VIPER SC™ VIPER SC+™ IP ROUTER FOR LICENSED SPECTRUM User Manual PN 001-5008-000 Rev 11 Revised August 2011
REVISION HISTORY REV DATE DESCRIPTION REV 0 Jan 2008 Initial Release as 001-5008-000. REV 1 May 2008 Update Dual Port Viper SC information. REV 2 Sept 2008 REV 3 Dec 2008 REV 4 Apr 2009 REV 5 Jul 2009 REV 6 Sept 2009 REV 7 Nov 2009 REV 8 Jun 2010 REV 9 Sept 2010 REV 10 Aug 2011 REV 11 REV 12a Aug 2011 July 2013 Added information about SNMP. Updated Firmware Upgrade instructions. Added information about TCP Client Server Mode.
Important Notice Because of the nature of wireless communication, transmission and reception of data can never be guaranteed. Data may be delayed, corrupted (i.e., have errors), or be totally lost. Significant delays or losses of data are rare when wireless devices such as the Viper SC are used in a normal manner with a well-constructed network.
Class A Digital Device Compliance NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
Table of Contents 1 2 PRODUCT OVERVIEW ................................................................................................................................................... 1 1.1 General Description .............................................................................................................................................. 1 1.2 Operational Characteristics ....................................................................................................................
4 WEB INTERFACE ......................................................................................................................................................... 26 4.1 Unit Status ......................................................................................................................................................... 27 4.1.1 General.....................................................................................................................................................
4.8 5 6 NETWORK MANAGEMENT/NEIGHBOR TABLE .................................................................................................... 83 4.8.1 Neighbor Discovery ............................................................................................................................................ 84 4.8.2 Status ................................................................................................................................................................. 89 4.8.
1 PRODUCT OVERVIEW Viper SC provides any IP-enabled device with connectivity to transmit data. This DSP-based radio was designed for industrial applications utilizing 136-174 MHz, 215-240 MHz VHF, 406.1-512 MHz UHF, 880-902 and 928-960 MHz frequencies. Operational as a wideband IP Modem or Router, Viper SC is optimized for use in SmartGrid, Distribution Automation, and SCADA applications.
1.3 PHYSICAL DESCRIPTION Viper consists of two logic PCBs, one that includes the modem circuitry and the other the radio module. Both are installed in a cast aluminum case. The unit is not hermetically sealed and should be mounted in a suitable enclosure when dust, moisture, and/or a corrosive atmosphere are anticipated. 1.3.1 CHASSIS DIMENSIONS Figure 1 shows the dimensions of the chassis and mounting plate.
LED ACT Lnk Rx/Tx Color Blinking Green Off Green Off Green Red Definition Ethernet activity detected on PHY link (RJ45) No Ethernet activity on PHY link (RJ45) Ethernet connection established (RJ45) No Ethernet connection (RJ45) Receiving data Transmitting data 1.3.
Contact 6 10 Base-T Signal RXN(1) 7 SPARE 8 SPARE SHELL Shield (1) The name shows the default function. Given the Auto-MDIX capability of the Ethernet transceiver, TX and RX function could be swapped. 1.3.3.2 SETUP AND COM PORTS The SETUP and COM serial connections are DE-9F RS-232 ports. Refer to Table 3 for pin out descriptions and Section 4.3.4 for control line configuration of DCD, DTR, RTS and CTS control lines.
The White Enable line must be tied to the red positive lead of the connector for the Viper SC to function. WARNING – EXPLOSION HAZARD- Do not disconnect unless power has been removed or the area is known to be non-hazardous 1.3.3.4 ANTENNA CONNECTOR Standard Viper models have a 50-ohm TNC female antenna connector. This connection functions for both transmit and receive.
Model Number Frequency Range Description 250-5018-500 140-5118-502 136 - 174 MHz 136 - 174 MHz Viper SC-100 Demo Kit Viper SC-100 Standard Base Station 140-5318-502 136 - 174 MHz Viper SC-100 Redundant Base Station 140-5028-502 215 - 240 MHz Viper SC-200 140-5028-504 215 - 240 MHz Viper SC+-200 140-5028-503 215 - 240 MHz Viper SC-200 Dual Port 250-5028-502 215 - 240 MHz Viper SC-200 Demo Kit 140-5128-502 215 - 240 MHz Viper SC-200 Standard Base Station 140-5328-502 215 - 240 MHz Vi
Model Number Frequency Range 140-5048-400 406.1 - 470 MHz 140-5048-401 406.1 - 470 MHz 140-5148-400 406.1 - 470 MHz 140-5348-400 406.
Part Number 250-0241-510 Frequency 450-470 MHz Description 10 dB Antenna Kit 250-5099-011 890-960 MHz 6.4 dB Antenna Kit 250-5099-021 890-960 MHz 10 dB Antenna Kit Antenna Kits include premium antenna, mounting bracket, surge protector, grounding kit, cable ties, 18” TNC male to Nmale jumper cable and weather kit. UHF and 900 kits include 25 feet of LMR400. VHF kits require feedline be purchased separately. LMR400 feedline is available in 25 and 50 feet.
2 NETWORK ARCHITECTURE AND SYSTEM PLANNING This section discusses network architecture, basic network types, interfacing modems and DTE, data protocols for efficient channel operation, as well as providing tips for selecting an appropriate site, antenna selection, and reducing the chance of harmful interference. 2.1 NETWORK ARCHITECTURE In a radio system, only one radio should transmit at a time. If two radios transmit at the same time to another radio, RF collisions occur.
2.1.1 POINT-TO-POINT A point-to-point network is the most simple of all networks, and may be used for connecting a pair of PC's, a host computer and a terminal, a SCADA polling master and one remote, or a wide variety of other networking applications. Figure 3 – Point to Point Network 2.1.2 POINT-TO-MULTIPOINT A Point-to-Multipoint network is a common network type used in SCADA and other polling systems.
