The Hiberfaker is offered by Hiber as a substitute for real Hiberband network connectivity when you do not have access to the Hiberband network, e.g. when you are working at your desktop. In this article, we describe step by step how the Hiberfaker can help you test your Hiber IoT device from end-to-end. The goal is to deliver the message you submit to the modem to Mission Control (hiber.cloud), via the Hiberfaker.
Make sure you have the following hardware ready:
- Hiber-enabled IoT device with 10 pin connector
Download or conform to the following software versions:
- Windows 7 or higher / MacOS 10.11 or higher / Linux Ubuntu 16.04 LTS or higher
- CP210x USB to UART driver (download)
- Hiberfaker utility (version 0.1):
Important: modem firmware version v0.9.5 required.
To test the complete end-to-end signal chain, the Hiberband modem should have firmware release v0.9.5.
You can check your version in the welcome message that is displayed when the modem reboots:
Hiber API (Build cn-release-v0.9.4-0-ge5cdfa46 @ Mon Aug 27 13:52:15 UTC 2018) - Ready
As you can see from this welcome message, this modem firmware needs to be updated.
Follow the instructions in this article to update your modem firmware with the Hiberfaker.
Step by step guide
- Download the latest Hiberfaker utility software (see links under "preparation")
- Extract the files from the downloaded ZIP archive
- Connect the ribbon cable coming from the Hiberfaker to the 10 pin connector
- Connect the black mini USB cable to your Hiberfaker
- The green LED should illuminate, and your operating system should detect your device
- Power-up your Hiberband device, keep the WKUP pin high, and keep RESET low.
- From the directory to which the files have been extracted, run the "hiber-faker" executable (.exe) or binary by double-clicking it or executing in a terminal on Linux (sudo ./hiber-faker)
- Wait for the terminal window to end with '-- UART -- Reading port'
- This means communication is established after a few seconds and the utility is waiting for a Hiberband message to be sent by your device
- Now set your payload (this should be automated in your prototype by e.g. a sensor trigger), an example sequence of input and response would look as follows:
- The Hiberfaker will pick up from here and pass your encrypted message to Mission Control (hiber.cloud). Log in to verify if your message was received successfully.
- The following screen recording shows the expected behavior, see the commands entered in at the top and the output of Hiberfaker Utility running at the bottom.
See the sequence diagram below under 'handshake between host and Hiberband modem' for more detail on what API commands to send and what responses to expect from the modem.
Handshake between host and Hiberband modem
When the Hiberfaker utility software is launched, you are ready to send your payload to the modem. After setting your payload, the HiberFaker will automatically detect the new payload and trigger a satellite pass-over. The desktop satellite will then pass your encrypted satellite message to Mission Control (hiber.cloud), where it is decrypted - as if it were an actual satellite message - and will trigger a webhook if this is set. A typical sequence diagram between the host and the modem looks as follows: