SlideShare a Scribd company logo
AN OVERVIEW OF
LoRa, SigFox, and IEEE
802.11ah
Faheem Zafari
Computer & Information Technology
Purdue University
faheem0@purdue.edu
AGENDA
• LoRa
• SigFox
• IEEE 802.11ah
• Differences between LoRa, SigFox, IEEE 802.11ah
• Use cases
• Problem with IEEE 802.11ah
• Co-existence problem
LoRa
• Physical Layer LPWAN solution
• High range (max 15km), low power, low data rate (0.3-
37.5 kbps), wideband, sub-GHz
• The architecture consists of
• LoRa end-devices
• LoRa Gateways
• LoRa Network Servers (NetServer)
Taken from Centenaro et al.
LoRa
• The MAC layer is basically ALOHA protocol controlled by
the LoRa NetServer.
• The LoRa MAC is designed to mimic IEEE 802.15.4 Mac
to allow the accommodation of other protocols such as
CoAP, 6LoWPAN etc.
Taken from Centenaro et al.
• SIGFOX
• First LPWAN technology.
• The physical layer uses
Ultra-Narrow Band (UNB)
wireless modulation.
• Network layer protocols
are ‘secret sauce’.
• Low throughput (~100
bps), low power, extended
range (up to 50 km).
• The end device must use
SIGFOX modem to
connect to the SIGFOX
network
• The device should initiate
the communication.
• IEEE 802.11ah
• Physical layer based on 802.11ac.
• Low Data Rate (~100kpbs), extended range (up to 1km),
low energy consumption, sub-GHz.
• One hop network topology.
• Supports MIMO, Single user beamforming etc on the
Physical layer.
• Three different types of stations supported
• Traffic Indication Map (TIM): Listens to AP for data transfer
• Non-TIM stations: Directly negotiate with AP during
association process to obtain transmission time on Periodic
Restricted Access Window (PRAW)
• Unscheduled Stations: does not listen to any beacons and
uses poll to access channels.
• IEEE 802.11ah
MAIN DIFFERENCES
Parameter LoRa Sigfox IEEE 802.11ah
Data rate (kbps) 0.3-37.5 0.1 >100
Coverage (km) Rural: 10-15
Urban: 3-5
Rural: 30-50
Urban: 3-10
1
Nodes per BS ≈ 104
≈ 106 8191
Frequency (MHz) Various,
Sub-Ghz
969 or 902 902-928 (US)
Initiation Both node
and
NetServer
Device Both device
and the AP
Energy
Consumption
Very low low slightly higher
Dedicated
Network
No Yes No
USE CASES
Technology Use Cases
LoRa Garbage collection bin fill level for pick up
route optimization
Sigfox Smart meters, smoke detectors
IEEE 802.11 ah Backhaul network for Sensors, Video
Surveillance, wearable consumer
electronics
PROBLEM WITH IEEE 802.11ah
• As pointed out by Adame et al., a potential challenge in
802.11ah is the performance of Non-TIM and
unscheduled stations, and their integration with TIM
stations in a single WLAN. The problem is interesting to
explore for further research.
• The number of stations that IEEE 802.11ah is also much
lesser than Sigfox and LoRa.
COEXISTENCE PROBLEM
• One of the problems with the coexistence of Sigfox and
LoRa is that, Sigfox is based on UNB sub-GHz while
LoRa is wideband sub-GHz. The wideband solution is
prone to the interference from UNB technologies. This
problem can be interesting to explore for further research.
REFERENCES
• Adame, T., Bel, A., Bellalta, B., Barcelo, J., & Oliver, M. (2014). IEEE
802.11 AH: the WiFi approach for M2M communications. Wireless
Communications, IEEE, 21(6), 144-152
• Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2015). Long-
Range Communications in Unlicensed Bands: the Rising Stars in
the IoT and Smart City Scenarios. arXiv preprint arXiv:1510.00620.
• Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2015). Long-
Range Communications in Unlicensed Bands: the Rising Stars in
the IoT and Smart City Scenarios. arXiv preprint arXiv:1510.00620.
• Keysight Technology. Explosion of the Internet of Things: What does
it mean for wireless devices? June, 2015
An Overview of LoRA, Sigfox, and IEEE 802.11ah