2.1.3 REPORT BY EXCEPTION In a true Report by Exception configuration, the remotes send data to the master only when an event or exception has occurred in the remote. However, most Report by Exception systems have a master/remote polling component. The master polls the remotes once every hour or half-hour to ensure there is still a valid communication path. In a Report by Exception configuration, there will not be a master controlling RF traffic and RF collisions will often occur.
2.2.1 BRIDGE MODE Bridge mode is the simplest configuration for all Viper networks. Viper may be configured for bridge mode only when all devices are located on the same Local Area Network (LAN). Thus, all units in the network can communicate directly with all other units in the network. Each Viper has only one IP address assigned to it and the subnet mask is the same for every Viper in the network.
Figure 6 – Bridge Mode Example 1 Bridge Mode Example 2 The subnet for this Viper network is comprised of devices with IP addresses ranging from 172.20.0.0 to 172.20.255.255. The subnet mask is 255.255.0.0. The shorthand notation is: 172.20.0.1/16 since the subnet mask 255.255.0.0 contains 16 ones then 16 zeros when it is converted to binary. The first address 172.20.0.0 is reserved for the Network ID. The last address 172.20.255.255 is reserved for the broadcast address.
Figure 7 – Bridge Mode Example 2 2.2.2 ROUTER MODE Router mode allows greater network configuration flexibility, allows the use of a variety of protocols, and also adds RF diagnostics capability to Viper networks. Diagnostics can be retrieved through the Ethernet port of the Viper. For more information on Viper RF Diagnostics, refer to Section 4.1.
Note 2: All the Viper Ethernet IP addresses are on different networks. Note 3: Computers, PLCs, RTUs, or other Ethernet capable devices can be connected up to each Viper’s local Ethernet interface. That device must be set with an IP address on the same network as the Ethernet interface of the Viper it is connected with. Ethernet Subnet Mask: Varies from Viper to Viper. RF Subnet Mask for all units: 255.0.0.0 Viper 1: Ethernet IP Address: 192.168.205.1/24 RF IP Address: 10.11.12.25/8 PLC 1: 192.168.205.
The subnet mask of the RF IP addresses has been changed to ensure that the RF IP network does not overlap any of the Ethernet networks. In this scenario, the RF IP addresses must be manually programmed to ensure that every Viper has an RF IP address in the network and that no RF IP address is used twice. Ethernet Subnet Mask for all units: 255.255.255.240 RF Subnet Mask for all units: 255.255.0.0 Viper #1 Eth IP Address: 10.200.1.1 / 28 RF IP Address: 10.0.0.1 / 16 Viper #2 Eth IP Address: 10.200.1.
Figure 10 – Multispeed Illustration 2.3 SYSTEM PLANNING A Site Survey is a propagation study of the RF path between two points or between one point and multiple points. Signal propagation may be affected by attenuation from obstructions such as terrain, foliage, or buildings in the transmission path. A Site Survey is recommended for most projects to determine the optimal RF paths for each link. This is especially true when more than one RF coverage area is required.
A radio modem requires a minimum amount of received RF signal to operate reliably and provide adequate data throughput. This is the radio’s receiver sensitivity. In most cases, spectrum regulators will define or limit the amount of signal that can be transmitted and it will be noted on the FCC license. This is the effective isotropic radiated power (EIRP). Transmitted power decays with distance and other factors as it moves away from the transmitting antenna. 2.3.
― Omni Directional Antenna. In general, an Omni directional antenna should be used at a master station and Relay Points. This allows equal coverage to all of the remote locations. Omni directional antennas are designed to radiate the RF signal in a 360-degree pattern around the antenna.
3 QUICKSTART It is easy to set up a Viper network to verify basic operation and to experiment with network designs and configurations. To eliminate unnecessary disruption of traffic on the existing network while you become familiar with Viper, you should use a network IP subnet address different from others currently in use in your test area. 3.1 PC LAN SETUP On a PC running MS-Windows with an existing LAN connection, connect to the Ethernet input of the Viper SC and complete the following steps.
10 watt supply for Tx @ 1W 40 watt supply for Tx @ 5W, or 60 watt supply for Tx @ 10 W Viper Demo Kits contain a power connector with screw-terminals. Observe proper polarity when connecting the cables to the Power Supply. The white wire must be connected to red wire. 3.4 CONNECT VIPER SC TO PROGRAMMING PC Connect a PC’s Ethernet port to the LAN port using a CAT 5 Ethernet cable. Wait for the LINK LED to glow green. 3.5 CONFIGURE YOUR VIPER Viper must be configured using the Setup Wizard.
To change the password for your Viper, refer to Section 4.5.1.1. 3.5.2 SETUP WIZARD From the navigation frame, select Setup Wizard to guide you through Viper configuration for operation. Read the onscreen instructions carefully before proceeding. Figure 11 – Setup Wizard Welcome Quit to exit the Setup Wizard; Next to proceed.
Click Apply. Click Next. STEP 2 Figure 13 – Setup Wizard (STEP 2) Each Viper SC is programmed with these defaults: IP Address: 192.168.205.1 Network Mask: 255.255.255.0 Default Gateway: 0.0.0.0 To monitor or change configuration remotely, each unit requires a unique IP Address. When configuring more than one unit, be sure to increment IP addresses. Click Apply. Click Next. #9 Viper_SC_Manual_001-5008-000_Rev12d.
