RFM CCT24 Series Quick setup guide

Page 1 of 90
CCT24
CCT24 Series
2.4 GHz Spread Spectrum
Wireless Transceivers
Integration Guide

Page 2 of 90
CCT24
Important Regulatory Information
RFM Product FCC ID: HSW-CCT24
IC: 4492A-CCT24
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial
environment. This equipment generates, uses, and can radiate radio frequency energy and, if not
installed and used in accordance with the instruction manual, may cause harmful interference to
radio communications. Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his own
expense.
Warning: Changes or modifications to this device not expressly approved by RFM could void the user’s
authority to operate the equipment.
RF Exposure Information:
For mobile operating conditions (>20 cm to the body):
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment.
This equipment should be installed and operated with minimum distance 20 cm between the radiator and
your body. This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
For mobile operating conditions, the CCT24 has been designed to operate with dipole antennas of up to 9
dBi gain, or patch antennas of up to 12 dBi gain or corner antennas up to 14dBi gain or Yagi antennas up
to 13.9 dBi gain or circularly polarized antennas up to 14dBi gain or a planar inverted F type antenna up
to 4dBi gain. Antenna types not included in this list, or having a gain greater than the maximum gain
indicated for that type, are strictly prohibited for use with this device.
See Section 3.9 of this manual for additional regulatory notices and labeling requirements.

Page 3 of 90
CCT24
Table of Contents
1.0 Introduction ...................................................................................................................................... 5
1.1 Why Spread Spectrum?................................................................................................................ 5
1.2 Frequency Hopping versus Direct Sequence ............................................................................... 6
2.0 CCT24 Radio Operation................................................................................................................... 7
2.1 Network Synchronization and Registration................................................................................... 7
2.2 Authentication ............................................................................................................................... 8
2.3 Serial Port Modes ......................................................................................................................... 8
2.4 SPI Port Modes............................................................................................................................. 9
2.5 RF Data Communications............................................................................................................. 9
2.6 RF Transmission Error Control ................................................................................................... 10
2.7 Transmitter Power Management ................................................................................................ 10
2.8 Network Configurations .............................................................................................................. 10
2.8.1 Point-to-Point Network Operation............................................................................................ 10
2.8.2 Point-to-Multipoint Network Operation .................................................................................... 11
2.8.3 Multipoint Peer-to-Peer Network Operation ............................................................................ 11
2.8.4 Tree Routing System Operation ................................................................................................. 12
2.9 Full-Duplex Serial Data Communications ................................................................................... 12
2.10 Channel Access....................................................................................................................... 12
2.10.1 Polling Mode ............................................................................................................................ 13
2.10.2 CSMA Mode ............................................................................................................................ 13
2.10.3 TDMA Modes........................................................................................................................... 14
2.11 Transmission Configuration Planning ......................................................................................... 15
2.11.1 TDMA Throughput ................................................................................................................... 15
2.11.2 Polling Throughput .................................................................................................................. 16
2.11.3 CSMA Throughput ................................................................................................................... 16
2.11.4 Latency .................................................................................................................................... 17
2.11.5 Configuration Validation .......................................................................................................... 18
2.12 Tree-Routing Systems ................................................................................................................ 20
2.12.1 Example Tree-Routing System................................................................................................ 20
2.12.2 Tree-Routing System Networks............................................................................................... 22
2.12.3 Tree-Routing System Addressing ........................................................................................... 22
2.12.4 Tree-Routing System Implementation Options ....................................................................... 23
2.13 Serial Port Operation .................................................................................................................. 25
2.14 SPI Port Operation...................................................................................................................... 26
2.15 Sleep Modes ............................................................................................................................... 29
2.16 Encryption ................................................................................................................................... 31
2.17 Synchronizing Co-located Bases................................................................................................ 31
3.0 CCT24 Hardware ........................................................................................................................... 33
3.1 Specifications.............................................................................................................................. 34
3.2 Module Interface ......................................................................................................................... 35
3.3 CCT24 Antenna Connector ........................................................................................................ 36
3.4 Input Voltages ............................................................................................................................. 37
3.5 ESD and Transient Protection .................................................................................................... 37
3.6 Interfacing to 5 V Logic Systems ................................................................................................ 37
3.7 Power-On Reset Requirements.................................................................................................. 38
3.8 Mounting and Enclosures ........................................................................................................... 38
3.9 Labeling and Notices .................................................................................................................. 38

Page 4 of 90
CCT24
4.0 Protocol Messages......................................................................................................................... 40
4.1 Protocol Message Formats......................................................................................................... 40
4.1.1 Message Types ....................................................................................................................... 40
4.1.2 Message Format Details.......................................................................................................... 41
4.1.3 /CFG Select Pin ....................................................................................................................... 43
4.1.4 Flow Control............................................................................................................................. 43
4.1.5 Protocol Mode Data Message Example .................................................................................. 43
4.1.6 Protocol Mode Tree-Routing MAC Address Discovery Example ............................................ 43
4.2 Configuration Registers .............................................................................................................. 44
4.2.1 Bank 0 - Transceiver Setup ..................................................................................................... 44
4.2.2 Bank 1 - System Settings ........................................................................................................ 47
4.2.3 Bank 2 - Status Registers........................................................................................................ 50
4.2.4 Bank 3 - Serial and SPI Settings ............................................................................................. 52
4.2.5 Bank 4 - Host Protocol Settings............................................................................................... 55
4.2.6 Bank 5 - I/O Peripheral Registers............................................................................................ 56
4.2.7 Bank 6 - I/O Setup ................................................................................................................... 57
4.2.8 Bank 7 - Authentication List..................................................................................................... 59
4.2.9 Bank 8 - Tree-Routing Active Router ID Table........................................................................ 59
4.2.10 Bank 9 - Registered MAC Addresses...................................................................................... 59
4.2.11 Bank FF - Special Functions ................................................................................................... 60
4.2.12 Protocol Mode Configuration Example.................................................................................... 61
4.2.13 Protocol Mode Sensor Message Example .............................................................................. 61
4.2.14 Protocol Mode Event Message Example ................................................................................ 61
5.0 CCT24DK Developer’s Kit.............................................................................................................. 62
5.1 CCT24DK Kit Contents ............................................................................................................... 62
5.2 Additional Items Needed............................................................................................................. 62
5.3 Developer’s Kit Operational Notes.............................................................................................. 62
5.4 Developer’s Kit Default Operating Configuration........................................................................ 63
5.5 Developer’s Kit Hardware Assembly .......................................................................................... 63
5.6 DNT Demo Utility Program ......................................................................................................... 65
5.6.1 Initial Kit Operation .................................................................................................................. 66
5.6.2 Serial Communication and Radio Configuration ..................................................................... 67
5.7 DNT Wizard Utility Program........................................................................................................ 75
5.8 CCT24 Interface Board Features................................................................................................ 83
6.0 Demonstration Procedure .............................................................................................................. 85
7.0 Troubleshooting ............................................................................................................................. 86
7.1 Diagnostic Port Commands ........................................................................................................ 86
8.0 Appendices .................................................................................................................................... 89
8.1 Ordering Information................................................................................................................... 89
8.2 Technical Support ....................................................................................................................... 89
9.0 Warranty......................................................................................................................................... 90

