Using the Flyport Wi-Fi embedded webserver, the user can anytime control the hardware I/O status and change the Wi-Fi network parameters.
http://openpicus.blogspot.com/2012/02/flyport-wi-fi-webserver-with-wi-fi.html
An Automotive Control Unit should always be ported with updated version of the software and security patches. Learn how a Flash Bootloader software plays an important role and understand the step-by-step process of ECU re-programming. https://www.embitel.com/blog/embedded-blog/what-is-flash-bootloader-and-nuances-of-an-automotive-ecu-re-programming
An Automotive Control Unit should always be ported with updated version of the software and security patches. Learn how a Flash Bootloader software plays an important role and understand the step-by-step process of ECU re-programming. https://www.embitel.com/blog/embedded-blog/what-is-flash-bootloader-and-nuances-of-an-automotive-ecu-re-programming
he content of the exams is proprietary.[4] Cisco and its learning partners offer a variety of different training methods,[5] including books published by Cisco Press, and online and classroom courses available under the title "Interconnecting Cisco Network Devices."
In this AUTOSAR layered architecture, Communication Stack or ComStack facilitates communication. Hence ComStack can be defined as a software stack that provides communication services to the Basic Software Modules and Application Layer or Application Software.
https://www.embitel.com/product-engineering-2/automotive/autosar/
In this Webcast recording iSeries NEWS magazine's Senior Editor Mel Beckman and MB Software's Mike Boadway show you that wireless access to your AS/400 or iSeries is easier than you think. From Mel, you'll learn how to set up wireless access to your favorite black box with a Palm-based handheld PDA - and you'll learn all the cool things that this kind of access can provide you and your organization. Then, from Mike, you'll learn how wireless access to iSeries performance measures can dramatically improve your ability to respond to critical situations occurring within your environments. In addition to the basic performance tools you may already use, you'll also learn how MB Software's Workload Performance Series and wireless access provided by PalmView can provide instant remote visibility like never before - you can monitor CPU and disk thresholds, track job queue bottlenecks, monitor interactive feature cards, and more.
Learning management system has emerged from auxiliary role to critical one in higher education. Present college students are technologically perceptive and demand their faculty to use technology and learning management systems. This paper explores the latest trends in this initiative and discusses the successful implementation of LMS in United Institute of Technology (UIT), Coimbatore. UIT persistently seeks and adopts innovative methods to equip the students with knowledge, skills and character to become competent engineers by facilitating the dynamic Learning Management System. This paper focuses exclusively on open source learning management system and impact of LMS in academic performance of the students in UIT and their utilization the LMS technology. This paper also suggests how to improve teaching and learning functions to improve the performance and acquisition of knowledge by using Learning Management System.
Key words: Learning Management System, e-Learning, Virtual Learning, Moodle
he content of the exams is proprietary.[4] Cisco and its learning partners offer a variety of different training methods,[5] including books published by Cisco Press, and online and classroom courses available under the title "Interconnecting Cisco Network Devices."
In this AUTOSAR layered architecture, Communication Stack or ComStack facilitates communication. Hence ComStack can be defined as a software stack that provides communication services to the Basic Software Modules and Application Layer or Application Software.
https://www.embitel.com/product-engineering-2/automotive/autosar/
In this Webcast recording iSeries NEWS magazine's Senior Editor Mel Beckman and MB Software's Mike Boadway show you that wireless access to your AS/400 or iSeries is easier than you think. From Mel, you'll learn how to set up wireless access to your favorite black box with a Palm-based handheld PDA - and you'll learn all the cool things that this kind of access can provide you and your organization. Then, from Mike, you'll learn how wireless access to iSeries performance measures can dramatically improve your ability to respond to critical situations occurring within your environments. In addition to the basic performance tools you may already use, you'll also learn how MB Software's Workload Performance Series and wireless access provided by PalmView can provide instant remote visibility like never before - you can monitor CPU and disk thresholds, track job queue bottlenecks, monitor interactive feature cards, and more.
