User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

PC Base Adapter Daughter Card UART GPIO. Figure 1. ToolStick Development Platform Block Diagram

PC Base Adapter Daughter Card UART GPIO. Figure 1. ToolStick Development Platform Block Diagram TOOLSTICK VIRTUAL TOOLS USER S GUIDE RELEVANT DEVICES 1. Introduction The ToolStick development platform consists of a ToolStick Base Adapter and a ToolStick Daughter card. The ToolStick Virtual Tools

More information

User's Guide. [Home Network] app. Model No.

User's Guide. [Home Network] app. Model No. User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

CodeWarrior Development Studio for Freescale S12(X) Microcontrollers Quick Start

CodeWarrior Development Studio for Freescale S12(X) Microcontrollers Quick Start CodeWarrior Development Studio for Freescale S12(X) Microcontrollers Quick Start SYSTEM REQUIREMENTS Hardware Operating System Disk Space PC with 1 GHz Intel Pentum -compatible processor 512 MB of RAM

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18

IDS. Users Guide to Keypad Functions S E C U R I T Y MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18 INHEP DIGITAL IDS S E C U R I T Y Users Guide to Keypad Functions MANUAL NO. 700-171-01B ISSUED AUG 2002 VERSION 1.18 Summary of Operation A rm/ disarm [#] + [USER CODE] Quick Quick Quick Away Arm Stay

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Solution 16 plus. User Guide Security System

Solution 16 plus. User Guide Security System Solution 16 plus EN Security System Copyright Notice Unless otherwise indicated, this publication is the copyright of Bosch Security Systems Pty Ltd ( Bosch ). All rights are reserved.you may download

More information

User Guide. for Card Reader and Payment Application

User Guide. for Card Reader and Payment Application User Guide for Card Reader and Payment Application Introduction to Pogo> This document provides detailed information on how best to use the Pogo> application to benefit your business. The intention is

More information

EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit

EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit EDK 350 User Manual Important Notes This information describes the type of component and shall not be considered as assured characteristics. No

More information

Bootloader with AES Encryption

Bootloader with AES Encryption ...the world's most energy friendly microcontrollers Bootloader with AES Encryption AN0060 - Application Note Introduction This application note describes the implementation of a bootloader capable of

More information

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP

More information

SPECIAL CONTROL BUTTON FUNCTIONS

SPECIAL CONTROL BUTTON FUNCTIONS Operating Guide 1 2 3 CONTENTS Page No. OPERATING YOUR ALARM 5 General Information 5 Arming the Alarm 5 Disarming the Alarm 6 Arming in Stay Mode 7 Disarming Stay Mode 8 Bypassing Zones 8 Manual Panic,

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-10524-05 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,

More information

Control/Communicator Installation Manual

Control/Communicator Installation Manual DAS NETWORX NX-8 Control/Communicator Installation Manual Page General Description... 2 Ordering Information... 2 Option Definitions... 2 Programming the LED Code Pads... 4 Programming the NX-8... 8 Types

More information

Ethernet Radio Configuration Guide

Ethernet Radio Configuration Guide Ethernet Radio Configuration Guide for Gateway, Endpoint, and Repeater Radio Units April 20, 2015 Customer Service 1-866-294-5847 Baseline Inc. www.baselinesystems.com Phone 208-323-1634 FAX 208-323-1834

More information

Solution-16 Operators Manual ISSUE 1.60

Solution-16 Operators Manual ISSUE 1.60 Solution-16 Operators Manual ISSUE 1.60 !"#$%&"'()*+ Operators Manual Copyright 2002 by, SYDNEY, AUSTRALIA Document Part Number MA880O DOCUMENT ISSUE 1.60 Printed 22 March 2002 This documentation is provided

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

SECURIT 800L+ CONTROL PANEL

SECURIT 800L+ CONTROL PANEL USER MANUAL SECURIT 800L+ CONTROL PANEL COMPANY PROFILE IntelliSense have been successfully making security products for over 20 years and lead the security industry throughout the world with many innovative

More information

PTC Integrity Eclipse and IBM Rational Development Platform Guide

PTC Integrity Eclipse and IBM Rational Development Platform Guide PTC Integrity Eclipse and IBM Rational Development Platform Guide The PTC Integrity integration with Eclipse Platform and the IBM Rational Software Development Platform series allows you to access Integrity

