-
ŇŏĵıijłġʼnŢųťŸŢųŦġŔűŦŤį őųŦűŢųŦť łűűųŰŷŦť œŦŷŪŴŪŰů Description ĹıijįIJIJůġŸŪŧŪġŔźŴŵŦŮġŎŰťŶŭŦ System CPU Flash DRAM RTC Ethernet RF łŵũŦųŰŴġłœĺĴĴIJġĩłœIJĴIJIJĪ ĹġŎŃ ĴijġŎŃ ŏŰ IJıİIJııġŎţűŴġŇŢŴŵġņŵũŦųůŦŵġīijġĩŰűŵŪŰůŢŭġŵŰġŐůŦġœŋĮĵĶĪ IJŕIJœĭġĹıijįIJIJůĭġũŪĮűŰŸŦųġĩĶııġŮŸĪ(2.
-
GPIO definition ňőŊŐġı ňőŊŐġIJĴ ňőŊŐġIJĸ őŰŸŦų ňőŊŐġijĸ ňőŊŐġijķ ňőŊŐġijı ňőŊŐġijĴ ňőŊŐġIJij ōņŅġIJ ōņŅġij ōņŅġĴ ōņŅġĵ ōņŅġĶ ōņŅġķ ŊƳńġŅŢŵŢ ŊƳńġńŭŰŤŬ œŦŴŦŵġţŶŵŵŰůġĩŴŰŧŵŸŢųŦġœŦŴŦŵĪ Revision record ųŦŷįIJįIJŎ 2
-
PRELIMINARY Revision History Revision Date Description 0.5 November 2008 Original Release 0.6 November 2008 Updated to include Web interface and configuration methods. 0.
-
PRELIMINARY Table of Contents 1 1.1 1.2 1.3 1.3.1 1.3.2 1.3.3 1.3.4 1.3.5 1.4 1.4.1 1.4.2 1.5 1.6 2 2.1 2.2 2.3 2.3.1 2.3.1.1 2.3.1.2 2.3.1.3 2.3.1.4 2.3.2 2.3.2.1 2.3.2.2 2.3.2.3 2.3.3 2.3.3.1 2.3.3.2 2.4 2.4.1 2.4.2 2.4.2.1 2.4.2.2 2.4.2.3 2.4.2.4 2.4.2.5 2.4.2.6 2.4.2.6.1 2.4.3 2.5 2.5.1 Introduction................................................................................................................................................ 6 Top Level architecture ....................................
-
PRELIMINARY Listing VAP Parameters.................................................................................................................... 63 2.5.2 2.5.2.1 Station (sta) ....................................................................................................................................... 64 2.5.2.2 AP List (ap)....................................................................................................................................... 65 2.5.2.3 Channel (chan) ........
-
PRELIMINARY 1 Introduction This manual provides information on the design and use of the Atheros AP system. This system consists of the OS kernel, utility functions, and the Atheros AP Driver. 1.1 Top Level architecture This driver is based on the Atheros Universal Driver Architecture. This architecture abstracts the WLAN driver into various common sections that can be used for a variety of operating systems.
-
PRELIMINARY WLAN Driver Interface OS Abstraction Layer IEEE 802.11 Protocol Stack STA/AP SME Scanning/Roaming MLME Config Mgmt Frm PM Base Objects (channel, ic, node, VAP) LMAC Interface Atheros Device Object (ath dev) ATH DEV Rate Control Packet Logging DFS Hardware Abstraction Layer AR5212 AR5416 Figure 1 Fusion Top Level Block Diagram 1.3 Lower MAC The Lower MAC portion consists of two main components: The Hardware Abstraction Layer (HAL), and the Atheros Device Object (ATH).
-
PRELIMINARY 1.3.4 Packet Logging Packet logging provides a low level mechanism to capture driver activities. It can log activities like transmit, receive, rate find and update, aggregation, ANI, and etc. Different operating system shall have its own tool to enable packet log and retrieve the log buffer. 1.3.5 DFS p the DFS or Dynamic y Frequency q y Selection algorithm, g , which enables wireless devices This module implements p g in the 5GHz band to detect the presence p a systems.
-
PRELIMINARY net80211 Packets net80211 Requests net80211 APIs IF_ATH Packets ath_dev APIs ath_dev Indications ATH_DEV Figure 2 UMAC Shim Layer 1.5 WLAN Driver Interface and OS Abstraction Layer Each operating system has its own networking and wireless driver interface, such as NDIS 6.0 with Revised Native WiFi in Windows Vista.