STEP 3 Figure 14 – Setup Wizard (STEP 3) Verify FCC license before completing this step. Channel ID: Enter 1 for Channel ID Bandwidth: Enter Bandwidth (in KHz) Data and Control Packet Bit Rate: Select desired bit rate (in kbps) RX Frequency: Enter RX Frequency TX Frequency: Enter TX Frequency TX Power: Enter 5.0 W Click Apply. Click Next. STEP 4 Figure 15 – Setup Wizard (STEP 4) The Viper SC uses AES-128 bit encryption to protect your data from intrusion.
Encryption: Select to Enable. Default = Disabled. If encryption is enabled, you must enter an Encryption Pass Phrase. This phrase must be the same for all units in the network. The default pass phrase is Dataradio. Click Apply. Click Next. STEP 5 Figure 16 – Setup Wizard (STEP 5) Click Done. Click Save Config to save the network parameters for your Viper SC. You will see a green success icon on the bottom left of the page when save is complete. Click Reset Unit to cycle device power.
4 WEB INTERFACE Viper is designed for easy installation and configuration. All operating parameters are set using a web browser. A built-in web server makes configuration and status monitoring possible from any browser-equipped computer, either locally or remotely. The Interface is divided into two frames. On the left, the navigation frame allows the user to navigate the main menu. Unit Status (see Section 4.1) Setup Wizard (see Section 4.2) Basic Setup (see Section 4.
― Apply. Use this command to write to RAM. When making an entry into a dialog box, click Apply when you are satisfied with the changes to temporarily apply the value(s) entered to the relevant parameter(s). Failure to use this command before leaving a web page will result in the loss of entered selections, addresses, and values. ― 4.1 Cancel. This command only affects the dialog boxes or radio buttons in the opened window.
― ― ― ― ― IP Forwarding Mode. Display Bridge/Router. Default = Bridge. IP forwarding mode is configured in Section 4.3.1. Station Relay Point. Display Yes/No. Default = No. The Station Relay Point is configured in Section 4.3.1. Multi-Speed Mode. Display Enabled/Disabled. Default = Disabled. Refer to Section 4.3.1 for multispeed configuration. Mode. Indicate the mode of operation (ANSI, ANSI 900, ETSI) On-line diagnostics Interval.
― Modem Firmware Version. Displays the modem firmware version of the unit. ― Radio Firmware Version. Displays the radio firmware version of the unit. ― RSSI from RF-MAC. Displays the Received Signal Strength Indication (RSSI) from the unit with the MAC address displayed. The RSSI displayed range is from approximately -50 dBm to -120 dBm. At signal strengths greater than -50 dBm, the radio will still operate but will not display an accurate RSSI value. ― SNR from RF-MAC.
Figure 20 – Diagnostic Output sample Table 9 – Diagnostics Output Definitions Output Definitions Host Ver # Period Flags Source Destination A B C D E F G MAC address of the station where diagnostic measurements are being collected. The host will collect diagnostic message from itself and all remote units with IPSD enabled. IPSD can be enabled/disabled under Version of the online diagnostics. Different versions may have different parameters. This document describes Version 1.
Table 10 – Online Diagnostics RSSI Display Value RSSI Notes 0 NA The RSSI Value is not Available 1 > -60.25 dBm The RSSI Value is greater than –60.25 dBm 20 -65.00 dBm 255 < -123.75 dBm X RSSI is less than –123.75 dBm RSSI = -60 – (X * 0.25), for X not equal to 0 4.2 SETUP WIZARD Refer to Section 3.5.2 – Quick Start to use the Setup Wizard to configure your Viper. 4.
― IP Forwarding Mode. Select Bridge/Router. Default = Bridge. ― Bridge Forwarding. Select Everything/IP and ARP only. Default = IP and ARP only. (Ethernet II types: 0x0800, 0x0806). Select Everything to forward all 802.3 Ethernet II packet types. Use this setting to transport protocols such as IPX, 802.1Q, etc. Bridge Forwarding is not available in Router mode. ― Relay Point. Select Yes/No; Default = No. Refer to Section 2.1.4 (pg 11) before configuring your Viper as a Relay Point. ― Access Point.
4.3.2 IP SETTINGS Figure 22 – Setup(Basic)IP Settings 4.3.2.1 ETHERNET INTERFACE ― DHCP Client. Select Static/Dynamic. Default = Static. Select Static to enable user entry of IP address of the unit. Select Dynamic to set the unit to be a DHCP client, which will allow the unit to accept an IP address from an external DHCP server. Activating this option will reset the IP address of the unit.
― Start Address. Represents the pool of addresses allocated for DHCP purpose. If a unit is configured as a DHCP Server, this field represents the start IP address pool managed by the DHCP Server. Normally, Viper automatically calculates the Lease Start Address (equal to Ethernet IP Address plus one). ― Number of Leases. Represents the maximum number of DHCP client(s) a unit can serve. ― Lease Duration. The period over which the IP Address allocated to a DHCP client is referred to as a "lease".
Figure 23 – Setup(Basic)Channel Table #9 Viper_SC_Manual_001-5008-000_Rev12d.
4.3.3.1 RADIO CAPABILITIES Transmit and Receive (TX/RX) Frequency Range and Output Power Range is factory set. 140-5018-502: VHF, 136.000-174.000 MHz, 1-10W 140-5028-502: VHF, 215.000-240.000 MHz, 1-10W 140-5028-504: VHF, 215.000-240.000 MHz, 1-10W 140-5048-302: UHF Range 3, 406.125-470.000 MHz, 1-10W 140-5048-502: UHF Range 5, 450.000-511.975 MHz, 1-10W 140-5098-304: PCS, 880.000-902.000 MHz, 1-8W 140-5098-502: ISM, 928.000-960.000 MHz, 1-8W 140-5098-504: ISM, 928.000-960.
#9 Viper_SC_Manual_001-5008-000_Rev12d.
