esib_iot_challenge
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
esib_iot_challenge [2017/05/17 18:50] – [3. Devices] samer | esib_iot_challenge [2017/05/17 22:35] – [3. Devices] samer | ||
---|---|---|---|
Line 99: | Line 99: | ||
Open the serial monitor in the Arduino IDE at 115200 baud and analyse the debug messages. | Open the serial monitor in the Arduino IDE at 115200 baud and analyse the debug messages. | ||
+ | <WRAP left round help 100%> | ||
+ | * What is the radio transmit parameters of the captured debug messages? | ||
+ | * What is the radio receive parameters of the captured debug messages for the two receive windows? | ||
+ | </ | ||
+ | |||
+ | Getting back to the backend, you can monitor some important information related to your device. Click on the corresponding node session. | ||
+ | |||
+ | <WRAP left round help 100%> | ||
+ | * What are the different fields that appear in the node session corresponding to you device? | ||
+ | * Explain how each field is created according to the LoRaWAN specification. | ||
+ | * What are the different counters visible at the backend? Explain how they get incremented and how they are used. | ||
+ | </ | ||
===== -. Applications ===== | ===== -. Applications ===== | ||
mqtt-spy is an open source utility intended to help you with monitoring activity on MQTT topics. It has been designed to deal with high volumes of messages, as well as occasional publications. mqtt-spy is a JavaFX application, | mqtt-spy is an open source utility intended to help you with monitoring activity on MQTT topics. It has been designed to deal with high volumes of messages, as well as occasional publications. mqtt-spy is a JavaFX application, | ||
- | You can use mqtt-spy to debug the messages received from the LoRaWAN devices. | + | You can use mqtt-spy to debug the messages received from the LoRaWAN devices. |
+ | |||
+ | <WRAP left round help 100%> | ||
+ | * Summarize the concepts and functionalities of the MQTT protocol. | ||
+ | * What are the possible strengths and weaknesses in terms of security of MQTT? | ||
+ | * What are the different types of topics used by the backend? Explain. | ||
+ | * Explain the different fields in a captured MQTT message received from you device. | ||
+ | </ | ||
+ | ===== -. The End-to-End Challenge ===== | ||
+ | |||
+ | ===== -. The Downlink Challenge ===== | ||
+ | |||
+ | ===== -. The Radio Challenge ===== | ||
+ | |||
+ | < | ||
+ | // LMIC_disableChannel(1); | ||
+ | // LMIC_disableChannel(2); | ||
+ | // LMIC_disableChannel(3); | ||
+ | // LMIC_disableChannel(4); | ||
+ | // LMIC_disableChannel(5); | ||
+ | // LMIC_disableChannel(6); | ||
+ | // LMIC_disableChannel(7); | ||
+ | // LMIC_disableChannel(8); | ||
+ | // LMIC_setDrTxpow(DR_SF10, | ||
+ | </ | ||
+ | |||
+ | < | ||
+ | { | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | }], | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | }, | ||
+ | " | ||
+ | } | ||
+ | } | ||
+ | </ |
esib_iot_challenge.txt · Last modified: 2021/08/28 09:53 by samer