-
PRELIMINARY 2 User Interface The user interface on the Linux AP baseline provides a rich set of capabilities via command line tools, and also provides a simplified web interface that can be used for quick AP configuration. The user interface is based on shell scripts and a configuration utility that will store configuration information in flash. The web interface also uses this utility to store information through boot cycles. 2.
-
PRELIMINARY 2.2.1.1 Variable Names All tags work with the names of environmental variables. These are passed either through the CGI interface when doing HTML pages, and/or read from the stored environmental data. There are two types of variable names used by the program: Fixed Names: The standard name with no additions, like AP_SSID Indexed Names: When variables are indexed by instance, they will typically have an extension, such as AP_SSID_2.
-
PRELIMINARY 2.2.1.3 Flash Usage This program seeks to eliminate extra usage of flash resources by using an existing sector for storing date (the calibration sector). Note that the board and radio calibration data only take up the first 32 KB of flash storage, leaving the second 32 KB available. The permanent storage area for parameter data is put into this area without using a filesystem – the data is simply written to flash as a linear string of data. Parameters are stored in the “NAME=VALUE” format.
-
PRELIMINARY An example of a tagged HTML page:
PAGE 14
PRELIMINARY 2.2.2.2 Command Line Usage The cgiMain program also has command line switches available for use in scripts. This provides convenient access to stored parameter data, and data updated via web pages. In fact, a web page can start a script as part of a CGI interface, where the script executes command line versions of cgiMain within the script to perform various functions. Note that the cache file takes precedence over the flash contents when executing scripts.
-
PRELIMINARY 2.2.2.2.6 Exporting variables In order to use the variables in scripts, they need to be exported. The form for doing this is: #cfg –e This will output all variables in the form “export VAR=VALUE” for all variables in the cache. To use this in a script file, you can put the following line in the script: `cfg –e` and all variable/value pairs will be in the environment for use. 2.2.2.2.7 Resetting to factory defaults Resetting to factory defaults is a two step process.
-
PRELIMINARY AP_STARTMODE standard Mode for apup execution. standard Creates a single AP rootap Creates a single WDS mode AP client Creates a single WDS station instance. repeater multi multivlan dual Creates a WDS repeater containing an AP and client Creates a multiple VAP configuration Puts each VAP on a desired VLAN interface On platforms capable of dual concurrent operations set VAP0 to 2.4 GHz on radio 0, and VAP1 to 5.
-
PRELIMINARY AP_BRNAME When assigning a VLAN to a VAP, a bridge instance is created for the VLAN. This identifies the “name” of the bridge. TXQUEUELEN 1000 SHORTGI SHORTGI_2 1 Enables the short gating interval. AMPDUENABLE AMPDUENABLE_2 1 Enables AMPDU aggregation; applies to all VAPs attached to the radio. AMPDUFRAMES AMPDUFRAMES_2 32 Maximum number of frames to include in the aggregated frame. Applies to all VAPs attached to the radio.
-
PRELIMINARY AP_SECFILE# Indicates which security configuration file to use for the VAP. See section 2.1for a description of the configuration files. AP_VLAN# Used to configure VLAN tags for SSIDs AP_SSID, AP_SSID_2, AP_SSID_3 and AP_SSID_4 respectively. To configure VLANs. AP_STARTMODE should be set to multivlan. No default values are assumed for these configuration items. WEPKEY_1 WEPKEY_2 WEPKEY_3 WEPKEY_4 These are the 4 WEP keys that are defined in the first 4 slots.
-
PRELIMINARY 2.4 Web Interface The Atheros AP reference design includes a simplified web interface that can be used to configure the AP in various modes. These pages provide both configuration and status information. All pages are processed using the cgiMain program described in section 2.2. Each of these pages contains related information that can be used to configure the AP. Note that default values are automatically provided to the web interface.
-
PRELIMINARY 2.4.1 Network Page The network page is the default initial page, and provides for general network settings. The network page is shown in Figure 3. Figure 3 Network Configuration Page The parameters on this page allow the user to set specific environmental variables with a “point and click” interface: Table 3 Network Configuration: Page Parameters Parameter Env Var Description Bridge Mode WAN_MODE Selects the bridge mode.
