https://en.wikipedia.org/wiki/Industry_4.0
https://cloud.google.com/solutions/iot/
https://azure.microsoft.com/en-us/services/iot-hub/
https://www.ibm.com/us-en/marketplace/internet-of-things-cloud
https://cloud.oracle.com/en_US/iot
https://www.salesforce.com/editions-pricing/app-cloud/
https://www.instructables.com/id/LoRaWAN-Gateway/
http://cpham.perso.univ-pau.fr/LORA/RPIgateway.html
http://www.davidhunt.ie/lorawan-gateway-build-with-raspberry-pi/
http://www.davidhunt.ie/lorawan-gateway-build-with-raspberry-pi/
LoRa | |
Module | SX1272 |
Dual Frequency Band | 863-870 MHz (Europe) |
902-928 MHz (US) | |
Transmission Power | 25 mW |
Sensitivity | -134 dBm |
Channels | 8 (868MHz) |
13 (900MHz) | |
Range | LOS = 21km (13.4miles) |
NLOS = +2km (1.2miles) |
FEATURESDESCRIPTION
BAND | 868 ÷ 870 MHz |
SENSITIVITY | -138 dBm |
MODULATION | LoRa™ technology |
RANGE | Urban environment 1Km / Open space 15Km |
USER INTERFACE | 3 Buttons 5 Grove connectors (2 digital, 2 analog, 1 I2C) 1 Reset |
OPEN SOURCE LIBRARY | Downlodable free of charge from www.udoit.eu |
http://lora-node.readthedocs.io/en/latest/
Features:
https://bitbucket.org/talk2/whisper-node-avr-lora
https://shop.clodpi.io/products/rak811-lora-sensor-node-board
The LoRaWAN specification defines three device types. All LoRaWAN devices must implement Class A, whereas Class B and Class C are extensions to the specification of Class A devices.
In Europe, LoRaWAN operates in the 863-870 MHz frequency band. European frequency regulations impose specific duty-cycles on devices for each sub-band. These apply to each device that transmits on a certain frequency, so both gateways and devices have to respect these duty-cycles. Most channels used by LoRaWAN have a duty-cycle as low as 1% or even 0.1%. As a result, the network should be smart in scheduling messages on gateways that are less busy or on channels that have a higher duty-cycle. Application developers are encouraged to keep their payloads small, do not transmit too often and avoid downlink messages if possible.
In the United States, LoRaWAN operates in the 902-928 MHz frequency band. Unlike the European band, the US band has dedicated uplink and downlink channels. The band is divided into 8 sub-bands that each have 8x125 kHz uplink channels, 1x500 kHz uplink channel and 1x500 kHz downlink channel. The Things Network uses the second sub-band (number 1 if you start counting at 0).
The specification of the Australian 915-928 MHz band is practically the same as the US 902-928 MHz, except that its uplink frequencies are on higher frequencies than in the US band. Its downlink channels are the same as in the US 902-928 MHz band. The Things Network uses the second sub-band (number 1 if you start counting at 0).
The Chinese 779-787 MHz band behaves similar to the European bands. The 779-787 MHz band also has three common 125 kHz channels (779.5, 779.7 and 779.9 MHz). The Chinese 470-510 MHz band behaves similar to the US bands. There are 96 uplink channels and 48 downlink channels. In some regions, a subset of these channels is used by China Electric Power and can therefore not be used for LoRaWAN. The Things Network uses the eleventh sub-band (number 10 if you start counting at 0).
Devices and applications have a 64 bit unique identifier (DevEUIand AppEUI). When a device joins the network, it receives a dynamic (non-unique) 32-bit address (DevAddr).
LoRaWAN 1.0 knows three distinct 128-bit security keys. The application key AppKey is only known by the device and by the application. When a device joins the network (this is called a join or activation), an application session key AppSKey and a network session key NwkSKey are generated. The NwkSKey is shared with the network, while the AppSKey is kept private. These session keys will be used for the duration of the session.
The algorithm used for this is AES-128, similar to the algorithm used in the 802.15.4 standard. The NwkSKey is used to validate the integrity of each message by its Message Integrity Code (MIC). This MIC is similar to a checksum, except that it prevents intentional tampering with a message. For this, LoRaWAN uses AES-CMAC. The AppSKey is used for encryption of the application payload.
https://lora-alliance.org/lorawan-certified-products