Page 5 of 90
CCT24
1.0 Introduction
The CCT24 series transceivers provide highly reliable wireless connectivity for point-to-point, point-to-
multipoint, peer-to-peer or tree-routing applications. Frequency hopping spread spectrum (FHSS) tech-
nology ensures maximum resistance to multipath fading and robustness in the presence of interfering
signals, while operation in the 2.4 GHz ISM band allows license-free use world wide. The CCT24 sup-
ports all standard serial data rates for host communications from 1.2 to 460.8 kb/s plus SPI data rates
from 6.35 to 80.64 kb/s. On-board data buffering and an error correcting radio protocol provide smooth
data flow and simplify the task of integration with existing applications. Key CCT24 features include:
•Multipath fading resistant frequency hop-
ping technology with up to 38 frequency
channels per subband
•
Dynamic TDMA slot assignment that maxim-
izes throughput and CSMA modes that max-
imizes network size
•Support for point-to-point, point-to-
multipoint, peer-to-peer and tree-routing
networks
•AES encryption provides protection from
eavesdropping
•FCC 15.247, IC and ETSI certified for
license-free operation
•Nonvolatile memory stores CCT24
configura-
tion when powered off
•10 mile plus range with omni-directional
antennas (antenna height dependent)
•Selectable 1, 10 and 63
mW transmit power
levels
•Transparent ARQ protocol with data
buffering ensures data integrity
•Simple interface handles both data and
control at up to 460.8 kb/s on the seria
l port
or 80.64 kb/s on the SPI port
•Analog and digital I/O simplifies wireless
sensing
•Auto-reporting I/O mode simplifies applic
a-
tion development
1.1 Why Spread Spectrum?
A radio channel can be very hostile, corrupted by noise, path loss and interfering transmissions from
other radios. Even in an interference-free environment, radio performance faces serious degradation from
a phenomenon known as multipath fading. Multipath fading results when two or more reflected rays of the
transmitted signal arrive at the receiving antenna with opposing phases, thereby partially or completely
canceling the signal. This problem is particularly prevalent in indoor installations. In the frequency do-
main, a multipath fade can be described as a frequency-selective notch that shifts in location and intensity
over time as reflections change due to motion of the radio or objects within its range. At any given time,
multipath fades will typically occupy 1% - 2% of the band. From a probabilistic viewpoint, a conventional
radio system faces a 1% - 2% chance of signal impairment at any given time due to multipath fading.
Spread spectrum reduces the vulnerability of a radio system to both multipath fading and jammers by
distributing the transmitted signal over a larger frequency band than would otherwise be necessary to
send the information. This allows a signal to be reconstructed even though part of it may be lost or cor-
rupted in transmission.

Page 6 of 90
CCT24
Narrow-band versus spread-spectrum transmission
Figure 1.1.1
1.2 Frequency Hopping versus Direct Sequence
The two primary approaches to spread spectrum are direct sequence spread spectrum (DSSS) and
frequency hopping spread spectrum (FHSS), either of which can generally be adapted to a given applica-
tion. Direct sequence spread spectrum is produced by multiplying the transmitted data stream by a much
faster, noise-like repeating pattern. The ratio by which this modulating pattern exceeds the bit rate of the
base-band data is called the processing gain, and is equal to the amount of rejection the system affords
against narrow-band interference from multipath and jammers. Transmitting the data signal as usual, but
varying the carrier frequency rapidly according to a pseudo-random pattern over a broad range of chan-
nels produces a frequency hopping spread spectrum system.
Forms of spread spectrum - direct sequence and frequency hopping
Figure 1.1.2

Page 7 of 90
CCT24
One disadvantage of direct sequence systems is that due to design issues related to broadband transmit-
ters and receivers, they generally employ only a minimal amount of spreading, often no more than the
minimum required by the regulating agencies. For this reason, the ability of DSSS systems to overcome
fading and in-band jammers is relatively weak. By contrast, FHSS systems are capable of hopping
throughout the entire band, statistically reducing the chances that a transmission will be affected by
fading or interference. This means that a FHSS system will degrade gracefully as the band gets noisier,
while a DSSS system may exhibit uneven coverage or work well until a certain point and then give out
completely.
Because it offers greater immunity to interfering signals, FHSS is often the preferred choice for co-located
systems. Since direct sequence signals are very wide, they can offer only a few non-overlapping chan-
nels, whereas multiple hoppers can interleave, minimizing interference. Frequency hopping systems do
carry some disadvantages, in that they requires an initial acquisition period during which the receiver
must lock onto the moving carrier of the transmitter before any data can be sent, which typically takes
several seconds. In summary, frequency hopping systems generally feature greater coverage and chan-
nel utilization than comparable direct sequence systems. Of course, other implementation factors such as
size, cost, power consumption and ease of implementation must also be considered before a final radio
design choice can be made.
2.0 CCT24 Radio Operation
2.1 Network Synchronization and Registration
As discussed above, frequency hopping spread spectrum radios such as the CCT24 periodically change
their transmit frequency. In order for the other radios in the network to receive the transmission, they must
be listening to the frequency on which the current transmission is being sent. To do this, all the radios in
the network must be synchronized to the same hopping pattern.
In all CCT24 networks, one radio is designated as the base. All other radios are designated as remotes or
routers. The base transmits a beacon each time it hops to a different frequency, which allows the other
radios in its network to synchronize with it. Since all radios in the network know the hopping pattern, once
they are synchronized with the base, they know which frequency to hop to and when.
When a remote or router is powered on, it rapidly scans the frequency band for the synchronizing signal.
Since the base is transmitting on up to 38 frequencies and the remotes and routers are scanning up to 37
frequencies, it can take several seconds to synchronize with the base.
Once a radio has synchronized with the base, it will request registration information to allow it to join the
network. Registration is handled automatically by the base. When a radio is registered, it receives several
network parameters from the base, including HopDuration,InitialNwkID,FrequencyBand and Nwk_Key
(see Section 4.2 for parameter details). Note that if a registration parameter is changed at the base, it will
update the parameter in the remotes or routers over the air.
When leasing is enabled, registration also allows the base to track radios entering and leaving a network,
up to a limit of 126. The base builds a table of serial numbers of registered radios using their three-byte
MAC addresses. To detect if a radio has gone offline or out of range, a registration is leased and must be
renewed within the configured lease interval. CCT24 radios automatically send lease renewal request to
the base. There is nothing a remote host needs to do to keep the lease renewed. Note that more than
126 radios can join a network, but base-managed leasing cannot be used. In this case, the base can be

