/* * Copyright (c) 2015, SICS Swedish ICT. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. * */ #ifndef __PROJECT_CONF_H__ #define __PROJECT_CONF_H__ /* Set to enable TSCH security */ #ifndef WITH_SECURITY #define WITH_SECURITY 0 #endif /* WITH_SECURITY */ /*******************************************************/ /********* Enable RPL non-storing mode *****************/ /*******************************************************/ #define UIP_CONF_MAX_ROUTES 0 /* No need for routes */ #define RPL_CONF_MOP RPL_MOP_NON_STORING /* Mode of operation*/ #define ORCHESTRA_CONF_RULES { &eb_per_time_source, &unicast_per_neighbor_rpl_ns, &default_common } /* Orchestra in non-storing */ /*******************************************************/ /********************* Enable TSCH *********************/ /*******************************************************/ /* TSCH and RPL callbacks */ #define RPL_CALLBACK_PARENT_SWITCH tsch_rpl_callback_parent_switch #define RPL_CALLBACK_NEW_DIO_INTERVAL tsch_rpl_callback_new_dio_interval #define TSCH_CALLBACK_JOINING_NETWORK tsch_rpl_callback_joining_network #define TSCH_CALLBACK_LEAVING_NETWORK tsch_rpl_callback_leaving_network /* Needed for CC2538 platforms only */ /* For TSCH we have to use the more accurate crystal oscillator * by default the RC oscillator is activated */ #define SYS_CTRL_CONF_OSC32K_USE_XTAL 1 /* Needed for cc2420 platforms only */ /* Disable DCO calibration (uses timerB) */ #define DCOSYNCH_CONF_ENABLED 0 /* Enable SFD timestamps (uses timerB) */ #define CC2420_CONF_SFD_TIMESTAMPS 1 /* Enable Sixtop Implementation */ #define TSCH_CONF_WITH_SIXTOP 1 /*******************************************************/ /******************* Configure TSCH ********************/ /*******************************************************/ /* IEEE802.15.4 PANID */ #define IEEE802154_CONF_PANID 0xabcd /* Do not start TSCH at init, wait for NETSTACK_MAC.on() */ #define TSCH_CONF_AUTOSTART 0 /* 6TiSCH schedule length */ #define TSCH_SCHEDULE_CONF_DEFAULT_LENGTH 11 #if WITH_SECURITY /* Enable security */ #define LLSEC802154_CONF_ENABLED 1 /* TSCH uses explicit keys to identify k1 and k2 */ #define LLSEC802154_CONF_USES_EXPLICIT_KEYS 1 /* TSCH uses the ASN rather than frame counter to construct the Nonce */ #define LLSEC802154_CONF_USES_FRAME_COUNTER 0 #endif /* WITH_SECURITY */ /*******************************************************/ /************* Other system configuration **************/ /*******************************************************/ #if CONTIKI_TARGET_Z1 /* Save some space to fit the limited RAM of the z1 */ #define UIP_CONF_TCP 0 #define QUEUEBUF_CONF_NUM 2 #define RPL_NS_CONF_LINK_NUM 2 #define NBR_TABLE_CONF_MAX_NEIGHBORS 2 #define UIP_CONF_ND6_SEND_NA 0 #define SICSLOWPAN_CONF_FRAG 0 #if WITH_SECURITY /* Note: on sky or z1 in cooja, crypto operations are done in S/W and * cannot be accommodated in normal slots. Use 65ms slots instead, and * a very short 6TiSCH minimal schedule length */ #define TSCH_CONF_DEFAULT_TIMESLOT_LENGTH 65000 #define TSCH_SCHEDULE_CONF_DEFAULT_LENGTH 2 #endif /* WITH_SECURITY */ #endif /* CONTIKI_TARGET_Z1 */ #if CONTIKI_TARGET_CC2538DK || CONTIKI_TARGET_ZOUL || \ CONTIKI_TARGET_OPENMOTE_CC2538 #define TSCH_CONF_HW_FRAME_FILTERING 0 #endif /* CONTIKI_TARGET_CC2538DK || CONTIKI_TARGET_ZOUL \ || CONTIKI_TARGET_OPENMOTE_CC2538 */ #endif /* __PROJECT_CONF_H__ */