• Wi-SUN Products Launch Anouncement!  ——RFstar Has Joined Hands with TI to Develop Wide-Area Mesh!
    Wi-SUN Products Launch Anouncement! ——RFstar Has Joined Hands with TI to Develop Wide-Area Mesh! Jun 24, 2022
    Recently, RF-star, a veteran wireless IoT company in China, announced that it has joined hands with Texas Instruments to launch several Wi-SUN products, focusing on the development of wide-area mesh, hoping to provide customers with integrated solution development environment of end-edge-cloud in the field of industrial IoT and public facilities. The products disclosed by the company include a variety of Wi-SUN communication modules based on the TI CC1352 and CC1312 series, which support Sub1G multi-band and 2.4GHz communication, and support self-organizing networks by mesh and multi-hop. The distance of a single hop can reach several kilometers. Development history of Wi-SUN Even for most people in the IoT circle, Wi-SUN is a new technology. Actually it has been created for more than a dozen years. However it floated only in recent years after more major chip vendors and device manufacturers joined the technology alliance and started to promote the technology. As early as 2008, there was no unified wireless communication standard for the Wide Area network in the industry, while there were various wireless communication protocols in the industry at that time. What these protocols have in common is that they adopted the IEEE 802.15.4 standard. But they still cannot achieve interconnection in the application layer. In order to solve this complex problem, Wi-SUN FAN (Wireless Utility Field Area Network), a large-scale wireless mesh network based on IP technology came into being. The standard is committed to becoming the global wireless mesh network standard with interoperability. With the implementation of the standard, Wi-SUN alliance was established in 2012. Currently, the alliance has more than 250 members worldwide, including Cisco, ARM, Texas Instruments and Itron, etc. Over the past two years, the Wi-SUN standard has matured, and hundreds of millions of Wi-SUN enabled devices have been deployed worldwide. It is widely used in public utilities and smart city facilities due to its feature of enabling smart meters, smart street lights and other devices to be connected to a public network. Wi-SUN technology is an open specification based on IEEE 802.15.4g, IEEE 802 and IETF IPv6 standard protocols. Wi-SUN FAN is a mesh network protocol that support self organizing and self-healing functions. Each device in the network can communicate with its neighbors, and signals can be transmit to each node in the mesh, making very long range hops in between. Wi-SUN features long distance transmission, security, high scalability, interoperability, easy deployment, mesh network, as well as low power consumption (the battery life of Wi-SUN modules has a chance to It can be used for ten years). It is widely used in smart meters and family intelligent energy management (HEMS) controllers for communication, and is also conducive to building a wide-area large-scale internet of things. The Wi-SUN standard mainly consists of two sub-specifications, namely FAN and HAN. ...
    Read More
  • Inclusive All-Win and Shape the Future—RF-star 2021 Year Banquet
    Inclusive All-Win and Shape the Future—RF-star 2021 Year Banquet Dec 24, 2021
    Time zipped by and the bell for the year 2022 is about to ring. At this beautiful moment of bidding farewell to the old and ushering in the new, RF-star held the Annual Banquet for 2021 at Chengdu where all staff gathered together to celebrate the achievements made in 2021 and expect a bright outlook for 2022. In the past year of 2021, RF-star has made numerous achievements and continues to develop in the IoT industry, which enables itself to be more professional and creative in wireless technology. Before the activities, each department leader made a report on their work for 2021. Then the chairman of the board, Mr.Kang Kai, made an achievement and progress summary of RF-star. He also talked about the company's annual sales achievements, which far exceeded initial expectations and mentioned the outlook for 2022, including several plans such as doubling overall sales in 2021 and expanding and relocating the Chengdu branch. Every success and progress of RF-star will not be possible without the support and help from everyone! After the Chairman’s speech, it comes to the award ceremony. The company awarded more than 20 awards to some outstanding staff, including the most excellent staff in 2021, sales champion award, the most outstanding team award and so on. Many young employees stepped onto the award-winning stage. They show the charming demeanor of RF-star young employees! After the award ceremony, all the staff moved to the hotel and share the banquet. During the banquet, the company held raffle draw activity and fun games, which brings endless rousing cheers and claps, also pushes the activity to its climax. The year 2022 is a new start for RF-star! With the enhancement of overall arrangements of the company, 2022 will be a more rapid development period. “Inclusive all-win and shape the future”. We have confident belief and wonderful wishes to keep close cooperation with all our customers to shape a better future!
    Read More
  • Beacon Technology Makes Indoor Positioning Easier
    Beacon Technology Makes Indoor Positioning Easier Oct 29, 2021
    The IoT technology is constantly updated and iterated, and the indoor positioning technology has also undergone earth-shaking changes. From room-level positioning, decimeter-level positioning to high-precision centimeter positioning, the evolution of technology is always unexpected! Various positioning technologies of indoor positioning solutions appear in turn. Which technology is most suitable for indoor positioning? Let’s take a comprehensive perspective to understand the Bluetooth indoor positioning solution. Overview of Beacon Indoor Positioning Technology There are two Beacon indoor positioning technologies: 1. Passive location: Use the Bluetooth gateway to capture the broadcast data transmitted by the beacon on the person/object. The gateway is deployed and installed in the environment. And the gateway will return the collected beacon data to the server through the network. The server obtains the real-time position coordinates of the beacon through a positioning algorithm based on the coordinates known by the gateway. 2. Active position: Use the APP on a mobile device to get the Beacon broadcast data. The APP will have a positioning algorithm. Based on Beacon broadcast data, we can know the person's location who holds the mobile device. The location and navigation in the room are realized through APP or Applet, which is suitable for shopping malls, parking lots, and hospitals. Features of Beacon indoor positioning technology Compared with Wi-Fi positioning technology, Beacon technology suffers less environmental interference. Beacon product is based on the battery power supply. With the advantages of Bluetooth low energy consumption, long service life, small size, and the high penetration rate of Beacon devices, Bluetooth positioning is the most commonly used technology in indoor positioning technology. In daily life, smartphones and smart speakers support Bluetooth. The popularity and mass use of Bluetooth makes Bluetooth chips at a low price. And the BLE price is lower than traditional UWB/RFID solutions. How does Bluetooth realize indoor positioning? The Bluetooth working frequency is 2400 MHz ~ 2483.5 MHz. When Bluetooth initiates a broadcast, in addition to its own MAC address, the strength of the Bluetooth signal will also be broadcasted, namely RSSI information. The RSSI reflects the signal strength of the broadcast data packet. According to the RSSI, when the Bluetooth receiver is closer to the transmitter, the signal strength is stronger, on the contrary, will be weaker. The relationship between the signal strength and the distance from the transmitter can be found through the transformation of signal strength. By deploying a Bluetooth transmitter in the room, namely a beacon, the Bluetooth receiver can determine its indoor location after receiving the RSSI signal broadcasted by the transmitter. This positioning method is called active positioning, and the positioning accuracy is 3 meters to 4 meters. Through a reasonable algorith...
    Read More
  • Journey to Western Sichuan Plateau-RFstar Chengdu Team
    Journey to Western Sichuan Plateau-RFstar Chengdu Team Jun 05, 2021
    RF-star Chengdu team has traveled to the Western Sichuan Plateau in July. The impressive natural landscapes with snow-covered mountains, endless grass landscapes, countless yak herds, and local monasteries leave us literally speechless! 
