LoRa is a low-power wireless radio technology that allows long-range transmissions of small packets of data over long distances of several kilometers. It uses spread spectrum technology and sends data in packets below the noise floor to achieve long range. LoRa devices have very low data rates but can achieve battery lives of years. LoRa networks use gateways to receive messages from LoRa endpoints and forward them to a LoRa server which then sends the data to backend applications. The Things Network provides an open LoRa network that developers can use for free.
Had the pleasure to introduce and discuss LoRaWaN unconference IoT 2018 and Smart IoT Product Managers Meetup in Tel Aviv. This presentation is a practical guide to LoRaWan and what it takes to build solutions with it.
A brief introduction to LoRaWAN given at the Webnesday in St. Gallen on January 11th 2017. The focus is to give an idea on what LoRaWAN is, why it helps for IoT applications and how to use it (in Switzerland).
Presentation by Quaenet on what LoRaWAN is and the role it plays in the Internet of Things (IoT and IIoT). Presented at Silicon Halton IoT Peer2Peer group Sep 2018.
Had the pleasure to introduce and discuss LoRaWaN unconference IoT 2018 and Smart IoT Product Managers Meetup in Tel Aviv. This presentation is a practical guide to LoRaWan and what it takes to build solutions with it.
A brief introduction to LoRaWAN given at the Webnesday in St. Gallen on January 11th 2017. The focus is to give an idea on what LoRaWAN is, why it helps for IoT applications and how to use it (in Switzerland).
Presentation by Quaenet on what LoRaWAN is and the role it plays in the Internet of Things (IoT and IIoT). Presented at Silicon Halton IoT Peer2Peer group Sep 2018.
Delivered a talk to discuss developer-perspective technical introduction, stories around LoRa/LoRaWAN, also the state in Indonesia.
Use this deck for a sharing session with Maker4Nation community, back then on Oct 3, 2018 in Jakarta.
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...EIT Digital Alumni
What if your coffee machine makes your coffee when you wake up and how about if it tells your toaster to keep your sandwich ready at your breakfast time? Thread is built to turn cool ideas like these into reality!
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
A brief summary of the LPWAN wireless protocols and a more technical overview of LoRa (Long-Range) starting from PHY and throughout the rest of the LoRaWAN stack emphasizing its implications on IoT platforms.
Talk held at:
Winter School 2017 on "Internet of Things: Security, Communication & Application Challenges" organized by the Computing Systems, Security and Networks (CSSN) Research Lab of the Alexander TEI of Thessaloniki (ATEITHE) and the IEEE ATEITHE Student Branch
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
WiFi 7 Training, Improved Latency, Introduction to 802.11beBryan Len
802.11be improvement. 802.11be training, known as WiFi 7.
It is the next noteworthy milestone in the Wi-Fi long-term success story what provides with extremely high throughput and compatible to real-time applications.
Watch the video https://www.youtube.com/watch?v=o-pILzlhP3I
The main features of 802.11be are:
320 MHz bandwidth
Multi-band/multi-channel aggregation
16 spatial streams and Multiple Input
Multiple Output (MIMO) protocols enhancements,
Multi-Access Point (AP) Coordination
Enhanced link adaptation
Adaptation to regulatory rules specific to 6 GHz spectrum,
Integrating Time-Sensitive Networking (TSN) extensions for low-latency real-time traffic (IEEE 802.11aa).
More…
Course outline:
Overview of Wi-Fi Evolution
New Features in Wi-Fi 7
Wi-Fi CERTIFIED 6™
Wi-Fi CERTIFIED 6E
Overview of a WiFi 6E Certified Product Example (Wi-Fi Alliance)
WiFi 6E Security
Overview of Wi-Fi 7
Advanced PHY Techniques Improving Spectrum Efficiency
Introduction to 802.11be, WiFi 7 Training
https://www.tonex.com/training-courses/introduction-to-802-11be-wifi-7-training/
Delivered a talk to discuss developer-perspective technical introduction, stories around LoRa/LoRaWAN, also the state in Indonesia.