More Related Content

What's hot

What is LoRaWaN
What is LoRaWaNWhat is LoRaWaN
What is LoRaWaN
Tom Zamir
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
Vipul Kumar Maurya
 
Webnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANWebnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWAN
Martin Haas
 
Introduction to trace viewer
Introduction to trace viewerIntroduction to trace viewer
Introduction to trace viewer
Laura Villarreal
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
APNIC
 
5G Network Architecture Options
5G Network Architecture Options5G Network Architecture Options
5G Network Architecture Options
3G4G
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Ramasubbu .P
 
IoT and LoRaWAN
IoT and LoRaWANIoT and LoRaWAN
IoT and LoRaWAN
Chris Herbert
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
Schwannden Kuo
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
manish_sapra
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lteMorg
 
3GPP Packet Core Towards 5G Communication Systems
3GPP Packet Core Towards 5G Communication Systems3GPP Packet Core Towards 5G Communication Systems
3GPP Packet Core Towards 5G Communication Systems
Ofinno
 
3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things
Eiko Seidel
 
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - InnovileGPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
Ahmet Ozturk
 
RISC-V Introduction
RISC-V IntroductionRISC-V Introduction
RISC-V Introduction
Yi-Hsiu Hsu
 
6lowpan
6lowpan6lowpan
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
Damien Magoni
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
KhushbirSinghSandhu
 
5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design
Tonex
 

What's hot (20)

What is LoRaWaN
What is LoRaWaNWhat is LoRaWaN
What is LoRaWaN
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Webnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWANWebnesday - Introduction to LoRaWAN
Webnesday - Introduction to LoRaWAN
 
Introduction to trace viewer
Introduction to trace viewerIntroduction to trace viewer
Introduction to trace viewer
 
BGP Multihoming Techniques
BGP Multihoming TechniquesBGP Multihoming Techniques
BGP Multihoming Techniques
 
5G Network Architecture Options
5G Network Architecture Options5G Network Architecture Options
5G Network Architecture Options
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
IoT and LoRaWAN
IoT and LoRaWANIoT and LoRaWAN
IoT and LoRaWAN
 
6LoWPAN.pptx
6LoWPAN.pptx6LoWPAN.pptx
6LoWPAN.pptx
 
LTE: X2 interface
LTE: X2 interfaceLTE: X2 interface
LTE: X2 interface
 
Lte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTELte default and dedicated bearer / VoLTE
Lte default and dedicated bearer / VoLTE
 
rrc-procedures-in-lte
rrc-procedures-in-lterrc-procedures-in-lte
rrc-procedures-in-lte
 
3GPP Packet Core Towards 5G Communication Systems
3GPP Packet Core Towards 5G Communication Systems3GPP Packet Core Towards 5G Communication Systems
3GPP Packet Core Towards 5G Communication Systems
 
3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things3GPP Standards for the Internet-of-Things
3GPP Standards for the Internet-of-Things
 
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - InnovileGPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
GPEH, PCHR, CHR, MR, SIG, CTUM, CELL TRACE, UETR Parsers - Innovile
 
RISC-V Introduction
RISC-V IntroductionRISC-V Introduction
RISC-V Introduction
 
6lowpan
6lowpan6lowpan
6lowpan
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design5G Network Architecture, Planning and Design
5G Network Architecture, Planning and Design
 

Similar to An Overview of LoRA, Sigfox, and IEEE 802.11ah

Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
AbyThomas54
 
802.11ah wi fi-iot-5709 (1)
802.11ah wi fi-iot-5709 (1)802.11ah wi fi-iot-5709 (1)
802.11ah wi fi-iot-5709 (1)
BasicFirst1
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
jainam bhavsar
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Joland Reambillo
 
