Professional Documents
Culture Documents
TP Enterprise 5.2.2 - Rev2 SAAS User Guide
TP Enterprise 5.2.2 - Rev2 SAAS User Guide
Software as a Service
User Guide
Under NDA
NOTICE
This document contains proprietary and confidential material of ACTILITY SA. This document
is provided under and governed by either a license or confidentiality agreement. Any
unauthorized reproduction, use, or disclosure of this material, or any part thereof, is strictly
prohibited.
The material provided in this document is believed to be accurate and reliable. However, no
responsibility is assumed by Actility SA for the use of this material. Actility SA reserves the
right to make changes to the material at any time and without notice. This document is
intended for information and operational purposes only. No part of this document shall
constitute any contractual commitment by Actility SA.
Portions of this documentation and of the software herein described are used by permission
of their copyright owners.
Actility, ThingPark, are registered trademarks of Actility SA or its subsidiaries may also be
registered in other countries.
Other denoted product names of Actility SA or other companies may be trademarks or
registered trademarks of Actility SA or its subsidiaries, or their respective owners.
Headquarters
Actility Lannion,
Actility S.A 4 rue Ampère BP 30225
22300 Lannion France
www.actility.com
REFERENCE INFORMATION
Documents Author
R1 ThingPark Enterprise Installation and Configuration Guide N Boulahya
▪ 10.6.3 Definitions
For more information about earlier, new and enhanced functionalities implemented in this
document, see What’s New History.
Acronym Definition
AS Application Server
AS Key Application Server Key
BS Base Station
DC Duty Cycle
DevAddr Device Address in the network
DevEUI Unique Address of the Device
End Device A sensor or an actuator
ESP Estimated Signal Power
FCNT Frame Counter
FSK Frequency Shift Keying
HTTP Hypertext Transfer Protocol
IoT Internet of Thing
IPsec Internet Protocol Security (IPsec)
KPI Key Performance Indicator
LC Logical Channel
®
LoRa Long Range
LoRaWAN® Long-Range Wide Area NW
LRC Long-Range Controller
LRR Long-Range Relay
LRR ID Base Station Identifier - Unique Identifier on the Network
LRR UUID Long-Range Relay Universal Unique IDentifier
MAC layer Media Access Control layer
MQTT Message Queuing Telemetry Transport
NS Network Server
NOC Network Operations Center
OCP On Customer Premises
TNP Time synchronization using Network Synchronization Protocol
PER Packet Error Rate
PKI Public Key Infrastructure
RF Region Radio Frequency Channel Plan
RSSI Received Signal Strength Indicator
SaaS Software as a Service
NOTICE ................................................................................................................................. 2
VERSIONS.............................................................................................................................. 3
1 SCOPE ................................................................................................................ 14
This document is intended for users of ThingPark Enterprise Software as a Service (SaaS) for
5.2.2 release.
ThingPark Enterprise allows then enterprise IoT administrators to manage the LoRaWAN®
network:
▪ Form the network infrastructure by creating, managing and removing LoRaWAN® Base
Stations (also called gateways).
▪ Monitor the network operations using dashboards, alarms and status data.
▪ Control the flow of data to your application servers or to popular IoT cloud platforms.
The LoRaWAN® network consists of Base Stations which can be installed both indoor and
outdoor. Devices, which comply with LoRaWAN® 1.0.x and LoRaWAN® 1.1 versions of the
protocol, are not attached to any Base Station in particular. Any Base Station which receives
an uplink frame will process it: this macro-diversity increases the robustness of
communication in the unlicensed radio spectrum. Base Stations transmit the uplink frames
received from LoRaWAN® Devices, together with specific radio receiver metadata, to the
LoRaWAN® Network Server function of ThingPark Enterprise, which deduplicates the uplink
frames and relays this data to configured Application Servers. The Network Server function in
the ThingPark architecture runs the LoRaWAN® protocol state machine and network layer and
selects dynamically the best Base Station when transmitting downlink frames received from
Application Servers.
▪ Devices listen for downlink frames from the Base Stations, after each uplink
transmission (class A), periodically (class B), or always (class C).
▪ Base Stations proxy the data to and from the via a backhaul wide area network,
typically Ethernet, cellular M2M or WIFI.
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 15
▪ The Network Server relays the data frames to/from Applications Servers via a
messaging protocol (e.g. HTTPS), and to/from cloud IoT platforms by their native
connectors.
The following diagram illustrates the data flow in the IoT private Network. XXXX IOT_image XXXX
It is compulsory that you add at least one Application prior to creating the Device, so that you
can associate the Device to the Application.
Requirements Explanation
Installation and This action is performed by your Vendor or your ThingPark Enterprise Channel
configuration of the prior to delivering the TPE SaaS platform.
SaaS platform
Supported browsers
▪ The minimum version of Google Chrome browser is 72 and 64 for
Mozilla Firefox browser.
▪ Note Older browsers or other browsers may run the Application but
can experience random issues.
3. Click Submit.
A dashboard that looks like the one that is shown in 5 Default Dashboard.
Note If you want to view the number of licenses that you purchased, click Manage >
Operating Management. Then, the License Management panel displays. For more
information, see 10.2 Managing the License.
Areas Explanation
Top bar area Corresponds to the Information menu. For more information, see 5.1.1
Top Bar Area.
Left menu bar Lists the menu options related to the network management. For more
information, see 5.1.2 Left Menu Bar.
Center pane Corresponds to the network elements as well as the News part. For more
information, see 5.1.3 Center Pane.
▪ Hides or shows the columns in the menu. When you click the
lines, a menu displays with a checklist. It allows you to select
the items that you want to display in the menu.
▪ Refers to the Home page. It takes you back to the dashboard.
Sub-area Description
Base Station
▪ This pie-chart displays the status of Base Stations. Clicking one
of the sectors of the pie chart takes you to the corresponding
Base Station’s list.
Devices
▪ This pie-chart displays the status of Devices. Clicking one of the
sectors of the pie-chart takes you to the corresponding Device’s
list.
Applications
▪ This table lists the provisioned applications and the number of
Devices that are associated to each application.
▪ Click a line to go to the application management or click the
title to see the complete list.
▪ Clicking the paper airplane posts your update to the news list.
▪ The widget is refreshed after update or delete.
Clicking the trash symbol deletes your edit (after confirmation).
▪ All users may post and share news messages.
▪
Recent Alarms
▪NoteTheOnly
area where you can view recent alarms.
the last 10 most recent alarms are visible on the
dashboard.