Use this deck for a sharing session with Maker4Nation community, back then on Oct 3, 2018 in Jakarta.
“Thread - A New Wireless Networking Protocol for Internet of Things” - Ankith...EIT Digital Alumni
What if your coffee machine makes your coffee when you wake up and how about if it tells your toaster to keep your sandwich ready at your breakfast time? Thread is built to turn cool ideas like these into reality!
LPWAN Technologies for Internet of Things (IoT) and M2M ScenariosPeter R. Egli
Rapid technological advances in the past made possible the miniaturization of network devices to meet the cost and power consumption requirements in IoT and M2M scenarios. What is missing in this picture is a radio technology with both long range capability and a very low cost footprint. Existing radio technologies such as 3G/4G or Short Range Radio do not aptly meet the requirements of IoT scenarios because they are either too expensive or are not able to provide the required range. Other wireless technologies are geared towards high bandwidth which is in most cases not a requirement for IoT.
Emerging LPWAN technologies such as ETSI LTN or LoRAWAN are poised for filling the gap by providing long range (up to 40km) and low power connectivity. These technologies allow low cost radio devices and operation thus enabling scaling up IoT applications.
A brief summary of the LPWAN wireless protocols and a more technical overview of LoRa (Long-Range) starting from PHY and throughout the rest of the LoRaWAN stack emphasizing its implications on IoT platforms.
Talk held at:
Winter School 2017 on "Internet of Things: Security, Communication & Application Challenges" organized by the Computing Systems, Security and Networks (CSSN) Research Lab of the Alexander TEI of Thessaloniki (ATEITHE) and the IEEE ATEITHE Student Branch
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends:
Exposing the device to a management framework
Exposing that management framework to a business centric logic
Exposing that business layer and data to end users.
This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles between cloud, APIs and native hardware/software configurations.
WiFi 7 Training, Improved Latency, Introduction to 802.11beBryan Len
802.11be improvement. 802.11be training, known as WiFi 7.
It is the next noteworthy milestone in the Wi-Fi long-term success story what provides with extremely high throughput and compatible to real-time applications.
Watch the video https://www.youtube.com/watch?v=o-pILzlhP3I
The main features of 802.11be are:
320 MHz bandwidth
Multi-band/multi-channel aggregation
16 spatial streams and Multiple Input
Multiple Output (MIMO) protocols enhancements,
Multi-Access Point (AP) Coordination
Enhanced link adaptation
Adaptation to regulatory rules specific to 6 GHz spectrum,
Integrating Time-Sensitive Networking (TSN) extensions for low-latency real-time traffic (IEEE 802.11aa).
More…
Course outline:
Overview of Wi-Fi Evolution
New Features in Wi-Fi 7
Wi-Fi CERTIFIED 6™
Wi-Fi CERTIFIED 6E
Overview of a WiFi 6E Certified Product Example (Wi-Fi Alliance)
WiFi 6E Security
Overview of Wi-Fi 7
Advanced PHY Techniques Improving Spectrum Efficiency
Introduction to 802.11be, WiFi 7 Training
https://www.tonex.com/training-courses/introduction-to-802-11be-wifi-7-training/
Build with Mbed - Exploring LoRa using MbedJan Jongboom
Webinar about the new LoRaWAN stack in Mbed OS 5.8, co-hosted with Etteplan. Recording: https://pages.arm.com/build-with-mbed-explore-LoRa-using-mbed.html
What is a Lora gateway and what does it do?
LoRa gateways use different frequency extension factors and different frequency extension factors, and can therefore theoretically demodulate multiple frequency extension factors in the same channel. Gateways and web servers are connected via standard IP, and endpoints communicate with one or more gateways via a single hop.
Master-Master Replication and Scaling of an Application Between Each of the I...vsoshnikov
Solutions to the problem of gathering and processing data in large-scale wireless sensor networks in the industrial IoT.
The rapid growth of wireless SCADA networks based on technologies like LoRa and 6LoWPAN has given birth to the problem of gathering and processing data from thousands of sensors and replicating this data to the cloud and to devices based on ARMv7+.