WIRELESS LAN.pptx
WIRELESS LAN.pptxWIRELESS LAN.pptx
WIRELESS LAN.pptx
ShikharAgarwal63
 
Wireless networks
Wireless networksWireless networks
Wireless networks
SYEDJAMAESHA
 
Wireless networks
Wireless networksWireless networks
Wireless networks
Derick Ochia
 
Procomuns 2016
Procomuns 2016 Procomuns 2016
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
Brian Ray
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
Inocentshuja Ahmad
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
xdarlord
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinRobert Russell
 
Designing LoRaWAN for dense IoT deployments webinar
Designing LoRaWAN for dense IoT deployments webinarDesigning LoRaWAN for dense IoT deployments webinar
Designing LoRaWAN for dense IoT deployments webinar
Actility
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoT
Jordan Eller
 
Lora vs Zigbee
Lora vs ZigbeeLora vs Zigbee
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
Rodgers Moonde
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
Siber Güvenlik Toplululuğu
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
KannanKrishnana
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
MinecraftJava
 

Similar to An Overview of LoRA, Sigfox, and IEEE 802.11ah (20)

082112 aruba 11ac webinar
082112 aruba 11ac webinar082112 aruba 11ac webinar
082112 aruba 11ac webinar
 
Wireless Networks 120719.ppt
Wireless Networks 120719.pptWireless Networks 120719.ppt
Wireless Networks 120719.ppt
 
802.11ah wi fi-iot-5709 (1)
802.11ah wi fi-iot-5709 (1)802.11ah wi fi-iot-5709 (1)
802.11ah wi fi-iot-5709 (1)
 
Final_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptxFinal_IoT_Protocol Stack.pptx
Final_IoT_Protocol Stack.pptx
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
WIRELESS LAN.pptx
WIRELESS LAN.pptxWIRELESS LAN.pptx
WIRELESS LAN.pptx
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Procomuns 2016
Procomuns 2016 Procomuns 2016
Procomuns 2016
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Wireless Networks.ppt
Wireless Networks.pptWireless Networks.ppt
Wireless Networks.ppt
 
Wireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_LinkedinWireless_Connectivity_BASIC_Linkedin
Wireless_Connectivity_BASIC_Linkedin
 
Designing LoRaWAN for dense IoT deployments webinar
Designing LoRaWAN for dense IoT deployments webinarDesigning LoRaWAN for dense IoT deployments webinar
Designing LoRaWAN for dense IoT deployments webinar
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoT
 
Lora vs Zigbee
Lora vs ZigbeeLora vs Zigbee
Lora vs Zigbee
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik Kablosuz İletişim ve Güvenlik
Kablosuz İletişim ve Güvenlik
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
 
Wireless Networks.pptx
Wireless Networks.pptxWireless Networks.pptx
Wireless Networks.pptx
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