More information

CentreWare for Microsoft Operations Manager. User Guide

CentreWare for Microsoft Operations Manager. User Guide CentreWare for Microsoft Operations Manager User Guide Copyright 2006 by Xerox Corporation. All rights reserved. Copyright protection claimed includes all forms and matters of copyright material and information

More information

HILLS Series LED Code Pad User Manual

HILLS Series LED Code Pad User Manual HILLS Series LED Code Pad User Manual Not all features may be available on your system Check with your installer to find out which features are programmed Page 2 TABLE OF CONTENTS Code Pad Diagrams...2

More information

Software User Guide UG-461

Software User Guide UG-461 Software User Guide UG-461 One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com ezlinx icoupler Isolated Interface Development Environment

More information

ebus Player Quick Start Guide

ebus Player Quick Start Guide ebus Player Quick Start Guide This guide provides you with the information you need to efficiently set up and start using the ebus Player software application to control your GigE Vision or USB3 Vision

More information

GEVPlayer. Quick Start Guide

GEVPlayer. Quick Start Guide GEVPlayer Quick Start Guide High-performance imaging data and video over Ethernet. Version 2.0 These products are not intended for use in life support appliances, devices, or systems where malfunction

More information

User Guide. Vehicle Diagnostics by Delphi

User Guide. Vehicle Diagnostics by Delphi User Guide Vehicle Diagnostics by Delphi Table Of Contents Welcome...9 Is My Vehicle Compatible?...9 Equipment Overview...10 Package Contents...10 System Requirements...11 Installation Requirements...11

More information

SNMP Manager User s Manual

SNMP Manager User s Manual SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2

More information

32-bit AVR UC3 Microcontrollers. 32-bit AtmelAVR Application Note. AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2

32-bit AVR UC3 Microcontrollers. 32-bit AtmelAVR Application Note. AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2 AVR32769: How to Compile the standalone AVR32 Software Framework in AVR32 Studio V2 1. Introduction The purpose of this application note is to show how to compile any of the application and driver examples

More information

Developing an Application on Core8051s IP-Based Embedded Processor System Using Firmware Catalog Drivers. User s Guide

Developing an Application on Core8051s IP-Based Embedded Processor System Using Firmware Catalog Drivers. User s Guide Developing an Application on Core8051s IP-Based Embedded Processor System Using Firmware Catalog Drivers User s Guide Developing an Application on Core8051s IP-Based Embedded Processor System Using Firmware

More information

Chapter 4 Control Center

Chapter 4 Control Center Chapter 4 Control Center Control Center is a central monitoring station solution (CMS) that provides the CMS operator with these major features: Access to client DVRs (See Remote DVR) Access to remote

More information

Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs

Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs Develop a Dallas 1-Wire Master Using the Z8F1680 Series of MCUs AN033101-0412 Abstract This describes how to interface the Dallas 1-Wire bus with Zilog s Z8F1680 Series of MCUs as master devices. The Z8F0880,

More information

PRT-CTRL-SE. Protege System Controller Reference Manual

PRT-CTRL-SE. Protege System Controller Reference Manual PRT-CTRL-SE Protege System Controller Reference Manual The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology

More information

Global Monitoring + Support

Global Monitoring + Support Use HyperTerminal to access your Global Monitoring Units View and edit configuration settings View live data Download recorded data for use in Excel and other applications HyperTerminal is one of many

More information

Download and Installation Instructions. Android SDK and Android Development Tools (ADT)

Download and Installation Instructions. Android SDK and Android Development Tools (ADT) Download and Installation Instructions for Android SDK and Android Development Tools (ADT) on Mac OS X Updated October, 2012 This document will describe how to download and install the Android SDK and

More information

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM

COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM COMSPHERE 6700 SERIES NETWORK MANAGEMENT SYSTEM SECURITY MANAGER FEATURE SUPPLEMENT Document No. 6700-A2-GB41-30 February 1998 Copyright 1998 Paradyne Corporation. All rights reserved. Printed in U.S.A.