Figure 24 – Setup (Basic)Serial Ports ― Speed. Select Baud Rate to match connected device. SETUP 300/1200/2400/4800/9600/19200 Baud Rate. Default = 19200. COM 300/1200/2400/4800/9600/19200/38400/57600/115200. Default = 9600. ― Data bits. Number of bits making up the data word. Select 7/8. Default = 8. ― Stop bits. Select 1/2. Default = 1. Marks the end of the serial port data byte. ― Parity. Select Even/Odd/None Default = None. Identify the sum of bits. ― DCD (Data Carrier Detect) Control.
4.3.4.1 IP GATEWAY SERVICE Serial port(s) can be configured to provide several different services. ― CLI Service. Command Line Interface; Access to the Command Line Interface command shell is password protected and is reserved for authorized personnel only. ― Serial/RF Bridge - DOX mode. 3 wire connection required. Data is sent whenever it is present at the port. Flow control is not required.
connection. If no open connections exist the data will be discarded. The Viper TCP server will leave the TCP connection open indefinitely, whether or not data is being sent. However, if the Viper is unable to send data successfully to the TCP Client (ie. no TCP acknowledgements are received from the remote endpoint) the Viper SC’s terminal server will close the faulty TCP connection. For more information on TCP acknowledgements, refer to Section 4.4.4.
sent over the Ethernet interface will have a source address equal to the Ethernet IP address. Messages sent over the RF interface will have a source address equal to the RF IP address. ― Local IP Port #. For TCP Client and UDP socket connections, set to any value between 1 and 65535. For TCP Server socket connections, set to any value between 1 and 65535, but must not be set to one of the following values or fall within the following ranges of values: 20, 21, 23, 123, 520, 5002, 6254 to 6299, 7000 to 7100.
4.4.1 RF OPTIMIZATIONS/MAC ADVANCED SETTINGS Figure 25 – Setup(Advanced)RF Optimizations/MAC Advanced Settings ― Duplicates Detection Period. Enter a value from 1000 to 15000 to specify the time period (in milliseconds) Default = 5000 ms. Viper will look for a duplicate message being sent, such as control and relay messages. If a duplicate message is detected it will not be forwarded. Certain protocols such as Modbus cannot tolerate hearing duplicate messages (echoes).
― Enabled (listen to noise and data). Viper listens on the Rx frequency and determines if the RF channel is available. Channel is available so long as received level is higher than the carrier sense threshold. When the channel is busy, Viper receives and decodes all remote messages Data is buffered and sent when the channel becomes available.
4.4.2 IP SERVICES From the navigation frame, select Setup(Advanced) IP Services to configure RIPV2, IPSD, NAT and SNMP. Figure 26 – IP Services #9 Viper_SC_Manual_001-5008-000_Rev12d.
― RIPV2. Select Enabled/Disabled. Default = Disabled. Router Information Protocol v2 is a dynamic IP routing protocol based on the distance vector algorithm and is only used in Router Mode. RIPV2 is responsible for passing router information to other routers in the network. ― IPSD (IP Services Delivery). Select Enabled/Disabled. Default = Enabled. Enables the generation of locally provided IP Services such as online diagnostics, etc. ― NAT (Network Address Translation). Select Enabled/Disabled.
To delete an address from the Trap IP List: Select “Delete” and type the IP address to be deleted from the read-only Trap IP list. Click “Apply” at the bottom of the page. The IP address should disappear from the Trap IP List. Download mibs.zip - The Viper MIB is bundled with each unit's firmware. Click "Download mibs.zip" and a pop-up dialog box will appear in your browser asking you to open or save the file to your PC. Save the zip file to a desired location. Unzip the contents of mibs.
Viewing MIB Files To view the hierarchy of SNMP MIB variables in the form of a tree and view additional information about each node, open each MIB files with a MIB browser. In a MIB browser, each object (or node) can be selected and its properties (including OID) can be observed. For simple networks, any MIB browser supporting SNMP v2c could be used. However, for managing complex networks, a more advanced SNMP Manager/Browser is recommended.
4.4.2.2 NAT OVERVIEW NAT is the process of modifying network address information in datagram (IP) packet headers while in transit across a traffic routing device for the purpose of remapping one IP address space into another. Most often, NAT is used in conjunction with network masquerading (or IP masquerading) which is a technique that hides an entire IP address space, usually consisting of private network IP addresses, behind a single IP address in another, often public address space.
The purpose of the NAT protocol is to hide a private IP network from a public network. This mechanism serves first as a firewall and second to save IP address space. The NAT enabled device translates the source address of packets transiting from the private network to the public network. The original IP source address gets replaced by the NAT enabled IP address (address of the outgoing interface).
Figure 33 – Private to Public Packet Flow Host 1 will be able to ping Host 2, however Host 2 will not be able to ping or originate a message to Host 1 when NAT Eth enabled. 4.4.2.2.1.2 RF INTERFACE PRIVATE Figure 34 shows the NAT enabled for the RF interface. Figure 34 – NAT Enabled, RF (Private) Figure 35 shows a Viper SC configuration protecting Viper SC (2) RF interface and Viper SC (1) Ethernet interface from hosts located on a public network. #9 Viper_SC_Manual_001-5008-000_Rev12d.
Figure 35 – NAT Enabled, RF (Private), Ethernet (Private) An IP packet whose source IP address originates from the RF network and is sent towards the Ethernet network will have its source IP address replaced by the Ethernet IP address of Viper (2). Notice in this configuration the Ethernet IP address for Viper (1) is considered private and the RF IP address for Viper (2) is considered private. Figure 36 shows how the packets will be modified as the packets pass through the network.
Figure 38 – Packet Flow, RF Interface (Private) Figure 38 shows when Host 1 sends a packet, the source IP address is not changed by Viper (2) because the source does not originate from the private RF network. 4.4.2.3 USER NAT ENTRIES The user can add three USER IP addresses that will be considered private. Figure 39 shows USER1 192.168.205.125 and USER2 192.168.205 will be considered private. If USER3 192.168.205.87 is connected to the Viper SC, but not added to the table, USER3 192.168.205.
