This document provides an overview of Sigfox technology, including Sigfox networks, protocols, modules, services, security features, and backend APIs. Key points covered include Sigfox's ultra narrow band technology, lightweight protocol supporting small payload messages, global network coverage, and web-based backend interfaces for accessing device and message data through APIs. Examples are given of configuring callbacks and using REST clients to test the Sigfox backend APIs.
Full overview of the Sigfox Service
Some details are proper to the Sigfox Radio Configuration 2 (USA - Mexico - Brazil) : Frequency & spetcrum occupation
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFHarshal Solao
I propose a novel vertical handoff algorithm which uses received SINR from various access networks as the handoff criteria. This algorithm consider the combined effects of SINR from different access networks with SINR value from one network being converted to equivalent SINR value to the target network, so the handoff algorithm can have the knowledge of achievable bandwidths from both access networks to make handoff decisions with QoS consideration.
Full overview of the Sigfox Service
Some details are proper to the Sigfox Radio Configuration 2 (USA - Mexico - Brazil) : Frequency & spetcrum occupation
OPTIMIZING PERFORMANCE OF 4G NETWORK USING VERTICAL HANDOFFHarshal Solao
I propose a novel vertical handoff algorithm which uses received SINR from various access networks as the handoff criteria. This algorithm consider the combined effects of SINR from different access networks with SINR value from one network being converted to equivalent SINR value to the target network, so the handoff algorithm can have the knowledge of achievable bandwidths from both access networks to make handoff decisions with QoS consideration.
Bluetooth 5 is the most significant update to the Bluetooth specification since the introduction of Bluetooth low energy. With the launch of Bluetooth 5, the technology continues to evolve to meet the needs of the industry as the global wireless standard for simple, secure connectivity. With 4x range, 2x speed and 8x broadcasting message capacity, the enhancements of Bluetooth 5 focus on increasing the functionality of Bluetooth for the IoT.
Explore the new capabilities of Bluetooth 5 and how to get the most out of it using the new EFR32 Blue Gecko SoCs.
On-demand webinar: http://bit.ly/2t3Szeg
Whitepaper: http://bit.ly/2sLCYAv
Chuyên cung cấp giải pháp VOIP, Call Center, Contact Center
TIME TRUE LIFE TECHNOLOGY JOINT STOCK COMPANY
Mr Long
Mobi: 0986883886 - 0905710588
Email: long.npb@ttlcorp.vn
Website: ttlcorp.vn
This updated presentation/video looks at 5G Network Architecture options that have been proposed by 3GPP for deployment of 5G. It covers the Standalone (SA) and Non-Standalone (NSA) architecture. In the NSA architecture, EN-DC (E-UTRA-NR Dual Connectivity), NGEN-DC (NG-RAN E-UTRA-NR Dual Connectivity) and NE-DC (NR-E-UTRA Dual Connectivity) has been looked at. Finally, migration strategies proposed by vendors and operators (MNOs / SPs) have been discussed.
Antenna design for sigfox ready devices recommendation guideSigfox
In this document, several aspects of antenna design and integration are developed. The document focuses on SIGFOX IOT application and small form factor devices.
The importance of implementing a high-performance antenna in a device is demonstrated by analyzing the SIGFOX radio link budget.
Theories are then developed to explain why antennas can be extremely sensitive to their environment and may therefore have varying performance (e.g. when held compared to standing alone). Using the same arguments, it is shown that the same antenna can have different behavior when implemented in two distinct device architectures. This leads to an initial finding that for each device development, a specific antenna design, or at least antenna tuning, must be carried out.
Then, the most important physical parameters that impact antenna characteristics and behavior are presented. Several typical antenna topologies, miniaturization techniques, and manufacturing techniques applicable to SIGFOX IOT applications and small form factor devices are listed.
Advice regarding off-the-shelf antennas is given to explain why antenna performance depicted in datasheets may differ from “real-life implementation” performance.
A selection tool will help the reader to select the best antenna topology for the device, based on several parameters such as expected performance, integration or miniaturization level, and design complexity.
To close the document, a simple method that roughly estimates devices radiated performance is given. This method does not involve very expensive equipment, such as anechoic chambers, and is relatively easy to set up.
Squire Technologies: Media Gateway Presentation.
