SlideShare a Scribd company logo
1 of 41
LoRa and LoRaWAN. Features of
technologies and usage recommendations
Bogdan Kostiv, Embedded Software Developer
Agenda
 LoRa general information;
 LoRaWAN basics;
 LoRaWAN device types and messages structure explanation;
 LoRaWAN security;
 LoRaWAN end-device activation;
 LoRaWAN server solutions;
LoRa
 LoRa is a proprietary spread spectrum modulation scheme that is derivative of Chirp Spread Spectrum
Modulation (CSS);
 LoRa is a PHY layer implementation and is agnostic with to higher-layer implementations;
Key features:
• Bandwidth Scalable (both bandwidth and frequency);
• Constant Envelope / Low-Power
• High Robustness
• Multipath / fading Resistant
• Doppler Resistant
• Long Range Capability
• Enhanced network capacity - (multiple spread signals can be transmitted at the same time and on the
same channel)
LoRa. Range vs Power
Source: https://lora.readthedocs.io/en/latest/
LoRa modulation
Source: https://lora.readthedocs.io/en/latest/
Chirp Spread Spectrum modulation (CSS)
LoRa packet structure
Typical LoRa modem employs two types of packet format, explicit and implicit. The explicit packet includes a short header
that contains information about the number of bytes, coding rate and whether a CRC is used in the packet.
The explicit header provides information on the payload, namely:
• The payload length in bytes.
• The forward error correction code rate.
• The presence of an optional 16-bits CRC for the payload.
LoRaWAN Networks
LoRaWAN classes
LoRaWAN device classes
LoRaWAN device class A
• The first receive window RX1 uses a frequency that is a function of the uplink frequency and a data rate
that is a function of the data rate used for the uplink.
• The second receive window RX2 uses a fixed configurable frequency and data rate. The frequency and
data rate used can be modified through MAC commands.
LoRaWAN device class B
In addition to Class A receive slots, class B device opens extra receive slots at
scheduled times.
LoRaWAN device class B, beacon-less temporary
operation
LoRaWAN device class C
LoRaWAN PHY structure
Uplink PHY
Downlink PHY
LoRaWAN MAC message format
MAC Header
LoRaWAN MAC payload format
Frame Header
FCtrl downlink frames Content
FCtrl uplink frames Content
Adaptive Data Rate Control
• If the uplink ADR bit is set, the network will control the data rate and Tx power of the end-device through
the appropriate MAC commands.
• If the ADR bit is not set, the network will not attempt to control the data rate nor the transmit power of the
end-device.
• When the downlink ADR bit is set, it informs the end-device that the Network Server is in a position to
send ADR commands. The device MAY set/unset the uplink ADR bit.
• When the downlink ADR bit is unset, it signals the end-device that the network temporarily cannot
estimate the best data rate.
Confirmed Data Feature
Confirmed Data and Frame Pending Features
LoRaWAN MAC port and application fields
FPort values:
• 0 indicates that the FRMPayload contains MAC commands only;
• 1..223 (0x01..0xDF) are application-specific;
• 224 is dedicated to LoRaWAN Mac layer test protocol;
• 225..255 (0xE1..0xFF) are reserved for future standardized application extensions;
Payload encryption keys:
MAC Commands for Class A Devices (R1.1)
MAC Commands for Class A Devices (R1.1)
MAC Commands for Class A Devices (R1.1)
MAC Commands for Class B Devices (R1.1)
MAC Commands for Class C Devices (R1.1)
LoRaWAN Security
Source: https://lora-alliance.org/sites/default/files/
2019-05/lorawan_security_whitepaper.pdf