Page 8 of 90
CCT24
configured to send join announcements to a host application for an unlimited number of radios. The
application can then verify the continued presence of each radio in the network through periodic polling.
The CCT24 also supports a RemoteLeave command that allows a host application to release a radio from
the network. This is useful to remove any rogue radios that may have joined then network when authenti-
cation is not being used. It is also useful to remove remotes from the network once they have been ser-
viced by the application. The RemoteLeave command includes the amount of time the radio must leave
the network, which can be set from 2 seconds to more than 36 hours. In addition, a radio can be told to
leave and not rejoin until it has been power-cycled or reset. The base can use RemoteLeave to keep
track of remotes that have not yet been serviced, allowing networks of more than 126 remotes to be
indirectly tracked by the base.
2.2 Authentication
In many applications it is desirable to control which radios can join a network. This provides security from
rogue radios joining the network and simplifies network segregation for co-located networks. Registration
is controlled by the AuthMode parameter in the base. The AuthMode parameter can be set to one of four
values, 0..3. The default value is 0, which allows any remote or router to register with a base.
When the AuthMode parameter is set to 1, a radio’s address must be listed in Parameter Bank 7 before it
will be allowed to register with the base. This is referred to as base authentication. Bank 7 must be pre-
loaded with the addresses of the authorized remotes before using base authentication. If a radio whose
MAC address is not in Bank 7 attempts to join the network the base will deny the registration request. A
maximum of 16 remotes can be entered into Bank 7. To support larger networks, mode 2 must be used.
When the AuthMode parameter is set to 2, the address of a radio attempting to register with the base is
sent to the host for authentication in a JoinRequest message. The host application determines if the radio
should be allowed to register and returns a JoinReply message to the base containing a PermitStatus
parameter that allows or blocks the radio from registering. The host application has 30 seconds in which
to respond, after which time the base denies registration to the radio. Up to 16 join requests can be
pending at any one time. If more than 16 radios are asking to join, the first 16 will be serviced and addi-
tional radios will be serviced after the earlier requests are handled. The RegDenialDelay parameter
controls how often a radio will request registration after it has been denied. If it is anticipated that more
than 16 radios will request registration before the application can service the first 16, this parameter
should be set to the time it will take the application to service four requests, as this will speed the authen-
tication process by freeing the base from issuing multiple denials to the same remotes.
When the AuthMode parameter is set to 3, authentication is locked to the addresses of the radios current-
ly registered with the base. Mode 3 is typically used in conjunction with Mode 0 during a commissioning
process. AuthMode is set to 0, radios are turned on and allowed to register with the base, and AuthMode
is then switched to 3 to lock the network membership.
2.3 Serial Port Modes
CCT24 radios can work in two data modes on the primary serial (UART) port: transparent and packet
protocol. Transparent mode formatting is simply the raw user data. Protocol mode formatting includes a
start-of-packet framing character, length byte, addressing, command bytes, etc. Transparent mode opera-
tion is especially useful in point-to-point systems that act as simple cable replacements. In point-to-
multipoint, peer-to-peer and tree-routing systems where the base needs to send data specifically to each