    Read More
  • RF-star 2021 Mid-Autumn Festival Activity
    RF-star 2021 Mid-Autumn Festival Activity Sep 18, 2021
    When the moon hangs in the sky, we know that the Mid-Autumn Festival is around the corner. With the strong sweet-scent of the osmanthus was waved to us by the breeze in the streets and lanes in Chengdu city, the Mid-Autumn Festival is coming. On the occasion of the festival, RF-star would like to give you our best wishes here for a happy holiday. And on this special day, all staff of RF-star gathered here to participate in the lantern riddles and mooncake cooking activities to celebrate for the coming traditional Chinese Mid-Autumn Festival. Let’s enjoy this happiness and rejoice together. Years come and go, but the moon in the Mid-Autumn night remains in our hearts forever. Guessing lantern riddles is a traditional folkloric entertainment activity for the Chinese. There is infinite wisdom and fun in the little riddles. From the animal names to the names of the objects, from the person names and place names to the rivers or mountains, everything can be included in the riddles and be a question or answer, which makes the riddle bring infinite extreme fun. Look, the activity has not begun yet, everyone is eager to have a try and some people roll up their sleeves to get ready to be the first person who gives the answer. With the host announced the kickoff of the activity, one after another answer being called out with the intermingled cheers and laughter, which pushes the activity to its climax. As the guessing riddles activity comes to an end, the host unveiled to move on to another activity named ”making mooncakes”. All staff brims with full of happiness and rejoice. Sweet-style mooncakes are one of the popular styles of mooncake for Chengdu people. Take one portion from each 3 colours of dough and combine them into a round. Flatten out the dough and center the filling. Seal and shape into a ball. Lightly coat the surface with prepared cooked glutinous rice flour. Press each into mooncake mould and then push lightly out on a serving plate. Each member of RF-star is busy chit-chatting and making mooncakes, which brings pleasure and warm atmosphere. After a while, several plates of crispy and delicious mooncakes come to the table. About Us Shenzhen RF-Star Technology Co., Ltd., founded in 2010, is a world leading Internet-of-Things (IoT) solution provider. RF-Star has the vision of a connected world with widely deployed IoT technology, such as BLE/BT, Wi-Fi, LoRa, ZigBee, Sub-1GHz, NB-IoT, RFID, which makes RF-star focus on creating innovative products and services, empowering industries to run intelligently and providing people a better life.
    Read More
  • IoT Security Made Simple with SimpleLink™ Wi-Fi® RF-star CC3100 and CC3200 Module RF-WM-3200B1
    IoT Security Made Simple with SimpleLink™ Wi-Fi® RF-star CC3100 and CC3200 Module RF-WM-3200B1 Mar 06, 2019
    The Internet of Things (IoT) connects billions of devices and brings a huge opportunity for businesses to grow. However, billions of new connected devices also brings billions of new opportunities for hackers to steal intellectual property (IP), compromise users’ property and invade their privacy. While consumer awareness for Internet security grows as more security breaches at large companies are revealed to the public, secure Internet communication technology has advanced to a level that provides online banking, e-commerce and government services. State-of-the-art Internet security relies on advanced cryptographic algorithms, powerful computers and collaboration between major Internet companies and users. The common security capabilities available to Internet applications today include the following: Private communication – Information exchanged between parties is encrypted, such that an eavesdropper cannot understand it. End-point authentication – Communicating parties confirm each other’s identity prior to any information exchange to prevent attackers from using a false identity to access information and gain unauthorized control of a remote device. Information authentication – Critical information including transaction data and software updates are digitally signed to authenticate its origin and prevent malware installation. These security capabilities largely rely on a few fundamental building blocks, including: Stable cryptographic ciphers such as the Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA2) and the public key ciphers RSA and ECC. When used properly with an adequate key size, these ciphers have no known practical attack. The Transport Layer Security (TLS) protocol, superseding its predecessor Secure Sockets Layer (SSL) protocol, provides the framework for establishing a secure communication channel between two parties. It handles both information encryption and end-point authentication, and relies on the cryptographic ciphers mentioned above. Public key infrastructure (PKI) provides the building blocks for authentication and trust through a digital certificate standard and certificate authorities (CA) such as Symantec and others. The benefit of using these well-known ciphers and protocols in IoT applications is two-fold. First, it relies on proven technology that is widely deployed and tested by the industry at a mega-scale. Second, it allows harnessing the power of already deployed Internet services (e.g. email, social media) as well as the public key infrastructure provided by CAs. Although Internet security technology is widely available, recent research from Symantec Security suggests that many deployed IoT devices have not implemented adequate security measures. There are likely multiple reasons for these security gaps, but vendor awareness, software complexity and implementation costs are probably at the top of the list. Many IoT devices are based on low-end microcontrollers (MCUs) that have limited processing...