4.4.2.4 NAT PORT FORWARDING The NAT Port Forwarding table allows the user to specify a particular public port or range of ports to be forwarded to the private network hidden by the Network Address Translation Table. The user can also select between TCP and UDP protocols. Figure 40 shows the NAT Eth IP subnet 192.168.205.0 will be hidden from the Public Network.
Figure 41 shows the Private Network 192.168.205.0 being protected from the Public Network 172.31.5.0. Viper (1) NAT Eth interface is enabled and Viper (2) NAT is disabled. The Host 172.31.5.2 cannot send packets directly to the Private Network because it is hidden. In this example, Host 172.31.5.2 thinks the IP packets are coming from 10.0.14.203. Figure 41 – Port 2000 is redirected to 192.168.205.125:23 #9 Viper_SC_Manual_001-5008-000_Rev12d.
When Host 172.31.5.2 wants to send packets to Host 192.168.205.2 the packets are sent to 10.0.14.203. NAT port translation allows Host 172.31.5.2:1435 (port 1435) to send TCP packets to 192.168.205.5:23 (port 23) by sending the packets to 10.0.14.203:2000 (port 2000). Figure 42 shows how the packets would be modified as they moved through the network. Figure 42 – Packet Flow, Port Redirection 4.4.3 IP ADDRESSING There are some SCADA PLC protocols that use different IP addressing modes.
4.4.3.1 BROADCAST Directed Broadcast This parameter controls the forwarding of directed broadcast packets from the LAN interface to the RF interface. Enabled - Forwarding of directed broadcast packets is enabled (default). Disabled - Forwarding of directed broadcast packets is disabled. Limited Broadcast This parameter controls the forwarding of limited broadcast packets from the LAN interface to the RF interface. Enabled - Forwarding of limited broadcast packets is enabled.
Multicast Forwarding This parameter controls the forwarding of multicast packets between the LAN interface and the RF interface. The packets forwarded from the LAN to the RF interface are identified by the "Multicast Address List" (all other multicast packets are dropped). The "Multicast White List" controls which multicast packets are forwarded from the RF interface to the LAN interface.
IP Optimization is only available in router mode. Figure 44 – IP Optimization (& Tuning) ― RF ACK (RF Acknowledgements). Select Enabled/Disabled. Default = Disabled. If enabled, the receiving Viper will reply with an acknowledgement message to the sending Viper to indicate that it has received the packet successfully. If the sending Viper does not receive the acknowledgement, it assumes the message was lost and resends the message. This number of retries is specified using MAC Retries (Section 4.4.
1) 2) 3) 4) Host A sends TCP data packet to Viper SC A. Viper SC A transmits packet over the air to Viper SC B. Viper SC B immediately responds with an RF acknowledgment and sends the TCP data packet to Host B. Viper SC A hears an RF acknowledgement from Viper SC B and generates a TCP ACK to send to Host A. Host B receives the original TCP data packet and generates a TCP ACK to send back over the network.
Figure 47 – Time Source 4.4.6.1 SNTP Simple Network Time Protocol (SNTP) is a protocol for synchronization of clocks of computer systems (Viper SCs) over the Internet. When SNTP client is enabled the Viper SC will poll the time server for the time information update. ― ― ― ― Client. Select: Enabled/Disabled. Default = Disabled Server Address. Enter the IP Address of the SNTP Server in dot decimal format. Default = 0.0.0.0 Period. Enter the period of time (in seconds) at which the SNTP Server is polled.
― Forward Power Alarm & Notification. Select Enabled/Disabled. Default = Enabled. The Forward Power Alarm will trigger when the measured forward power drops 1 dB or more below the user configured transmit power. The Forward Power Alarm SNMP trap is generated when this condition occurs. When the forward power returns to within 0.8 dB of the wanted power the error is cleared and a second notification is sent indicating the error has cleared. For example, assume the Viper SC is programmed to transmit at 10W.
Select Celsius/Fahrenheit. Default = Celsius. 4.5 SECURITY From the navigation frame, select Security to configure passwords, encryption and access control. 4.5.1 PASSWORD AND ENCRYPTION Figure 50 – Security Settings/Pass Control 4.5.1.1 USER ― User ID. Enter a string up to 15 alphanumeric characters. ― Old Password. Default = ADMINISTRATOR. ― New Password. Enter a new password. Passwords are case sensitive and must be 8-15 characters in length. 4.5.1.
Viper uses RADIUS (Remote Authentication Dial in User Service) for authentication and authorization. RADIUS is a networking protocol that provides centralized authentication, authorization and accounting management for computers and devices to connect and use a network service. RADIUS in the Viper is used for two authentication scenarios: User Authentication (see Section 4.5.2.1.1) and Device Authentication (see Section 4.5.2.1.2).
User access can be configured independently for Command Shell and HTTP and FTP Servers. In the following descriptions, the HTTP interface is used as an example but they also apply to the FTP and command shell interfaces. ― Local. Authentication is done locally, i.e. within the Viper device. Example: when accessing the HTTP server, check the user credentials against username and password stored in the unit. The user will not be able to access the HTTP server unless proper credentials are provided.
― RADIUS Server IP. User entered Server IP address. ― RADIUS Server Port. User entered port can be used but most common values are 1812 or 1645. These are the only values supported for RADIUS login on a non-access point device that uses the VPN feature. ― RADIUS Secret. Request encryption key. The same value must be set in the RADIUS server. ― RADIUS Timeout. Timeout (in seconds) on the RADIUS’ server reply before a new request is generated. Default = 5. ― RADIUS Retries.