-
PRELIMINARY 2.4.2 Radio Configuration Page This page includes the radio parameters for each radio on the AP. This example is for a dual concurrent AP, a single radio AP would only show a single column. Note that indexed variables here are per Radio as opposed to per VAP. Figure 4 Radio Configuration Page Table 4 Radio Configuration: Page Parameters Parameter Env Var Description Channel AP_PRIMARY_CH AP_PRIMARY_CH_2 Indicates the channel selected for the AP.
-
PRELIMINARY 2.4.3 Virtual AP (VAP) Configuration Page For each VAP (1-4) its individual parameters can be configured through this page. Note that there are selections for VAP 1-4 on the left panel. These parameters specify things like the ESSID string, which radio to use (for dual concurrent platforms), VLAN information, initialization mode, and Security Modes. In this document the various sections of the page are shown in two sections, because a readable screen shot of the entire page was not possible.
-
PRELIMINARY Figure 6 VAP Configuration Page (2 of 2) 23
-
PRELIMINARY Table 6 VAP Configuration: Page Parameters Parameter Env Var Description Security Modes AP_SECMODE# Vertical set of radio buttons that select the security mode Security Submodes AP_SECFILE Open No Security WEP WEP Security (only 1 instance per radio allowed) WPA WPA (and WDS) security modes For WPA Security Mode, the following sub modes are defined: Personal Shared Key User creates a passphrase for authentication. No outside server required.
-
PRELIMINARY 2.4.4 Status Page This page shows the output of the command “iwconfig” with no parameters Figure 7 AP Status Page 2.4.5 Channel Page This page shows the output of the “wlanconfig athx list channel” command. See section 2.5.3 for details.
-
PRELIMINARY 2.4.6 Statistics This shows the output of the “athstats” program. Figure 9 Statistics Page 2.5 Command Line Interface The command line interface consists of setting environmental variables using the configuration tool, and the following scripts. The recommended approach is to set environmental variables and use the “apup” or “apdown” scripts to ensure everything is configured correctly. 2.5.1 Shell Scripts Several shell scripts are provided as examples, or as fully useable implementations.
-
PRELIMINARY 2.5.1.1.1 rcS Format: # /etc/rc.d/rcS This script is the bootup script. It will install any board specific modules, initialize the networking system and bridge, and optionally bring up the WLAN with the default configuration. It calls the rc.network, rc.bridge, and optionally the apup script. This script is never executed in any context other than initialization. 2.5.1.1.2 rc.network Format: /etc/rc.d/rc.network This script initializes the main network interfaces on the device.
-
PRELIMINARY 2.5.1.2.1 makeVAP Format: /etc/ath/makieVAP VAP_type SSID IFStr Beacon_Int VAP_type SSID IFstr Beacon Int ap Standard access point ap-wds WDS root access point sta Standard Client Mode sta-wds WDS mode client station ESSID string for the access point Interface configuration string of the form interface:RF:PriCh:ModeStr Beacon interval, in milliseconds This script will create and configure a VAP for the indicated mode VAP_type can be set to AP or station.
-
PRELIMINARY 2.5.1.2.2 activateVAP /etc/ath/activateVAP VAP_id BRG_id SECmode SECparam VAP_id The specific VAP, as in ath0, ath1, etc. BRG_id The bridge to add the VAP to, as in br0. Specifying “-“ will keep the VAP from being added to any bridge. SECmode Security mode. One of WPA, WEP, WSC, or NONE. blank for the default mode of NONE SECparam Parameter for the security mode. Typically the file containing the parameters for the selected security mode.
-
PRELIMINARY 2.5.2 Wireless Tools The Wireless Tools interface is the primary interface used in Linux for configuring and operating the WLAN interface. The tools themselves are open source, and require specific support through the ioctl interface for the driver. The Atheros WLAN driver supports these tools “out of the box” without modification. Any version of Wireless tools after version 28 can be used with the Atheros WLAN driver system.
-
PRELIMINARY channel #iwconfig athN args Selects the channel for operations. In AP mode, this is the channel that the AP will operate in. For STA operations, the station will associate to the appropriate AP based on the MAC address setting and the ESSID, so channel is not important in that mode. The channel argument will only take channel number. See the freq command for setting the specific frequency. If an invalid channel is selected, this command will return with an error status.
-
PRELIMINARY txpower #iwconfig athN txpower power_setting This command will set the transmit power for all packets on the device. This power is limited by the regulatory limits encoded into the driver, and selected by setting the country code (see iwpriv command setCountry). The value of power_setting is provided in units of dBm. Setting the power_setting value to off will enable the internal power control logic for setting power level.