Learning management system has emerged from auxiliary role to critical one in higher education. Present college students are technologically perceptive and demand their faculty to use technology and learning management systems. This paper explores the latest trends in this initiative and discusses the successful implementation of LMS in United Institute of Technology (UIT), Coimbatore. UIT persistently seeks and adopts innovative methods to equip the students with knowledge, skills and character to become competent engineers by facilitating the dynamic Learning Management System. This paper focuses exclusively on open source learning management system and impact of LMS in academic performance of the students in UIT and their utilization the LMS technology. This paper also suggests how to improve teaching and learning functions to improve the performance and acquisition of knowledge by using Learning Management System.
Key words: Learning Management System, e-Learning, Virtual Learning, Moodle
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
These slides include discussion on important Wi-Fi security issues and the solutions available to address them. Enterprises which need to secure their networks from Wi-Fi threats in order to protect their information assets, prevent unauthorized use of their network, enforce no-Wi-Fi zones, and meet regulatory compliance for themselves and their clients will benefit from this discussion.
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyIT@Intel
Intel IT wanted to create a simple and efficient way for employees to be able to self-provision their PCs, without having to take the
PC to an IT Service Center. We created a tool that allows our employees to self-provision their systems over the WLAN.
To help other enterprises easily do the same, this presentation provides the necessary instructions and a link to the downloadable batch file.
How to Self-Provision over WLAN with Intel(R) vPro(TM) TechnologyIntel IT Center
Intel IT wanted to create a simple and efficient way for employees to be able to self-provision their PCs, without having to take the
PC to an IT Service Center. We created a tool that allows our employees to self-provision their systems over the WLAN.
To help other enterprises easily do the same, this presentation provides the necessary instructions and a link to the downloadable batch file.
NetSim VANET library (https://www.tetcos.com) supports the following protocols
IEEE 802.11p, IEEE 1609 WAVE
Layer 3 Routing – AODV, DSR, OLSR, ZRP
PHY Layer RF Propagation
o Pathloss
o Shadowing
o Fading
Source C Code
Automatic import of road network and vehicles from SUMO
Wide range of output metrics including Delay, Throughput, Error, Retransmission,
etc.
Interfacing between SUMO & NetSim via Traffic control interface (TraCI).
As the World-Wide Web (WWW) continues to evolve, it is clear that its underlying technologies are useful for much more than just browsing the web. Web browsers have become the
de factor standard user interface for a variety of applications including embedded real time applications such as Remote Data Acquisition System.This brings in a need for web services being deployed on various embedded processors such as Advanced RISC Machine (ARM) in real time context. The main aim of the project is to develop an embedded web server using ARM7 TDMI processor.
The web pages which are required for the web server will be developed using HTML. This embedded web server which will be developed by using Embedded C language can be beneficial for mission critical applications, remote data acquisition systems, ATM and controlling devices such as servo motor, dc motor, stepper motor ,turning ON or OFF the stereo sets., use as dimmerstat to control light intensities. can be used in home automation, store programs in flash memory and run the according to need.
Embedded systems are specialized computer systems designed and optimized to perform a particular task. Usually they are a part of a larger system or a machine In today's world, embedded systems are everywhere homes, offices, cars, factories, hospitals, plains and consumer electronics. They span all aspects of modern life and examples of their use are numerous.
Modern embedded systems are able to connect to the internet and can be remotely maintained and diagnosed . M2M(Machine to machine) communication is growing with a considerable rate. The possibility to connect two or more embedded systems enables developers to build more powerful distributed systems such as networked embedded systems .Remote maintenance is performed by different communication protocols. The most common communication protocol is HTTP which enables remote system control and monitoring.
A web server is a computer program that implements HTTP protocol. It accepts HTTP requests from clients like web browsers and serves HTTP responses which are usually HTML pages with linked objects. There are many web servers available, and a number of them are free, like Apache, AOL , Roxen . Internet Information Services, Sun Java System web Server are some of the most common commercial web servers. Some web servers can run on almost any operating system while others are platform specific.
