ANTHEMIS OFFERS THE BEST WIRELESS COMMUNICATION SOLUTION FOR YOUR CONNECTED DEVICE
LTE : Long Term Evolution
With the 4G standards extending, the ‘Long Term Evolution’ standard is progressively developing. With the generalisation of connected devices and machine to machine (M2M), devices are capable of emitting information and data and can communicate among themselves.
Chosen by 9 of the biggest operators in the world such as At&T, Verizon and Orange to only quote a few, the LTE-M has the wind in its sails and is starting to be favoured by more and more players.
This technology is very well adapted to the diversification and massification of such connected devices. The LTE is a multi-purpose communication, capable of connecting a wide range of devices intended for numerous applications. Furthermore, the LTE has the advantage of coexisting with already existing networks and doesn’t require the purchase of new compatible modems.
EXAMPLES OF DEVICES USING LTE COMMUNICATION
- Smart Electrical Meters.
- GPS beacons.
- E-health equipment.
ADVANTAGES OF LTE COMMUNICATION
- Simple deployment.
- Low electrical consumption.
- High and guaranteed coverage inside buildings.
- Interfacing with external captors.
- Possibility of objects mobility.
LoRa / LoRaWAN
LoRaWAN is a telecommunication protocol allowing dial-up communication through radio. The LoRaWAN protocol enables the connection of captors and devices requiring a long battery life (in years), with reduced space and cost (size of a cigarette packet).
LoRa (Long Range) is a long-range communication, dedicated to M2M communications and developed by the firm from Grenoble Cycleo (Semtech group). This communication guarantees a strong interference immunity, is very sensitive while receiving, has very low consumption and is obviously a long-range communication. An ideal communication between connected devices.
EXAMPLES OF DEVICES USING LORAM COMMUNICATION
- Smart City.
- Industrial Monitoring.
ADVANTAGES OF LORA COMMUNICATION
- The power of theLoRa alliance.
- Multi operators or private network.
- Precise geo-location.
- Low consumption.
CONS OF LTE COMMUNICATION
- SEMTECH Mono Source.
- Indoor penetration.
- Necessity of a LoraWan server.
- Low data sending.
DO YOU HAVE A CONNECTED OBJECT PROJECT?
The IoT requires dedicated networks so as not to saturate those that are used by computers and smartphones. Among the companies that offer alternative solutions, SigFox is one of the foremost that is dedicated to M2M in the world.
Sigfox is specialised in M2M via narrow band networks. It contributes to the IoT by allowing the interconnection via a gateway. Its UNB radio technology (Ultra narrow band) enables it to build a narrow band and energy-efficient cellular network. This type of network is deployed in some ISM frequency bands, available world-wide and without a licence.
EXAMPLES OF DEVICES USING SIGFOX COMMUNICATION
- Control of moving & static message boards.
- Home automation (Alarm, fire detector, gaz…).
- Industrial monitoring.
ADVANTAGES OF SIGFOX COMMUNICATION
- Network coverage.
- Network reliability.
- Bidirectional communication.
- Low consumption.
- Low cost.
CONS OF SIGFOX COMMUNICATION :
- Low data sending.
Bluetooth is a wireless technology everybody knows. It has existed for many years and has first been used for Bluetooth earphones. For the last few years, Bluetooth (BLE) has been widely used withsuccess for connected devices. It was at first limited to connected bracelets butwatches quickly appeared, with new needs in bandwidths and standby time. Standards were little by little adapted to the new uses.
Wi-Fi and Bluetooth use the same frequency band, at 2,4 GHz. This is the only common point since BLE and Wi-Fi each have their own field of use. Wi-Fi is a lot better performing, but it requires a lot more energy and is more complex, and therefore more expensive. On the other hand, BLE uses a weaker bandwidth and is better for light data sending.
ADVANTAGES OF BLUETOOTH COMMUNICATION
- Low cost.
- Goes throughwalls.
- Standard protocol.
- No interference.
CONS OF BLUETOOTH COMMUNICATION
- Reaches (30m max).
- Safety (data transmitted through radio waves).
- Transfer Rate.
Wi-Fi is a set of wireless communication protocols. A Wi-Fi network allows the linking of several IT devices via radio waves (computers, routers, smartphones, Internet modems, etc…) within an IT network,so as to allow the data to be transmitted among them.
It can generally reach up to 20 to 50 meters indoors if there are no obstacles (concrete walls for example) between the transmitter and the user. Therefore, Internet access providers can establish a Wi-Fi network connected to the Internet in a zone with many users (station, airport, hotel, train, etc…). These zones or access points are called Wi-Fi access points or Hot Spots.
ADVANTAGES OF WI-FI COMMUNICATION
- Mobility : The wireless network connection allows a person to move freely in the available connectivity zone. We can therefore bring our laptop from the meeting room to the workshop without having to plug / unplug anything.
- Ease of use : A well configured Wi-Fi network allows an easy connection, provided of course, there is authorisation to connect. One can generally connect easily in the coverage zone.
- Flexibility : The flexibility of Wi-Fi installation permits people to adapt easily to the zone of access according to their needs. If the access point is too weak, we add extenders to repeat the signal.
- Cost : Most of the Wi-Fi network elements (access points, extenders, aerials…) can be easily installed. The installation can therefore be made without any tools, which reduces the costs of labour. The running cost is similar to a wired network.
CONS OF WI-FI COMMUNICATION :
- Quality and constancy of the signal : a well installed and configured Wi-Fi network is generally reliable and has a constant quality. However, it sometimes doesn’t take very much to disrupt the signal: such as a radar or a Bluetooth emitter for example.
- Safety : Since Wi-Fiis a wireless network, it is possible to connect to it without any physical connection. It means that it is necessary to study the safety of the network if we are to avoid any intruders or information leaks.