-
PRELIMINARY 2.5.2.3 Radio Layer The radio layer commands are provided to configure the radio layer for ALL VAPs attached to the radio. Common parameters for the radio include the frequency (channel), the channel width mode (HT 20/40), and other parameters that apply to radio operations. Note that ALL VAPS attached to the specific radio are affected by the configurations made to the radio layer.
-
PRELIMINARY AggrProt AggrProtDur AggrProtMax #iwpriv wifiN AggrProt 1|0 #iwpriv wifiN AggrProtDur duration #iwpriv wifiN AggrProtMax size These are used to enable RTS/CTS protection on aggregate frames, and control the size of the frames receiving RTS/CTS protection. These are typically used as a test commands to set a specific condition in the driver. The AggrProt command is used to enable (1) or disable (0) this function. Default is disabled.
-
PRELIMINARY ANIEna #iwpriv wifiN ANIEna 0|1 This parameter enables the Automatic Noise Immunity (ANI) processing in both the driver and the baseband unit. ANI is used to mitigate unpredictable noise spurs in receive channels that are due to the host system that the device is installed in. This feature was added for CardBus and PCIE devices sold in the retail market that were not pre-installed in host systems. Most AP implementations will not enable ANI, preferring to limit noise spurs by design.
-
PRELIMINARY CCKTrgLow CCKTrgHi #iwpriv wifiN CCKTrgLow Low Threshold #iwpriv wifiN CCKTrgHi High Threshold These commands control the CCK PHY Error/sec threshold settings for the ANI immunity levels. A PHY error rate below the low trigger will cause the ANI algorithm to lower immunity thresholds, and a PHY error rate exceeding the high threshold will cause immunity thresholds to be increased.
-
PRELIMINARY CWMIgnExCCA #iwpriv wifiN CWMIgnExCCA 1|0 This command allows the system to ignore the clear channel assessment (CCA) on the extension channel for 11n devices operating in HT 40 mode. Normally, to transmit, the device will require no energy detected on both the control and extension channels for a minimum of a PIFS duration. This control will allow for ignoring energy on the extension channel. This is not in conformance with the latest draft of the 802.
-
PRELIMINARY HALDbg #iwpriv wifiN HALDbg debug level Used to set the debug level in the HAL code. This can be modified “on the fly” as required. The HAL must be built with the AH_DEBUG parameter defined for this command to be available; otherwise it is conditionally compiled out. The value provided is a bitmask selecting specific categories of debug information to select from. Note that some categories will produce copious amounts of output, and should be used sparingly for a few seconds.
-
PRELIMINARY HTEna #iwpriv wifiN HTEna 1|0 This command is used to enable (1) or disable (0) 11N (HT) data rates. This is normally only used as a test command. The parameter is set to 1 (enabled) by default. The command has a corresponding Get command. #iwpriv wifi0 HTEna 1 #iwpriv wifi0 GetHTEna wifi0 GetHTEna:1 NoiseImmLvl #iwpriv wifiN NoiseImmLvl level This will select a specific noise immunity level parameter during initialization.
-
PRELIMINARY OFDMWeakDet #iwpriv wifiN OFDMWeakDet 1|0 This command will select normal (0) or weak (1) OFDM signal detection thresholds in the baseband register. The actual thresholds are factory set, and are loaded in the EEPROM. This parameter corresponds to the initialization value for the ANI algorithm, and is only valid prior to system startup. The default value for this parameter is 1 (detect weak signals). The corresponding Get command will return the initialization value only.
-
PRELIMINARY #iwpriv wifi0 SpurImmLvl 3 #iwpriv wifi0 GetSpurImmLvl wifi0 GetSpurImmLvl:2 txchainmask rxchainmask #iwpriv wifiN txchainmask mask #iwpriv wifiN rxchainmask mask These parameters set the transmit and receive chainmask values. For MIMO devices, the chainmask indicates how many streams are transmitted/received, and which chains are used. For some Atheros devices up to 3 chains can be used, while others are restricted to 2 or 1 chain.
-
PRELIMINARY 2.5.2.5 WMM related WMM commands are provided to manage the WMM link settings. In order to specify the proper parameters, each command must specify the access category (AC) and mode (either STA or AP).
-
PRELIMINARY aifs #iwpriv athN aifs AC Mode Value This WMM command sets the AIFSN WMM parameter for either the AP or Station parameter set. This parameter controls the frame spacing in WMM operations. The command takes 3 parameters: The first value, AC, is the access class value. The second value indicates whether the command is to be applied to the AP or Station tables, which are kept separately. Finally, the third parameter is the AIFSN value (see Table 9 Access Categories and Modes ).
