esib_iot_challenge
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
esib_iot_challenge [2017/05/17 16:01] – [3. Backend] samer | esib_iot_challenge [2017/05/17 16:01] – [3. Backend] samer | ||
---|---|---|---|
Line 93: | Line 93: | ||
* Security | * Security | ||
</ | </ | ||
- | ===== -. Backend ===== | ||
- | The Loraserver has a web interface for configuring the applications and devices on the platform. | ||
- | [{{ : | ||
- | |||
- | Start by choosing the application named '' | ||
- | * A unique node name: '' | ||
- | * The node description | ||
- | * A unique device EUI on 64 bits: Random identifiers can be generated on [[https:// | ||
- | * The application EUI on 64 bits: '' | ||
- | * A unique application key on 128 bits also obtained by random generation. | ||
- | * In advanced network settings, choose the receive window RX2. | ||
- | |||
- | Make sure that the '' | ||
- | |||
- | <WRAP left help 100%> | ||
- | * What does the application EUI mean? How is it used in LoRaWAN? | ||
- | * What does the application key mean? How is it used in LoRaWAN security? | ||
- | * Compare the two join methods used in LoRaWAN by giving the advantages and inconvenients. | ||
- | * What is the difference between the two receive windows in LoRaWAN? What are they used for? | ||
- | </ | ||
===== -. Applications ===== | ===== -. Applications ===== | ||
==== -. mqtt-spy ==== | ==== -. mqtt-spy ==== |
esib_iot_challenge.txt · Last modified: 2021/08/28 09:53 by samer