LoRaWAN Security
Source: https://lora-alliance.org/sites/default/files/
2019-05/lorawan_security_whitepaper.pdf
LoRaWAN End-Device Activation (OTAA and ABP)
Over-The-Air Activation (OTAA) — end-devices follows a join procedure to participating in data exchanges
with the network server. An end-device has to go through a new join procedure every time it has lost the
session context information.
Activation by Personalization (ABP) — directly ties an end-device to a specific network. Activating an end-
device by personalization means that the device contains all required data/keys for communication. Join
request — join accept procedure is not needed for this type of activation.
LoRaWAN End-Device Activation (OTAA and ABP)
OTAA Pros:
• Session key generation during join procedure - better security;
• There is possibility to join to new network (re-join);
• Network settings can be specified during join procedure;
OTAA Cons:
• More complex procedure in comparing with ABP;
ABP Pros:
• Join procedure is not necessary;
ABP Cons:
• Less secure, since a chance of session key compromising is higher (improved in R1.1);
• The only way to update session keys is to re-flash end device.
LoRaWAN End-Device Activation Data
DevEUI - Device EUI, set by manufacturer, unique per device
AppEUI - Application EUI - identifies the end application (leplaced with JoinEUI)
AppKey - Application Key, used in OTAA to generate session keys
DevAddr - Device Address, identifies a device on a particular network
NwkSKey (R1.0) or NwkSEncKey, SNwkSIntKey, FnwkSIntKey (R1.1) - Network Session Key(s), encrypts the
packet metadata
AppSKey - Application Session Key, encrypts the packet payload
DevNonce - a random nonce sent from device to network during a join request to prevent rogue device re-
playing the join request
AppNonce - a nonce sent from network to device during a join response that allows the device to generate the
session keys
NetID - Network Identifier, uniquely identifies the network
LoRaWAN OTA End-Device Activation
LoRaWAN End-Device types and states
End-Device: DevAddr, AppSKey,
network session keys ( R1.1: SNwkSIntKey,
FNwkSIntKey, and NwkSEncKey;
R1.0: NwkSKey)
Network Server: DevAddr, network session
keys, App Serevr info
App Server: DevAddr, AppSKey
End-Device: DevEUI, AppKey(R1.0),
NwkKey(R1.1), AppEUI/JoinEUI.
Join Server: DevEUI, AppKey,
NwkKey,
App Server: no information is required
Semtech LoRaWAN Stack
The concept follows the Request-Confirm and Indication-Response architecture.
The LoRaMAC layer offers MCPS (MAC Common Part Sublayer) services, MLME (MAC layer
management entity) services and a MIB (MAC information base).
In general, the LoRaMAC layer utilizes MCPS services for data transmissions and data receptions, and
MLME services to manage the LoRaWAN network. The MIB is responsible to store important runtime
information and holds the configuration of the LoRaMAC layer.
Repository https://github.com/Lora-net/LoRaMac-
node
LoRaServer.io
LoRaServer.io
LoRaServer.io Main Features
• Device Class A, B and C support
• Adaptive data-rate support
• Live frame-logging
• Multi-tenant
• APIs and integration
• LoRaWAN 1.0 and 1.1 compatible
Thethingsnetwork.org
Thethingsnetwork.org
Thethingsnetwork.org
References
• https://lora-alliance.org/
• https://lora.readthedocs.io/en/latest/
• https://github.com/Lora-net (Semtech)
• https://www.loraserver.io/
• https://www.thethingsnetwork.org/
• https://www.youtube.com/watch?v=cUhAyyzlv2o&list=PLmL13yqb6OxdeOi97EvI8QeO8o-PqeQ0g
Thank you!
Questions?