▪ Clicking the widget takes you to Alarms Management.
Color Description
Active (Green)
▪ A green bullet means that the Base Station is connected to the
Network Server and is able to send or receive LoRaWAN®
packets to or from a Device.
Initialization
(Orange) ▪ An orange bullet is an initialized Base Station which has not
communicated yet. It corresponds to the initial Base Station
status after its creation.
Connection Error
(Red) ▪ A red bullet is a Base Station that has backhaul connection
issues and cannot communicate with the Network Server.
Radio Error (Grey)
▪ A grey bullet relates to a Radio Error - A Base Station that has
radio transmission issues and cannot send or receive LoRaWAN ®
packets to or from a Device.
The difference in the color code used between that of the Base Stations and the Devices
resides in the fact that the grey color (Radio error) only apply to Base Stations.
Color Description
Active (Green)
▪ A green bullet means that the Device is commissioned, and its
communication pattern corresponds to the expected profile,
e.g. the uplink frequency matches the minimal frequency
configured in the Device profile.
5.1.5 Buttons
Buttons are used to perform the following actions:
Button Description
Button Description
Base Stations,
Devices and ▪ You can access these network elements using the dedicated
menu, the Search button or the network element’s area.
Applications
Base Station element
and Device element ▪ You can access single network elements with their status by
clicking each color of the circle of the network element.
Application element
▪ You can access each Application by clicking the Application icon
in the Application area.
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 24
5.2 Using the Tablet Version of ThingPark Enterprise
ThingPark Enterprise is also available on tablet as an Early Availability version.
Functionalities are the same as for a TPE OCP platform with the following limitations:
Functionalities Description
"Eye" button ▪ Is used to show the clear text password on the Login panel.
▪ Is hidden.
Moving over ▪ Is hidden. However, tooltips associated with buttons are
tooltips available.
Widgets ▪ Are displayed within the screen.
▪ Are always displayed one below the other and never next
to each other.
Note Other differences from a regular browser version that are not listed yet (above) may be
present.
5.3.2 Prerequisites
Prior to using My Profile you must have the following information ready to be used:
▪ A user account.
▪ A valid email address.
Parameter Definition
First Name
▪ Designates your first name.
Last Name
▪ Designates your last name.
Email Address
▪ Designates a valid email address
Phone Number
▪ Designates a phone number or a landline that works.
Language
▪ Provides the language you want to work in. English (USA) is the
default language.
Password
▪ Designates the old, new and confirmation password.
▪ You have two ways for modifying personal information. Either you use the My Profile
widget (described in 10.3.3 Modifying or Deleting User Profiles or change your Profile
through the My Profile widget on the upper right side of the screen.
Note All fields with an asterisk are mandatory.
If you choose to change your password and for your password to turn green, ensure the
following:
▪ The password must contain at least 6 characters.
▪ The password must contain at most 16 characters.
▪ The password must contain digit characters: The password must contain special
characters in this list: ‘ ~ @ # $ % ^ & * () _ - + = { } [ ] \ | : ; < > , . ? / .
Otherwise, the password strength will be considered as weak and be displayed in red.
1. Confirm your new password.
2. Click Save.
If you changed your password correctly a message in a green box appears on the
upper right side of your screen to tell you that the password has been updated.
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 26
5.4 Using Contact us
5.4.1 Overview
Prior to using Contact us section when you have any question regarding the usage of the
ThingPark Enterprise platform.
5.4.2 Prerequisites
Prior to using Contact us you must have the following information ready to be used:
▪ A user account.
▪ A valid email address.
Parameter Definition
Object
▪ Designates what you need support from while using the
ThingPark Enterprise platform
Your message
▪ Describes the problem that you encounter.
Organization
▪ Designates the name of the company where you have a user
account and email.
Email address
▪ Designates the email address under which you are registered.
Phone number
▪ Specifies the phone number where one can reach you, if need
be.
2. Describe briefly the object of your request. For instance, write “I created a Base
Station, but it does not display in the list of created Base Stations.”.
4. Click Send.
▪ Secure the transmissions between the Base Stations and the Network Server.
▪ Quickly create another Base Station by using an existing Base Station as a template.
▪ Check the system load of a Base Station: CPU usage, RAM usage and Disk usage.
The ThingPark Enterprise license model that you purchase allows you to create the size of the
network that you wish.
For more information, see 10.2 Managing the License.
6.2.2 Workflow
The private/public key authentication is used when the Base Station contacts the Network
Server for the first time. That allows a specific Base Station to retrieve its own X.509 certificate.
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 29
The X.509 certificate is then used by the Base Station to establish the IPsec tunnel securing
the link toward the Network Server of the ThingPark Enterprise SaaS platform.
IP filtering was used in previous ThingPark Enterprise versions instead of private/public key
authentication. This new authentication scheme provides a stronger security and more
flexibility as public IP of the Base Station is not needed to be static.
For more information, see X.509 on this resource.
The workflow is illustrated in the following graphic. XXXXpublic_key_authentication_5.2.2 - BXXX
▪ Step 1: Get the LRR UUID and the Public Key using the Base Station configuration tool
called SUPLOG via SSH. Note that the LRR UUID is also available on the package of the
Base Station.
▪ Step 2: Activate the Base Station using the ThingPark Enterprise User Interface.
For more information, see the TP Enterprise BS Installation Guide corresponding to your Base
Station model. This document is available by clicking Download the base station
documentation from the Base Station’s detailed view.
For more information, see 6.3.2 Activating A Base Station in 2 Steps.
6.2.3.2 CASE 1 - WHEN ACTIVATING THE FEATURE ON AN EXIST ING BASE STATION
Pre-requisites To activate the Public Key Authentication mode on an existing Base Station, the
LRR software version should be at least 2.4.88 or higher. If not, upgrade the LRR software
version. For more information, see 6.5.3 Updating the Base Station Information.
▪ Step 2: Add the new Public Key using the ThingPark Enterprise User Interface.
The following table summarizes the cases where you need to activate Public Key
Authentication on a Base Station on a ThingPark Enterprise SaaS platform.
Parameter Definition
LRR UUID
▪ Long-Range Relay Universally Unique Identifier, that is Base
Station Universally Unique Identifier. The Base Station Universal
Unique Identifier (LRR UUID) is a concatenation of LRR OUI and
LRR GID.
▪ <LRR-OUI> is the IEEE OUI of the Base Station vendor (6
hexadecimal characters).