Page 9 of 90
CCT24
radio, protocol formatting must be used unless the data being sent includes addressing information that
the devices connected to the remotes/routers can use to determine the intended destination of the broad-
cast data. Protocol formatting is also required for configuration commands and responses, and sensor I/O
commands and responses. Protocol mode can be used at the base while transparent mode is used at the
remotes. The one caution about protocol mode: the length of a protocol mode message cannot exceed
the BaseSlotSize or RemoteSlotSize or the packet will be discarded. Protocol formatting details are
covered in Section 4.
The CCT24 provides two ways to switch between transparent and protocol modes. To enter protocol
mode, the /CFG input Pin 18 can be switched from logic high to low, or the EnterProtocolMode command
can be sent. When input Pin 18 is switched from logic low to high, or an ExitProtocolMode command is
sent to the primary serial input, the CCT24 will switch to transparent operation. Note that it is possible that
part of the EnterProtocolMode command will be sent over the air as transparent data.
When operating in transparent mode, two configuration parameters control when a CCT24 radio will send
the data in its transmit buffer. The MinPacketLength parameter sets the minimum number of bytes that
must be present in the transmit buffer to trigger a transmission. The TxTimeout parameter sets the maxi-
mum time data in the transmit buffer will be held before transmitting it, even if the number of data bytes is
less than MinPacketLength. The default value for MinPacketLength parameter is one and the TxTimeout
parameter is zero, so that any bytes that arrive in the CCT24 transmit buffer will be sent on the next hop.
As discussed in Section 2.8.2, it is useful to set these parameters to values greater than their defaults in
point-to-multipoint systems where some or all the remotes are in transparent mode.
2.4 SPI Port Modes
CCT24 radios can be configured to transmit and receive data through the serial peripheral interface (SPI)
port instead of the primary serial (UART) port. A CCT24 can operate as either an SPI Master or Slave.
Messages routed through the SPI port must be protocol formatted, as described in Section 4. When a
CCT24 is acting as an SPI Slave, all messages are routed through the SPI port. When a CCT24 is acting
as an SPI Master, only data messages are routed through the SPI port; radio configuration commands
and responses are routed through the primary serial (UART) port. A radio configured as an SPI Master
can use a command stored in the SPI_MasterCmdStr parameter to interrogate a Slave peripheral for
data to transmit to the base. This is especially useful where periodic I/O reporting is enabled on the
remote. Alternately, the base can send an interrogation command to the radio to fetch peripheral data.
SPI operation is configured with the SPI_Mode parameter.
2.5 RF Data Communications
At the beginning of each hop the base transmits a beacon, which always includes a synchronizing signal.
After synchronization is sent, the base will transmit any user data in its transmit buffer, unless in transpar-
ent mode the MinPacketLength and/or TxTimeout parameters have been set above their default values.
The maximum amount of user data bytes that the base can transmit per hop is limited by the BaseSlot-
Size parameter, as discussed in Section 2.8.1. If there is no user data or reception acknowledgements
(ACKs) to be sent on a hop, the base will only transmit the synchronization signal in the beacon.
The operation for remotes and routers is similar to the base, but without a synchronizing signal. The
RemoteSlotSize parameter indicates the maximum number of user data bytes a remote or router can
transmit on one hop and is a read-only value. The RemoteSlotSize is determined by the HopDuration and

Page 10 of 90
CCT24
BaseSlotSize parameters and the number of registered radios. The MinPacketLength and TxTimeout
parameters operate in a remote in the same manner as in the base.
2.6 RF Transmission Error Control
The CCT24 supports two error control modes: automatic transmission repeats (ARQ), and redundant
transmissions for broadcast packets. In both modes, the radio will detect and discard any duplicates of
messages it receives so that the host application will only receive one copy of a given message. In the
redundant transmission mode, broadcast packets are repeated a fixed number of times based on the
value of the ARQ_AttemptLimit parameter. In ARQ mode, a packet is sent and an acknowledgement is
expected on the next hop. If an acknowledgement is not received, the packet is transmitted again on the
next available hop until either an ACK is received or the maximum number of attempts is exhausted. If the
ARQ_AttemptLimit parameter is set to its maximum value, a packet transmission will be retried without
limit until the packet is acknowledged. This is useful in some point-to-point cable replacement applications
where it is important that data truly be 100% error-free, even if the destination remote goes out of range
temporarily.
2.7 Transmitter Power Management
The CCT24 includes provisions for setting the base transmit power level and the remote maximum trans-
mit power level with the TxPower parameter. CCT24 networks covering a small area can be adjusted to
run at lower transmitter power levels, reducing potential interference to other nearby systems. Radios that
are located close to their base can be adjusted to run at lower maximum power, further reducing potential
interference. Base units transmit at the fixed power level set by the TxPower parameter. Remotes and
routers automatically adjust their transmitter power to deliver packets to the base at an adequate but not
excessive signal level, while not transmitting more power than set by their TxPower parameter. Remotes
and routers make transmitter power adjustments using the strength of the signals received from the base
and the base transmitter power setting, which is periodically transmitted by the base. The automatic
transmit power adjustment is enabled by default, but can be disabled if so desired. Refer to Section 4.2.1
for details.
2.8 Network Configurations
The CCT24 supports four network configurations: point-to-point, point-to-multipoint, peer-to-peer and
tree-routing. In a point-to-point network, one radio is set up as the base and the other radio is set up as a
remote. In a point-to-multipoint network, a star topology is used with the radio set up as a base acting as
the central communications point and all other radios in the network set up as remotes. In this configura-
tion, each communication takes place between the base and one of the remotes. Peer-to-peer communi-
cations between remotes using the base as a relay is also supported, as discussed in Section 2.8.3.
Tree-routing networks can retransmit messages through one or more routers, greatly expanding the area
that can be covered by a single CCT24 system, as discussed in Section 2.8.4.
2.8.1 Point-to-Point Network Operation
Most point-to-point networks act as serial cable replacements and both the base and the remote use
transparent mode. Unless the MinPacketLength and TxTimeout parameters have been set above their
default values, the base will send the data in its transmit buffer on each hop, up to a limit controlled by the
BaseSlotSize parameter. In transparent mode, if the base is buffering more data than can be sent on one
hop, the remaining data will be sent on subsequent hops. The base adds the address of the remote, a

