Digi Xbee® 3 Cellular LTE-M/NB-Iot Global Smart Modem User Guide 2
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cat® B15 Smartphone User Manual Please Read Before Proceeding Safety Precautions
Cat® B15 Smartphone User manual Please Read Before Proceeding Safety Precautions Please read the safety precautions carefully to ensure the correct use of your mobile phone. Despite the nature of this rugged device, avoid hitting, throwing, dropping, crushing, bending and puncturing, your mobile phone. Avoid using your mobile phone in a damp environment, such as the bathroom. Prevent your mobile phone from being intentionally soaked or washed in liquid. Do not switch on your mobile phone when it is prohibited to use phones or when the phone may cause interference or danger. Do not use your mobile phone while driving. Follow any rules or regulations in hospitals and health care facilities. Switch off your mobile phone near medical equipment. Switch off your mobile phone in aircraft. The phone may cause interference to control equipment of the aircraft. Switch off your mobile phone near high-precision electronic devices. The phone may affect the performance of these devices. Do not attempt to disassemble your mobile phone or its accessories. Only qualified personnel are allowed to service or repair the phone. Do not place your mobile phone or its accessories in containers with a strong electromagnetic field. Do not place magnetic storage media near your mobile phone. Radiation from the phone may erase the information stored on them. Do not put your mobile phone in a high-temperature place or use it in a place with flammable gas such as a gas station. Keep your mobile phone and its accessories away from young children. Do not allow children to use your mobile phone without guidance. -
5G INDOOR ROUTER Fx2000e USER GUIDE 2
USER GUIDE Inseego WavemakerTM PRO 5G Indoor Router FX2000e INSEEGO COPYRIGHT STATEMENT © 2021 Inseego Corp. All rights reserved. Complying with all copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording or otherwise), or for any purpose without the expressed written permission of Inseego Corp. SOFTWARE LICENSE Proprietary Rights Provisions: Any software drivers provided with this product are copyrighted by Inseego Corp. and/or Inseego Corp.’s suppliers. Although copyrighted, the software drivers are unpublished and embody valuable trade secrets proprietary to Inseego Corp. and/or Inseego Corp. suppliers. The disassembly, decompilation, and/or Reverse Engineering of the software drivers for any purpose is strictly prohibited by international law. The copying of the software drivers, except for a reasonable number of back-up copies is strictly prohibited by international law. It is forbidden by international law to provide access to the software drivers to any person for any purpose other than processing the internal data for the intended use of the software drivers. U.S. Government Restricted Rights Clause: The software drivers are classified as “Commercial Computing device Software” and the U.S. Government is acquiring only “Restricted Rights” in the software drivers and their Documentation. U.S. Government Export Administration Act Compliance Clause: It is forbidden by US law to export, license or otherwise transfer the software drivers or Derivative Works to any country where such transfer is prohibited by the United States Export Administration Act, or any successor legislation, or in violation of the laws of any other country. -
LTE-M Deployment Guide to Basic Feature Set Requirements
LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS JUNE 2019 LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS Table of Contents 1 EXECUTIVE SUMMARY 4 2 INTRODUCTION 5 2.1 Overview 5 2.2 Scope 5 2.3 Definitions 6 2.4 Abbreviations 6 2.5 References 9 3 GSMA MINIMUM BAseLINE FOR LTE-M INTEROPERABILITY - PROBLEM STATEMENT 10 3.1 Problem Statement 10 3.2 Minimum Baseline for LTE-M Interoperability: Risks and Benefits 10 4 LTE-M DATA ARCHITECTURE 11 5 LTE-M DePLOYMENT BANDS 13 6 LTE-M FeATURE DePLOYMENT GUIDE 14 7 LTE-M ReLEAse 13 FeATURes 15 7.1 PSM Standalone Timers 15 7.2 eDRX Standalone 18 7.3 PSM and eDRX Combined Implementation 19 7.4 High Latency Communication 19 7.5 GTP-IDLE Timer on IPX Firewall 20 7.6 Long Periodic TAU 20 7.7 Support of category M1 20 7.7.1 Support of Half Duplex Mode in LTE-M 21 7.7.2 Extension of coverage features (CE Mode A / B) 21 7.8 SCEF 22 7.9 VoLTE 22 7.10 Connected Mode Mobility 23 7.11 SMS Support 23 7.12 Non-IP Data Delivery (NIDD) 24 7.13 Connected-Mode (Extended) DRX Support 24 7.14 Control Plane CIoT Optimisations 25 7.15 User Plane CIoT Optimisations 25 7.16 UICC Deactivation During eDRX 25 7.17 Power Class 26 LTE-M DEPLOYMENT GUIDE TO BASIC FEATURE SET REQUIREMENTS 8 LTE-M ReLEAse 14 FeATURes 27 8.1 Positioning: E-CID and OTDOA 27 8.2 Higher data rate support 28 8.3 Improvements of VoLTE and other real-time services 29 8.4 Mobility enhancement in Connected Mode 29 8.5 Multicast transmission/Group messaging 29 8.6 Relaxed monitoring for cell reselection 30 8.7 Release Assistance Indication -