More information

System Overview and Terms

System Overview and Terms GETTING STARTED NI Condition Monitoring Systems and NI InsightCM Server Version 2.0 This document contains step-by-step instructions for the setup tasks you must complete to connect an NI Condition Monitoring

More information

UG103.8 APPLICATION DEVELOPMENT FUNDAMENTALS: TOOLS

UG103.8 APPLICATION DEVELOPMENT FUNDAMENTALS: TOOLS APPLICATION DEVELOPMENT FUNDAMENTALS: TOOLS This document provides an overview of the toolchain used to develop, build, and deploy EmberZNet and Silicon Labs Thread applications, and discusses some additional

More information

RN-WIFLY-EVAL-UM. WiFly Evaluation Kit. 2012 Roving Networks. All rights reserved. RN-WIFLY-EVAL-UM Version 1.32r 10/9/2012 USER MANUAL

RN-WIFLY-EVAL-UM. WiFly Evaluation Kit. 2012 Roving Networks. All rights reserved. RN-WIFLY-EVAL-UM Version 1.32r 10/9/2012 USER MANUAL WiFly Evaluation Kit 2012 Roving Networks. All rights reserved. Version 1.32r 10/9/2012 USER MANUAL OVERVIEW This document describes the hardware and software setup for Roving Networks evaluation kits,

More information

Prisma II Software Upgrade Program (SOUP) Installation Guide

Prisma II Software Upgrade Program (SOUP) Installation Guide Prisma II Software Upgrade Program (SOUP) Installation Guide Overview The Prisma II Software Upgrade Program (SOUP) is a user-friendly utility that allows users to perform firmware upgrades on Prisma II

More information

RiOffice Users Manual

RiOffice Users Manual RiOffice Users Manual Rio Networks 9/23/2009 Contents Available Services... 4 Core PBX Features... 4 Voicemail Features... 4 Call Center Features... 4 Call Features... 4 Using Your Phone... 5 Phone Layout...

More information

1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear.

1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear. SECURITY SYSTEM MANAGEMENT SOFTWARE FOR WINDOWS WINLOAD MODEM SETUP The modem setup is a very important step in the connection process. If the modem setup is not properly completed communication between

More information

How To Use A Water Quality Monitor (Wqmsw)

How To Use A Water Quality Monitor (Wqmsw) Water Quality Monitor WQM Host Software User s Guide The user s guide is an evolving document. If you find sections that are unclear, or missing information, please let us know. Please check our website

More information

Packs Infotel Limited M30. ULTIMATE Operating Instructions. Version: Copyright Packs Infotel Limited 2015, all rights reserved.

Packs Infotel Limited M30. ULTIMATE Operating Instructions. Version: Copyright Packs Infotel Limited 2015, all rights reserved. Packs Infotel Limited M30 ULTIMATE Operating Instructions Version: 4 Copyright Packs Infotel Limited 2015, all rights reserved. Packs Infotel Limited Model 30 Operating Instructions Index Page 2 Page 3

More information

Liebert IntelliSlot Web Cards

Liebert IntelliSlot Web Cards Monitoring For Business-Critical Continuity Liebert IntelliSlot Web Cards Firmware Upgrade Manual Liebert IntelliSlot Web Card, Liebert IntelliSlot Web Card-LB, Liebert IntelliSlot Web Card-LBDS, Liebert

More information

Using the Cisco OnPlus Scanner to Discover Your Network

Using the Cisco OnPlus Scanner to Discover Your Network Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

WITURA CORPORATION SDN BHD

WITURA CORPORATION SDN BHD WT 1010SA Stand Alone GSM Alarm System User Manual and Installation Instructions Version: 1.2 Updated: 4 JAN 2012 WITURA CORPORATION SDN BHD Stand Alone GSM Alarm System Instruction Manual 1 Introduction:

More information

Possum HC2006 SERO! Telephone. Firmware Upgrade and Software Manual firmware version 2.00+

Possum HC2006 SERO! Telephone. Firmware Upgrade and Software Manual firmware version 2.00+ Possum HC2006 SERO! Telephone Firmware Upgrade and Software Manual firmware version 2.00+ POSSUM LIMITED, 2009 8 FARMBROUGH CLOSE STOCKLAKE PARK INDUSTRIAL ESTATE AYLESBURY BUCKS HP20 1DQ TELEPHONE (from