Page 11 of 90
CCT24
packet sequence number and error checking bytes to the data when it is transmitted. These additional
bytes are not output at the remote in transparent mode. The sequence number is used in acknowledging
successful transmissions and in retransmitting corrupted transmissions. A two-byte CRC and a one-byte
checksum allow a received transmission to be checked for errors. When a transmission is received by the
remote, it will be acknowledged if it checks error free. If no acknowledgment is received, the base will
retransmit the same data on the next hop. Note that acknowledgements from remotes are suppressed on
broadcast packets from the base.
In point-to-point operation, by default a remote will send the data in its transmit buffer on each hop, up to
the limit controlled by its RemoteSlotSize parameter. If desired, the MinPacketLength and TxTimeout
parameters can be set above their default values, which configures the remote to wait until the specified
amount of data is available or the specified delay has expired before transmitting. In transparent mode, if
the remote is buffering more data than can be sent on one hop, it will send the remaining data in subse-
quent hops. The remote adds its own address, a packet sequence number and error checking bytes to
the data when it is transmitted. These additional bytes are not output at the base if the base is in trans-
parent mode. When a transmission is received by the base, it will be acknowledged if it checks error free.
If no acknowledgment is received, the remote will retransmit the same data on the next hop.
2.8.2 Point-to-Multipoint Network Operation
In a point-to-multipoint network, the base is usually configured for protocol formatting, unless the applica-
tions running on each remote can determine the data’s destination from the data itself. Protocol formatting
adds addressing and other overhead bytes to the user data. If the addressed remote is using transparent
formatting, the source (originator) address and the other overhead bytes are removed. If the remote is
using protocol formatting, the source address and the other overhead bytes are output with the user data.
A remote can operate in a point-to-multipoint network using either transparent or protocol formatting, as
the base is the destination by default. In transparent operation, a remote CCT24 automatically adds
addressing, a packet sequence number and error checking bytes as in a point-to-point network. When the
base receives the transmission, it will format the data to its host according to its formatting configuration.
A remote running in transparent mode in a point-to-multipoint network can have the MinPacketLength and
TxTimeout parameters set to their default values to reduce latency, or above their default values to re-
duce the volume of small packet transmissions.
2.8.3 Multipoint Peer-to-Peer Network Operation
After a remote has joined a point-to-multipoint network, it can communicate with another remote through
peer-to-peer messaging, where the base acts as an automatic message relay. In protocol mode, if a
remote specifies a destination address other than the base address, peer-to-peer messaging is enabled.
In transparent mode, the RmtTransDestAddr parameter sets the destination address. Changing Rmt-
TransDestAddr from the default base address to the address of another remote enables peer-to-peer
messaging. The broadcast address can also be used as a peer-to-peer destination address. In this case,
the message will be unicast from the remote to the base (using ARQ) and then broadcast by the base (no
ARQ). For peer-to-peer broadcasts, no acknowledgement is sent and no TxDataReply packet is reported
to the host.

Page 12 of 90
CCT24
2.8.4 Tree-Routing Operation
A CCT24 tree-routing system consists of a base, remotes and up to 63 routers. A router is basically a
remote that has been configured with two operating modes - a base mode for its “child” radios and a
remote mode for its “parent” router or the system base. This allows a router to do tree-routing in addition
to normal remote functions. Each router can forward messages to/from a total of 126 child radios. A
CCT24 tree-routing system can cover a much larger area than other CCT24 networks, with the trade-off
that tree-routing increases message transmission latency. Tree-routing systems are well suited to many
industrial, commercial and agricultural data acquisition applications. Tree-routing operation is supported
by CSMA (mode 1) channel access. See Section 2.12 below.
2.9 Full-Duplex Serial Data Communications
From a host application’s perspective, CCT24 serial communications appear full duplex. Both the base
host application and each remote/router host application can send and receive serial data at the same
time. At the radio level, the radios do not actually transmit at the same time. If they did, the transmissions
would collide. As discussed earlier, the base transmits a synchronization beacon at the beginning of each
hop, followed by its user data. After the base transmission, the remotes/routers can transmit. Each trans-
mission may contain all or part of a complete message from its host application. From an application’s
perspective, the radios are communicating in full duplex since the base can receive data from a re-
mote/router before it completes the transmission of a message to the remote/router and visa versa.
2.10 Channel Access
The CCT24 provides three methods of channel access: Polling, CSMA and TDMA, as shown in the
table and figure below. The channel access setting is distributed to all radios by the base, so changing it
at the base sets the entire network or system. Polling refers to an application sending a command from
the base to one or more remote devices and receiving a response from only one remote device at a time.
Polling is suitable for both large and small networks where periodic or event reporting by remotes is not
required. Carrier Sense Multiple Access (CSMA) is very effective at handling packets with varying
amounts of data and/or packets sent at random times from a large number of remotes. Time Division
Multiple Access (TDMA) provides a scheduled time slot for each remote to transmit on each hop. The
default CCT24 access mode is TDMA dynamic mode.
Access Mode
Description
Max Number of Remotes
0
Polling
unlimited
1
CSMA
unlimited
2
TDMA dynamic slots
up to 16
3
TDMA fixed slots
up to 16
4
TDMA with PTT
up to 16
Table 2.10.1

Page 13 of 90
CCT24
Figure 2.10.1
2.10.1 Polling Mode
Polling channel access is used for point-to-point and point-to-multipoint systems where only one remote
will attempt to transmit data at a time, usually in response to a command from the base.
Polling (mode 0) is a special case of CSMA mode 1. The user can set the BaseSlotSize and CSMA_
RemtSlotSize parameters when using this mode. Since only one remote will attempt to transmit at a time,
to minimize latency, the CSMA_Predelay and CSMA_Backoff parameters are not used. Lease renewals
are also not used, again to minimize latency. Thus, when the base is operated in protocol mode with
Announce messages enabled, only join messages are generated. This mode provides high throughput as
there is no contention between remotes and the entire portion of the hop frame following the base trans-
mission is available for a remote to transmit. Applications where more than one remote may attempt to
transmit at a time, where event and/or periodic I/O reporting are enabled, and/or tree-routing operation is
required should not use this mode.
2.10.2 CSMA Mode
When using CSMA channel access, each remote/router with data to send listens to see if the channel is
clear and then transmits. If the channel is not clear, a radio will wait a random period of time and listen
again. CSMA works best when a large or variable number of radios transmit infrequent bursts of data.
There is no absolute upper limit on the number of radios that can be supported in this mode - it depends
on message density. A maximum of 126 radios can be supported if base-managed join/leave tracking is
required, or an unlimited number of remotes if base join-leave tracking is not required or will be handled
by the host application.
There are two important parameters related to CSMA operation. The CSMA_Backoff parameter defines
the initial time that a radio will wait when it determines the channel is busy before again checking to see if
the channel is clear (back-off interval). If, after finding the channel busy and backing off, the radio finds