Voice Controlled Home Automation Akshay Mewada, Ayush Mishra, Manoj Gupta, Rahul Dash, Prof
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on 3rd International Conference on Electronics & Computing Technologies-2016 Conference Held at K.C. College of Engineering & Management Studies & Research, Maharashtra, India Voice Controlled Home Automation Akshay Mewada, Ayush Mishra, Manoj Gupta, Rahul Dash, Prof. Nilofer Mulla BE EXTC, Department of Electronics and Telecommunication Engineering, K.C. College of Engineering & Management Studies & Research, Kopri, Thane (E), Maharashtra, India Abstract— Voice Controlled Home Automation is a very useful project for the adults and physically disabled persons, who are not able to do various activities efficiently when they are at home and need one’s assistant to perform those tasks. With the Voice Recognition the complication of wiring in case of wired automation is prevented. With the use of Bluetooth Home Automation considerable amount of power saving is possible and it is flexible and compatible with future technologies so it can be easily customized for individual requirements. Voice recognition system provides secure access to home. In the recent years, the Home Automation systems have seen rapid changes due to introduction of various wireless technologies. Home Automation industry is growing rapidly, this is fuelled by the need to provide supporting systems that are made to ease our life. Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation is based on recognition of voice commands and uses Bluetooth modules along with microcontroller. This paper presents the overall design of ‘Voice Controlled Home Automation’, which we are currently developing. -
Trusted Connectivity Alliance Recommended 5G SIM: a Definition
Trusted Connectivity Alliance Recommended 5G SIM: A Definition February 2021 1 Copyright © 2021 Trusted Connectivity Alliance ltd. The information contained in this document may be used, disclosed and reproduced without the prior written authorization of Trusted Connectivity Alliance. Readers are advised that Trusted Connectivity Alliance reserves the right to amend and update this document without prior notice. Updated versions will be published on the Trusted Connectivity Alliance website at http://www.trustedconnectivityalliance.org Intellectual Property Rights (IPR) Disclaimer Attention is drawn to the possibility that some of the elements of any material available for download from the specification pages on Trusted Connectivity Alliance's website may be the subject of Intellectual Property Rights (IPR) of third parties, some, but not all, of which are identified below. Trusted Connectivity Alliance shall not be held responsible for identifying any or all such IPR, and has made no inquiry into the possible existence of any such IPR. TRUSTED CONNECTIVITY ALLIANCE SPECIFICATIONS ARE OFFERED WITHOUT ANY WARRANTY WHATSOEVER, AND IN PARTICULAR, ANY WARRANTY OF NON- INFRINGEMENT IS EXPRESSLY DISCLAIMED. ANY IMPLEMENTATION OF ANY TRUSTED CONNECTIVITY ALLIANCE SPECIFICATION SHALL BE MADE ENTIRELY AT THE IMPLEMENTER'S OWN RISK, AND NEITHER TRUSTED CONNECTIVITY ALLIANCE, NOR ANY OF ITS MEMBERS OR SUBMITTERS, SHALL HAVE ANY LIABILITY WHATSOEVER TO ANY IMPLEMENTER OR THIRD PARTY FOR ANY DAMAGES OF ANY NATURE WHATSOEVER DIRECTLY OR INDIRECTLY -
Design and Implementation of Internet of Things for Home Environment
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. Design and Implementation of Internet of Things for Home Environment A thesis presented in partial fulfilment of the requirements for the degree of Master of Engineering in Electronics and Computer Systems Engineering at Massey University, Manawatu, New Zealand. Sean Kelly 2013 Abstract An integrated framework for smart home monitoring towards internet of things based on ZigBee and 6LoWPAN wireless sensor networks is presented. The system was developed to retrofit existing sub systems of wireless technologies in order to reduce cost, and complexity. The practical internetworking architecture and the connection procedures for reliable measurement of smart sensors parameters and transmission of sensing data via internet are presented. A ZigBee based sensing system was designed and developed to see the feasibility of the system in home automation for contextual environmental monitoring. The ubiquitous sensing system is based on combination of pervasive distributed sensing units and an information system for data aggregation and analysis. Results related to the home automation parameters and execution of the system running continuously for long durations is encouraging. The prototype system (ZigBee based) was tested to generate real-time graphical information rather than using a simulator or a test bed scenario. A trail has also been performed with 6LoWPAN technology to provide functionality as the ZigBee based system. The overall internetworking architecture describes the integration of a low power consumption wireless sensor network with the internet. -
