esib_iot_challenge
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
esib_iot_challenge [2017/05/17 16:16] – [2. Backend] samer | esib_iot_challenge [2017/05/17 16:20] – [2. Backend] samer | ||
---|---|---|---|
Line 23: | Line 23: | ||
</ | </ | ||
===== -. Backend ===== | ===== -. Backend ===== | ||
- | In the platform, the devices communicate to a backend Loraserver through the gateway. The backend implements the network server functions and provides frame control and security. It has a web interface for configuring the applications and devices on the platform (https:// | + | In LoRaWAN, the devices communicate to a backend Loraserver through the gateway. The backend implements the network server functions and provides frame control and security. It has a web interface for configuring the applications and devices on the platform (https:// |
[{{ : | [{{ : | ||
- | Start by choosing the application named '' | + | Start by choosing the application named '' |
- | * A unique node name: '' | + | * A unique node name: '' |
* The node description | * The node description | ||
* A unique device EUI on 64 bits: Random identifiers can be generated on [[https:// | * A unique device EUI on 64 bits: Random identifiers can be generated on [[https:// | ||
* The application EUI on 64 bits: '' | * The application EUI on 64 bits: '' | ||
* A unique application key on 128 bits also obtained by random generation. | * A unique application key on 128 bits also obtained by random generation. | ||
- | * In advanced network settings, choose the receive window RX2. | + | |
- | + | Make sure that the '' | |
- | Make sure that the '' | + | |
<WRAP left help 100%> | <WRAP left help 100%> | ||
* What does the application EUI mean? How is it used in LoRaWAN? | * What does the application EUI mean? How is it used in LoRaWAN? | ||
* What does the application key mean? How is it used in LoRaWAN security? | * What does the application key mean? How is it used in LoRaWAN security? | ||
- | * Compare the two join methods used in LoRaWAN by giving the advantages and inconvenients. | + | * Compare the two device activation |
* What is the difference between the two receive windows in LoRaWAN? What are they used for? | * What is the difference between the two receive windows in LoRaWAN? What are they used for? | ||
</ | </ |
esib_iot_challenge.txt · Last modified: 2021/08/28 09:53 by samer