The general purpose web servers are intended to run on powerful server computers, workstations or personal computers and support a number of advanced features. On the other hand, web servers for embedded system shave limited resources and offer only a set of required features
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
On an LAS-integrated soft PLC system based on WorldFIP fieldbusISA Interchange
Communication efficiency is lowered and real-time performance is not good enough in discrete control based on traditional WorldFIP field intelligent nodes in case that the scale of control in field is large. A soft PLC system based on WorldFIP fieldbus was designed and implemented. Link Activity Scheduler (LAS) was integrated into the system and field intelligent I/O modules acted as networked basic nodes. Discrete control logic was implemented with the LAS-integrated soft PLC system. The proposed system was composed of configuration and supervisory sub-systems and running sub-systems. The configuration and supervisory sub-system was implemented with a personal computer or an industrial personal computer; running subsystems were designed and implemented based on embedded hardware and software systems. Communication and schedule in the running subsystem was implemented with an embedded sub-module; discrete control and system self-diagnosis were implemented with another embedded sub-module. Structure of the proposed system was presented. Methodology for the design of the sub-systems was expounded. Experiments were carried out to evaluate the performance of the proposed system both in discrete and process control by investigating the effect of network data transmission delay induced by the soft PLC in WorldFIP network and CPU workload on resulting control performances. The experimental observations indicated that the proposed system is practically applicable.
2/23/2016 Sample Implementation Plan1.html
file:///C:/Users/Kevo24/AppData/Local/Temp/Temp1_Sample%20Implementation%20Plan1.html.zip/Sample%20Implementation%20Plan1.html 1/8
Now you are completing Part 5 of the AAP (WWTC) which is:
“This section will lay out the implementation plan of the entire AAP design, which include configuration
of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a
deliverables schedule.”
Project Implementation Plan
In this lecture I will discuss implementation plan through an example of an enterprise network.
The figure presents a fictitious enterprise factious network. The company would like to implement a
scalable solution with a routing protocol that provides fast convergence. For optimal routing and packet
forwarding, hierarchical addressing with summarization is required. Users require highspeed access to
the server farm with redundant connectivity for protection. The company has many remote offices; a
redundant connection to the Internet is required to provide the remote offices with nonstop access to its
server farm. For remote offices, a secure connection must be implemented to prevent unauthorized
persons from accessing data.
The first step before creating an implementation plan is to gather existing information about the networks
and all the requirements.
The existing topology provides redundant connectivity among all the network devices. Internet
connectivity is dual homed, which provides redundant access to the remote sites as well as World Wide
Web resources. The equipment can provide all the functionalities that are required, but the software
version of the operation system must be upgraded.
The networking equipment has existing IP addressing that needs to be changed to ensure optimal routing
and forwarding of packets as well as summarization. Requirements for server farm access and remote
2/23/2016 Sample Implementation Plan1.html
file:///C:/Users/Kevo24/AppData/Local/Temp/Temp1_Sample%20Implementation%20Plan1.html.zip/Sample%20Implementation%20Plan1.html 2/8
office connectivity do not include changes in QoS configuration. The server farm hosts the critical
applications of the company including VoIP, and these require preferred treatment. OSPF is configured
in the network. This configuration must be changed, because a faster convergence time is required.
EIGRP is better choice than OSPF.
Security configuration is required to provide secure access to terminal resources. In this case existing
security is sufficient, therefor no changes are needed.
For this scenario implementation plan would be
Project contact list
Location information and means of accessing the premises
Tools and resources
Assumption
Task and detailed description
Network staging plan
Project Contact List
Consultant Project Team Customer Project Team
Project Manager
Telephone
EMail
Project Manager
Telephone
EMail
Configuration Engineer
Telephone
Email
Con.