This report addresses ways and methods of solving this problem, including solutions for low-speed gateways and devices in industrial IoT networks.
In Infrastructure-as-a-Service (IAAS) clouds, Xen is a popular choice of hypervisor. While the Xen hypervisor has strong isolation, integrating with the cloud infrastructure environment (switches, routers, load balancers, firewalls, ip address allocation) requires additional work by the IAAS cloud management platform (CMP) to achieve this. We will look at various solutions such as network virtualization, SDN, network function virtualization and L3 isolation that work with the Xen hypervisor, in the context of the Apache CloudStack IAAS platform. Attendees will come away with an understanding of the challenges of network isolation, how Apache CloudStack solves some of the scaling issues and the future of Xen-based clouds.
Radio Frequencies are all around us. Our organizations use them, and our traditional security measures don't often account for them. What sort of tools and programs do you need to help you find them so that you can begin to have conversations about the information on them and how to secure it.
Embedded Systems: Lecture 8: Lab 1: Building a Raspberry Pi Based WiFi APAhmed El-Arabawy
In this Lab, we go through the steps to build a WiFi Access Point using the Raspberry Pi. The Lab starts by introducing some concepts of Wireless LANs followed by step-by-step procedure to build the AP. The Lab concludes by an evaluation of the performance of the built AP
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
Similar to Introduction to LoRa for developers (20)
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
3. Low powered radio
• Designed for use in battery powered devices
• Battery life measured in years
• LoRa radio transmitters are cheap and easy to add to a device
• Uses “Spread Spectrum Technology”
• Messages are sent “below the noise” as packets of data
• Best regarded as a form of “SMS” message rather than a continuous
telephone call
• There are limits on the message size and the number of messages you can
send in a given time
4. Long Range
• Range up to 15-20 km
• (although this depends a lot on conditions – take it with a pinch of salt)
• Lora wavebands
• 868 MHz for Europe
• 915 MHz for North America
• 433 MHz band for Asia
• You don’t need a licence to use the LoRa band
• But you should be using properly certified devices and not breach the usage
conditions – if you’re doing this properly
5. Lora Radio
• “Spread spectrum technology” lets you trade bandwidth for range
• LoRa has built in Adaptive Data Rate (ADR) technology that will
manage this for an application
• Bit rates are very low (start at 250 bits per second and go up to
50Kbps)
• Transmission times can be of the order of seconds
• Packet size varies from 59 to 230 bits
• The “duty cycle” of a LoRa network connection is around 1%
• A given device should only use the network for 1% of the available time
6. Building a LoRa device
• I’m using a LoRa shield from Dragino
• It fits on top of an Arduino
• You can program it in C++ using the
Arduino SDK and the IBM LMIC
library
• The one on the right also has GPS
7. Pycom LoPy
• If you want to use Python,
you can use the LoPy from
Pycom
• This provides LoRa, WiFi an
Bluetooth along with a
Python library for LoRa
8. Heltec
• From a hobbyist point of view you
can have a lot of fun with “peer to
peer” LoRa networking
• A company called Heltec makes
some interesting devices with WiFi,
Bluetooth and LoRa
• Very cheap, but “interesting” quality
9. LoRa “peer to peer”
• You can use LoRa to connect two devices together
• Think of this as a car remote keyfob with a really long range
• However, this is not what you’re expected to do with LoRa
• A LoRa embedded device (an endpoint) will be associated with one or
more LoRa gateways
• If you were making a “cow tracker” you’d attach an endpoint to the cow
• The LoRa gateway will forward endpoint messages to a LoRa server
• The server sends messages onto backend applications
• This forms a LoraWAN (LoRa Wide-Area Network)