An Overview of LoRA, Sigfox, and IEEE 802.11ah

  • 1. AN OVERVIEW OF LoRa, SigFox, and IEEE 802.11ah Faheem Zafari Computer & Information Technology Purdue University faheem0@purdue.edu
  • 2. AGENDA • LoRa • SigFox • IEEE 802.11ah • Differences between LoRa, SigFox, IEEE 802.11ah • Use cases • Problem with IEEE 802.11ah • Co-existence problem
  • 3. LoRa • Physical Layer LPWAN solution • High range (max 15km), low power, low data rate (0.3- 37.5 kbps), wideband, sub-GHz • The architecture consists of • LoRa end-devices • LoRa Gateways • LoRa Network Servers (NetServer) Taken from Centenaro et al.
  • 4. LoRa • The MAC layer is basically ALOHA protocol controlled by the LoRa NetServer. • The LoRa MAC is designed to mimic IEEE 802.15.4 Mac to allow the accommodation of other protocols such as CoAP, 6LoWPAN etc. Taken from Centenaro et al.
  • 5. • SIGFOX • First LPWAN technology. • The physical layer uses Ultra-Narrow Band (UNB) wireless modulation. • Network layer protocols are ‘secret sauce’. • Low throughput (~100 bps), low power, extended range (up to 50 km). • The end device must use SIGFOX modem to connect to the SIGFOX network • The device should initiate the communication.
  • 6. • IEEE 802.11ah • Physical layer based on 802.11ac. • Low Data Rate (~100kpbs), extended range (up to 1km), low energy consumption, sub-GHz. • One hop network topology. • Supports MIMO, Single user beamforming etc on the Physical layer. • Three different types of stations supported • Traffic Indication Map (TIM): Listens to AP for data transfer • Non-TIM stations: Directly negotiate with AP during association process to obtain transmission time on Periodic Restricted Access Window (PRAW) • Unscheduled Stations: does not listen to any beacons and uses poll to access channels.
  • 8. MAIN DIFFERENCES Parameter LoRa Sigfox IEEE 802.11ah Data rate (kbps) 0.3-37.5 0.1 >100 Coverage (km) Rural: 10-15 Urban: 3-5 Rural: 30-50 Urban: 3-10 1 Nodes per BS ≈ 104 ≈ 106 8191 Frequency (MHz) Various, Sub-Ghz 969 or 902 902-928 (US) Initiation Both node and NetServer Device Both device and the AP Energy Consumption Very low low slightly higher Dedicated Network No Yes No
  • 9. USE CASES Technology Use Cases LoRa Garbage collection bin fill level for pick up route optimization Sigfox Smart meters, smoke detectors IEEE 802.11 ah Backhaul network for Sensors, Video Surveillance, wearable consumer electronics
  • 10. PROBLEM WITH IEEE 802.11ah • As pointed out by Adame et al., a potential challenge in 802.11ah is the performance of Non-TIM and unscheduled stations, and their integration with TIM stations in a single WLAN. The problem is interesting to explore for further research. • The number of stations that IEEE 802.11ah is also much lesser than Sigfox and LoRa.
  • 11. COEXISTENCE PROBLEM • One of the problems with the coexistence of Sigfox and LoRa is that, Sigfox is based on UNB sub-GHz while LoRa is wideband sub-GHz. The wideband solution is prone to the interference from UNB technologies. This problem can be interesting to explore for further research.
  • 12. REFERENCES • Adame, T., Bel, A., Bellalta, B., Barcelo, J., & Oliver, M. (2014). IEEE 802.11 AH: the WiFi approach for M2M communications. Wireless Communications, IEEE, 21(6), 144-152 • Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2015). Long- Range Communications in Unlicensed Bands: the Rising Stars in the IoT and Smart City Scenarios. arXiv preprint arXiv:1510.00620. • Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2015). Long- Range Communications in Unlicensed Bands: the Rising Stars in the IoT and Smart City Scenarios. arXiv preprint arXiv:1510.00620. • Keysight Technology. Explosion of the Internet of Things: What does it mean for wireless devices? June, 2015