Figure 54 – Viper VPN Network with Relay Point Figure 55 – SecurityVPN Settings #9 Viper_SC_Manual_001-5008-000_Rev12d.
4.5.3.1 ACCESS TO SETTINGS ― VPN Password. The VPN configuration login password must be at least 8 characters long and contain at least three of the following character types: (1) uppercase letters, (2) lowercase letters, (3) numbers, and (4) special characters. ― Key Strength. Enter 128/192/256. Default = 128. This value represents the strength (in bits) of the master key used by the VPN client and the VPN server. Enter 128 for a Master Key that is 16 bytes (16 characters).
Enable/Disable VPN Select Enable VPN/Disable VPN. Click to manually enable/disable the device’s VPN service. Enable/Disable VPN Clients (Available on VPN servers only) The VPN server sends a 'VPN enable service' or ‘VPN disable service’ command to all of its clients when the user clicks the Enable- or Disable- VPN Clients button. Note: The command is broadcast a few times using the 'Network Latency' VPN setting as the delay (in seconds) between each broadcast.
4.5.3.4 GENERAL SETTINGS ― Operating Mode. Select Server/Client. Default = Client. ― Automatic Start. Select Enabled/Disabled. Default = Enabled. If enabled, VPN service starts automatically when Viper is powered on. 4.5.3.5 SERVER SETTINGS ― Block non-VPN Traffic. Select Enabled/Disabled. Default = Enabled. If enabled, the VPN service blocks all packets from the RF link which were not sent via a VPN tunnel.
― Status Frequency (Available on VPN servers only). The delay (in seconds) between server-status advertisements sent to VPN clients. An advertisement consists of a few packets sent at an interval determined by the Network Latency setting. A server's status includes its VPN service state (enabled/disabled) and load (0-100% tunnel capacity in use). A non-zero value permits VPN clients to 'discover' servers (e.g. they do not need to be pre-configured with server IP addresses).
Enter the RF IP address of the VPN server(s). You may enter up to 4 VPN servers. The unit will attempt to establish a VPN tunnel connection with the first server on the list. If unsuccessful, it will continue down the list in a round‐robin manner. 4.5.3.7 VPN FILTERS The VPN filters provide criteria used to select which packets are sent through VPN tunnels. Packets passing through VPN tunnels are protected with strong encryption.
Example 2 In this example the source netmask is 255.255.255.0, so messages originating from source IP addresses: 172.30.51.1172.30.51.254 and from ports: 5555-6000 will be passed through the VPN tunnel. All other messages will be blocked (assuming that “Block non-VPN Traffic” is enabled). The destination IP address is 0.0.0.0 and the destination port range is 0 to 0. So messages destined to any IP address and any destination port will be passed through the VPN tunnel. 4.
4.6.1 ETHERNET INTERFACE Ethernet statistics gathered from the LAN port include: ― RX Pkts. The total number of input packets received by the Ethernet interface. ― TX Pkts (LAN). The total number of output packets transmitted by the Ethernet interface. 4.6.2 SERIAL INTERFACE Serial statistics are gathered from both the Setup and COM ports. These include: ― ― ― ― RX Bytes. The total number of input bytes received by the port. TX Bytes. The total number of output bytes transmitted by the port. RX Pkts.
― RX Ctrl Pkts. The total number of control packets received over-the-air. These packets may be RTS/CTS messages or RF Acknowledgements. ― RX Data Pkts. The total number of input data packets received over-the-air. ― TX Ctrl Pkts. The total number of output control packets transmitted over-the-air. These packets may be RTS/CTS messages or RF Acknowledgements. ― TX Data Pkts. The total number of output data packets transmitted over-the-air. 4.6.3.2.
A PER value shows a question mark ("?") when the unit cannot compute it. This can be due to no packets being received or to the received packets not including a sequence number. The later is due to the "OIP duplicate packet removal" feature being disabled. Transmitted Packets. The number of IP packets transmitted on the RF interface (good and bad packets) to the remote unit (unicast or broadcast).
4.7.2 CONFIG CONTROL The Config Control page grants access to User Configuration, Firmware Upgrade and Factory Settings. Figure 60 – Maintenance/Unit Configuration Control 4.7.2.1 USER CONFIGURATION SETTINGS Select Checkpoint User Configuration to create a checkpoint of all the user configurable settings in the Viper. Click Proceed to save these settings into the configuration file (UserCFG_macaddress.drp, where macaddress is equal to the Ethernet MAC Address of the Viper).
Export Last Checkpoint to PC. Right Click this link, then select “Save Target As” to save the configuration file to a PC. A save dialog box will appear. Select the file name and folder to save the configuration file to and click save. The configuration file may be renamed, if desired, (must keep the .drp extension) then reloaded back into the original Viper SC or into another Viper SC by using an FTP client program. Do not load more than 5 separate configuration files into a single Viper SC.
Figure 62 – Maintenance/Net Tests ― Destination RF MAC address. User entered RF MAC address of the Viper unit they wish to connect to (Format 0x00000FD4). Default = 0xFFFFFFFF) Send a broadcast packet to all Viper listening for the test packets. ― Number of packets to transmit. The total number of packets transmitted during the test. Default = 1. ― Delay between packets. The user can enter a delay in milliseconds between the packets being sent.
Open window to display test statistics. Note: The user should use this feature on the receiving unit to monitor the Net test. This window will also display the RSSI value from the transmitting unit. Net Test Results Click Show Stats to display the test results. A typical results page from the transmitting Viper is shown in Figure 63. Figure 63 – Net Test Statistics (From the Transmitting device) The left column lists current results.