<LRR-GID> is the Base Station identifier relatively to the vendor
(allowed characters: [0-9][a-z]-_, max 256 characters).
▪ IMST
▪ Kerlink
▪ Multitech
▪ Tektelic
▪ UfiSpace
6.3.2.1 GETTING THE LRR UUID AND THE PUBLIC KEY USING SUPLOG VIA SSH
1. Connect to the Base Station using its IP address. For instance, 10.100.52.75.
2. Connect to SUPLOG using the credentials that your Vendor or your ThingPark
Enterprise has provided you with.
Note Ensure that you display a full window of the Base Station configuration tool. This will
ensure that you copy the whole Public Key.
The main menu is displayed. This looks like the screen shown in 6.5.7.1 Using the
Remote Access.
3. In the main menu go to LRR configuration.
4. Go to Get LRR UID.
5. From the result window that displays copy/note the UID, for instance, 001558-
46584254C00014EF.
6. Go back to the Main Menu.
7. Go to VPN Configuration.
8. Go to Generate new key pair.
1. Click Base Stations > Create or from the Dashboard, click the icon.
The following screen (excerpt) appears: xx004_GW Creation_1_Emptyxx
Note You cannot set the Base Station location unless you have filled in the Base
Station information.
A confirmation message appears on the upper right corner of your screen telling
you that the Base Station has been created.
This message also provides you with the option to duplicate the Base Station or
to review its parameters.
Duplicate the Base Station if you want to create the same type of Base Station. Otherwise,
View the Base Station.
▪ Execute Base Station operational functions for debugging and maintenance purposes.
Parameter Definition
LRR UUID
▪ Long-Range Relay Universally Unique Identifier, that is Base
Station Universally Unique Identifier. The Base Station Universal
Unique Identifier (LRR UUID) is a concatenation of LRR OUI and
LRR GUID.
▪ <LRR-OUI> is the IEEE OUI of the Base Station manufacturer (6
hexadecimal characters)
▪ <LRR-GID> is the Base Station identifier relatively to the vendor
(allowed characters: [0-9][a-z]-_, max 256 characters)
o Kerlink: <LRR-GID> = full eth0 MAC address
o Cisco: <LRR-GID> = full Cisco S/N
LRR ID
▪ Base Station network Identifier, unique within the network
(allocated by network).
▪ LRR ID (32 bits) is automatically generated and dynamically
associated with the LRR.
SW Version
▪ LRR software version that has been installed on the Base
Station.
SW Restart
▪ Last restart time of the Base Station LRR software.
Backhaul Networks
Traffic ▪ Traffic exchange on the backhaul network interface between
the Base Station and the Network Server. This interface may use
different physical technologies such as Ethernet, cellular
connectivity or Wi-Fi.
Last Uplink /
Downlink ▪ Frame details for the last uplink and downlink messages
processed by the gateway.
The Base Station’s type icons are decorated with a color bullet, corresponding to the overall
Base Station’s status. For more information about the colors of the bullets, see 5.1.4.1 Color
Codes used for Base Stations.
Note If you have reached the maximum number of Base Stations, a message informing you
about it will display on your screen.
In the Base Station’s panel on the upper right side of your screen, you can filter Base Stations
by state.
Note The detailed information screen of the Base Station allows you to set the
parameters of the Base Station. For more information, see 6.5 Managing Base
Stations.
▪ View radio traffic and network activity history, including transmit and receive duty-
cycle, receiver noise level and signal strength.
▪ Inspect recent LoRaWAN® communication frames, including data payload and MAC
command details to troubleshoot LoRaWAN® communication issues.
▪ Inspect LoRaWAN® RF physical layer subsystem activity and error counters, restart
the RF subsystem if needed.
▪ Perform a spectrum analysis of the radio frequencies on your Base Stations. Scanning
the radio frequency will determine the best radio frequencies to use by your Base
Stations in the RF Region plan. For more information on spectrum analysis, see the
Spectrum Analysis User Guide.
▪ Monitor time synchronization status of the Base Station, including current time
synchronization source.
▪ View Devices which have a given Base Station as their best server.
Parameter Definition
LRR UUID
▪ Long-Range Relay Universally Unique Identifier, that is the Base
Station Universally Unique Identifier. The Base Station Universal
Unique Identifier (LRR UUID) is a concatenation of LRR OUI and
LRR GUID.
▪ <LRR-OUI> is the IEEE OUI of the Base Station vendor (6
hexadecimal characters).
<LRR-GID> is the Base Station identifier relatively to the vendor
(allowed characters: [0-9][a-z]-_, max 256 characters)
o Kerlink: <LRR-GID> = full eth0 MAC address
o Cisco: <LRR-GID> = full Cisco S/N
LRR ID
▪ Base Station network Identifier allocated by the network and
unique within the network.
▪ Base Station network Identifier, unique within the network
(allocated by network).
▪ LRR ID (32 bits) is automatically generated and dynamically
associated with the LRR.
LRR Software Version
▪ Version of the Long-Range Relay software installed on the Base
Station.
▪ A specific widget close to the field of this parameter shows the
Base Station’s versions. This includes:
o Base Station Firmware Version that is installed on the
Base Station
o Field-Programmable Gate Array (FPGA) Firmware
Version that is installed on the Base Station
o Hardware Abstraction Layer (HAL) Version that is linked
with the LRR software running of the Base Station
o Hardware Version (indicated, if available)
o OS Version (indicated, if available)
o Custom Build Version (indicated, if available)
o Configuration Version(indicated, if available)
Note When providing the list of LRR software packages
available for upgrade, only LRR software packages
compatible with the firmware version and the FPGA
version currently installed on the targeted Base Station
are offered.
RF Region
▪ The LoRaWAN® specification “LoRaWAN® Regional Parameters”,
defines several RF profiles depending on the regional RF
regulatory context. These regional parameters are grouped into
a set of radio parameters along with a frequency allocation that
is adapted to the ISM Band called RF Region.
Additional
information ▪ Any useful information related to the Base Station. We
recommend that you write information related to the antenna,
as well as precise location information (Editable).
Time Synchronization
(NTP)
▪ Time synchronization using Network Synchronization Protocol
(NTP); refers to Base Station clock synchronization service.
Last Uplink
▪ Last packets that were sent from a LoRaWAN® Device and
received by the Base Station.
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 42
Parameter Definition
Last Downlink
▪ Last packets were transmitted by the Base Station.
Asymmetric downlink
channel ▪ Channels that are used for downlink messages for specific ISM
bands, using different frequency than uplink channels.