Page 14 of 90
CCT24
the channel busy a second time, the amount of time the radio will wait before checking the channel will
increase. It will continue to increase each subsequent time the channel is busy until the channel is finally
found idle. This is the classic CSMA technique that handles the situation where a number of radios hold
data to send at the same time. The CSMA_ Predelay parameter controls the maximum time that a radio
will wait before first listening to see if the channel is clear for a transmission. This parameter is used to
make sure that all the remotes do not transmit immediately after the base finishes transmitting.
CSMA (mode 1) provides classical CSMA channel access, and gives the user control over both the
CSMA_Predelay and CSMA_Backoff parameters. This mode is well suited for large numbers of uncoordi-
nated radios, where periodic/event reporting is used, or tree-routing operation is required. In addition to
CSMA_ Predelay and CSMA_ MaxBackoff, the user can set the BaseSlotSize and CSMA_ RemtSlotSize
parameters when using this mode. The following guidelines are suggested for setting CSMA_Predelay:
•For lightly loaded CSMA contention networks, decrease CSMA_Predelay
to 0x03 or less to reduce latency.
•For heavily loaded CSMA contention networks, increase CSMA_Predelay
to 0x05 or more for better throughput.
As an option, CSMA mode allows the base to directly track remotes entering and leaving the network, for
up to 126 remotes. The base is operated in protocol mode and is configured to send Announce messages
to its host when a remote joins, and when the remote’s registration lease expires.
While a base in a CSMA network can track a maximum of 126 remotes entering and leaving the network,
it can generate join Announce messages for an unlimited number of remotes. This allows the host appli-
cation to track remotes entering and leaving a CSMA network with more than 126 remotes by creating its
own table of MAC addresses and periodically sending a GetRemoteRegister command to each remote in
the table. Failure to answer a GetRemoteRegister command indicates the remote is no longer active in
the network.
CSMA modes work well in many applications, but CSMA has some limitations, as summarized below:
•Bandwidth is not guaranteed to any remote.
•Marginal RF links to some remotes can create a relatively high chance of
collisions in heavily loaded networks.
2.10.3 TDMA Modes
TDMA modes provide guaranteed bandwidth to some or all of the radios in a network. Radios that regis-
ter with the base receive several special parameters, including ranging information and a specific channel
access time slot assignment. TDMA registrations are always leased and must be renewed every 250
hops. The CCT24 provides three TDMA access modes, as discussed below.
TDMA Dynamic Slots (mode 2) is used for general-purpose TDMA applications where scaling the capaci-
ty per slot to the number of active remotes is automatic. Each radio that registers with the base receives
an equal time slice. As new remotes join, the size of the TDMA remote slots shrinks accordingly. The
number of slots, individual slot start times, and the RemoteSlotSize are computed automatically by the
CCT24 network in this mode. The user should note that the bandwidth to each remote will change

Page 15 of 90
CCT24
immediately as remotes join or leave the network. When running in protocol mode on a remote, care must
be taken not to generate messages too long to be sent in a single hop due to automatic RemoteSlotSize
reduction.
TDMA Fixed Slots (mode 3) is used for applications that have fixed data throughput requirements, such
as isochronous voice or streaming telemetry. The slot start time and the RemoteSlotSize are computed
automatically by the CCT24 network in this mode. The user must set the number of slots using the
MaxSlots parameter. The base radio will allocate remote slot sizes as if MaxSlots number of radios are
linked with the base, even when fewer remotes/routers are actually linked. In this mode, the remote slot
sizes are constant.
TDMA with PTT (mode 4) supports remotes with a "push-to-talk" feature, also referred to as "listen-
mostly" remotes. This mode uses fixed slot allocations. Remotes can be registered for all but the last slot.
The last slot is reserved for the group of remotes that are usually listening, but occasionally need to
transmit. In essence, the last slot is a shared channel for this group of remotes. When one of them has
data to send it keys its transmitter much like a walkie-talkie, hence the name push-to-talk (PTT). There is
no limit to the number of remotes that can listen to the last slot.
The slot start time and the RemoteSlotSize are computed automatically by the CCT24 network in mode 4.
The user must specify the number of slots using the MaxSlots parameter. The last slot is reserved for the
PTT remotes. The user must configure PTT remotes individually to select mode 4 operation. The user’s
application must ensure that only one PTT remote at a time is using the slot. Mode 4 does not support
tree-routing operation.
2.11 Transmission Configuration Planning
Because frequency hopping radios change frequency periodically, a single message may be sent in one
or more RF transmissions. The length of time the radio stays on a frequency, the hop duration, impacts
both latency and throughput. The longer the radio stays on a single frequency, the higher the throughput
since the radio is transmitting for a higher percentage of the time, but latency is also higher since radios
may have to wait longer to transmit. So latency and throughput trade off against one another. The CCT24
has several configuration parameters that allow latency and throughput to be optimally balanced to the
needs of an application.
2.11.1 TDMA Throughput
For TDMA channel access without routers, throughput and latency are controlled by the RF data rate, the
serial port baud rate, the BaseSlotSize, the HopDuration, and the number of remotes. A wide range of
throughput and latency combinations can be obtained by adjusting these parameters. The throughput of a
radio in a TDMA network is simply:
Number of bytes per hop/Hop Duration
For the base, the number of byes per hop is controlled by the BaseSlotSize parameter so the throughput
of the base radio is:
BaseSlotSize/HopDuration
Note that if fewer bytes than the BaseSlotSize limit are sent to the base radio by its host during the hop
duration time in transparent mode, the observed throughput of the base radio will be reduced. If the base
is in protocol mode, it will wait until a protocol formatted message is completely received from its host