More Related Content

What's hot

What's hot (20)

Iuwne10 S02 L05
Iuwne10 S02 L05Iuwne10 S02 L05
Iuwne10 S02 L05
 
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
LAN Switching and Wireless: Ch4 - VLAN Trunking Protocol (VTP)
 
Private VLANs
Private VLANsPrivate VLANs
Private VLANs
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
Segment Routing & Application Engeering Routing
Segment Routing & Application Engeering RoutingSegment Routing & Application Engeering Routing
Segment Routing & Application Engeering Routing
 
OTV Configuration
OTV ConfigurationOTV Configuration
OTV Configuration
 
Iuwne10 S02 L02
Iuwne10 S02 L02Iuwne10 S02 L02
Iuwne10 S02 L02
 
CCNA Exam 200-120 pdf
CCNA Exam 200-120 pdfCCNA Exam 200-120 pdf
CCNA Exam 200-120 pdf
 
Virtual LAN
Virtual LANVirtual LAN
Virtual LAN
 
Ch3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wirelessCh3 ccna exploration 3 lan switching and wireless
Ch3 ccna exploration 3 lan switching and wireless
 
Iuwne10 S02 L03
Iuwne10 S02 L03Iuwne10 S02 L03
Iuwne10 S02 L03
 
Day 14.2 inter vlan
Day 14.2 inter vlanDay 14.2 inter vlan
Day 14.2 inter vlan
 
Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)Dynamic ARP Inspection (DAI)
Dynamic ARP Inspection (DAI)
 
vlan
vlanvlan
vlan
 
Ccna3 mod9-vtp
Ccna3 mod9-vtpCcna3 mod9-vtp
Ccna3 mod9-vtp
 
Iuwne10 S01 L09
Iuwne10 S01 L09Iuwne10 S01 L09
Iuwne10 S01 L09
 
DHCP Snooping
DHCP SnoopingDHCP Snooping
DHCP Snooping
 
TechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the DatacenterTechWiseTV Workshop: Segment Routing for the Datacenter
TechWiseTV Workshop: Segment Routing for the Datacenter
 
Vlan
Vlan Vlan
Vlan
 
VLAN
VLANVLAN
VLAN
 

Similar to LoRa and LoRaWAN. Features of technologies and usage recommendations

LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in DepthAPNIC
 
LoRa Architecture for internet of things.pptx
LoRa Architecture for internet of things.pptxLoRa Architecture for internet of things.pptx
LoRa Architecture for internet of things.pptxkirtanchoudhary333
 
Unit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdfUnit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdf1ms21cs111
 
Mbed LoRaWAN stack: a case study - LoRa Alliance AMM Tokyo
Mbed LoRaWAN stack: a case study - LoRa Alliance AMM TokyoMbed LoRaWAN stack: a case study - LoRa Alliance AMM Tokyo
Mbed LoRaWAN stack: a case study - LoRa Alliance AMM TokyoJan Jongboom
 
internt of things 1.pptx
internt of things 1.pptxinternt of things 1.pptx
internt of things 1.pptxRiazAhmad521284
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerHolger Winkelmann
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to knowPaul Coomans
 
LoRaWAN class module and subsystem
LoRaWAN class module and subsystemLoRaWAN class module and subsystem
LoRaWAN class module and subsystemJian-Hong Pan
 
Class notes fhrp,hsrp
Class notes  fhrp,hsrpClass notes  fhrp,hsrp
Class notes fhrp,hsrpSagarR24
 
Class notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpClass notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpSagarR24
 
what is lorapan ,explanation of iot module with
what is lorapan ,explanation of iot module withwhat is lorapan ,explanation of iot module with
what is lorapan ,explanation of iot module withneelamsanjeevkumar
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsChristian Silva Espinoza
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)Jeff Green
 

Similar to LoRa and LoRaWAN. Features of technologies and usage recommendations (20)

LoRaWAN in Depth
LoRaWAN in DepthLoRaWAN in Depth
LoRaWAN in Depth
 
LoRa Architecture for internet of things.pptx
LoRa Architecture for internet of things.pptxLoRa Architecture for internet of things.pptx
LoRa Architecture for internet of things.pptx
 
Unit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdfUnit-3 -Low Bandwidth Communication.pdf
Unit-3 -Low Bandwidth Communication.pdf
 
Mbed LoRaWAN stack: a case study - LoRa Alliance AMM Tokyo
Mbed LoRaWAN stack: a case study - LoRa Alliance AMM TokyoMbed LoRaWAN stack: a case study - LoRa Alliance AMM Tokyo
Mbed LoRaWAN stack: a case study - LoRa Alliance AMM Tokyo
 
What is LoRaNET?
What is LoRaNET?What is LoRaNET?
What is LoRaNET?
 
internt of things 1.pptx
internt of things 1.pptxinternt of things 1.pptx
internt of things 1.pptx
 
FlowER Erlang Openflow Controller
FlowER Erlang Openflow ControllerFlowER Erlang Openflow Controller
FlowER Erlang Openflow Controller
 
6 FAQs About The LoRa Encryption
6 FAQs About The LoRa Encryption6 FAQs About The LoRa Encryption
6 FAQs About The LoRa Encryption
 
Lorawan: What you need to know
Lorawan: What you need to knowLorawan: What you need to know
Lorawan: What you need to know
 
LoRaWAN class module and subsystem
LoRaWAN class module and subsystemLoRaWAN class module and subsystem
LoRaWAN class module and subsystem
 
