Electric imp IMP001

From WikiDevi.Wi-Cat.RU
Jump to navigation Jump to search

electric imp IMP001

Manuf (OEM/ODM): Lite-On

FCC approval date: 19 July 2012
UPC: 713757100014 (UPC DB, On eBay)
Country of manuf.: China

Amazon image

ASINs
B009K2ILKK (Flag of the United States.svg, On Amazon, On CCC)
B00G3IJ6GM (Flag of the United States.svg, On Amazon, On CCC)
B01N47J61L (Flag of the United States.svg, On Amazon, On CCC)

Type: module

FCC ID: PPQ-IMP001
IC ID: 4491A-IMP001

Power: ? VDC, ? A

CPU1: STMicroelectronics STM32F205 (120 MHz)
FLA1: 1 MiB1,048,576 B <br />8,192 Kib <br />1,024 KiB <br />8 Mib <br />9.765625e-4 GiB <br /> (STMicroelectronics STM32F205)
RAM1: 128 KiB 0.125 MiB <br />131,072 B <br />1,024 Kib <br />1 Mib <br />1.220703e-4 GiB <br /> (STMicroelectronics STM32F205)

Expansion IFs: SD Card
Serial: yes

WI1 chip1: Broadcom BCM43362
WI1 802dot11 protocols: bgn
WI1 MIMO config: 1x1:1
WI1 antenna connector: none

bgn

802dot11 OUI: 0C:2A:69 (-, 1 W)

For a list of all currently documented Broadcom chipsets with specifications, see Broadcom.
For a list of all currently documented STMicro chipsets with specifications, see STMicro.


WiFi IoT Module in SD Card form factor

The labels "EEL_BCM43362_A" and "323C1627834D" are

silkscreened on the bottom side of the board.
SoC: ARM Cortex-M3 MCU (120MHz max, 32-bit Core)
with Adaptive real-time accelerator (ART. Accelerator)
1MB Flash memory, MPU, UART, I²C, CAN, SDIO, USB OTG

Serial

There are a number of test pads available on the bottom of

the board which can be used to access the bootloader.

You can interface with it using any 3.3V TTL RS-232 interface

and stm32loader code. The wiring required:
Pin name on board RS232 pin Notes
MCU_NRST DTR
MCU_BOOT0 RTS
PIN1 RXD On SD card, this is UART3_TXD
PIN2 TXD On SD card, this is UART3_TXD
 sudo ./stm32loader.py -p /dev/ttyUSB0 -V
 Open port /dev/ttyUSB0, baud 115200
 *** Get command
     Bootloader version: 0x30
     Available commands: 0x63, 0x73, 0x82, 0x92
 Bootloader version 30
 *** GetID command
 Chip id: 0x0411 (STM32F2xx)
 ***

Do NOT send the Readout Unprotect command (0x92) to the chip,

it will erase the entire flash bricking the device!

Refer to AN1355 for details about the bootloader protocol.

See also