Asymmetric downlink channels are used for instance in US915
RF region.
System load
▪ CPU, RAM and disk usage are indicators of the system load of
the Base Station.
CPU
▪ Central Processing Unit usage of the Base Station.
RAM
▪ RAM usage of the Base Station.
Disk
▪ Disk usage of the Base Station, often Flash memory disk.
X.509 certificate
▪ An X.509 certificate is a digital certificate that uses the widely
accepted international X.509 Public Key infrastructure (PKI)
standard to verify that a Public Key belongs to the user,
computer or service identity contained within the certificate.
2. Only the RF Regions having an ISM band compatible with the Base Station are
proposed in the drop-down list.
Note The Base Station upgrade applies only to the LRR software. It concerns neither the
Base Station firmware, nor the FGPA.
Caution Prior to performing an LRR software version upgrade, we recommend that you first
backup the current LRR software and configuration before upgrading the new version. For
more information, see 6.5.7.2 Using the Backup Procedure.
Note The LRR software upgrade procedure will take several minutes while the Base
Station will be unavailable during this time.
3. Click Upgrade.
A dialog box regarding the LRR software upgrade opens. This dialog box will guide
you through the whole procedure.
4. You are asked to confirm each action that is required for the upgrade.
The LRR software upgrade runs until the new software version is downloaded and
the Base Station is upgraded. If the upgrade is successful, a similar dialog box
displays on your screen:
5. Click Close.
2. Click Duplicate.
You are redirected to the Creating a Base Station in 2 Steps screen. For more
information, see 6.3.2 Activating A Base Station in 2 Steps.
3. Fill in the parameters, as requested.
Prior to restarting the Base Station, you can check the latest restart time in the widget.
Otherwise, proceed as follows:
1. Click Base Station Restart to restart the Base Station, if need be.
An animation is visible on the Restart Base Station button while the command is being
executed. If you want to check the latest restarting date, check the Base Station Widget.
A message in a green box appears on the upper right side of your screen to ask you if
you want to confirm your action. You are informed that the action may take several
minutes.
2. Click Confirm.
The button displays an animation to indicate that the scan is in progress. When the
scan is complete, the spectrum analysis displays from the Spectrum Analysis Tool. For
more information, see 9.6.5 Using the Spectrum Analysis Tool.
3. Click Cancel to cancel the scan.
1. Analyze the different configurations that you need for completing advanced
maintenance tasks and troubleshooting operations on the Base Station.
Note You can retrieve the Public Key either using SUPLOG via SSH or using the Remote
Access which is accessible from the ThingPark Enterprise User Interface.
1. Click Base Stations > List and select the updated Base Station for which you want to
change the Public Key (001558-46584254C00014EF).
2. In the Base Station commands of the Base Station Status Information, click Remote
Access.
You are asked if you want to enable the Public Key Authentication.
5. Enter “x” and confirm your choice.
6. Generate the Public Key as explained in Getting the LRR UUID and the Public Key
Using SUPLOG via SSH.
7. Copy the new Public Key.
6.5.8.2 ADDING THE NEW PUBLIC KEY USING THE THINGPARK ENTERPRISE USER
INTERFACE
Caution You must use this command carefully as setting a wrong Public Key will disconnect
the Base Station.
4. Enter the new Public Key that you retrieved from SUPLOG or the remote access.
5. Click Save.
1. Click Base Stations > List and the name of the Base Station for which you want to
check the authentication.
The Base Station security information appears as follows: XX base station security_5.1.5X
When the old certificate is revoked and replaced by a new one, the Base Station loses
connection to the ThingPark Enterprise backend. The interruption duration is 5 minutes if the
LRR version is 2.4.88 or higher (30 minutes for LRR versions < 2.4.88).
Caution To avoid service disruption, regenerating the security certificate of a Base Station
should be limited to the case when the current certificate has been corrupted/compromised.
Note If the location using Google Maps does not display, it means that the Google
Maps API key has not been installed on the platform. For more information, see 4.1.1
Prerequisites.
Note To choose the Google Maps coordinates, you can also move the cursor related
to the Base Station over the map or click any location on the map. The cursor moves
to the position where you click.
In the example, you can view the distribution of the network activity of a Base Station
for a given time.
In this example, the widget is adapted per configured network interface. In this case
the mobile network is not connected and not shown.
2. Click Ping Base Station to test the Base Station backhaul connection.
A message in a green box appears on the upper right side of your screen to tell you
that the Base Station has been pinged.
In this graph, you can view that the counted messages are those that are exchanged
between the Base Station and the core network at the applicative level. This applies
both to LoRaWAN® traffic and signaling traffic.
2. Move the mouse over “Sent” or “Received” to view specifically the sent or the
received packets.
3. Move the mouse over a day to view the sent and received packets at the same time.
You should have only a small fraction of frames using the lower data rates (SF11 and
SF12). As these low data rates use more airtime, LoRaWAN® networks have lower
capacity at low data rates. Devices will use more energy when operating at lower
data rates. If you see that your network operates mostly at SF11 and SF12:
▪ Check that the aggregate uplink duty cycle remains below 10% for all RF channels
(see section 6.5.15 below).
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 58
▪ Check that the aggregate downlink duty cycle remains below regulatory limits. If
not, you will experience downlink packet drop as ThingPark Enterprise will
enforce duty cycle compliance.
▪ Check that Base Station antenna is placed in a position where it has least
obstacles between Devices and Base Station antenna.
6.5.15 Checking the RF Signal Strength, Background Noise and Duty Cycle
1. Click Base Stations > List and the name of the Base Station for which you want to
check the RF signal strength, background noise and duty cycle.
RF signal strength, background noise and duty cycle information appear as follows:
XXXX signal_strength_noise_duty_cycle_5.2.2 XXXX
The uplink and downlink duty cycles are provided for each Logical Channel (LC).
4. Move the mouse over “Uplink Duty Cycle” or “Downlink Duty Cycle” to view
specifically the uplink or downlink duty cycles.
5. Move the mouse over time axis to view the uplink and downlink duty cycle
simultaneously.
2. Select Received Signal Strength Indicator (RSSI) or Signal to Noise Ratio (SNR) in the
upper right corner of the graph to view the corresponding time series.
▪ Symmetrical Logical channels (same frequency used for uplink and downlink
communication), in which case both uplink and downlink data will appear
when you select the Logical Channel tab.