Editor's Notes

  1. Class A defines the default functional mode of the LoRaTM networks, and must be mandatorily supported by all LoRaTM devices. In a Class A network, transmissions are always initiated by the end-devices, in a totally asynchronous manner. After each uplink transmission, the end-device will open (at least) two reception windows, waiting for any command or data packet returned by the Net- Server. The second window is opened on a different sub-band (previously agreed upon with the NetServer) in order to increase resilience to channel fluctuations. Class A networks are mainly intended for monitoring applications, where data produced by the end-devices have to be collected by a control station. Class B has been introduced to decouple uplink and downlink transmissions. Class B end-devices, indeed, get synchronized with the NetServer by means of beacon packets broadcast by Class B gateways, and can hence receive downlink data or command packets in specific time windows, irrespective of the uplink traffic. Class B is intended for end-devices that need to receive commands from a remote controller, e.g., switches or actuators, or need to provide data at user’s request. Finally, Class C is defined for end-devices without (strict) energy constraints (e.g., connected to the power grid), which can hence keep the receive window always open.
  2. A distinguishing feature of the LoRa MAC is the Adaptive Data Rate, which allows the NetServer to adapt the transmit rate of an end-device by changing the SF index, in order to find the best tradeoff between energy efficiency and link robustness. Another important feature is the strong security mechanisms that entail a network key and an application key, which are set up through an over-the-air activation procedure, as well as an activation by personalization procedure (where the security parameters are set into the device at production time).
  3. Uses unlicensed spectrum –mostly sub-GHz band and patented ultra narrow band (UNB) communication ( bandwith with the order of 25 KHz) (wideband for LoRa is about 126-250 KHz) •Ultra low throughput -~100 bps -Devicecan send between 0 and 140 messages per day, each message is up to 12 bytes •Up to 20 years of battery life •Long range –up to 30 miles in rural area and 2-6 miles in urban area –Devices require a SIGFOX modem to connect to SIGFOX network –Target applications: smart meter, pet tracking, smoke detector, agriculture etc… –Have networks deployed in France, Netherlands, Russia and Spain; Launching 902 MHz network in San Francisco
  4. Traffic indication map (TIM) stations This is the only type of station that needs to listen to AP beacons to send or receive data. Their data transmissions must be performed within a restricted access window (RAW) period with three differentiated segments (multicast, downlink and uplink). Stations with a high traffic load should use this procedure to access the channel because it combines periodic data transmission segments with energy efficiency mechanisms. • Non-TIM stations: Non-TIM stations do not need to listen to any beacons to transmit data. During the association process, non-TIM devices directly negotiate with the AP to obtain a transmission time allocated in a periodic restricted access window (PRAW). The following transmissions can be either periodically defined or renegotiated, depending on the requirements set by the station. Although non-TIM stations can transmit data periodically, it is advisable to deploy TIM stations for high-volume data applications to achieve better management of channel resources and benefit from all the improvements developed by IEEE 802.11ah. • Unscheduled stations: These stations do not need to listen to any beacons, similar to non-TIM stations. Even inside any restricted access window, they can send a poll frame to the AP asking for immediate access to the channel. The response frame indicates an interval (outside both restricted access windows) during which unscheduled stations can access the channel. This procedure is meant for stations that want to sporadically join the network. –Target use cases •Large scale low power sensor networks and smart meter •Video surveillance, wearable consumer electronics •Backhaul for aggregated sensor and meter data •Outdoor Wi-Fi for cellular traffic offloading
  5. Traffic indication map (TIM) stations This is the only type of station that needs to listen to AP beacons to send or receive data. Their data transmissions must be performed within a restricted access window (RAW) period with three differentiated segments (multicast, downlink and uplink). Stations with a high traffic load should use this procedure to access the channel because it combines periodic data transmission segments with energy efficiency mechanisms. These novel features are described in detail below. • Non-TIM stations: Non-TIM stations do not need to listen to any beacons to transmit data. During the association process, non-TIM devices directly negotiate with the AP to obtain a transmission time allocated in a periodic restricted access window (PRAW). The following transmissions can be either periodically defined or renegotiated, depending on the requirements set by the station. Although non-TIM stations can transmit data periodically, it is advisable to deploy TIM stations for high-volume data applications to achieve better management of channel resources and benefit from all the improvements developed by IEEE 802.11ah. • Unscheduled stations: These stations do not need to listen to any beacons, similar to non-TIM stations. Even inside any restricted access window, they can send a poll frame to the AP asking for immediate access to the channel. The response frame indicates an interval (outside both restricted access windows) during which unscheduled stations can access the channel. This procedure is meant for stations that want to sporadically join the network. –Target use cases •Large scale low power sensor networks and smart meter •Video surveillance, wearable consumer electronics •Backhaul for aggregated sensor and meter data •Outdoor Wi-Fi for cellular traffic offloading