Configuring lifa for remote communication using web architectureVatsal N Shah
This paper presents remote transmission of Temperature parameters using web architecture based on LIFA to remote Engineer for analysis. Web services enable the invocation of a method on a remote target using standard Web-based protocols. A client sends a request to a remote server, which processes the request and replies with a response, which is then interpreted and displayed by the client application. One relies on this communication method for everyday activities such as browsing the Web, checking e-mails, etc. Online data from the sensors can viewed in graphical form showing changes with respect to time.
Embedded Web Server based Home Automation using Raspberry PIEditor IJMTER
In smart home’s we have various high-tech appliances to get our jobs done and make
the life easier. It is necessary to control these home appliances smartly from anywhere. In this paper
we are implementing a system that will enable house owner to control their home through the
internet with high mobility and security. We will use the Embedded Web Server (EWS) which
enables controlling and monitoring the home appliances remotely with the help of any standard web
browser
Data Acquisition and Control System for Real Time Applicationsijsrd.com
This paper proposes an Embedded Ethernet which is nothing but a processor that is capable to communicate with the network. This helps in data acquisition and status monitoring with the help of standard LAN. Currently device with processor is widely used in industrial field. The Embedded Ethernet provides web access to distributed measurement/control systems and provides optimization for instrumentation, educational laboratories and home automation. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM Processor based Embedded Ethernet interface is presented. In this design, data can be transmitted transparently through Ethernet interface unit to remote end desktop computer. By typing the IP address of LAN on the ARM9 board, the user gets sensor values on the PC screen at remote station. This provides the status of the devices at remote field. The user can also control the devices interfaced to the ARM9 Board by pressing the button displayed on the GUI of the remote Desktop PC.
Pivotal Cloud Foundry 2.5: A First LookVMware Tanzu
Join Dan Baskette and Jared Ruckle for a first look at Pivotal Cloud Foundry (PCF) 2.5 capabilities with demos and expert Q&A. Attend this session and learn how you can:
● Accelerate developer productivity with new capabilities that give you more control over your applications.
● Improve operator efficiency and simplify administration of applications at scale.
● Reduce risk by keeping your your platform in a secure, healthy state.
Plus so much more!
Presenters:
Dan Baskette, Director, Technical Marketing
Jared Ruckle, Director, Product Marketing
Similar to Flyport wifi webserver configuration page (20)
IoT with OpenPicus Flyport Temperature/Pressure with BMP085
I2C LCD setup Use case of Pachube and Paraimpu
http://openpicus.blogspot.com/2012/03/flyport-wifi-pachube-and-paraimpu-lets.html
How to Integrate Internet of Things with Webserver with Ionela
The project is integrating several technologies, found during the investigation of Flyport :
- Web server
- Wifi connection
- Dynamic variables substitutions (in xml files)
- Ajax callbacks
- jQuery use case
- Dynamic Memory allocation (malloc/free) (see heap.s)
- Web service calls : for tweeter, thingspeak and nimbits
http://openpicus.blogspot.com/2012/01/flyport-web-controlled-simulator-tweet.html
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Monitoring Java Application Security with JDK Tools and JFR Events
Flyport wifi webserver configuration page
1. openPicus Application Note
Application Note: OP-AN-0009
Webserver with Wi-Fi Parameter Configuration
Device: Openpicus Flyport Wi-Fi
IDE version: 2.1
Author - version: Simone Marra - v1.1
External libs: -
Connections: -
Description:
One of the great feature of openPICUS framework with Wi-Fi devices is the ability to handle 2 different configurations
for the Wi-Fi network parameters.
The “WF_DEFAULT” can be configured inside the IDE Wizard tool, and it can not be changed at run-time. It is a fixed
configuration that must be stored inside the microcontroller with the download of the firmware.
The second configuration, called “WF_CUSTOM”, can be changed at run-time, saved inside the internal Flash memory
of microcontroller, loaded and deleted. This configuration is used to let the user to change the information related to
the router or access point where the Flyport Wi-Fi has to connect itself, or if Flyport should create an adhoc
connection, etc.