-
PRELIMINARY This command will enable or disable WMM capabilities in the driver. The WMM capabilities perform special processing for multimedia stream data including voice and video data. This command has a corresponding get command, and its default value is 1 (WMM enabled). #iwpriv ath0 wmm 1 #iwpriv ath0 get_wmm ath0 get_wmm:1 2.5.2.6 Security Related These commands relate to the security subsystem, and also are specific interfaces required by the hostapd and wpa_supplicant programs.
-
PRELIMINARY 2 WPA_ASE_8021X_PSK The command is a combination of the above, so a value of 3 indicates both unspec and PSK support. The command has a corresponding get command. #iwpriv ath0 keymgtalgs 3 #iwpriv ath0 get_keymgtalgs ath0 get_keymgtalgs:3 mcastcipher #iwpriv athN mcastcipher cipher Used mainly by the hostapd daemon, this command will set the cipher used for multicast.
-
PRELIMINARY setfilter #iwpriv athN setfilter filter This command allows an application to specify which management frames it wants to receive from the VAP. This will cause the VAP to forward the indicated frames to the networking stack.
-
PRELIMINARY setmlme Another of the host_apd support commands, this command is used to perform direct access to the MLME layer in the driver. This allows an application to start or terminate a specific association. Note that the MLME_ASSOC sub command only makes sense for a station (AP won’t start an association).
-
PRELIMINARY 2.5.2.6.1 802.11n related These commands provide a set of parameters and actions that can be used to configure and test various functions specified in 802.11n and 802.11e such as aggregation, block acknowledgement, channel width management, and static rate settings. addba delba #iwpriv athN addba AID AC BufSize #iwpriv athN delba AID AC initiator reason These test commands are used to manually add or delete Block Acknowledge Aggregation streams.
-
PRELIMINARY ampdusframes #iwpriv athN ampdusframes numFrames This is the same command as used in the Radio layer. This command will affect ALL VAPs that are attached to the same radio. This command will set the maximum number of subframes to place into an AMPDU aggregate frame. Frames are added to an aggregate until either a) the transmit duration is exceeded, b) the number of subframes is exceeded, c) the maximum number of bytes is exceeded, or d) the corresponding queue is empty.
-
PRELIMINARY htprot #iwpriv athN htprot 1|0 HT protection modes are defined in the 802.11n specification, paragraph 9.13. Depending on conditions, various protection modes are implemented. This command will override automatic protection settings and enable protection for ALL modes. A value of 1 indicates all protection enabled, while a value of 0 indicates dynamically calculated protection levels. This command has a corresponding get command, and its default value is 0.
-
PRELIMINARY shortgi #iwpriv athN shortgi 1|0 This command will enable/disable the short Gating Interval (shortgi) when transmitting HT 40 frames. This effectively increases the PHY rate by 25%. This is a manual control typically used for testing. This command has a corresponding get command, and its default value is 1.
-
PRELIMINARY 2.5.2.6.2 Regulatory commands These commands interface with the regulatory information in the driver, and are used to control the settings affecting local requirements. countryie #iwpriv athN countryie 1|0 This is an enable/disable control that determines if the country IE is to be sent out as part of the beacon. The country IE is used by 802.11h processing to allow stations to self-configure their regulatory tables to the country they are in.
-
PRELIMINARY doth_reassoc #iwpriv athN doth_reassoc value This command instructs the driver to generate a reassociation request. The single value provided is not used. This is more of a single-shot action rather than a setting. This command has no default, and no corresponding get command. #iwpriv ath0 doth_reassoc 1 get_countrycode #iwpriv athN get_countrycode This command will return the current setting of the country code. The country code values are listed in Appendix A.
-
PRELIMINARY General Commands These are the common commands used for various functions during operations. addmac delmac maccmd #iwpriv athN maccmd cmd #iwpriv athN addmac mac_addr #iwpriv athN delmac mac_addr These commands are used to setup and modify the MAC filtering list. MAC filtering allows the user to either limit specific MAC addresses from associating with the AP, or specifically indicates which MAC addresses can associate with the AP.
-
PRELIMINARY bgscanintvl #iwpriv athN bgscanintvl interval This sets the interval to perform background scans. A scan is started each time the interval times out, or if the idle interval is not timed out when the idle interval is complete. The interval timer is started when the scan is started, so a idle period timeout will “shift” all subsequent scan intervals. The interval value is specified in seconds. This command has a corresponding get command, and its default value is 300.