Class notes fhrp,hsrp
Class notes  fhrp,hsrpClass notes  fhrp,hsrp
Class notes fhrp,hsrp
 
Class notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrpClass notes fhrp,hsrp,vrrp
Class notes fhrp,hsrp,vrrp
 
what is lorapan ,explanation of iot module with
what is lorapan ,explanation of iot module withwhat is lorapan ,explanation of iot module with
what is lorapan ,explanation of iot module with
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
Lo ra
Lo raLo ra
Lo ra
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
denme
denmedenme
denme
 
LPWAN.pdf
LPWAN.pdfLPWAN.pdf
LPWAN.pdf
 
14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
 

More from Sigma Software

Fast is Best. Using .NET MinimalAPIs
Fast is Best. Using .NET MinimalAPIsFast is Best. Using .NET MinimalAPIs
Fast is Best. Using .NET MinimalAPIsSigma Software
 
"Are you developing or declining? Don't become an IT-dinosaur"
"Are you developing or declining? Don't become an IT-dinosaur""Are you developing or declining? Don't become an IT-dinosaur"
"Are you developing or declining? Don't become an IT-dinosaur"Sigma Software
 
Michael Smolin, "Decrypting customer's cultural code"
Michael Smolin, "Decrypting customer's cultural code"Michael Smolin, "Decrypting customer's cultural code"
Michael Smolin, "Decrypting customer's cultural code"Sigma Software
 
Max Kunytsia, “Why is continuous product discovery better than continuous del...
Max Kunytsia, “Why is continuous product discovery better than continuous del...Max Kunytsia, “Why is continuous product discovery better than continuous del...
Max Kunytsia, “Why is continuous product discovery better than continuous del...Sigma Software
 
Marcelino Moreno, "Product Management Mindset"
Marcelino Moreno, "Product Management Mindset"Marcelino Moreno, "Product Management Mindset"
Marcelino Moreno, "Product Management Mindset"Sigma Software
 
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"Sigma Software
 
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...Sigma Software
 
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”Sigma Software
 
Stoyan Atanasov “How crucial is the BA role in an IT Project"
Stoyan Atanasov “How crucial is the BA role in an IT Project"Stoyan Atanasov “How crucial is the BA role in an IT Project"
Stoyan Atanasov “How crucial is the BA role in an IT Project"Sigma Software
 
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...Sigma Software
 
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"Sigma Software
 
Business digitalization trends and challenges
Business digitalization trends and challengesBusiness digitalization trends and challenges
Business digitalization trends and challengesSigma Software
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Sigma Software
 
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”Sigma Software
 
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”Sigma Software
 
Training solutions and content creation
Training solutions and content creationTraining solutions and content creation
Training solutions and content creationSigma Software
 
False news - false truth: tips & tricks how to avoid them
False news - false truth: tips & tricks how to avoid themFalse news - false truth: tips & tricks how to avoid them
False news - false truth: tips & tricks how to avoid themSigma Software
 
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...Sigma Software
 
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...Sigma Software
 

More from Sigma Software (20)

Fast is Best. Using .NET MinimalAPIs
Fast is Best. Using .NET MinimalAPIsFast is Best. Using .NET MinimalAPIs
Fast is Best. Using .NET MinimalAPIs
 
"Are you developing or declining? Don't become an IT-dinosaur"
"Are you developing or declining? Don't become an IT-dinosaur""Are you developing or declining? Don't become an IT-dinosaur"
"Are you developing or declining? Don't become an IT-dinosaur"
 
Michael Smolin, "Decrypting customer's cultural code"
Michael Smolin, "Decrypting customer's cultural code"Michael Smolin, "Decrypting customer's cultural code"
Michael Smolin, "Decrypting customer's cultural code"
 
Max Kunytsia, “Why is continuous product discovery better than continuous del...
Max Kunytsia, “Why is continuous product discovery better than continuous del...Max Kunytsia, “Why is continuous product discovery better than continuous del...
Max Kunytsia, “Why is continuous product discovery better than continuous del...
 
Marcelino Moreno, "Product Management Mindset"
Marcelino Moreno, "Product Management Mindset"Marcelino Moreno, "Product Management Mindset"
Marcelino Moreno, "Product Management Mindset"
 
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
Andrii Pastushok, "Product Discovery in Outsourcing - What, When, and How"
 
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
Elena Turkenych “BA vs PM: Who' the right person, for the right job, with the...
 