The SVI_MG SS7 Media Gateway enables cost effective, scaleable SS7 and PSTN network breakout to VoIP / 4G / LTE networks, allowing carriers to realise the cost and performance benefits of integrating into an SS7 network.
The SVI_MG range of Media Gateways are a fully featured, carrier-grade product with a flexible and powerful routing engine, offered in 2 models 1000 and 8000 to satisfy clients deployment requirements and budget.
Intermediate: Security in Mobile Cellular Networks3G4G
A brief presentation looking at how Security has evolved in the mobile cellular networks from 2G to 4G. This is a very high level presentation but links are provided for anyone interested in studying this topic in detail.
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
Telecom security is way more than SIP-breaking some peripheral PBXs and raking a few thousands of dollars of free calls. From the formerly closed garden of SS7 to new all-IP telecom protocols such as Diameter and LTE protocols, the telecom domain faces now both the challenges of availability -one minute of downtime costs literally millions- and signaling vulnerabilities cutting down entire countries, causing massive frauds and the all new networking protocols. These new telecom protocols are rolled out in IP-centric fashion, with its myriad of standard IP security pitfalls and vulnerabilities, as well as very specific telecom vulnerabilities. The HLR is not only using TCP/IP for OAM and business workflow, but also now being named an HSS, it uses IP-only protocols such as Diameter for its Core Network signaling operations. That means that now telecom are facing new security risks both in term of exposure and threats, with its Core Network being exposed to unsophisticated IP-centered attackers, and the continuous waves of telecom-centered defrauders. In this presentation, we'll demo the new technologies of 3G and LTE networks and how to attack and defend them. We'll also show what kind of exposure one telecom companies, Mobile Network Operators and SS7 providers shows to external attackers.
Recent advances in Broadcasting standards and research3G4G
Dr. Belkacem Mouhouche – Samsung Electronics
Chief Standards Engineer
Technical Manager of 5G projects: 5G-Xcast and 5G-Tours
Presented in IEEE 5G Summit Istanbul, June 2019
*** SHARED WITH PERMISSION ***
All our slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Colloque Enseignants IUT GEII (Génie Electronique et Informatique Industrielle)
Premiers pas sur le réseau Sigfox
* Utilisation d'une carte Arduino MKRFOX 1200 pour envoyer de premiers messages sur le réseau
* Utilisation d'une plateforme IoT pour recevoir et visualiser les données
Bluetooth 5 is the most significant update to the Bluetooth specification since the introduction of Bluetooth low energy. With the launch of Bluetooth 5, the technology continues to evolve to meet the needs of the industry as the global wireless standard for simple, secure connectivity. With 4x range, 2x speed and 8x broadcasting message capacity, the enhancements of Bluetooth 5 focus on increasing the functionality of Bluetooth for the IoT.
Explore the new capabilities of Bluetooth 5 and how to get the most out of it using the new EFR32 Blue Gecko SoCs.
On-demand webinar: http://bit.ly/2t3Szeg
Whitepaper: http://bit.ly/2sLCYAv
Chuyên cung cấp giải pháp VOIP, Call Center, Contact Center
TIME TRUE LIFE TECHNOLOGY JOINT STOCK COMPANY
Mr Long
Mobi: 0986883886 - 0905710588
Email: long.npb@ttlcorp.vn
Website: ttlcorp.vn
This updated presentation/video looks at 5G Network Architecture options that have been proposed by 3GPP for deployment of 5G. It covers the Standalone (SA) and Non-Standalone (NSA) architecture. In the NSA architecture, EN-DC (E-UTRA-NR Dual Connectivity), NGEN-DC (NG-RAN E-UTRA-NR Dual Connectivity) and NE-DC (NR-E-UTRA Dual Connectivity) has been looked at. Finally, migration strategies proposed by vendors and operators (MNOs / SPs) have been discussed.
Antenna design for sigfox ready devices recommendation guideSigfox
In this document, several aspects of antenna design and integration are developed. The document focuses on SIGFOX IOT application and small form factor devices.
The importance of implementing a high-performance antenna in a device is demonstrated by analyzing the SIGFOX radio link budget.