-
PRELIMINARY dbgLVL #iwpriv athN Yet another debug control. This parameter controls the debug level of the VAP based debug print statements. It’s normally set to zero, eliminating all prints. Table 11 802.
-
PRELIMINARY driver_caps #iwpriv athN driver_caps caps This command is used to manually set the driver capabilities flags. This is normally used for testing, since the driver itself will fill in the proper capability flags.
-
PRELIMINARY getchaninfo This command is used by external applications to get channel information from the driver. An example application is the wlanconfig tool that uses this interface to get the channel information. The wireless tools do not know how to parse the information provided, since it is returned in an Atheros driver specific data structure.
-
PRELIMINARY inact_auth #iwpriv athN inact_auth inactivity period This sets the TSPEC inactivity period for the AP AUTH state. This is an 802.11e mechanism that allows for allocating QoS priority to certain traffic types. The inactivity period is a timer that counts the seconds that a QoS stream is inactive during AUTH state. This timer will delete a traffic stream after the indicated number of seconds elapse. The default value is 180 seconds, and this command has a corresponding get command.
-
PRELIMINARY protmode #iwpriv athN protmode 0|1 This command will enable or disable 802.11 protection mode.. This will cause RTS/CTS sequence (or CTS to Self) to be sent when 802.11 devices are detected on the 802.11 network. This is used to protect against transmission by devices that do not recognize OFDM modulated frames. This command has a corresponding get command, and its default value is 0.
-
PRELIMINARY reset #iwpriv athN reset This command will force a reset on the VAP and its underlying radio layer. Note that any VAP connected to the same radio in mBSSID configuration will be affected. This is an action command that has no get command or default value. #iwpriv ath0 reset roaming #iwpriv athN roaming mode The roaming mode defines how state transitions are controlled in the AP, and what will cause a scan to happen.
-
PRELIMINARY shpreamble #iwpriv athN shpreamble 1|0 This command will enable (1) or disable (0) short preamble. Short preamble will disable the use of a barker code at the start of the preamble. This command affects ALL VAPs connected to the same radio. This command has a corresponding get command, and its default value is 0. #iwpriv ath0 shpreamble 1 #iwpriv ath0 get_shpreamble ath0 get_shpreamble:1 sleep #iwpriv athN sleep 1|0 This test command will force a STA VAP into (1) or out of (0) sleep mode.
-
PRELIMINARY 2.5.2.7 Changing parameters using iwconfig and iwpriv Many of the parameters that can be accessed via iwconfig and iwpriv are initialization parameters. If they are changed while the AP is running, they may not take effect until the VAP is brought down and up. For multiple BSS (multiple VAP) configurations, some iwpriv parameters may affect ALL VAPs, not just the one of interest.
-
PRELIMINARY 2.5.3.2.1 Station (sta) This type of list provides information for each station associated with the indicated VAP. The following listing is produced: ADDR 00:03:7f:08:62:23 AID CHAN RATE RSSI IDLE 1 36 6M 59 135 TXSEQ 13 RXSEQ CAPS ACAPS ERP 12128 E 0 STATE HTCAPS 33 Q WME The list elements are described as follows: ADDR MAC address of the station AID Association ID. This is used to determine the specific AP/Station association pair used in 802.11n test commands.
-
PRELIMINARY 2.5.3.2.2 AP List (ap) This only applies to VAPs that are station VAPs. This is the result of a scan, providing a list of nearby APs. The listing produced is as follows: SSID Atheros Guests ney-11a perseus-cis... BILL-AP apps-atheros1 CHAN RATE S:N 52 54M 13:0 60 54M 22:0 36 54M 30:0 36 54M 27:0 36 54M 26:0 INT 100 100 100 100 100 CAPS E Es E Es EPs WME WME WME WME ATH SSID Name string of the AP as broadcast in the beacon BSSID BSSID value of the AP.
-
PRELIMINARY 2.5.3.2.4 Capabilities (caps) This provides a list of the capabilities of the VAP referenced. These are output as a comma delimited string. /etc/ath # wlanconfig ath0 list caps ath0=3782e41f The capability strings are defined as follows: 2.5.3.2.
-
PRELIMINARY 3 AP Configuration Guide 3.1 AP Modes of Operation The Access point can operate in several modes, including single or dual concurrent, multiple VAP, and with or without WDS support. In addition, the channel mode (band selection and channel width) can be operated in one of several configurations. Finally, the AP can be configured with several network options, including bridged mode and router mode.
