LoRa Network: LoRaWAN

- LoRa is a wireless technology that has been developed to enable low data rate communications to be made over long distances by sensors and actuators for M2M and Internet of Things, IoT applications.

As LoRa technology is able to provide a wide area network capability, it is often referred to as LoRaWAN.

A LoRa network consists of several elements:

  • End points:   The endpoints are the elements of the LoRa network where the sensing or control is undertaken. They are normally remotely located.
  • LoRa gateway :   The gateway receives the communications from the LoRa endpoints and then transfers them onto the backhaul system. This part of the LoRa network can be Ethernet, cellular or any other telecommunications link wired or wireless. The gateways are connected to the network server using standard IP connections. On this way the data uses a standard protocol, but can be connected to any telecommunications network, whether public or private. In view of the similarity of a LoRa network to that of a cellular one, LoRa gateways may often be co-located with a cellular base station. In this way they are able to use spare capacity on the backhaul network.
  • Server:   The LoRa network server manages the network. The network server acts to eliminate duplicate packets, schedules acknowledgement, and adapts data rates. In view of the way in which it can be deployed and connected, makes it very easy to deply a LoRa network.
  • Remote computer:   a remote computer can then control the actions of the endpoints or collect data from them - the LoRa network being almost transparent.

Diagram showing the architecture of a LoRa network with the endpoints, gateway, server and remote computer
LoRa network architecture

In terms of the actual architecture for the LoRa network, the nodes are typically in a star-of-stars topology with gateways forming a transparent bridge. These relay messages between end-devices and a central network server in the backend.

Communication to end point nodes is generally bi-directional, but it is also possible to support multicast operation, and this is useful for features such as software upgrades and the like or other mass distribution messages.

LoRaWAN endpoint classes

There are many different needs to LoRa endpoints. Accordingly the LoRaWAN supports three classes of endpoints:

  • Class A - bi-directional end-devices:   LoRaWAN class A endpoint devices provide bidirectional communications. To achieve this, each endpoint transmission is followed by two short downlink receive windows. The transmission slot scheduled by the particular endpoint is based upon the needs of the end point and also there is a small variation determined using a random time basis.

    LoRa Class A operation provides the lowest power option for end points that only require downlink communication from the server shortly after the end-device has sent an uplink transmission. Downlink communications from the server at any other time wait until the next scheduled uplink time.
  • Class B - bi-directional end-devices with scheduled receive slots:   LoRa Class B devices provide the Class A functionality and in addition to this they open extra receive windows at scheduled times. To achieve the required synchronisation from the network, the endpoint receives a time synchronized Beacon from the gateway. This allows the server to know when the end-device is listening.
  • Class C - bi-directional end-devices with maximal receive slots:   LoRa Class C devices provide nearly continuously open receive windows. They only closed when the endpoint is transmitting. This type of endpoint is suitable where large amounts of data are needed to be received rather than transmitted.

LoRa network security

The issue of network security is becoming increasingly important. As such LoRa networks require high levels of security to prevent disruption of any systems.

To achieve the required levels of security for LoRa networks, several layers of encryption have been employed:

  • Unique Network key (EUI64) and ensure security on network level
  • Unique Application key (EUI64) ensure end to end security on application level
  • Device specific key (EUI128)

Employing these layers of encryption ensures that the LoRa network remains sufficiently secure.

By Ian Poole


<< Previous   |   Next >>


Share this page


Want more like this? Register for our newsletter






Should I consider AMOLED? Mike Logan | andersDX
Should I consider AMOLED?
LED technology is now being used for many applications not envisaged years ago. One variant of LED technology namely AMOLED, active-matrix organic light-emitting diode, technology is a form that is being used increasingly.
Whitepapers
mmWave The Battle of the Bands
5G mobile communications will use mmWave for many short range wide band links - but which microwave band will be used? Find out more in this informative white paper.

More whitepapers










Radio-Electronics.com is operated and owned by Adrio Communications Ltd and edited by Ian Poole. All information is © Adrio Communications Ltd and may not be copied except for individual personal use. This includes copying material in whatever form into website pages. While every effort is made to ensure the accuracy of the information on Radio-Electronics.com, no liability is accepted for any consequences of using it. This site uses cookies. By using this site, these terms including the use of cookies are accepted. More explanation can be found in our Privacy Policy