More information

HILLS Series LED Code Pad User Manual

HILLS Series LED Code Pad User Manual HILLS Series LED Code Pad User Manual Not all features may be available on your system Check with your installer to find out which features are programmed Page 2 TABLE OF CONTENTS Code Pad Diagrams...2

More information

Scribe Online Integration Services (IS) Tutorial

Scribe Online Integration Services (IS) Tutorial Scribe Online Integration Services (IS) Tutorial 7/6/2015 Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, photocopying,

More information

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem

c. Securely insert the Ethernet cable from your cable or DSL modem into the Internet port (B) on the WGT634U. Broadband modem Start Here Follow these instructions to set up your router. Verify That Basic Requirements Are Met Assure that the following requirements are met: You have your broadband Internet service settings handy.

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) CN2HK LIMITED Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) User Manual Please read this manual before operating this product. After you finish reading this manual,

More information

An Introduction to MPLAB Integrated Development Environment

An Introduction to MPLAB Integrated Development Environment An Introduction to MPLAB Integrated Development Environment 2004 Microchip Technology Incorporated An introduction to MPLAB Integrated Development Environment Slide 1 This seminar is an introduction to

More information

APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features

APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features APPLICATION NOTE AT16268: JD Smart Cloud Based Smart Plug Getting Started Guide ATSAMW25 Introduction This application note aims to help readers to get started with the Atmel smart plug reference design

More information

Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface

Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Application te Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Abstract This

More information

ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4

ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4 ACU-1000 Manual Addendum Replacement of CPM-2 with CPM-4 1 PURPOSE:... 1 2 CPM-4/CPM-2 COMPATIBILITY... 2 2.1 NETWORK CABLES... 2 2.2 FACTORY DEFAULT SETTINGS... 2 2.3 CHANGING THE RS-232 SERIAL PORT BAUD

More information

Verizon Wireless 4G LTE USB Modem 551L Software Upgrade

Verizon Wireless 4G LTE USB Modem 551L Software Upgrade Overview To help you with the system update for your Verizon Wireless 4G LTE USB Modem 551L, this page contains the following information: o o System Update Instructions for Windows users via VZAccess

More information

NX-8 Installation manual Page 1 Date 13/03/04

NX-8 Installation manual Page 1 Date 13/03/04 NetworX NX-8 Installation Manual NX-8 Installation manual Page 1 Date 13/03/04 CONTENTS CONTENTS...2 GENERAL INFORMATION...4 ORDERING INFORMATION...4 FEATURE DEFINITIONS...5 PROGRAMMING THE NX-8 KEYPADS...12

More information

Avalanche Enabler 5.3 User Guide

Avalanche Enabler 5.3 User Guide Avalanche Enabler 5.3 User Guide 30/05/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095 Telephone:

More information

How to Set Up a Cell Phone

How to Set Up a Cell Phone My Keypad for Cell Phones Quick Start Guide 800-02577-CP 12/09 Rev. B TRADEMARKS Honeywell is a registered trademark of Honeywell International Inc. All other trademarks are the properties of their respective

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Operating Manual QUESTOR

Operating Manual QUESTOR QUESTOR AS 273 Management Software Document: KSW3s527.0004 / en 2010.08 Edition: August 2010 QUESTOR TABLE OF CONTENT 1 Product description EN-4 1.1 Purpose... EN-4 1.2 System components... EN-4 1.2.1

More information

OWNERS MANUAL. Status Monitor. for Windows 95, 98, ME, NT 4, 2000 & XP. SIGNALCRAFTERS TECH, INC. www.signalcrafters.com

OWNERS MANUAL. Status Monitor. for Windows 95, 98, ME, NT 4, 2000 & XP. SIGNALCRAFTERS TECH, INC. www.signalcrafters.com OWNERS MANUAL Status Monitor for Windows 95, 98, ME, NT 4, 2000 & XP SIGNALCRAFTERS TECH, INC. www.signalcrafters.com 57 Eagle Rock Avenue, East Hanover, NJ 07936 Tel: 973-781-0880 or 800-523-5815 Fax:

More information