-
PRELIMINARY 3.1.2 Radio Configuration As part of the WLAN bringup p g p script, p , several environmental variables need to be set to configure the radio. Most have default settings that are defined in Table 2 AP Environmental Variable p g g The Access Point can The most important environmental variable for radio configuration is the channel mode setting. p in several modes. The selection of the mode is generally g y made usingg the AP _CHMODE and AP _CHMODE_2 operate AP_CHMODE AP_CHMODE_2 g pparameters.
-
PRELIMINARY 3.2 Security The AP will support various security modes including WEP, WPA, WPA2, and WPA Enterprise modes. WPA/WPA2 modes will support both AES and TKIP encryption methods. 3.2.1 WEP Configuration To configure an AP or Station for WEP operations, one will edit the WEP.conf file in /etc/ath/ and set the key values as required. This is a simple script file that gets the AP name passed as an argument. Both AP and Client side can be configured for WEP mode.
-
PRELIMINARY 3.2.2.2 WPA PSK To enable WPA PSK on the VAP, set the AP_SECMODE variable to WPA, and select the proper security parameter file. For the AP side, this file is located at /etc/ath/wpa2-psk.conf. For the client side, this file is located at /etc/ath/wpapsk.conf. Note that the file formats are very different. This is because the AP side uses the hostapd program to perform the host side protocol, and the client side uses the wpa_supplicant to perform the client side of the protocol.
-
PRELIMINARY 3.3 VLAN Configuration The Linux utility “vconfig” is provided to enable IEEE 802.1QVLAN support. A VLAN is a “virtual” network that coexists over an actual physical interface, but only stations that are configured to interface to the VLAN participate in network traffic on the VLAN. Normally VLANs have a DHCP server that provides an IP address for the VLAN interface.
-
PRELIMINARY 3.3.1 Bridge Configuration in mBSSID and VLAN mode If one prefers to use commands to configure VLANs in mBISSID mode. The following bridge configuration need to be achieved. APUP script can get the following configuration when AP_STARTMODE is set to multivlan and corresponding VLAN tag values. br0 with no interfaces br2 with ath0.second_tag, eth0.second_tag, eth1.second_tag br3 with ath1.third_tag, eth0.third_tag, eth1.third_tag br4 with ath2.fourth_tag, eth0.fourth_tag, eth1.
-
PRELIMINARY 3.4.2 Multiple APs With Different Security Modes This example shows how a set of VAPs with different security modes can be defined. NOTE THAT THE WEP VAP IS ATH0. This is required due to hardware limitations. # # # # # # # # # # # # # export export export export export export export export export export export export apup AP_STARTMODE=multi AP_SSID=AP_wep AP_SECMODE=WEP AP_SECFILE=WEP.conf AP_SSID_2=AP_open AP_SECMODE_2=NONE AP_SSID_3=AP_psk AP_SECMODE_3=WPA AP_SECFILE_3=wpa2-psk.
-
PRELIMINARY 3.5.1.2 Setup Instructions This mode requires a different configuration file in the root AP and in the repeater. The root AP is responsible for the main “distribution” of the data packets. Each repeater will pass packets to its associated STA clients. Note that a station will associate with the AP with the strongest signal – associating to the Root AP is allowed. Ensure you are using hard wired connections if you are trying to force a specific configuration.
-
PRELIMINARY 3.5.2.1 3.5.2.2 Limitations When running in the multiple repeater mode, the following limitations apply: x VAP configuration after start is subject to the conditions specified in section 3.4.3 and section 0. x Use the environmental variable method to configure the VAPs. Setup Instructions This configuration is set up in the same manner as the previous configuration. Note that each repeater must have a unique IP address, on the same subnet.
-
PRELIMINARY 3.5.3.2 Setup Instructions To create this configuration, the Root AP and the Client must be configured accordingly. The root AP configuration is identical to that used in the repeater case. The Client setup however, is set to “client” mode vice “repeater” mode. This creates only a single station VAP that associates with the Root AP. Again, to setup different channel/SSID configurations, ensure the proper environmental variables are set.
-
PRELIMINARY 3.5.4.2 Setup Instructions Setup is identical to the single span case. All clients must have the client configuration in apcfg, each must have an unique IP address, but all must be configured with the same SSID. The root/clients can be started in any order. 3.6 Dual Concurrent Operations Dual concurrent operations go hand in hand with multiple VAP operations, because to operate in dual concurrent mode multiple VAPs must be instantiated.