    Read More
  • Strengthening Wi-Fi security at the hardware level RFSTAR RF-WM-3220B1 W-iFi module
    Strengthening Wi-Fi security at the hardware level RFSTAR RF-WM-3220B1 W-iFi module Mar 06, 2019
    If you’re an Internet of Things (IoT) designer, you’re probably often challenged to do more with less when it comes to security, constantly looking for new ways to protect your products against an ever-growing list of threats with lean system resources and perhaps limited experience. Knowing that these struggles are very real, in this post I’ll outline a few top IoT security risks and common misconceptions on how to address them. I will also provide an overview of how new CC3220SF Wi-Fi module RF-WM-3200B1 give you more tools to help address security challenges through a novel architecture and rich set of integrated security features. Are there IoT applications that don’t need to implement security measures? Any device that connects to the internet may be vulnerable to local or remote attacks. Attackers can target almost any connected device to try and steal manufacturer intellectual property stored in the system, gain access to user data, or even maliciously manipulate the system to compromise users or attack third parties online. As demonstrated by the major distributed denial of service (DDoS) attack late last year, labeled by experts as the largest of its kind in history, even seemingly harmless products such as home digital video recorders (DVRs) can be maliciously infected and used as “botnets” to halt operations for third-party entities. The attack last year affected services such as Twitter and PayPal, but similar attacks could potentially target large smart infrastructure technologies such as electric grid systems. According to a 2016 study conducted by Kapersky Lab, a single DDoS attack can cost an organization more than $1.6 million to resolve. Recognizing these threats,RF-star's CC3220SF Wi-Fi module integrates a host of powerful, multilayered and hardware-based security features to provide you with powerful tools to help protect products from attacks such as local or remote packet sniffing, man-in-the-middle (MITM) server emulation, hostile takeovers via over-the-air updates, remote file manipulation, data and software theft, intellectual property (IP) cloning, and many more. Watch the below video to learn more about these tools: Should IoT security features primarily focus on Wi-Fi and internet-level encryption of packets sent over the air? Having strong Wi-Fi (Advanced Encryption Standard [AES]/Wired Equivalent Privacy [WEP]) and internet-level (Transport Layer Security [TLS]/Secure Sockets Layer [SSL]) encryption is critical to help prevent local and remote network-packet sniffing, respectively. But these measures alone may not be enough to fend off hostile takeover attempts or provide full protection against theft of IP, code, data, keys and identity information stored and used in a connected system. Figure 1 illustrates these measures in action. Figure 1: Local network security features in action The CC3220 Wi-Fi module actually integrates more than 25 additional security features to help provide tools that address potential thr...
    Read More
  • CC3220SF Wi-Fi module RF-WM-3220B1
    CC3220SF Wi-Fi module RF-WM-3220B1 Sep 15, 2018
    The post will briefly introduce what RF-WM-3220B1 WiFi module is, what features it has and where it is applied in. What is RF-WM-3220B1 WiFi module? RF-WM-3220B1 is a Wi-Fi IoT module built on basis of TI CC320SF IC, which is embedded with a Cortex-M4 MCU. It supports a variety of peripherals i.e. camera interface, I²S, SD/MMC, UART, SPI, I²C, ADC and GPIO. The module supports IEEE 802.11 b/g/n standards, and is able to work at Station, AP and Wi-Fi Direct modes. Antenna wise, it offers 3 options: ceramic antenna, IPEX base and antenna welding. RF-WM-3220B1 supports TCP/IP protocols and relevant applications. It can be widely applied in a big variety of IoT scenarios i.e. home automation, home appliance control, security systems, smart energy, internet gateway, industrial control, smart metering, wireless audio, wireless doorbell and sensor networking nodes etc. The module has two operation modes: AT Command Mode and Data Transparent Transmission Mode. With AT Command Mode, the developer can write a series of AT commands to route the transmission of the data. While in Data Transparent Transmission Mode, the modules automatically transmit the data by broadcasting the UDP packets with designated destinations. The developer or user does not have to instruct how