esib_iot_challenge
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
esib_iot_challenge [2017/05/17 16:01] – [3. Backend] samer | esib_iot_challenge [2017/05/17 17:25] – [1. Platform] samer | ||
---|---|---|---|
Line 3: | Line 3: | ||
Welcome to the ESIB IoT Challenge. In this challenge, you will be designing and prototyping the first IoT services based on a LoRaWAN network. | Welcome to the ESIB IoT Challenge. In this challenge, you will be designing and prototyping the first IoT services based on a LoRaWAN network. | ||
- | ===== -. What is a LoRaWAN | + | ===== -. Platform ===== |
During this challenge, you will benefit from the first experimental platform implementing an end-to-end LoRaWAN solution in Lebanon. The platform consists of the following elements: | During this challenge, you will benefit from the first experimental platform implementing an end-to-end LoRaWAN solution in Lebanon. The platform consists of the following elements: | ||
Line 19: | Line 19: | ||
* How LoRa is compatible with LPWAN requirements and constraints? | * How LoRa is compatible with LPWAN requirements and constraints? | ||
* What is LoRaWAN? What is the difference between LoRaWAN and LoRa? | * What is LoRaWAN? What is the difference between LoRaWAN and LoRa? | ||
- | * Where is LoRaWAN implemented in the platform? | ||
- | * Where does the IP layer start in the platform? Comment your answer considering the trends in IoT. | ||
* Illustrate the protocol stacks on the LoRaWAN platform. | * Illustrate the protocol stacks on the LoRaWAN platform. | ||
+ | * What elements are IP enabled in the platform? What do you think about IP support in IoT? | ||
+ | </ | ||
+ | ===== -. Backend ===== | ||
+ | In LoRaWAN, the devices communicate to a backend Loraserver through the gateway. The backend implements the network server functions and provides frame control and security. It has a web interface for configuring the applications and devices on the platform (https:// | ||
+ | |||
+ | [{{ : | ||
+ | |||
+ | Start by choosing the application named '' | ||
+ | * A unique node name: '' | ||
+ | * The node description | ||
+ | * A unique device EUI on 64 bits: Random identifiers can be generated on [[https:// | ||
+ | * The application EUI on 64 bits: '' | ||
+ | * A unique application key on 128 bits also obtained by random generation. | ||
+ | |||
+ | Make sure that the '' | ||
+ | |||
+ | <WRAP left help 100%> | ||
+ | * What does the application EUI mean? How is it used in LoRaWAN? | ||
+ | * What does the application key mean? How is it used in LoRaWAN security? | ||
+ | * Compare the two device activation methods used in LoRaWAN by giving the advantages and inconvenients. | ||
+ | * What is the difference between the two receive windows in LoRaWAN? What are they used for? | ||
</ | </ | ||
===== -. Devices ===== | ===== -. Devices ===== | ||
Line 95: | Line 114: | ||
===== -. Applications ===== | ===== -. Applications ===== | ||
- | ==== -. mqtt-spy ==== | ||
- | |||
mqtt-spy is an open source utility intended to help you with monitoring activity on MQTT topics. It has been designed to deal with high volumes of messages, as well as occasional publications. mqtt-spy is a JavaFX application, | mqtt-spy is an open source utility intended to help you with monitoring activity on MQTT topics. It has been designed to deal with high volumes of messages, as well as occasional publications. mqtt-spy is a JavaFX application, | ||
You can use mqtt-spy to debug the messages received from the LoRaWAN devices. For this, you should download the software tool from [[https:// | You can use mqtt-spy to debug the messages received from the LoRaWAN devices. For this, you should download the software tool from [[https:// | ||
- | ==== -. Emoncms ==== |
esib_iot_challenge.txt · Last modified: 2021/08/28 09:53 by samer