Guidelines on Mobile Device Forensics
NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority. -
User Guide TABLE of CONTENTS the Basics Phone Overview
User guide TABLE OF CONTENTS THE BASICS Phone overview...........................................................................................................................................................................4 Navigating your phone..............................................................................................................................................................7 Installing the battery ..................................................................................................................................................................8 Removing the battery and SIM card.........................................................................................................................................9 Turning your phone on and off ...............................................................................................................................................12 Home screen ............................................................................................................................................................................12 Phone status Icons.....................................................................................................................................................................12 Notifications ..............................................................................................................................................................................14 CONVENIENT FEATURES Vibrate mode ............................................................................................................................................................................15 -
Wireless Temperature Monitoring System Using Wireless Sensor Networks
ISSN: 2278 – 909X International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 1, Issue 4, October 2012 WIRELESS TEMPERATURE MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Author -Prof.S.S.Sarade Prof.A.C.Joshi Prof. SACHIN S. PATIL Prof.A.N.Shinde R.I.T Rajaramnagar ADCET, ASHTA A.D.C.E.T ASHTA ADCET, ASHTA [email protected] Abstract - In today’s world we are facing with and networking possibilities with a variety of many different types of emergencies in networks such as CISCO messaging client or a the indoor environment. Response to such desktop program in order to make messaging emergencies is critical in order to protect easily integrated with existing systems. Using resources including human life and also we can wireless sensor networks it is possible to inform save property from damage. In this Paper, we appropriate user in timely manner. It emergency present wireless sensor network for Temperature detection and it is possible to save life of people, monitoring. Which can report the emergency to it will avoid damage of property. [1] the users in various forms, such as pop-ups on a The advancement of science and Computer screen, SMS on their cell phones and technology are dependent on parallel progress in so on. Due to this flexibility of reporting low sensing and measurement techniques. The cost wireless sensor network prepared for reason for this is obvious. As science and emergency response system of future. In this technology move ahead new phenomena and paper we are going to develop three wireless relationships are discovered and these advances sensor nodes and we have to place in different make new types of imperative. -
Wolfbot: a Distributed Mobile Sensing Platform for Research and Education
Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) WolfBot: A Distributed Mobile Sensing Platform for Research and Education Joseph Betthauser, Daniel Benavides, Jeff Schornick, Neal O’Hara, Jimit Patel, Jeremy Cole, Edgar Lobaton Abstract— Mobile sensor networks are often composed of agents with weak processing capabilities and some means of mobility. However, recent developments in embedded systems have enabled more powerful and portable processing units capable of analyzing complex data streams in real time. Systems with such capabilities are able to perform tasks such as 3D visual localization and tracking of targets. They are also well-suited for environmental monitoring using a combination of cameras, microphones, and sensors for temperature, air-quality, and pressure. Still there are few compact platforms that combine