exploring_lorawan
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
exploring_lorawan [2018/10/29 10:42] – [2. Backend] samer | exploring_lorawan [2018/10/29 10:49] – [2. Backend] samer | ||
---|---|---|---|
Line 25: | Line 25: | ||
Start by choosing the application named '' | Start by choosing the application named '' | ||
- | * A unique device name: '' | + | * A unique device name: '' |
* The device description | * The device description | ||
* A unique device EUI on 64 bits: Random identifiers can be generated on [[https:// | * A unique device EUI on 64 bits: Random identifiers can be generated on [[https:// | ||
Line 33: | Line 33: | ||
<WRAP left round help 100%> | <WRAP left round help 100%> | ||
- | * What does the application EUI mean? How is it used in LoRaWAN? | ||
* What does the application key mean? How is it used in LoRaWAN security? | * What does the application key mean? How is it used in LoRaWAN security? | ||
- | * Compare the two device activation methods used in LoRaWAN by giving the advantages and inconvenients. | + | * Compare the two device activation methods used in LoRaWAN by giving the advantages and shortcomings. |
- | * What is the difference between the two receive windows in LoRaWAN? What are they used for? | + | |
</ | </ | ||
===== -. Devices ===== | ===== -. Devices ===== |
exploring_lorawan.txt · Last modified: 2021/11/02 06:31 by samer