zephyr/samples/net/wpan_serial
Marcus Shawcroft 954baea90b random: Restructure RANDOM Kconfig
Restructure the RANDOM Kconfig to match the structure used in other
drivers with a single top level menu.  Move the true random number
generators to appear first in the menu, with pseudo generators at the
bottom.  Do not present pseudo generators if a true random generator
is presented.

This change implies that tests, samples and applications that require
the random driver interface must now select CONFIG_RANDOM_GENERATOR.

In order for tests and samples to build (and run) on platforms that
have no random driver it remains necessary to select
the CONFIG_TEST_RANDOM_GENERATOR.

Note that CONFIG_TEST_RANDOM_GENERATOR retains its original purpose of
enabling a random driver that delivers non random numbers for the
purpose of testing only.

Change-Id: I2e28e44b4adf800e64a885aefe36a52da8aa455a
Signed-off-by: Marcus Shawcroft <marcus.shawcroft@arm.com>
2016-12-13 22:50:18 +00:00
..
src net: buf: Redesigned pool & buffer allocation API 2016-12-13 21:41:53 +00:00
Makefile wpan_serial: Implement 802.15.4 serial radio protocol 2016-12-02 12:40:52 +02:00
README wpan_serial: Update README 2016-12-02 12:41:03 +02:00
prj.conf random: Restructure RANDOM Kconfig 2016-12-13 22:50:18 +00:00
testcase.ini wpan_serial: Implement 802.15.4 serial radio protocol 2016-12-02 12:40:52 +02:00

README

Application implementing 802.15.4 "serial-radio" protocol.

How to use:

1. Build and flash Zephyr application to Quark board with 802.15.4 radio,
   at the moment CC2520 radio is supported.
2. Connect board to Linux PC, /dev/ttyACM[number] should appear
3. Run Contiki-based native border router (6lbr, native-router, etc)
     Example for Contiki:
     $ cd examples/ipv6/native-border-router
     $ make
     $ sudo ./border-router.native -v5 -s ttyACM0 fd01::1/64

Now you have Contiki native border router, simple web server should show some
802.15.4 devices. Web server address is printed in the border-router output
screen:
...
Server IPv6 addresses:
 0x62c5c0: =>fd01::212:4b00:531f:113a
...
Go to http://[fd01::212:4b00:531f:113a]/

It shall show you Neighbors and Routes.

PS: Make sure your disto ModemManager is disabled, otherwise it sends AT commands
to our device ;)

$ sudo systemctl disable ModemManager.service