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
Eleonora Budanova “BA+PM+DEV team: how to build the synergy”
 
Stoyan Atanasov “How crucial is the BA role in an IT Project"
Stoyan Atanasov “How crucial is the BA role in an IT Project"Stoyan Atanasov “How crucial is the BA role in an IT Project"
Stoyan Atanasov “How crucial is the BA role in an IT Project"
 
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
Olexandra Kovalyova, "Equivalence Partitioning, Boundary Values ​​Analysis, C...
 
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
Yana Lysa — "Decision Tables, State-Transition testing, Pairwase Testing"
 
VOLVO x HACK SPRINT
VOLVO x HACK SPRINTVOLVO x HACK SPRINT
VOLVO x HACK SPRINT
 
Business digitalization trends and challenges
Business digitalization trends and challengesBusiness digitalization trends and challenges
Business digitalization trends and challenges
 
Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"Дмитро Терещенко, "How to secure your application with Secure SDLC"
Дмитро Терещенко, "How to secure your application with Secure SDLC"
 
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
Яна Лиса, “Ефективні методи написання хороших мануальних тестових сценаріїв”
 
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
Тетяна Осетрова, “Модель зрілості розподіленної проектної команди”
 
Training solutions and content creation
Training solutions and content creationTraining solutions and content creation
Training solutions and content creation
 
False news - false truth: tips & tricks how to avoid them
False news - false truth: tips & tricks how to avoid themFalse news - false truth: tips & tricks how to avoid them
False news - false truth: tips & tricks how to avoid them
 
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
Анна Бойко, "Хороший контракт vs очікування клієнтів. Що вбереже вас, якщо вд...
 
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
Дмитрий Лапшин, "The importance of TEX and Internal Quality. How explain and ...
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 