state of the art hardware with accessible software, an open source design, and an affordable price. In this paper, we present an in- depth comparison of several mobile distributed sensor network platforms, and we introduce the WolfBot platform which offers a balance between capabilities, accessibility, cost and an open- design. Experiments analyzing its computer-vision capabilities, power consumption, and system integration are provided. Index Terms— Distributed sensing platform, Swarm robotics, Open design platform. I. INTRODUCTION ireless sensor networks have been used in a variety of Wapplications including surveillance for security purposes [30], monitoring of wildlife [36], [25], [23], Fig 1.WolfBot mobile sensing platform and some of its features. and measuring pollutant concentrations in an environment [37] [24]. Initially, compact platforms were deployed in order to As the number of mobile devices increases, tools for perform low-bandwidth sensing (e.g., detecting motion or distributed control and motion planning for swarm robotic recording temperature) and simple computations. -
Long-Range Wireless Radio Technologies: a Survey
future internet Review Long-Range Wireless Radio Technologies: A Survey Brandon Foubert * and Nathalie Mitton Inria Lille - Nord Europe, 59650 Villeneuve d’Ascq, France; [email protected] * Correspondence: [email protected] Received: 19 December 2019; Accepted: 11 January 2020; Published: 14 January 2020 Abstract: Wireless networks are now a part of the everyday life of many people and are used for many applications. Recently, new technologies that enable low-power and long-range communications have emerged. These technologies, in opposition to more traditional communication technologies rather defined as "short range", allow kilometer-wide wireless communications. Long-range technologies are used to form Low-Power Wide-Area Networks (LPWAN). Many LPWAN technologies are available, and they offer different performances, business models etc., answering different applications’ needs. This makes it hard to find the right tool for a specific use case. In this article, we present a survey about the long-range technologies available presently as well as the technical characteristics they offer. Then we propose a discussion about the energy consumption of each alternative and which one may be most adapted depending on the use case requirements and expectations, as well as guidelines to choose the best suited technology. Keywords: long-range; wireless; IoT; LPWAN; mobile; cellular; LoRa; Sigfox; LTE-M; NB-IoT 1. Introduction Wireless radio technologies, such as Wi-Fi, are used daily to enable inter-device communications. In the last few years, new kinds of wireless technologies have emerged. In opposition to standard wireless technologies referred to as “short-range”, long-range radio technologies allow devices to communicate over kilometers-wide distances at a low energy cost, but at the expense of a low data rate. -
The International Journal of Science & Technoledge
The International Journal Of Science & Technoledge (ISSN 2321 – 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Wireless Microcontroller Based Mutlidrop System L. J. Kore P.G. Student, Electronics & Telecommunication Enginerring Department, SVERI’s College of Engineering, Pandharpur, Maharashtra, India Dr. Bodhe S. K. Professor, Electronics & Telecommunication Enginerring Department, SVERI’s College of Engineering, Pandharpur, Maharashtra, India Abstract: In our daily life, Wireless based industrial automation is a prim e concern. The field of approach to Zigbee Based Wireless Network for Industrial Applications has been standardized now a days. A wireless control and monitoring system for a industrial machines realized using the Zigbee communication protocol for safe and economic data communication in industrial fields where the wired communication is either more expensive or impossible due to physical conditions. The machines can be controlled wireless due to the microcontroller interface developed with Zigbee. It is also possible to protect the machines against some critical conditions such as change in temperature, humidity, light, pressure etc. so controlling, monitoring, and protection of the system are realized in real time. So the wireless communication technology is used in this paper, controlling abilities of the system are increased and also hardware and the necessities of other similar equipment for data communication are minimized. We concerns with designing and implementing the system which can be utilized effectively to reduce human efforts and accuracy of measurement of data. The main work behind this is to make instrumentation system more power full by enabling it modern communication technologies. Here we are using different sensors like temperature and humidity to measure surrounding temperature and humidity.