Page 16 of 90
CCT24
before transmitting it. If the message is not completely received by the time the base transmits, the base
will wait until the next hop to transmit the message. The throughput for each remote is:
RemoteSlotSize/HopDuration
In a TDMA mode, the RemoteSlotSize is set automatically based on the number of remotes and the
BaseSlotSize. Note that the base radio always reserves BaseSlotSize amount of time in each hop wheth-
er or not the base has user data to send.
To help select appropriate parameter values, RFM provides the DNT Throughput Calculator utility pro-
gram (DNTCalc.exe). This program is on the development kit CD. Enabling encryption (security) adds
additional bytes to the data to be sent but the Calculator has a mode to take this into account.
2.11.2 Polling Throughput
In polling mode, the application sends data from the base to a specific remote, which causes the remote
and/or its host to send data back to the application. The network operates like a point-to-point network in
this case. In polling, the HopDuration should be set just long enough to accommodate a base transmis-
sion up to the limit allowed by the BaseSlotSize parameter, plus one remote transmission up to the limit
allowed by the CSMA_RemtSlotSize parameter. These slot sizes and the hop duration set the polling
throughput as in TDMA channel access.
The throughput in Polling mode is also determined by the amount of time it takes for the remote host
device to respond to the poll. For example, consider the situation where a remote host device communi-
cates with the CCT24 at 38.4 kb/s, receives a 16-byte poll command, and takes 1 ms to generate a 32-
byte response which it then sends to the CCT24. Sixteen bytes over a UART port is 160 bits using 8,N,1
serial parameters. Sending 160 bits at 38.4 kb/s takes 4.2 ms. Add 1 ms for the host device to process
the command and begin sending the 32-byte response. The 32-byte response takes 8.4 ms to send at
38.4 kb/s, for a total turnaround time of 13.6 ms. This amount of time could be added to the base and
remote slot times to allow the entire transaction to take place in a single hop. However, except at the 38.4
kb/s over-the-air data rate, this is likely to be much longer than the base and remote slot times. Thus, in
practice, lengthening the hop duration to complete the transaction in a single hop doesn’t really affect the
throughput. Nevertheless, it is important to note that the throughput for the remote in the example above
is substantially less than the remote slot size in bytes divided by the hop duration.
It is not a CCT24 requirement that the complete application message be sent in a single hop, nor that the
remote response is returned in a single hop, when in transparent mode. If either transmission occurs over
more than one hop, then depending on the length of the data, the RF data rate and the serial port data
rate at the receiving end, there may be a gap in the serial data. Some protocols, such as Modbus RTU,
use gaps in data to determine packet boundaries.
2.11.3 CSMA Throughput
In CSMA mode, remote radios do not have a fixed throughput, which is why applications requiring guar-
anteed throughput should use polling or a TDMA mode. The reason that the throughput of a CSMA
remote is not fixed is because its ability to transmit at any given time depends on whether another radio is
already transmitting. The throughput of a remote is further affected by how many other remotes are
waiting for the channel to become clear so they can transmit. This is not a problem when remotes, even a
large numbers of remotes, only send data infrequently. The CCT24 includes several configuration param-
eters that can be used to optimize the performance of a CSMA network.

Page 17 of 90
CCT24
It is often desirable to limit the amount of data a CSMA remote can send in one transmission. This pre-
vents one remote from hogging network throughput. To accommodate this, the CCT24 provides a
CSMA_RemtSlotSize parameter that is user configurable. When a remote has transmitted CSMA_
RemtSlotSize bytes on a given hop, it will stop transmitting until the next hop. Note that this remote will
have to contend for the channel on the next hop, so it is not guaranteed that it will be the first remote to
transmit on the next hop or that it will be able to transmit on the next hop at all. To allow multiple remotes
a chance to transmit on the same hop, the HopDuration parameter must be set long enough to support
the BaseSlotSize, plus the number of remotes to transmit per hop multiplied by the CSMA_ RemtSlotSize,
plus the number of remotes to transmit per hop multiplied by the CSMA_Backoff. Because of the way
CSMA channel access works, this does not guarantee that the desired number of remotes to transmit on
a hop will always be able to transmit on a single hop. This is due to the fact that when a remote with data
to send finds the channel busy a second time, it waits for a longer period to time before testing the chan-
nel again. This time will continue to increase until the remote finds the channel clear. In practice this is
unlikely to present a problem, as CSMA networks are used with devices that infrequently have data to
send.
The DNT Throughput Calculator can be used to determine the HopDuration, but it will be necessary to
increase the number of slots to a value greater than the number of remotes to transmit on a single hop to
account for the backoffs. It is indeterminate how many backoffs may occur during a single hop, which is
why the number of remotes that transmit on a given hop cannot be guaranteed. Note that the CSMA_
Backoff parameter sets the length of time a remote will wait to recheck the channel when it has detected
that the channel is busy. The second time a remote detects that the channel is busy, it will increase the
amount of time it waits until it checks again. Every subsequent time it detects a busy channel it will in-
crease the amount of time it will wait in a geometric fashion. This continues until it detects an idle chan-
nel. So while a short CSMA_Backoff can decrease the time between when one remote transmits and the
next remote transmits, it can actually lead to a longer time between remote transmissions than a longer
backoff. This can occur when the remote checks the channel multiple times during the transmitting re-
mote’s transmission causing the back-off time to be increased.
2.11.4 Latency
The worst case latency for TDMA access (without routers), excluding retries, occurs when the radio
receives data just after its turn to transmit. In this instance, it will have to wait the length of time set by the
HopDuration to begin transmitting the data. If the radio is receiving data over its serial port at a rate higher
than its throughput, this will only occur at the beginning of a transmission that spans several hops.
In a polling application, latency is affected by how long the remote and/or its host takes to respond, and
when in the hop data is ready to be transmitted. Since a remote can begin transmitting at practically any
time during the hop after the base has transmitted, the latency can be less than HopDuration. However,
the remote transmission may extend over two hops if it starts late in the first hop.
Latency for any given remote in a CSMA network is particularly difficult to characterize. If many remotes
have data to send, the latency for the last remote to send will be the length of time it takes all the other
remotes to send. The CSMA scheme used in the CCT24 is designed to allow each remote an equal
opportunity to transmit, so the concern is not that one remote is locked out, but just how long it will take a
number of remotes with data to sent to each gain access to the channel and send their data. The more
data that needs to be sent, the more time will be consumed checking the channel and backing off when
the channel is busy. Again, this is why CSMA networks are best used when there are a large number of
nodes that send data infrequently.