2. Move the mouse over CPU, RAM or a Disk to view the usage level details.
3. Move the mouse over the time axis to view a usage level summary for a specific day.
The number of displayed disks shown on the graph depends on the number of partitions which
are configured on the Base Station. One disk is displayed per partition. The number of disks
depends on the Base Station model.
▪ Amazon AWS® IoT: cloud applications leveraging the Amazon AWS® infrastructure
and using Amazon AWS® APIs as a communication method.
▪ IBM Watson® IoT: cloud applications leveraging the IBM Watson® infrastructure and
using IBM Watson® APIs as a communication method.
▪ Microsoft Azure® IoT Hub: cloud applications leveraging the Microsoft Azure®
infrastructure and using Microsoft Azure® APIs as a communication method.
Parameter Definition
Application Name ▪ Name of the Application that you want to register (Editable).
Content Type ▪ The type of encoding used to report Device data to your
Application (XML or JSON format) (Editable).
In addition, your HTTPS application server will need to understand and handle the Token
security key provided by ThingPark Enterprise, which is required to send downlink information
from the Application Server to ThingPark Enterprise. For more information, see the ThingPark
Enterprise LRC-AS Tunnel Interface Developer Guide LoRaWAN®.
A form (empty) that looks like this displays: XXXX https_application_5.2.2 XXXX
A message in a green box appears on the upper right side of your screen to
confirm that the Application has been created.
5. Click View the Application to view the application details.
Parameter Definition
Application Name
▪ Name of the Application that you want to register (Editable).
Downlink Port
▪ If downlink is supported and enabled, indicate which LoRaWAN ®
port should be used to send the downlinks to the associated
Devices. As only one type of Amazon AWS platform can be
created, you should set a homogeneous set of Devices in the
Amazon AWS IoT account.
Account Prefix
▪ Account Prefix of the AWS IoT account.
AWS Region ▪ Region that is hosting the AWS Application for example us-west-
2.
Protocol ▪ Protocol to be used for the connection with AWS IoT account -
WSS (MQTT over Web Services Security) or SSL (MQTT with
Secured Sockets Layer certificates).
Private Key ▪ The private key file registered in your AWS IoT account.
▪ This parameter does not apply to the WSS protocol.
Account Prefix
▪ Account prefix of the AWS IoT account in format alpha numeric.
▪ To obtain an AWS server URL you will need the account prefix
and the region attributes
<accountPrefix>.iot.<region>.amazonaws.com
In our example:
o "accountPrefix": "a2shubp7zpiozr"
o "region": "us-west-2"
The URL will be a2shubp7zpiozr.iot.us-west-2.amazonaws.com
For detailed information on Amazon AWS IoT configuration and parameters, see
https://aws.amazon.com/iot/
1. Select the Amazon IoT application type as explained in 7.3.1.2 Connecting an HTTPS
Application in 2 Steps.
4. Click Save.
A message in a green box appears on the upper right side of your screen to tell you
that the Application has been created.
5. Click View the Application to view the application details.
Application Name
▪ Name of the Application that you want to register (Editable).
Host Name
▪ The Hostname of your Azure IoT Hub account. Example:
myaccountname.azure-devices.net
IoT Hub Name
▪ Hub name of the IoT network
Primary key
▪ A valid key for the selected access policy within the Azure IoT
Hub account.
Access Policy Name
▪ The shared Access Policy Name within the Azure IoT Hub
account. Example: iothubowner.
Protocol
▪ Protocol to be used for the connection.
▪ Only ‘AMQPS’ protocol is supported. AMQP is to be used on field
and cloud gateways to take advantage of connection multiplexing
across Devices.
▪ Other protocols exist:
o HTTPS - Use for Devices that cannot support other
protocols.
o MQTT - Use on all Devices that do not require to connect
multiple Devices.
For detailed information on Microsoft Azure IoT configuration and parameters, see
https://docs.microsoft.com/en-us/azure/iot-hub/
3. Click Save.
Application Name
▪ Name of the Application that you want to register (Editable).
Downlink port
▪ If downlink is supported and enabled, indicates which LoRaWAN®
port should be used to send the downlink to the Device.
Organization ID
▪ Identification number of the organization.
Device Type
▪ IBM Watson IoT Device type to be associated with the Devices
processed by the Application.
Gateway Type
▪ Watson IoT gateway type of the Watson IoT gateway that is used
by the Application.
Gateway ID
▪ ID of the gateway that is created in the Watson IoT account,
which is used by the Application.
Gateway Token
▪ Authentication token of the Watson IoT gateway that is used by
the Application.
API Key
▪ Watson IoT API key to be associated with the Application.
Authentication
Token ▪ The Watson IOT Authentication Token to be associated with the
Application.
Topics
▪ Provides a list of port/link associations. Messages related to
uplink ports in that list, will be pushed to the corresponding Beta
IBM Watson topics.
▪ Overrides ‘the Downlink Port’ parameter. Downlink port means
that on receiving a downlink on a specific topic, the downlink is
transmitted on a specific port. There is a relationship between
port and downlink because you need to define a port on the
reception of a downlink.
▪ Topic examples:
o If the port is 2, then the topic is humiditySensor.
o If the port is 3, then the topic is temperatureSensor.
Additional
Information ▪ Any useful information related to the application.
1. Select the IBM Watson IoT Application type as explained in 7.3.1.2 Connecting an HTTPS
Application in 2 Steps.
Parameter Definition
Name ▪ A name you want for your application that allows you to identify
it on your IoT network. For example, “Vehicle Tracking”, “Smart
Lighting”.
Application ID ▪ Application IDentifier
Hostname ▪ The hostname/IP and port of your MQTT server. For example,
“myhostname.com:8883”.
Protocol ▪ Protocol to be used for your connection with your MQTT server.
Choose among SSL, WSS and TCP.
Certificate
▪ The client certificate file (X.509 with .crt format only) used to
connect to your MQTT server. Only required when you are using
double factor authentication (login/password and client
interface).
A message in a green box appears on the upper right side of your screen to confirm
that the Application has been created.
7. Click View the Application to view the application parameters.
Parameter Definition
Application Name
▪ Name of the Application.
Last Uplink (UL) ▪ Timestamp of the Uplink radio that is received on the best Base
Station.
Last Downlink (DL) ▪ Timestamp of the Downlink radio that is sent on the best Base
Station.
4. Click Save.
instance to be updated.