The “WF_CUSTOM” parameters can be handled by user task, and the user can provide for example serial commands
to change them when the “taskFlyport” firmware is executed, but this solution requires a hardware connection, so the
customization should be done in the nearby of any Flyport module.
The solution for this problem could be to permit the change of “WF_CUSTOM” parameters using the Wi-Fi connection.
In this application note it is shown how a smart configuration web page can be integrated to configure Flyport Wi-Fi
Network parameters.
The configuration page has some input forms to enter the new parameters, and some scripts to check the validation of
the data added by user. In fact, if a parameter is filled with an incompatible value, the browser will automatically show
a message of what parameter must be corrected. In this way, the human errors are reduced.
The proposed solution also has a configurable starting time firmware, where the Flyport Wi-Fi connects only to its
WF_DEFAULT configuration (the parameters entered inside the IDE Wizard settings); On the other hand, when the
code is in execution, the pressure of a input button for more than 3 seconds forces the microcontroller to delete the
WF_CUSTOM customizable parameters, and after connects again to the “WF_DEFAULT” settings.
In a typical application with more Flyport Wi-Fi modules used, or with a physical position not easily reachable from the
user, the replacement of Wi-Fi routers is an easy task. The customer can change the configuration of every Flyport one
by one, using the web browser of a PC or SMARTPHONE or TABLET, without the worry about the hardware cable
connections.
Using the Flyport Wi-Fi embedded web server, the user can anytime not only to control the hardware I/O status, but
also to change the Wi-Fi network parameters.
09.02.2012 (v.1.1) www.openpicus.com 1
2. openPicus Application Note
The above picture shows the typical use of the webserver with the configuration page. The user can access to the
Flyport Wi-Fi using a PC, a Smart-Phone, or any other internet enabled device. Surfing with a web browser to the
Flyport Wi-Fi IP address or host name, the user can access to the first page of the webserver (the index.htm file); this
page is related to the “I/O real-time control”, and has a tab to access the “Configuration Page” (the conf.htm file).
2 www.openpicus.com 09.02.2012 (v.1.1)
3. openPicus Application Note
The conf.htm page has a router-like interface, with all the customizable parameters accessible by the user.
The section related to the SSID and the Security type changes dynamically in relation of the security type chosen by
user, and enables the forms to fill with the pass-phrases and passkeys only where expected.
On the right side of the page, it is located a section called “Network Scanner”. This tool reports a list of all the Wi-Fi
network reachable from the Flyport Wi-Fi module. The list is updated by the pressure of the button “Scan it!” inside
the web-page, or with the pressure of the button at the pin “scanPinNumber” (defined in firmware) of the module.
Webserver Files structure:
The two pages of webserver are “index.htm” and “conf.htm”.
Both pages share some files inside the images folder and the style.css file.
The index.htm page uses the script mchp.js, inside the “scripts” folder, and the leds.cgi and
status.xml files too.
The conf.htm page uses instead the scripts main_conf.js and mchp.js, inside the “scripts”
folder, and refresh.cgi and refresh.xml files too.
The mchp.js file is the scripting file responsible of the handle of I/Os control and any other
related hardware/firmware resource that user would like to embed into the webpage. The
code of index.htm, in conjunction with status.xml and the microcontroller firmware can be
modified by the user to show and to control the other dynamic resources, like sensor values
(temperature, humidity, etc...), relays or PWMs (for example to turn on/off a light, or take
advantage of a dimmer to control the brightness of a lamp). The script updates also the
network list of the Network Scanner tool inside the config.htm, using refresh.xml
09.02.2012 (v.1.1) www.openpicus.com 3
4. openPicus Application Note
The main_conf.js is the scripting file responsible to pass the Wi-Fi parameters to the Flyport's firmware, using a POST
method; it checks if a data is correct for every specific parameter, for example it checks if an IP address is written in the
correct format (clearly it can't check if an IP address is correct, but only if it was written in a correct format). This file is
very important since it checks the human input, so it can reduce a lot the probability of errors (like bad typing, or
parameter exchange...).