LoRa and LoRaWAN. Features of technologies and usage recommendations

  • 1. LoRa and LoRaWAN. Features of technologies and usage recommendations Bogdan Kostiv, Embedded Software Developer
  • 2. Agenda  LoRa general information;  LoRaWAN basics;  LoRaWAN device types and messages structure explanation;  LoRaWAN security;  LoRaWAN end-device activation;  LoRaWAN server solutions;
  • 3. LoRa  LoRa is a proprietary spread spectrum modulation scheme that is derivative of Chirp Spread Spectrum Modulation (CSS);  LoRa is a PHY layer implementation and is agnostic with to higher-layer implementations; Key features: • Bandwidth Scalable (both bandwidth and frequency); • Constant Envelope / Low-Power • High Robustness • Multipath / fading Resistant • Doppler Resistant • Long Range Capability • Enhanced network capacity - (multiple spread signals can be transmitted at the same time and on the same channel)
  • 4. LoRa. Range vs Power Source: https://lora.readthedocs.io/en/latest/
  • 6. LoRa packet structure Typical LoRa modem employs two types of packet format, explicit and implicit. The explicit packet includes a short header that contains information about the number of bytes, coding rate and whether a CRC is used in the packet. The explicit header provides information on the payload, namely: • The payload length in bytes. • The forward error correction code rate. • The presence of an optional 16-bits CRC for the payload.
  • 10. LoRaWAN device class A • The first receive window RX1 uses a frequency that is a function of the uplink frequency and a data rate that is a function of the data rate used for the uplink. • The second receive window RX2 uses a fixed configurable frequency and data rate. The frequency and data rate used can be modified through MAC commands.
  • 11. LoRaWAN device class B In addition to Class A receive slots, class B device opens extra receive slots at scheduled times.
  • 12. LoRaWAN device class B, beacon-less temporary operation
  • 14. LoRaWAN PHY structure Uplink PHY Downlink PHY
  • 15. LoRaWAN MAC message format MAC Header
  • 16. LoRaWAN MAC payload format Frame Header FCtrl downlink frames Content FCtrl uplink frames Content
  • 17. Adaptive Data Rate Control • If the uplink ADR bit is set, the network will control the data rate and Tx power of the end-device through the appropriate MAC commands. • If the ADR bit is not set, the network will not attempt to control the data rate nor the transmit power of the end-device. • When the downlink ADR bit is set, it informs the end-device that the Network Server is in a position to send ADR commands. The device MAY set/unset the uplink ADR bit. • When the downlink ADR bit is unset, it signals the end-device that the network temporarily cannot estimate the best data rate.
  • 19. Confirmed Data and Frame Pending Features
  • 20. LoRaWAN MAC port and application fields FPort values: • 0 indicates that the FRMPayload contains MAC commands only; • 1..223 (0x01..0xDF) are application-specific; • 224 is dedicated to LoRaWAN Mac layer test protocol; • 225..255 (0xE1..0xFF) are reserved for future standardized application extensions; Payload encryption keys:
  • 21. MAC Commands for Class A Devices (R1.1)
  • 22. MAC Commands for Class A Devices (R1.1)
  • 23. MAC Commands for Class A Devices (R1.1)
  • 24. MAC Commands for Class B Devices (R1.1)
  • 25. MAC Commands for Class C Devices (R1.1)
  • 28. LoRaWAN End-Device Activation (OTAA and ABP) Over-The-Air Activation (OTAA) — end-devices follows a join procedure to participating in data exchanges with the network server. An end-device has to go through a new join procedure every time it has lost the session context information. Activation by Personalization (ABP) — directly ties an end-device to a specific network. Activating an end- device by personalization means that the device contains all required data/keys for communication. Join request — join accept procedure is not needed for this type of activation.
  • 29. LoRaWAN End-Device Activation (OTAA and ABP) OTAA Pros: • Session key generation during join procedure - better security; • There is possibility to join to new network (re-join); • Network settings can be specified during join procedure; OTAA Cons: • More complex procedure in comparing with ABP; ABP Pros: • Join procedure is not necessary; ABP Cons: • Less secure, since a chance of session key compromising is higher (improved in R1.1); • The only way to update session keys is to re-flash end device.
  • 30. LoRaWAN End-Device Activation Data DevEUI - Device EUI, set by manufacturer, unique per device AppEUI - Application EUI - identifies the end application (leplaced with JoinEUI) AppKey - Application Key, used in OTAA to generate session keys DevAddr - Device Address, identifies a device on a particular network NwkSKey (R1.0) or NwkSEncKey, SNwkSIntKey, FnwkSIntKey (R1.1) - Network Session Key(s), encrypts the packet metadata AppSKey - Application Session Key, encrypts the packet payload DevNonce - a random nonce sent from device to network during a join request to prevent rogue device re- playing the join request AppNonce - a nonce sent from network to device during a join response that allows the device to generate the session keys NetID - Network Identifier, uniquely identifies the network
  • 32. LoRaWAN End-Device types and states End-Device: DevAddr, AppSKey, network session keys ( R1.1: SNwkSIntKey, FNwkSIntKey, and NwkSEncKey; R1.0: NwkSKey) Network Server: DevAddr, network session keys, App Serevr info App Server: DevAddr, AppSKey End-Device: DevEUI, AppKey(R1.0), NwkKey(R1.1), AppEUI/JoinEUI. Join Server: DevEUI, AppKey, NwkKey, App Server: no information is required
  • 33. Semtech LoRaWAN Stack The concept follows the Request-Confirm and Indication-Response architecture. The LoRaMAC layer offers MCPS (MAC Common Part Sublayer) services, MLME (MAC layer management entity) services and a MIB (MAC information base). In general, the LoRaMAC layer utilizes MCPS services for data transmissions and data receptions, and MLME services to manage the LoRaWAN network. The MIB is responsible to store important runtime information and holds the configuration of the LoRaMAC layer. Repository https://github.com/Lora-net/LoRaMac- node
  • 36. LoRaServer.io Main Features • Device Class A, B and C support • Adaptive data-rate support • Live frame-logging • Multi-tenant • APIs and integration • LoRaWAN 1.0 and 1.1 compatible
  • 40. References • https://lora-alliance.org/ • https://lora.readthedocs.io/en/latest/ • https://github.com/Lora-net (Semtech) • https://www.loraserver.io/ • https://www.thethingsnetwork.org/ • https://www.youtube.com/watch?v=cUhAyyzlv2o&list=PLmL13yqb6OxdeOi97EvI8QeO8o-PqeQ0g