▪ Abeeway
▪ Adeunis RF
▪ Digital Matter
▪ Finsecur
▪ Flashnet
▪ Foxconn
▪ FullUp sprl
▪ GlobalSat
▪ Multitech
▪ SemTech
▪ Sensing Labs
▪ Solvera Lynx
▪ Twave Technologie
▪ Watteco/NKE
Note Other brands can be connected upon request. Contact your Vendor or your ThingPark
Channel.
Parameter Definition
Device Name
▪ Name of the Device that you want to register
Device Model
▪ Name of the Device model.
▪ Each Device model is associated to a preconfigured LoRaWAN ®
profile template which ensures interoperability with the Device.
DevEUI ▪ Globally unique address of the Device. The DevEUI is usually
written on the Device casing. The DevEUI is based on IEEE
Organizationally Unique Identifier (OUI). The 24, 28, or 36
leading bits identify the vendor which the OUI was assigned by
the IEEE. All LoRaWAN® Device vendors must buy an IEEE OUI
block from IEEE.
▪ A DevEUI is composed of 32 hexadecimal digits (0 to 9, and A to
F), the first 6, 7 or 9 digits identify the Device manufacturer.
▪ Example: F0-3D-29-00-0B-B1-7A-AA.
JoinEUI (AppEUI)
▪ Global application ID that identifies uniquely the application
provider of the Device.
AppKey ▪ The Application Key is an AES-128 key specific for each end-
Device, programmed in factory by the Device manufacturer. It
is used to derive the session keys that allow LoRaWAN® to
secure communication with the Network Server and the
Application Servers.
▪ The AppKey is provided by the Device manufacturer when you
purchase the Device. In the future, the manufacturer may also
provide you with an ownership claim key and a JoinEUI, which
together will allow ThingPark Wireless to reach the
manufacturer’s Join server and negotiate session keys without
ever communicating the AppKey in clear. Ask your Vendor or
your ThingPark Channel about Actility ThingPark Activation
Server for more information.
Under Non-Disclosure Agreement
Actility S.A. au capital de 1 122 916 € - 4 rue Ampère, 22300 Lannion, France
RCS St Brieuc 522 305 473, Siret 522 305 473 00012, TVA FR62522305473
TP_Enterprise_5.2.2_-rev2_SAAS_User_Guide 84
Parameter Definition
Additional
Information ▪ Any useful information related to the Device. It can be where
you want to install the Device for instance, a room for checking
humidity.
2. To activate a Device, select one of the Device Manufacturers displaying on your screen.
a) If your Device Manufacturer is not displayed on your screen, click View More
Manufacturers.
Note If the location using Google Maps does not display, it means that the Google Maps
API key has not been installed on the platform. For more information, see 4.1.1
Prerequisites.
6. Click Save.
a. Prepare your Device import file. Ensure that the format of your Device
import file complies with the .CSV file format given in the sample; click
SAMPLE FILE. For more information on HTTPS applications, see 7.3.1.
Connecting to an HTTPS Application.
3. Analyze and correct the errors in the .CSV file and re-import the file.
After successful Device import, go to the Device list to view all imported Devices.
The Device type icons are decorated with a color bullet, corresponding to the overall Device
status. For more information about the colors of the bullets, see 5.1.4.2 Color Codes used for
Devices.
If the Device is not mains electric powered, and if the Device supports the DevStatusReq
LoRaWAN® command, the list also presents the battery status.
Green means good level (battery level is greater than 30%) range, low level (battery level is
comprised between 15% and 30%), red (battery level is lower than 15%) and grey means the
battery level is unknown (typically because the Device does not support the DevStatusReq
command).
A status filter in the upper right side of the list allows to select only Devices with a specific
status, that is, Initialization. The list is then filtered and only Devices in the selected state (that
is, Initialization) are displayed: 004_list_devices_initialization_state_4.2
Device statuses are explained in the previous section Devices > List.
Parameter Definition
Device Name
▪ Name of the Device (Editable).
Manufacturer
▪ Name of the Device manufacturer.
Class
▪ LoRaWAN® class of the Device, class A, B or C. (Editable)
DevEUI
▪ Globally unique address of the Device. The DevEUI is usually
written on the Device casing. The DevEUI is based on IEEE
Organizationally Unique Identifier (OUI). The 24, 28, or 36
leading bits identify the vendor which the OUI was assigned by
the IEEE. All LoRaWAN® Device vendors must buy an IEEE OUI
block from IEEE.
▪ A DevEUI is composed of 32 hexadecimal digits (0 to 9, and A to
F), the first 6, 7 or 9 digits identify the Device manufacturer.
▪ Example: F0-3D-29-00-0B-B1-7A-AA.
DevAddr
▪ 8-digit hexadecimal Device address in the LoRaWAN® network,
unique within the network and allocated by the Network Server.
▪ The most significant bits of the DevAddr identify a LoraWAN ®
network operator ID. Network identifiers are available to LoRa
Alliance® members and are needed if your Devices need to roam
out of your ThingPark Enterprise network (requires roaming
agreement with an operator; ask your Vendor or your ThingPark
Enterprise Channel for ThingPark Exchange roaming hub). If you
do not own a network identifier, the first 7 bits will be set to
‘0000000’, or ‘0000001’ which are reserved values for local
networks.
▪ Example: 00-AB-C4-89
Additional
Information ▪ Any useful information related to the Device. (Editable)
Connection
▪ Device status: Active, Initialization, Radio Error or Connection
Error.
SNR
▪ Signal to Noise Ratio in Decibels (dB). Determines the quality of
LoRaWAN® reception. LoRaWAN® physical layer can receive
signals with negative SNR, up to about -20dB for SF12.
FCNT
▪ Frame Counter. There are separate uplink and downlink frame
counters. Whenever an uplink or downlink packet is sent, the
corresponding counter is incremented.
PER
▪ Packet Error Rate in percentage (%). Measures the ratio of
missing uplink packets to total uplinks.
RSSI
▪ Received Signal Strength Indicator. Measures in dBm the total
RF power received on a given RF channel, summing up the
desired LoRaWAN® signal and the background noise. When the
SNR is negative, it is a good approximation of the background
noise power.
ESP
▪ Estimated Signal Power measured in dBm. It is an estimate of
the LoRaWAN® useful signal power, computed from SNR and RSSI
estimates.
SF
▪ LoRaWAN® Spreading Factor. Determines the data rate used
during transmission. LoRaWAN® SF range is [7...12]: SF7
corresponds to the fastest data rate (~5.5 kbits/sec) while SF12
corresponds to the slowest data rate (~300 bits/sec).