10. LoRaWAN cow tracking
endpoints
Fit cows with LoRa endpoint
devices that contain a GPS
tracker and a LoRa wireless
transmitter
Devices send location
information every few hours
15. What is a gateway?
• A gateway has a LoRa radio receiver and a network connection
• Receives messages from the endpoint and forwards them to a LoRa server
• You can use LoRa endpoint devices as primitive gateways
• But they don’t expose the full functionality as they are only single channel
devices
• The cheapest “proper” LoRa gateway is around 120 pounds and runs
on a Raspberry Pi
• Best placed high up and outdoors
16. Getting a gateway
• This is a single channel LoRa gateway
• “proper” gateways uses 8 channels
• A gateway receives LoRa messages
from endpoint devices and pushes
them on to a LoRaWAN server
• This gateway is cheap but limited
• Great for playing with
• You can buy gateways for use with
Raspberry Pi or other platforms
• But you might not need to
17. The Things Network
• The Things Network underpins a worldwide network of open LoRa
gateways
18. The Things Network
• Building networked communities using LoRa
• Provides the server backend for LoRaWAN applications
• Creates open source software and hardware which you can use to build your
own bespoke LoRa network
• Sells LoRa devices on Kickstarter
• You can buy your own gateway and register it on The Things Network
• Any LoRa endpoint can then use your gateway as a conduit onto The Things
Network
• The Things Network will host your LoRa applications and pass your endpoint
data into your own backend servers
19. Local LoRa gateways
• There are a number of gateways in Hull which are attached to The
Things Network
• We can get a reliable signal here in c4di
• We’d like to see more gateways
• Particularly one in Cottingham
• We see a crucial outcome of this initiative as some agreement on a
means by which we can construct and manage a network of gateways
and server infrastructure for use in the area
20. What is a server?
• The LoRa server receives messages from the gateways, identifies ones
that are for applications it knows about, sorts out multiple messages
and then forwards them on to the application backend
• You can create your own servers, but for testing you can use those
provided by The Things Network (TTN) for free
• You can register your gateways on The Things Network and then
create your applications and connect your servers to them
• A great way to get started, but for “proper” services you would want to have
your own infrastructure
21. LoRa Security
• Because LoRa is a broadcast medium using public frequency bands
anyone can eavesdrop on any message
• An endpoint is associated with a particular application which is
identified in each LoRa packet that the endpoint sends
• Each application has an encryption key
• Keys can be “baked in” to a device or deployed via the LoRa network
• In addition, a given network session is encrypted by means of a
network session key
• Based on AES-128 (802.15.4 security)
22. Endpoint activation
• No such thing as “default password” for a LoRa device
• An endpoint must be activated before it can be used on a LoRa
network
• Two forms of activation:
• Activation By Personalisation (ABP):
• Credentials are “burned in” to the endpoint before it is deployed
• Over The Air Activation (OTAA):
• Endpoint is deployed containing an Application Root Key which is used to
authenticate a setup process that produces credentials to be stored in the
endpoint
24. Authentication By Personalisation
• These setting values are copied into the application code
• This is great for small apps, but would be painful if you had lots of endpoints
25. LoRa applications
• These are my LoRa applications on The Things Network
• Each has an Extended Unique Identifier (EUI)
26. Application endpoints
• This application is associated with two endpoints (devices)
• An endpoint can only be associated with one application
30. The LMIC library
• The LMIC library can be used to transmit LoRa messages to the server
31. The LMIC library
• Works with C++ programs developed using the Arduino IDE
32. Integrations
• The Things Network provides a
set of “integrations” that you use
to send LoRa messages into your
application
• You can use http GET/POST, or
MQTT or IFTT
• They also provide a database for
short term storage (7 days)
33. Sending messages to a LoRa endpoint
• A LoRa endpoint will not normally be listening for messages from the
gateway
• This is to save power
• Class A
• Listen for a brief interval after the endpoint has sent something
• Class B
• Listen for a brief interval at scheduled times
• Class C
• Nearly continuous listening (not suitable for battery powered endpoints)
34. Lora on a page
• Cheap endpoint devices (£5.00), low power (AA batteries), long range
(in the Km)
• Great for exchanging small packets of data with endpoints that form
part of an application – not great for streaming video
• Needs gateways to connect the endpoints
• Needs servers to manage gateways
• The Things Network provide all this for free
• Endpoint associated with an application, protected by encryption at
network level and application level
• Great for cow tracking