-
PRELIMINARY Appendix A Country Code Definition The following table identifies the country definition, country string, and country code used to set the country ID for 802.11 and regulatory requirements.
-
PRELIMINARY CTRY_ESTONIA "EE" CTRY_FAEROE_ISLANDS 233 234 CTRY_FINLAND "FI" 246 CTRY_FRANCE "FR" 250 CTRY_FRANCE2 "F2" 255 CTRY_GEORGIA "GE" 268 CTRY_GERMANY "DE" 276 CTRY_GREECE "GR" 300 CTRY_GUATEMALA "GT" 320 CTRY_HONDURAS "HN" 340 CTRY_HONG_KONG "HK" 344 CTRY_HUNGARY "HU" 348 CTRY_ICELAND "IS" 352 CTRY_INDIA "IN" 356 CTRY_INDONESIA "ID" 360 CTRY_IRAN "IR" 364 CTRY_IRAQ 368 CTRY_IRELAND "IE" 372 CTRY_ISRAEL "IL" 376 CTRY_ITALY "IT" 380 CTRY_JAMAIC
-
PRELIMINARY CTRY_JAPAN17 "JP" 4017 CTRY_JAPAN18 "JP" 4018 CTRY_JAPAN19 "JP" 4019 CTRY_JAPAN20 "JP" 4020 CTRY_JAPAN21 "JP" 4021 CTRY_JAPAN22 "JP" 4022 CTRY_JAPAN23 "JP" 4023 CTRY_JAPAN24 "JP" 4024 CTRY_JAPAN25 4025 CTRY_JAPAN26 4026 CTRY_JAPAN27 4027 CTRY_JAPAN28 4028 CTRY_JAPAN29 4029 CTRY_JAPAN30 4030 CTRY_JAPAN31 4031 CTRY_JAPAN32 4032 CTRY_JAPAN33 4033 CTRY_JAPAN34 4034 CTRY_JAPAN35 4035 CTRY_JAPAN36 4036 CTRY_JAPAN37 4037 CTRY_JAPAN38 4038 CTRY_JAPAN3
-
PRELIMINARY CTRY_JAPAN55 4055 CTRY_JAPAN56 4056 CTRY_JORDAN "JO" 400 CTRY_KAZAKHSTAN "KZ" 398 CTRY_KENYA "KE" 404 CTRY_KOREA_NORTH "KP" 408 CTRY_KOREA_ROC "KR" 410 CTRY_KOREA_ROC2 "K2" 411 CTRY_KOREA_ROC3 412 CTRY_KUWAIT "KW" 414 CTRY_LATVIA "LV" 428 CTRY_LEBANON "LB" 422 CTRY_LIBYA 434 CTRY_LIECHTENSTEIN "LI" 438 CTRY_LITHUANIA "LT" 440 CTRY_LUXEMBOURG "LU" 442 CTRY_MACAU "MO" 446 CTRY_MACEDONIA "MK" 807 CTRY_MALAYSIA "MY" 458 CTRY_MALTA 470 CTRY_MEXI
-
PRELIMINARY CTRY_RUSSIA "RU" 643 CTRY_SAUDI_ARABIA "SA" 682 CTRY_SERBIA_MONTENEGRO 891 CTRY_SINGAPORE "SG" 702 CTRY_SLOVAKIA "SK" 703 CTRY_SLOVENIA "SI" 705 CTRY_SOUTH_AFRICA "ZA" 710 CTRY_SPAIN "ES" 724 CTRY_SRI_LANKA "LK" CTRY_SWEDEN "SE" 752 CTRY_SWITZERLAND "CH" 756 CTRY_SYRIA "SY" 760 CTRY_TAIWAN "TW" 158 CTRY_THAILAND "TH" 764 CTRY_TRINIDAD_Y_TOBAGO "TT" 780 CTRY_TUNISIA "TN" 788 CTRY_TURKEY "TR" 792 CTRY_UAE "AE" 784 CTRY_UKRAINE "UA" 804 CTRY_U
-
This device is intended for use under the following conditions: 1. The transmitter module may not be co-located with any other transmitter or antenna. 2. The module is approved using the FCC “unlicensed modular transmitter approval” method. As long as these two conditions are met, further transmitter testing will not be required. However, the OEM integrator is still responsible for testing their end product for any additional compliance measures necessitated by the installation of this module (i.e.