Theories are then developed to explain why antennas can be extremely sensitive to their environment and may therefore have varying performance (e.g. when held compared to standing alone). Using the same arguments, it is shown that the same antenna can have different behavior when implemented in two distinct device architectures. This leads to an initial finding that for each device development, a specific antenna design, or at least antenna tuning, must be carried out.
Then, the most important physical parameters that impact antenna characteristics and behavior are presented. Several typical antenna topologies, miniaturization techniques, and manufacturing techniques applicable to SIGFOX IOT applications and small form factor devices are listed.
Advice regarding off-the-shelf antennas is given to explain why antenna performance depicted in datasheets may differ from “real-life implementation” performance.
A selection tool will help the reader to select the best antenna topology for the device, based on several parameters such as expected performance, integration or miniaturization level, and design complexity.
To close the document, a simple method that roughly estimates devices radiated performance is given. This method does not involve very expensive equipment, such as anechoic chambers, and is relatively easy to set up.
Squire Technologies: Media Gateway Presentation.
The SVI_MG SS7 Media Gateway enables cost effective, scaleable SS7 and PSTN network breakout to VoIP / 4G / LTE networks, allowing carriers to realise the cost and performance benefits of integrating into an SS7 network.
The SVI_MG range of Media Gateways are a fully featured, carrier-grade product with a flexible and powerful routing engine, offered in 2 models 1000 and 8000 to satisfy clients deployment requirements and budget.
Intermediate: Security in Mobile Cellular Networks3G4G
A brief presentation looking at how Security has evolved in the mobile cellular networks from 2G to 4G. This is a very high level presentation but links are provided for anyone interested in studying this topic in detail.
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
Telecom security is way more than SIP-breaking some peripheral PBXs and raking a few thousands of dollars of free calls. From the formerly closed garden of SS7 to new all-IP telecom protocols such as Diameter and LTE protocols, the telecom domain faces now both the challenges of availability -one minute of downtime costs literally millions- and signaling vulnerabilities cutting down entire countries, causing massive frauds and the all new networking protocols. These new telecom protocols are rolled out in IP-centric fashion, with its myriad of standard IP security pitfalls and vulnerabilities, as well as very specific telecom vulnerabilities. The HLR is not only using TCP/IP for OAM and business workflow, but also now being named an HSS, it uses IP-only protocols such as Diameter for its Core Network signaling operations. That means that now telecom are facing new security risks both in term of exposure and threats, with its Core Network being exposed to unsophisticated IP-centered attackers, and the continuous waves of telecom-centered defrauders. In this presentation, we'll demo the new technologies of 3G and LTE networks and how to attack and defend them. We'll also show what kind of exposure one telecom companies, Mobile Network Operators and SS7 providers shows to external attackers.
Recent advances in Broadcasting standards and research3G4G
Dr. Belkacem Mouhouche – Samsung Electronics
Chief Standards Engineer
Technical Manager of 5G projects: 5G-Xcast and 5G-Tours
Presented in IEEE 5G Summit Istanbul, June 2019
*** SHARED WITH PERMISSION ***
All our slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Colloque Enseignants IUT GEII (Génie Electronique et Informatique Industrielle)
Premiers pas sur le réseau Sigfox
* Utilisation d'une carte Arduino MKRFOX 1200 pour envoyer de premiers messages sur le réseau
* Utilisation d'une plateforme IoT pour recevoir et visualiser les données
IoT Workshop with Sigfox & Arduino - Copenhagen Business SchoolNicolas Lesconnec
Hands On IoT Workshop, using an Arduino MKRFOX board
(March 2019)
First steps on the Sigfox network :
* Send first messages
* Use the Sigfox Cloud to check incoming data
* Set up first callbacks to push data
* Complex frame handling
* Downlink communication
* Event monitoring
Sigfox discovery workshop using an Arduino MKRFOX board.
* Getting started with the MKRFOX
* Getting started with the Sigfox Cloud
* First messages over the Sigfox network
* Downlink feature
* Callback settings
* Events configuration
* IFTTT demo
* API configuration
Session held in Cape Town on November 8th, 2017
ST tech tour - sigfox presentation & hands-on dempFrançois Oudot
This presentations was given at the ST tech tour of Chicago and Seattle. It introduces sigfox and go through the first steps of getting your hands on the ST devkit and the sigfox backend.