Best LRR ID
▪ ID of the best Base Station (LRR) in range for the Device, i.e.
with the best and most stable ESP value. It will be chosen for
downlink transmission.
A message in a green box appears on the right side of your screen to confirm that
the Device has been removed.
A message in a green box appears on the upper right side of your screen to
confirm that the Application has been updated.
6. Click Save.
In the example, the mean Estimated Signal Power (ESP) per Device is given.
Select another graph if you want to display the Packet Error Rate (PER), the Received Signal
Strength Indicator (RSSI), the Signal to Noise Radio (SNR) or the Spreading Factor (SF).
For each type of radio activity of a dedicated uplink or downlink frame a range value is defined
as illustrated in the following table.
A color code is associated with each value or range value as depicted in the following table.
This takes you to the Wireless Logger application to view the entire traffic history and
obtain additional details. For more information, see 10.5 Using Network Tools.
▪ https://<domain>/thingpark/dx/core/latest/doc/index.html
▪ https://<domain>/thingpark/dx/admin/latest/doc/index.html
The license information indicates the maximum number of devices and the maximum number
of Base Stations that have been granted to your Enterprise.
To increase your license, contact your Vendor or your ThingPark Enterprise Channel.
You can view the latest connection date per user and their status.
The catalog is automatically upgraded to the latest version which is displayed on your
screen.
The catalog is automatically upgraded to the latest version which is displayed on your
screen.
In the previous screen you can see that the catalog version of the Device models is already
present in the ThingPark Enterprise library. The models are up-to-date. You do not have
anything to do.
The catalog is automatically upgraded to the latest version which is displayed on your
screen.
In the previous screen you can see that RF Region catalog version is already present in the
ThingPark Enterprise library. The catalog is up to date. You do not have anything to do.
Parameter Definition
The signification of the range values of each type of radio activity and the colors used
to illustrate these values is given in 8.5.11 Viewing Recent Uplink / Downlink Activity
of a Device.
For further use of the ThingPark Wireless Logger, contact your Vendor or your
ThingPark Channel.
For further use of the ThingPark Network Survey Tool, contact your Vendor or your
ThingPark Channel.
For further use of the ThingPark Spectrum Analysis Tool, contact your Vendor or your
ThingPark Channel.
▪ Set alarms thresholds to Base Stations and Devices to identify a low uplink activity
causing the malfunction of the LoRaWAN® network.
10.6.2 Concepts
To monitor a LoRaWAN® network ThingPark Enterprise uses an alarm management system.
An alarm in ThingPark Enterprise is a visible signal used to indicate to the enterprise that an
equipment malfunction, a process deviation or an abnormal condition requires a response.
When a fault occurs on a Base Station or a Device, an alarm is raised in ThingPark Enterprise.
The system qualifies the alarm and assigns it a with a specific state: an Indeterminate, a
Warning, Minor, Major, Critical or Cleared state is set. For more information on alarm’s states,
see 10.6.4 Viewing Alarms in the User Interface.
The state of each type of alarm changes as it is subject to triggering and clearing conditions.
These conditions are based on the Network Server (Base Stations or Devices) reports and time
stimulus.
The alarm generation process is illustrated in the following graphic. XXXX alarm_clearing XXXX
▪ When the triggering conditions are satisfied, an alarm is created, an existing alarm is
updated (if not cleared) or an existing Alarm is recycled (if cleared).
▪ A Base Station low uplink activity alarm that applies if a Base Station has encountered
a low uplink activity in a certain period.
These types of alarms have the same state as service or fault-related alarms.
When an alarm is triggered or when the severity state of an alarm changes, a recipient or
recipients receive an email notification. If an alarm is Acked, the notification is only sent if the
severity state of the alarm increases. This requires a pre-configuration of the email
notification. For more information, see 10.6.9 Creating Notifications.
10.6.3 Definitions
An alarm in ThingPark Enterprise has the following characteristics:
Alarm Description
characteristics
State
▪ Severity state of the alarm
Alarm Name
▪ Alarm name
Base Station
Name / Device ▪ Name of the Base Station/Device related to the alarm
Name
LRR ID / DevEUI
▪ Base Station ID
▪ Device Global Unique Identifier
Date
▪ Timestamp of the last occurrence or last state of the alarm
Occurrence
▪ For an event-driven alarm, the number of occurrences increases each
time the event associated with the alarm is detected.
An alarm raise can be associated with an email notification. For more information, see 10.6.9
Creating Notifications.
The Base Station Alarms’ widget and the Device Alarms’ widget display a global view of the
severity states of Base Stations and Devices’ alarms.
Two pie charts distribute the severity states of Base Stations and that of the Devices: critical,
major, minor, warning and indeterminate.
Critical
▪ The service is affected. An immediate corrective action is required.
Major
▪ The service is partly affected. An urgent action is required.
Minor
▪ A fault that does not affect the service should be corrected to prevent
the problem from aggravating further.
Warning
▪ A potential or impending fault affecting the service should be diagnosed
and corrected, if necessary.
Indeterminate
▪ The severity cannot be determined.
Clear
▪ The alarm has been fixed.
▪ Alarms in "Clear" state are not visible in the pie charts but are visible in
the Alarms’ table.
The following screen illustrates the different severity states of Base Station’s alarms.
XXXXalarms_base_stations_5.2.2XXX
▪ State-driven alarms
▪ Event-driven alarms
For a state-driven alarm, the number of occurrences is not applicable and always set to 1.
For an event-driven alarm, the number of occurrences increases each time the event
associated with the alarm is detected. Hence, a high number of occurrences of an event-driven
alarm can be considered as an aggravating factor of the severity of the alarm.
Note Existing alarms are not migrated. Hence, existing state-driven alarms with a number of
occurrences greater than 1 will still exist after an upgrade. For these alarms, the number of
occurrences will be reset to 1 when the alarm will be recycled (that is, updated from clear to
non-clear state).
The following tables detail this categorization.