Page 18 of 90
CCT24
The other factor impacting latency is retries. This impact is not unique to frequency hopping radios but is
common among all wireless technologies. A radio only transmits data once per hop. It needs to wait until
the next hop to see if the transmission was received at the destination. If not, the radio will transmit the
data again and wait for the acknowledgement. This can happen up to ARQAttemptLimit number of times
which is equal to ARQAttemptLimit times HopDuration amount of time.
2.11.5 Configuration Validation
Although slot durations are automatically calculated by the CCT24, the RF data rate, hop duration, etc.,
must be coordinated by the user to assure a valid operating configuration based on the following criteria:
1. Regardless of the RF data rate, the maximum CCT24 hop duration is limited to 200 ms. A CCT24
network must be configured accordingly.
2. In protocol mode, the BaseSlotSize and RemoteSlotSize parameters must be large enough to
hold all the data bytes in the largest protocol formatted message being used. Protocol formatted
messages must be sent in a single transmission. Any protocol formatted messages too large for
the slot size setting will be discarded
3. In TDMA mode 2, the RemoteSlotSize will be reduced automatically when a new remote joins the
network. This can cause a network to suddenly malfunction if the hop duration is not set to pro-
vide an adequately large remote slot allocation when fully loaded with remotes
4. When operating in polling mode 0, the CSMA_RemtSlotSize and HopDuration parameters are
usually set to accommodate the number of data bytes in a maximum size transmission. This con-
figuration provides low latency for polled messages.
5. When operating in CSMA mode 1 with multiple remotes, the CSMA_RemtSlotSize and HopDura-
tion parameters are usually set to accommodate three times the number of data bytes in one
maximum size transmission, to allow time for more than one remote to attempt to transmit during
a single hop.
The DNT Throughput Calculator utility program is shown in Figure 2.11.5.1. Decimal data is entered by
default. Hexadecimal data can also be entered using a 0x prefix, as shown in the Hop Duration Counts
text box. When using the DNT Throughput Calculator, parameter coordination depends on the operating
mode of a CCT24 network, as outlined below:
Polling (mode 0) - the user can set and must coordinate the RF data rate, hop duration, base slot size
and remote slot size. First, set the BaseSlotSize to accommodate the maximum number of data bytes in a
base transmission. Next, set the CSMA_RemtSlotSize to accommodate the maximum number data bytes
in a remote transmission. Use these slot sizes, the RF data rate and the maximum operating range (20
miles is the default) as inputs to the Calculator program to determine minimum valid HopDuration.
CSMA contention (mode 1) - the same procedure as for polling is used, except that the CSMA_
RemtSlotSize typically should be set at three times the maximum number of data bytes for point-to-
multipoint networks. The default values for CSMA pre-delay and back-off are assumed.
TDMA dynamic (mode 2) - this is the CCT24’s default operating mode and the default settings are opti-
mized for point-to-point transparent operation. For other configurations the user must coordinate the RF

Page 19 of 90
CCT24
data rate, hop duration, base slot size and maximum number of remotes. Although the remote slot size
and remote slot time allocation are automatically set in mode 2, the user must predetermine these values
to assure a valid operating configuration. First, set the BaseSlotSize to accommodate the maximum
number of data bytes in a base transmission. Next, determine the RemoteSlotSize required to accommo-
date the maximum number of data bytes in a remote transmission. Use these slot sizes, the maximum
number of remotes that will be used in the network, the RF data rate and the maximum operating range
as inputs to the Calculator to determine the minimum valid HopDuration time. Note that when there are
fewer remotes on the network than the maximum specified, the remotes will automatically be configured
with a bigger RemoteSlotSize parameter.
TDMA fixed (mode 3) - First, set the BaseSlotSize to accommodate the maximum number of data bytes in
a transmission. Next, determine the RemoteSlotSize required to accommodate the maximum number of
data bytes in a remote transmission. Then set the number of remote slots. Use the slot sizes, the number
of remotes, the RF data rate and maximum operating range as inputs to the Calculator to determine the
minimum valid hop duration.
TDMA PTT (mode 4) - use the same procedure as for TDMA fixed mode 3.
The CCT24 base firmware can detect a significant number of invalid configurations and override the
HopDuration parameter to establish a valid configuration. To take advantage of this feature, configure a
CCT24 network in the following order:
1. In all system radios, set the RF_DataRate parameter and save it. Then reset all radios to estab-
lish the new RF data rate.
2. Set the BaseSlotSize and TDMA_MaxSlots or CSMA_RemtSlotSize as needed. Use the default
maximum operating range unless links of more than 20 miles are planned.
3. Set the HopDuration parameter and then read it back. If the HopDuration parameter readout is
different than the value set, the firmware detected an invalid configuration and is overriding it.

Page 20 of 90
CCT24
2.12 Tree-Routing Systems
As discussed in Section 2.8.4, CCT24 tree-routing systems can cover much larger areas than other
CCT24 networks, with the trade-off that tree-routing increases message transmission latency. Tree-
routing systems are well suited to many industrial, commercial and agricultural applications. Compared to
other CCT24 network configurations, however, tree-routing systems require somewhat more initial plan-
ning and commissioning steps, as discussed in this Section.
2.12.1 Example Tree-Routing System
An example tree routing system is shown in Figure 2.12.1.1. In this example, seven sensor locations
need to be monitored over a several acre outdoor site. All of the sensor data must be sent back to a
central location, the base radio, for collection and analysis. Due to obstructions, remotes R1, R3, R6, and
R7 are prevented from communicating directly with the base radio. R1, R3, and R6 have direct communi-
cations with either R2 or R5, both of which have direct communications with the base radio. R7 has direct
communications with R6 and can use R6 to route messages to and from the base through R5.
Using the tree routing function of the CCT24, all nodes will be able to send and receive data to and from
the centrally located base. R2, R5, and R6 which are configured to relay data to and from other nodes in
addition to sending their own sensor data are called routing remotes, or routers. Note that there is no
hardware or firmware difference between CCT24 base, remote and router nodes - they are simply config-
ured for the particular mode of operation.
As the system is powered up, R2, R4, and R5 will join by registering with the base radio. R2 and R5, once
they have registered with the base radio, will start sending out beacons so that R1, R3, and R6 can join
the tree-routing system through them. In the case of R6, it will wait until it has joined the system through
R5 before sending out the beacons that will let R7 join the system through it.
Figure 2.12.1.1
CCT24 Tree Routing
System
Table of contents
Other RFM Transceiver manuals
Popular Transceiver manuals by other brands

BWI Eagle
BWI Eagle AIR-EAGLE XLT 441AN-6000-4-20O-120VAC Product information bulletin

BWI Eagle
BWI Eagle AIR-EAGLE SR PLUS 36-4000-DC Product information bulletin

Kenwood
Kenwood TK-2402V Service manual

Omnitronic
Omnitronic GS-100 user manual

Entel
Entel HT644 GMDSS user guide

Kenwood
Kenwood TH-26A instruction manual