4.7.5 RF TESTS Select Unmodulated/Random Data/1 KHz Sine Wave to indicate the type of test tone to be transmitted. Click Start Test to transmit a test tone for 20 seconds. Other Viper in the network may stop transmitting for the duration of this test. Click Stop Test to end the test tone immediately. Figure 65 – Maintenance/RF Tests Figure 66 – SINAD Meter SINAD Meter. Display readings from the SINAD meter.
Vipers in the deployment have received all the blocks, it directs the Vipers to install the image received and perform a station reset. As a last step, the WCS verifies that all Vipers have successfully applied the firmware upgrade. Figure 67 – MaintenanceWing Commander Most of the WCP settings (intrusive or transparent packet pacing, addressing options, retries etc.) are controlled from the WCS, leaving only a few settings to be specified on the Viper unit.
Each ID is an arbitrary 15 character long case-sensitive string. The following characters are allowed: a-z A-Z 0-9 # $ % # $ % & ( ) * @ [ ^ _ ASCII: 0x61 – 0x7A ASCII: 0x41 – 0x5A ASCII: 0x30 – 0x39 ASCII: 0x23 ASCII: 0x24 ASCII: 0x25 ASCII: 0x23 ASCII: 0x24 ASCII: 0x25 ASCII: 0x26 ASCII: 0x28 ASCII: 0x29 ASCII: 0x2a ASCII: 0x2d ASCII: 0x40 ASCII: 0x5b ASCII: 0x5e ASCII: 0x5f The default value (“n/a”) does not result in an ID comparison match when used. IP Settings. Multicast Group 239.192.0.
Blocks Total The WCP server sends the filename in small blocks. This number represents the number of blocks the server divided the file into. Block Written Number of blocks that have been successfully written into the Viper non-volatile memory Completed (%) Completion ratio (blocks written over total number of blocks) Cmd The last WCP command received by the client Contact your authorized CalAmp representative for availability and details on the Wing Commander Server. 4.7.
Figure 68 – Network ManagementNeighbor Table 4.8.1 NEIGHBOR DISCOVERY Select Manual/Auto/Disabled. Default = Manual-Scan. There are three modes of operation. This mode must be configured the same for every Viper in the network. ― Manual-SCAN. Viper starts in the “Ready” state. In the “Ready” state, the unit is quiet (no neighbor discovery control messages are sent). If the user presses the “Force Scan” button, the unit goes into the “Scanning for Neighbors” state.
network. Auto-Scan mode could generate a large number of neighbor discovery control messages in a large Viper SC network. CalAmp recommends Auto-Scan be limited to Viper SC networks of two to ten units. If Auto-Scan mode is used, be aware that the Neighbor Discovery learning process may slow responses in SCADA networks from remote units or capture the RF channel so remotes cannot respond to a Master. ― Disabled.
4.8.1.2.2 ROUTE TO NEIGHBORING VIPER ― Hop Count/Next Hop. Indicates the route the remote Viper SC can be reached - when Hop Count is 1, the device can be reached directly. When HOP COUNT is more than 1, it can be reached by passing though another Viper SC as identified by the Next Hop field. Entry Type ― Static. This entry has been defined by the user. The entry type can only be removed by the user. This entry cannot be replaced by a "Dynamic" or "Locked" entry.
― RF MAC Address. Default = the last six digits of the Ethernet MAC that is found on the label on the bottom of your Viper. Also you can verify the current RF MAC that is being used in the remote radio by checking the Basic Setup IP Settings web page of the remote unit. Enter the current RF MAC address of the remote radio into this field. ― RF IP address, RF netmask, Ethernet IP Address, and Ethernet netmask of the remote Viper.
The Neighbor Discovery module will keep track of two routes determined by the shortest hop count to any given Viper SC the primary route and the backup route (if a route is detected). Users can override the Neighbor Discovery selection by pressing the “Toggle Primary/Backup Routes” button. The backup route will become the active route. In certain applications, it may be necessary to edit Primary and/or Backup routes.
4.8.2 STATUS Figure 69 – Network Management Status 4.8.3 MAINTENANCE The Network Maintenance page allows the user to make changes to a single Viper device or to the entire Viper network. This allows the user to make changes to the remote units' neighbor tables. Figure 70 – Network Management Maintenance ― Delete Station. User entered RF MAC Address of the station to be deleted from the Neighbor Table of all Viper SCs in the network. ― Replace Station.
5 NETWORK OPTIMIZATION 5.1 MAXIMIZING TCP/IP THROUGHPUT After optimizing the Airlink, if there appears to be an unexplained speed loss, you can attempt to maximize TCP/IP throughput. TCP/IP throughput can be a challenge to measure as performance is related not only to the RF link, but how well flowcontrol is implemented in the TCP/IP stack and each application’s design. Viper SC has been optimized with this in mind.
5.2.3 INCREASE OIP AND MAC RETRIES LIMIT OIP retries and MAC retries are only available in Router mode. The MAC Retry Limit is normally set to 1 and the OIP Retry Limit is normally set to 2. Gradually increasing these limits (up to 3 in extreme cases), may provide a slower, but more reliable link impossible with weak signals. Use in conjunction with the slower over-the-air network bit rate for the system’s bandwidth.
6 UPGRADING YOUR FIRMWARE Viper SC radio firmware is field-upgradeable using the unit’s Ethernet port. The process involves connecting to the IP address of the Viper SC from a host PC and transferring firmware files via a Files Transfer Protocol (FTP) program. There are two sets of code in the Viper SC Radio. The first set of code is the Modem Firmware and must be updated every time a software upgrade is needed. The second set of code is the Radio Firmware.
Example: Telnet using Windows Command Prompt program. Open Windows Command Prompt. Type the following command then press enter: telnet Viper SC_ip_address Figure 71 – Use Windows Command Prompt to Telnet to Viper SC Radio 3. 4. Enter in your username and password. Type the following command then press enter: radio.upload.firmware.binary –v –f vipr_radio.bin You should see the following message in return: 100-Loading file "vipr_radio.bin"... 100-File imported successfully.