the data transmission is routed in the latter mode. However, to switch between operation modes for the network or change the work mode of a module, the user has to use some simple AT commands to instruct the modules. Applications of RF-WM-3220B1 WiFi module Features of RF-WM-3220B1 WiFi module The module which works at Station mode can exchange data between any devices in the LAN, beside it can through a router to enter the internet, and communicate among remote devices. One module works at AP mode as TCP Server, and the other modules works at Station mode as TCP Client to communicate with it. Pin Assignment Package Size Module Thickness No. Parameter item Parameter details Description 1 Chip CC3220SF TI 2 Size 31*20mm - 3 Weight 5g - 4 Frequency Band 2402 MHz ~ 2480MHz   6 PCB 4-layer Impedance-matching, lead-free 7 Supply Voltage 2.3~3.6V DC The voltage higher than 3.6V is forbidden 8 Operation Range 100m Open area; +17dBm; 9 Max Power Max +17dBm 50mW 10 Power consumption Averge:1.AP Mode:74mA                                    2.STA mode Active:20mA                      3.STA Mode Always                                Connected(Long Sleep                          Intervals:400ms):1.5mA   4.STA Mode Hibernate:35uA 11 Communication interface IO See details in Pin definition 12 Antenna type PCB/IPEX 50Ω characteristic impedance/- 13 Operating temperature -40 ~ +85℃ Industrial-grade 14 Operating hum...
    Read More
  • Why ZigBee 3.0 module?
    Why ZigBee 3.0 module? Jul 03, 2018
    ZigBee 3.0 is the only complete and interoperable Internet of things solution, which enables intelligent products to work together from mesh network layer to general language layer. Why ZigBee 3.0 ZigBee 3.0 gives users and developers more options. The standardization of the whole stack covers chips from multiple chip suppliers, ZigBee Pro network protocol stack, and ZigBee cluster Library in application layer, bringing confidence that products and services can work together. ZigBee 3.0 complete solution includes testing, certification, brand and marketing support, making the development and sales of interoperable products and solutions easier, releasing growth opportunities, and giving unlimited innovation possibilities for home, work and travel. RF-star provides the most advanced ZigBee 3.0 module in the industry. Users can use the ZigBee 3.0 module of RF-star for secondary development or in-depth cooperative development with RF-star. ZigBee 3.0 advantages Interoperability Certification procedures ensure interoperability between devices Multi vendor ecosystem uses the same application layer common language ZigBee 3.0 network can be used for devices using previous application layer standards ZigBee 3.0 equipment can also be added to the network using the previous application layer standards Different industries, same plan Home, architecture, industry, retail, health, etc Developers and users in different fields have the same choice to solve the problem of market fragmentation The same application layer can meet the requirements of the complete deployment scheme Convenient and easy to use All the required files are in one place The same certification mark shall be used on each certified product and package Stable and reliable Proven mesh network, eliminating the impact of single node failure, can be expanded to large-scale network Self healing and scalable, capable of supporting a network of hundreds of devices Global general Use 2.4 GHz frequency band to ensure that the product can be deployed globally free of frequency band license fee Practice verification · 2500 certified products and 300 million deployed products Green environmental protection Specially designed for energy capture devices and ultra-low power consumption devices ZigBee routers all have green power proxy function to provide mesh network support for energy capture devices Future guarantee Developed by more than 400 member companies who have been deeply involved in the Internet of things industry for many years and launched to the market Continuous innovation - in our ecosystem, there are not only industry giants, established enterprises, but also start-ups and new forces Complete test The integrated test and authentication program covers all layers of protocol stack: MAC / PHY, network stack protocol and application layer Examples of ZigBee Application Equipment
    Read More
1 2

A total of 2 pages

Leave A Message

Leave A Message
If you are interested in our products and want to know more details, please leave a message here, we will reply you as soon as we can.