Sigfox Workshop in Torino - Nov 26th
Full presentation of the Sigfox service : basics, radio protocol & properties, uplink/downlink communications, security, hardware solutions, cloud service, current use cases in production, ...
+ Support slides for technical workshop with SmartEverything boards
Squire Technologies: Media Gateway Controller Function Presentation.
The SVI_MGCF Media Gateway Controller Function provides a gateway between traditional Circuit Switched SS7 networks and next generation IMS networks such as LTE/ VoLTE.
The SVI-MGCF provides a fully 3GPP compliant Media Gateway Control Function extending Squire Technologies existing SVI-MGC SS7 Media Gateway Controller product utilising the rich heritage of functionality developed over 10 years of global deployment.
The SVI-MGCF provides conversion between SS7-ISUP signalling, SIP-I, SIP-T and traditional and IMS compliant SIP using H.248 MEGACO to control media gateways and DIAMETER to record charging information.
Overview of the Sigfox Technology & Services
Used as support for a webinar to Sigfox partners (Universities, Developers & Startups) : https://www.youtube.com/watch?v=I1PaypiGO4Q
Low power wireless technologies for connecting embedded sensors in the IoT: A...Gilles Callebaut
Embedded sensors are enabling a wide range of emerging smart services in domains ranging from
healthcare to smart homes and cities. They are waiting to be connected to the internet and rapidly
becoming crucial components of a valuable Internet of Things (IoT).
The variety of wireless sensor system applications demands appropriate wireless connectivity.
Several new technologies and standards are popping up, fit for short or large range, and various data
rate requirements. Dedicated networks are being deployed for Machine Type Communication.
This tutorial will bring a theoretical and practical initiation of wireless technologies tailored for connecting
embedded sensors. It will explain fundamental concepts of wireless propagation, highlighting the
challenges and opportunities to realize low power connections. Several actual technologies and
standards for different categories of connections will be introduced. A few illustrative use cases will be
presented. A hands-on session will allow the participants to experiment with EFM32 Happy Gecko
developer boards, cooperating in small teams. In a final session, a glance at future trends will be
given. The tutorial will be concluded with an overview of interesting relevant resources and a discussion
with the participants on the expectations for follow up beyond the tutorial.
Secure Cloud Networking – Beyond Cloud Boundaries. When you are learning cloud, networking examples are just complicated enough to get you exposed to the networking fundamentals of that cloud. Real-life is quite a bit different. Matt Kazmar, Rod Stuhlmuller, Corbin Louks and Mark Cunningham from Aviatrix walks us through the complications of cloud networking, especially those encountered beyond one cloud.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
5. • Sigfox: Global LPWA network
Low power,
to provide autonomy
Global,
to be used everywhere
Low cost,
Low power,
to provide autonomy
Global,
to be used everywhere
Low cost,Low cost,
to address everything
Easy to use,
and adopted quickly
Low cost,
to address everything
Easy to use,
and adopted quickly
5
12. WHAT DO WE PROVIDE?
A network for connected objects transporting the data from your device to your IT systems
Customer ITBig Data
analytics
platforms
Object data Transmitted
through its radio
protocol on the
public spectrum
Global
network
SIGFOX
cloud
Partners with
specific
applications for
your business
Data storage
and
intelligence for
verticals
Identification
and
authentication
integrity
0 to 12-byte
messages
optimized for
sensor data
High capacity
network: over 1
million messages
per Base station
per day
0 to 140
messages per
day per device
12
18. Sigfox Uplink data payload
Less is more !
GPS coordinates (lat x lng) : 6 bytes
Temperature: 2 bytes
State reporting : 1 byte
Heartbeat, update request : 0 byte Keep it as simple as possible
18
24. Sigfox Ultra narrow band technology
Anti-jamming capabilities due to UNB intrinsic ruggedness coupled with spatial diversity of the base stations (+20dB)
HIGH RESILIENCE TO INTERFERERS
robust to operate in the public ism band
8 dB needed for
the signal to be
Jamming signal
✓✓
For the same technical reasons as above, UNB is extremely robust in an environment with other spread
spectrum signals. However, Spread spectrum networks are affected by UNB signals. Ultra Narrow Band is
therefore the best choice to operate in the public ISM band
the signal to be
received
✓✓
Interference
impact
24
45. Sigfox backend cloud access interfaces
API, to request, create or alter a specific data
through HTTP request. The originator of the
request is a computer running a computer
program, to do specific tasks. Most of theprogram, to do specific tasks. Most of the
data operations are available through API,
such as group creation, device registration,
callback creation, etc.