001
▪ Battery level threshold
004
▪ No uplink activity warning
005
▪ Node uses higher data rate than expected
006
▪ Node uses lower data rate than expected
012
▪ MAC command transmission blocked because of rejection
013
▪ MAC command transmission blocked because of no reply
002
▪ Traffic exceeds the downlink regulator settings
003
▪ Traffic exceeds the uplink regulator settings
007
▪ Join request replay detected (DevNonce replay)
008
▪ Wrong MIC detected in Join request
009
▪ Join request replay detected (wrong MIC correlation)
010
▪ Uplink frame replay detected (wrong FCnt)
011
▪ Uplink frame replay detected (repeated FCnt)
014
▪ Invalid AppEUI detected in Join request
015
▪ Join request replay detected (invalid DevNonce)
016
▪ Wrong MIC detected in Uplink frame
102
▪ Base station connection status
103
▪ Unusually low uplink traffic level
104
▪ Unusually high level of invalid uplink physical CRC
105
▪ Downlink frame rate exceeds the RF cell capacity
106
▪ Unusually high CPU usage level
107
▪ Unusually high RAM usage level
108
▪ Unusually high file system usage level
109
▪ Time synchronization lost
110
▪ Power failure detected
111
▪ Beacon transmission failure
112
▪ Abnormal log activation
121
▪ Backhaul network interface status
101
▪ LRR software restarted by watchdog
114
▪ Wrong MIC detected in Join request
115
▪ Join request replay detected (wrong MIC correlation)
116
▪ Uplink frame replay detected (wrong FCnt)
117
▪ Wrong MIC detected in Uplink frame
118
▪ Uplink frame replay detected (repeated FCnt)
119
▪ Invalid AppEUI detected in Join request
120
▪ Join request replay detected (invalid DevNonce)
102 Base Station Informs on Base Six diverse alarm states occur Check the Base Station power
connection Station’s connection accordingly to Base Station’s for potential power failure.
status status to ThingPark administrative state (active,
LRC-cluster validating, suspended) along
Check the Ethernet/Cellular
with Base Station’s connection
state (never connected, connection for potential
disconnected). network failure.
▪ The BS is
Use the remote access to
administratively active
collect logs and contact your
but has never connected
support. For more information,
to the core network
see 6.5.7.1 Using the Remote
(warning alarm by
Access.
default)
▪ The BS is
administratively active
but is disconnected
from the core network
(critical alarm by
default)
107 Unusually RAM usage reaches The alarm gets triggered once Use the remote access to
high RAM an abnormal level the RAM’s average and standard collect logs and contact your
usage level deviation cumulated load support. For more information,
exceeds 80%:
see 6.5.7.1 Using the Remote
▪ Warning alarm if
Access.
average + standard
deviation of the CPU
load > 80%
108 Unusually File-system usage The alarm gets triggered once Use the remote access to
high file reaches an abnormal the file-system average and collect logs and contact your
system usage level standard deviation cumulated support. For more information,
level load exceeds 95%:
see 6.5.7.1 Using the Remote
▪ Warning alarm if
Access.
average + standard
deviation of the CPU
load > 95%
level > 0
several days ▪ If an ongoing
troubleshooting
without RAM
session does not justify
disk usage.
the log activation,
▪ Major alarm: deactivate it.
Log is
activated
If the alarm persists, contact
with trace
your support if the LRR trace
level > 0 for 7
level cannot be set to 0.
days (by
default)
Note In some cases when a
Base Station makes many
insertions into flash memory, it
might damage the normal
usage and behavior of the Base
Station.
115 Join request A wrong MIC If the number of the alarm Stop the radio and try to
replay correlation has been occurrences is high, the Base identify the attacker.
detected detected between a
Station may be the victim of a
(wrong MIC Join request and the
correlation) following Uplink join request replay attack. If the alarm persists, contact
frame, invalidating your support.
the last join request
received from this
Device.
120 Join request A DevNonce attack If the number of the alarm If a join request replay attack:
replay has been detected in occurrences is high, the Base stop the radio and try to
detected a Join request when Station may be the victim of a identify the attacker.
(invalid the Device is join request replay attack.
If the alarms persists, contact
DevNonce) supposed to use
your support.
counter-based
DenNonce.
warning packet for the ▪ No power or power too low 2. If the power level of the
Device is low, change the
to transmit packets.
past X hours
(state-driven) battery.
according to the ▪ The Device cannot connect
3. If the Device is not located
thresholds you to the network.
have defined. For in the coverage area of the
more information, ▪ Wrong provisioning of the
network, move the Device.
Device.
see 10.6.8 Uplink 4. Check the Device
Activity Alarms information.
5. If the alarm persists, contact
your support.
005 Node uses
higher data
The Device sends
packets whose
▪ The Device's firmware does 1. Check the Device's firmware
ADR configuration (see your
not support ADR or is
rate than Spreading Factor configured with a fixed Device documentation).
expected is too low (e.g. SF7 Spreading Factor. 2. Check the coverage of the
instead of SF10)
(state-driven)
▪ The Device did not receive Device and move the Device
if necessary.
the LoRaWAN® ADR
command to adjust 3. Check if Alarm 002 -Traffic
Spreading Factor. exceeds the downlink
regulator settings has been
triggered, because it
prevents the Device from
receiving LoRaWAN®
commands.
4. If the alarm persists, contact
your support.
If an alarm state having a registered recipient is reached, an email for all Base Stations and
Devices impacted is sent:
▪ Log out.
▪ Edit.
▪ Confirm changes.
▪ Discard changes.
▪ Upload a file.
▪ Regenerate.
IBM Watson IoT Application ▪ 7.3.4 Connecting to a Beta IBM Watson IoT 4.3
TPE On Customer Premise ▪ 7.4 Managing Applications 4.3.1 for OCP
configuration
TPE SaaS configuration ▪ 2 ThingPark Enterprise 5.0 for OCP
applies to On Customer
Premises’ Configuration ▪ 5 Default Dashboard
▪ Feature that is specific ▪ 6.4.6.2 Scanning the Radio - removed 5.0 for OCP
to a TPE OCP
configuration ▪ 9.4.5 Using the Spectrum Analysis Tool -
removed
▪ Features that are
related to ThingPark
Enterprise OCP and ▪ 9.4.4 Using the Network Survey Tool -
removed
SaaS configurations
▪ 10.4 Managing Catalogs added
Restructuring content for
optimizing information access
▪ 7.2 Application Parameters 5.0 for OCP
A TPE platform supports
Baidu maps
▪ 4.1.1 Prerequisites 5.1 - 5.1.5
A single TPE OCP platform
supports several ISM bands
▪ 6.3.1 Prerequisites 5.1 - 5.1.5
▪ 6.3.2 Activating A Base Station in 2 Steps
LoRaWAN®, the LoRa Alliance®, and LoRa Alliance CertifiedCM are trademarks of Semtech
Corporation, used with permission under a sublicense granted to the LoRa Alliance™ and its
members.