200-Firmware Version: . FIRM-03_10-R 200-ASD Data Map: . . . 2.0 200-Radio Circuit Board: 0.10 200-Radio Serial Number: 405163 200 Radio Model Number: 823-5028-452 Check that the “Firmware Version:” shows the latest firmware revision. Figure 72 – Using Windows Command Prompt to upgrade Radio Firmware 5. 6.3 Restart the Viper SC. You can restart the Viper SC by typing “stationreset” in the CLI then pressing enter. VERIFY FILE INTEGRITY 1. 2. 3. Using your browser, connect to the unit’s IP address.
APPENDIX A – SPECIFICATIONS These specifications are typical and subject to change without notice. GENERAL Model Numbers, Frequency Range and Bandwidth Model Numbers Frequency Range Channel Bandwidths Available 140-5018-502 140-5018-600 140-5028-502 140-5028-504 136 – 174 MHz 136 – 174 MHz 215 – 240 MHz 215 – 240 MHz 6.25 kHz, 12.5 kHz, 25 kHz, 50 kHz 6.25 kHz, 12.5 kHz, 25 kHz, 50 kHz 6.25 kHz, 12.5 kHz, 25 kHz, 50 kHz 6.25 kHz, 12.
TRANSMITTER VHF UHF 900 Tx Frequencies 136 - 174 MHz 142-174 MHz 215 – 240 MHz 1-10 Watts Adjustable 406.125 – 470.000 MHz, 450.000 - 511.
RECEIVER Bandwidth 140-5018-50x 140-5028-50x Bit Rate Typical / Max 140-5098-x0x Units 140-5048-50x 136 - 174 215 - 240 406.125 – 470.000 450.000 - 511.975 880 – 902 928 - 960 MHz MHz 4 kbps -115 / -112 -115 / -112 -115 / -112 -- dBm 8 kbps -106 / -103 -106 / -103 -106 / -103 -- dBm 12 kbps -100 / -95 -100 / -95 -- -- dBm RX Frequencies Data Sensitivity @ -6 10 Bit Error Rate (BER) 140-5048-30x 6.25 kHz 12.
Bandwidth 140-5018-60x 140-5048-40x Bit Rate 142 - 174 406.125 – 470.000 450.000 - 511.975 MHz MHz 12.5 kHz (ETSI) 8 kbps 16 kbps 24 kbps -111 / -108 -104 / -101 -96 / -92 -111 / -108 -104 / -101 -96 / -92 dBm dBm dBm 25kHz (ETSI) 16 kbps 32 kbps 48kbps -110 / -107 -103 / -100 -96 / -92 -110 / -107 -103 / -100 -96 / -92 dBm dBm dBm 6.25 kHz 45 45 45 -- dB 12.
MODEM/LOGIC Model Data Rate (Selectable) 6.25 kHz 12.
SETUP and COM Port Interface EIA-232F DCE Data Rate Setup Port: 300 – 19,200 bps (Default: 19.2 Kbps) Com Port: 300 – 115,200 bps (Default: 9.
APPENDIX B – REGULATORY CERTIFICATIONS Domestic and International Certifications Model Number Frequency FCC Range 140-5018-500 140-5018-501 136 – 174 MHz NP4-5018-500 140-5018-502 140-5018-503 140-5018-600 140-5018-601 140-5028-502 140-5028-503 140-5028-504 140-5048-300 140-5048-301 140-5048-302 140-5048-303 215 – 240 MHz NP4-5028-502 773B-5028502 215 – 240 MHz NP45028504 773B-5028504 406.1 - 470 MHz NP4-5048-300 773B-5048300 406.
DECLARATION OF CONFORMITY FOR MODELS # 140-5018-60x, 140-5048-40x, and 140-5048-60x The Viper radio is tested to and conforms with the essential requirements for protection of health and the safety of the user and any other person and Electromagnetic Compatibility, as included in following standards: Standard EN 60950-1 EN 301 489-1 EN 301 489-5 Issue Date 2006 (with Amendment A11: 2009 + A1: 2010 2008-04 2002-08 and is tested to and conforms with the essential radio test suites so that it effectively use
provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC. Magyar [Hungarian] Polski [Polish] Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] Suomi [Finnish] Svenska [Swedish] Íslenska [Icelandic] Norsk [Norwegian] Alulírott, CalAmp nyilatkozom, hogy a rádió megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. Niniejszym CalAmp oświadcza, że radio jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Malta Contact Authority Contact Authority Slovak Republic 146-174 410–448 Slovenia 146-174 401.6–410, 440–470 450-470 147-174 406.1-470 142-174 406.125 – 512 142-145 406.25-409, 449-470 450-511.975 142-145 411–439 471-511.
APPENDIX C – PRODUCT WARRANTY CalAmp warrants to the original purchaser for use ("Buyer") that data telemetry products manufactured by DRL ("Products") are free from defects in material and workmanship and will conform to DRL's published technical specifications for a period of, except as noted below, one (1) year from the date of shipment to Buyer.
APPENDIX D – DEFINITIONS Access Point. Communication hub for users to connect to a LAN. Access Points are important for providing heightened wireless security and for extending the physical range of wireless service accessibility Ethernet. IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Airlink. Physical radio frequency connections used for communications between units Firewall.
OIP (Optimized IP). Compresses TCP and UDP headers, and filters unnecessary acknowledgments. OIP makes the most use of the available bandwidth Static IP Address. A fixed address assigned to a computer or device connected to a network Static Routing. Forwarding data in a network via a fixed path OTA (Over the Air). Standard for the transmission and reception of application-related information in a wireless communications system PHY.