-
Notifications
You must be signed in to change notification settings - Fork 81
FAQs
A: An end-node device -like a sensor- sends encrypted information transmited via LoRa radio. A gateway receives the data and forwards it into another network (such as Ethernet) to a network server. The network server delivers the message to the correct end application.
A: No. It uses your internet connection (Wi-Fi or Ethernet) to deliver information sent by devices, like GSP trackers or environmental sensors. That means you can´t connect you smartphone or computer to the hotspot. It only works with devices that use LoRaWAN.
A: LoRaWAN uses unlicensed frecuencies and no subscription is required from a telecommunication operator, so it is considered free - to an extent until after putting out the infrastructures for application.
A: A LoRaWAN node is a device that sends encrypted data to a gateway. It can be a sensor or other smart device. A LoRaWAN gateway is the device that receives data sent by end-node devices, processes it and forwards it to a network server.
A: If you encounter issues while using Beelan-LoRaWAN, try the following troubleshooting steps: Ensure the hardware connections are correct and the devices are powered properly. Verify that the correct firmware or library versions are being used. Check if there are any known issues or compatibility problems with specific hardware or firmware versions. Review the error messages or debug output for clues about the problem. Consult the repository's documentation, FAQs, or community forums for known solutions or similar issues faced by other users.
A: To ensure secure communication with Beelan-LoRaWAN, consider the following practices: Use strong and unique security keys for device authentication and data encryption. Implement appropriate cryptographic algorithms and protocols supported by LoRaWAN. Enable and configure additional security features provided by the LoRaWAN network server, such as frame counters and message integrity checks. Regularly update firmware and security keys to mitigate potential vulnerabilities. Follow best practices and guidelines provided by Beelan-LoRaWAN and the LoRaWAN network server you are using.
Q: Are there any differences between the Activationby-Personalization (ABP) and Over-the-Air-Activation (OTAA) methods in terms of security?
A: The backend interfaces involve control and data signaling among Network Servers, Join Servers and Application Servers. HTTPS and VPN technologies are recommended for securing the communication among these critical infrastructure elements, in much the same way as is done in any other telecom systems.
Thank you for reading our Wiki!
-
- How does LoRaWAN work?
- Change class
- Change port
- Does the LoRaWAN network replace Wi-Fi?
- Is LoRaWAN free of charge?
- What is a LoRaWAN node and a LoRaWAN gateway?
- How can I troubleshoot common issues when using Beelan-LoRaWAN?
- How can I implement secure communication using Beelan-LoRaWAN?
- Are there any differences between the Activation-by-Personalization (ABP) and Over-the-Air-Activation (OTAA) methods in terms of security?