0% found this document useful (0 votes)
55 views

Report Lorawan

Uploaded by

Ntt Hue
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Report Lorawan

Uploaded by

Ntt Hue
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

MINISTRY OF INFORMATION AND COMMUNICATIONS

Authority of Central Posts and Telecommunications

A brief introduction to LoRaWAN for IoT:


From Technology to Application

Presenter: Nguyen Thi Hoa Hue – Post Office T26

1
Mobile Internet
Wifi
(2G-5G)

Bandwidth

Bluetooth/BLE

LoRa, Sigfox

Range

LP-WAN provides new capabilities :


Low-power and long communication range 2
Content
• Introduction to LoRa and LoRaWAN
• LoRaWAN network architecture
• LoRaWAN Security
• Advantages and Disadvantages of LoRaWAN
• Applications based on LoRa/LoRaWAN
• Proposal for CPT

3
Introduction to LoRa and LoRaWAN
• LoRa (Long Range) is a patented
digital wireless data
communication IoT technology.
• LoRaWan is a software protocol
using lora physical layer.
▪ LoRaWan includes:
▪ Network Layer
▪ Data Link Layer

4
Introduction to LoRa and LoRaWAN
• LoRaWAN Bandwidth

Vietnam?
Need
contact to
ARF

5
LoRaWAN network architecture
• End Device, Node, Mote - an object with
an embedded low-power communication
device.
• Gateway - antennas that receive
broadcasts from End Devices and send
data back to End Devices.
• Network Server - servers that route
messages from End Devices to the right
Application, and back.
• Application - a piece of software, running
on a server.
• Uplink Message - a message from a Device
to an Application.
• Downlink Message - a message from an
Application to a Device.
6
LoRaWAN network architecture
• End Devices

7
LoRaWAN Security

• LoRaWAN™ utilizes two layers of security:


one for the network and one for the
application. Accordingly, the LoRaWAN
specification defines two layers of
cryptography:
• A unique 128-bit Network Session Key
(NwkSKey) shared between the end-device
and network server
• A unique 128-bit Application Session Key
(AppSKey) shared end-to-end at the
application level
8
Comparison of LoraWAN and other
technologies

9
Comparison of LoraWAN and other
technologies

Advantages and Disadvantages

10
• Please visit http://ttnmapper.org/ for more information about
LoRaWAN gateways
11
Proposal for CPT
• For Server Rooms:
• Room Sensor Temperature, Light, Motion and Humidity:
• The Battery life is estimated to be up to several years but depends on
sample interval, transmit interval, data rate, and environmental factors
• Easy configuration
• Can change sample rate, data rate, encryption keys, triggers,
activation, etc.
• Usage: Building, Indoor, Room (Office/Living/Kitchen)
• Application: Air quality measurement, Room occupancy, Temperature
measurement
• Current sensor: current measurement
• Monitor consumption
• Measure energy consumption
• Transmission on events (Alert) or periodic (Counting)

12
Proposal for CPT
• For Server Rooms:

13
Proposal for CPT
• Geolocation of end-devices
• Geolocation support through Time
Difference of Arrival (TDoA) and
Received Signal Strength Indication
(RSSI) for GPS-free end-point
location tracking at lower power
consumption levels

• Ex. http://zane.hu/catalog.pdf

14
Conclusion
• LoRa and LoraWAN belong to the category of non-cellular LPWAN
wireless communication network protocols and players, operating in the
license-free spectrum.
• LoRaWAN has the benefit of being an alliance with an Open approach
instead of a proprietary one.
• In a June 2016 blog post Cisco’s Tony Shakib announced several new
Internet of Things solutions, including for the Cisco solution for
LoRaWAN offering.
• LoRaWAN is the most adopted type of LPWAN, and promises ubiquitous
connectivity in outdoor IoT applications, while keeping network
structures, and management, simple.
15
Thank you for your attention!

Q&A

16

You might also like