45
46. Sigfox backend cloud access interfaces
Following API documentation, the REST principle
(usage of POST, GET, DELETE, PUT HTTP requests) is
use for Sigfox API: any access to APIs is done
through an authenticated HTTPS request, with the
API usage
through an authenticated HTTPS request, with the
URL shown in the documentation, and the
potential parameters as explained in the
documentation.
46
59. Sigfox Uplink messages callback message to HTTP Restful call
Callback types
Each callback type shares a set of common variables :
time (int) :the event timestamp (in seconds since the Unix Epoch)
UPLINK
This subtype does not define any additional variable.
BIDIR
59
ack (bool): true if this message needs to be acknowledged, false else.
The client can decide not to send any answer to the device. There are 2 ways to do so :
respond to the callback with the HTTP NO_CONTENT code (204).
respond with a json data containing the noData field ex :
{ "0CB3" :
{
"noData" : true
}
}
60. Sigfox Uplink messages callback message to HTTP Restful call
DATA
device (string): device identifier (in hexadecimal – up to 8 characters <=> 4 bytes)
duplicate (bool): «true» if the message is a duplicate one, meaning that the backend has already
processed this message from a different base station, «false» otherwise.
snr (float): the signal to noise ratio (in dB – Float value with two maximum fraction digits)
rssi (float): the RSSI (in dBm – Float value with two maximum fraction digits). If there is no data
to be returned, then the value is null.
avgSnr (float): the average signal to noise ratio computed from the last 25 messages (in dB –
Float value with two maximum fraction digits) or «N/A». The device must
60
Float value with two maximum fraction digits) or «N/A». The device must
have send at least 15 messages.
station (string): the base station identifier (in hexadecimal – 4 characters <=> 2 bytes)
data (string): the user data (in hexadecimal)
lat (float): the latitude, rounded to the nearest integer, of the base station which received the
message
lng (float): the longitude, rounded to the nearest integer, of the base station which received the
message
seqNumber (int): the sequence number of the message if available
71. Simply create a SERVICE > GEOLOC callback, and
receive latitude + longitude + accuracy
71
72. • Create a new
Service > Geoloc
callback
• Use following URL
to center the map:
• https://maps.googleapis.com/ma
ps/api/staticmap?center={lat},{ln
Sigfox Geoloc callback
ps/api/staticmap?center={lat},{ln
g}&zoom=13&scale=1&size=600x
300&maptype=roadmap&format
=png&visual_refresh=true
72
75. Monitor break in sequence number
• New Event: Device > Event Configuration > New
• Select Event Type « Out of message sequence »
• Select « EMAIL » as channel and enter your email
address and email contentaddress and email content
75
76. Monitor break in sequence number
• Remove the antenna to simulate a
coverage issue
• Send a message
• Re-attach the antenna and send a new
message
• Check reception of email notification
76
103. Add a New Device:
https://www.youtube.com/watch?v=Kphi4j1JGec&list=PLcw1TnahFRW-dpqGwxa3noSMLP_nTEhdb&index=5
See The Device Messages:
https://www.youtube.com/watch?v=xJIzvg70UEg&index=6&list=PLcw1TnahFRW-dpqGwxa3noSMLP_nTEhdb
Add a Callback:
https://www.youtube.com/watch?v=dDNY-xAxECE&list=PLcw1TnahFRW-dpqGwxa3noSMLP_nTEhdb&index=7
Add a New User:
Sigfox Technology Overview Video summary #2
Add a New User:
https://www.youtube.com/watch?v=-FHk25dfIEA&list=PLcw1TnahFRW-dpqGwxa3noSMLP_nTEhdb&index=8
Integrate API's:
https://www.youtube.com/watch?v=qqSkoopzoJw&list=PLcw1TnahFRW-dpqGwxa3noSMLP_nTEhdb&index=9
Check Coverage With The Service Map:
https://www.youtube.com/watch?v=Oike19mLoYU&list=PLcw1TnahFRW-dpqGwxa3noSMLP_nTEhdb&index=10
103