NOTE: When the user press the “Save Parameters” button on the bottom-right side of the configuration
page, the parameters validation is done by a JavaScript, so all the calculation is done by the browser (the PC
or the Smart-Phone or the Tablet, etc...but outside of the Flyport). If the data is verified and correct, they are
sent to the Flyport firmware HTTPApp with the using of a POST method.
Firmware of Flyport:
The Flyport has to execute some functions to store, to change and to reload the WF_CUSTOM parameters. When the
user changes the network parameters inside the web-server configuration page, the Flyport receives data and store
them inside the WF_CUSTOM configuration.
Above is a schematic diagram of the flow of the flyportTask.c execution firmware.
After the initializations of hardware and RTCC module, the Flyport Wi-Fi connects to WF_DEFAULT parameters to
permit the user to configure the network parameters, before using the customizable configuration. The Flyport waits
for a time (customizable in firmware) before to proceed with the code execution. The time is configurable with two
const int variables: setuptimeSec and setuptimeMin. Changing those variables the developer can change the RTCC
alarm, and so the waiting time for this “setup pause” phase of the firmware. At the end of this process, the RTCC
module is stopped.
4 www.openpicus.com 09.02.2012 (v.1.1)
5. openPicus Application Note
The next step on firmware execution is to choose the network parameters to connect with.
If the WF_CUSTOM configuration does exist, it means that a custom configuration was previously saved inside the flash
memory of the Flyport Wi-Fi microcontroller. In this case, the firmware connects the module to the customized
network parameters.
In case WF_CUSTOM does not exist it could mean that it is the first start of Flyport Wi-Fi, or that WF_CUSTOM
configuration was never saved. In this case, the firmware connects the module to the default network parameters.
After the Wi-Fi connection successful created, the firmware enters in a “infinite loop” and checks at every cycle the
state of the variable “ParamSet” and the state of the p5 input pin.
If the input pin is tied low for a time greater then “waitbuttonSec” seconds, the WF_CUSTOM configuration is deleted,
and the Flyport returns in its “factory default” (or first start) state.
The “ParamSet” variable is changed by the HTTPApp.c file if the user provide a new configuration inside the
configuration webpage of Flyport Wi-Fi's webserver. The function responsible of the handle of the update of
parameters is the HTTPExecutePost that changes all the WF_CUSTOM parameters, and the saving of the new
configuration is done by the taskFlyport.c.
Conclusions:
A special attention should be payed when you choose the WF_DEFAULT parameters. This configuration is prepared
inside the openPICUS IDE, using the Wizard tool. All the information related to the WF_DEFAULT configurations is
written directly inside the microcontroller firmware, and cannot be changed at run-time. The only way to change the
default configuration is to prepare and download again the microcontroller firmware inside the Flyport Wi-Fi, but it
needs a hardware connection between a PC and the Flyport Wi-Fi module.
In the specific context of this application note, it is suggested to use the WF_DEFAULT parameters as an “adhoc”
connection, to be sure that Flyport Wi-Fi is reachable from every PC; Due to this specific network type, Flyport Wi-Fi
acts as a one-to-one access point and the customer can configure the parameters easily. This solution is very
comfortable in an environment with few Flyport Wi-Fi modules, so every module can change its network configuration
one by one.
A solution for an architecture with more modules could be to setup the default parameters to access to a
“infrastructure” network, with a access point with fixed SSID and protection settings (like the safe WPA2), specifically
designed for setup purpose (it is not necessary to have a internet connection). In this case, every Flyport can connect
with default parameters at the “always accessible” access point, and also the customer can connect to the same
network to setup all the Flyport Wi-Fi modules to connect to a new network.
In this case, one access point is used to setup the Flyport Wi-Fi modules, and another access point is used on the
specific application, maybe with internet connection available.
The “Network Scanner” tool embedded inside the web-server configuration page, helps the customer to choose the
network parameters, and to check them if a specific network is reachable from the Flyport Wi-Fi module.
09.02.2012 (v.1.1) www.openpicus.com 5