WAVIOT Technologies
We offer a new radio protocol designed exclusively for devices and large distributed wireless telemetry networks.
Operation principle
However, unlike mobile communication technology, WAVIOT uses its own protocol, which allows data to be transmitted over tens of kilometers and ensures the autonomy of the sensors for more than 10 years without power replacement.The approach used to transmit data on a WAVIOT network is very similar to how cellular networks work.
Meters and sensors connected to WAVIOT modems, or devices with already integrated radio modules, transmit readings to the Internet through the base station. Further,the data is processed and provided in a convenient form in a specially designed web interface on the WAVIOT servers. The reverse communication channel allows you to control individual instruments and devices remotely.
However, unlike mobile communication technology, WAVIOT uses its own protocol, which allows data to be transmitted over tens of kilometers and ensures the autonomy of the sensors for more than 10 years without power replacement.
Internet of things
Internet of Things (IoT) from WAVIOT is a system of remote interaction and data exchange between devices and people via the Internet, debugged over the years, anywhere and at any time.
WAVIOT Internet of Things systems include various types of sensors and devices, wireless networks with wide coverage and stable service for a large number of devices, secure server software that can be integrated into the client’s infrastructure, and a convenient user interface.
Support for all types of energy metering devices (electricity, water, gas, heat)
End-to-end support for energy metering processes, from metering devices to the WAVIOT MDM system (“Personal Account”) and third-party applications
Support for device control commands, including load relay control, updating the tariff schedule for electricity meters
Availability of summary reports on metering units and reports for each device in Excel and CSV formats with different details
Flexible management of user roles and rights, the ability to provide individual access to the system to each consumer
API for interaction with third-party applications, IT systems and top-level CPI
LPWAN
LPWAN technology provides energy-efficient data transmission over long distances. WAVIOT, using the LPWAN approach, creates devices that can transmit information over tens of kilometers and at the same time work for several years on a single battery.
Existing wireless technologies are not able to meet the needs of individual applications in the transmission of small data over long distances with high autonomy and low connection costs. As a rule, such applications belong to the field of machine-to-machine communication and the Internet of Things.
LPWAN is a technology that supports an entirely new class of telematics devices. Its appearance became possible due to the development of the component base: radio modules and transceiver equipment.
Characteristics
The NB-Fi standard supports two-way communication with NB-Fi devices. First of all, this is applicable for electricity meters, in which the reverse channel (Downlink) is necessary for controlling the meter - time synchronization, updating the tariff schedule, disconnecting the load relay. The use of NB-Fi chips in devices that implement signal reception algorithms developed by WAVIOT provide an almost symmetrical communication channel in both directions (both Uplink and Downlink).
All WAVIOT devices with two-way communication support adaptive change in the signal transmission rate with a good level of signal reception, the devices automatically switch to a higher data transmission rate which not only frees up the air, but also further reduces power consumption on the subscriber’s side.
Technical specifications of the NB-Fi standard (for Uplink packages)
Modulation technique
Transfer rate
Channel separation method
Accuracy class
The number of simultaneously received channels in the operating frequency band of 51.2 kHz
128 (for 400 bps)
6 (for 3200 bps)
2 (for 25600 bps)
Maximum sensitivity of signal reception
-141 dBm (for 400 bps)
-132 dBm (for 3200 bps)
-123 dBm (for 25600 bps)
Maximum bandwidth for receiving UPLINK packages by one base station
Technical characteristics of the MAC and transport layer of the NB-Fi protocol
Network numbering capacity
Effective Data Rates (UPLINK packages)
Effective data rates (DOWNLINK package)
Used encryption algorithm
Encryption key length
Payload length of one package (payload)
Maximum length of protocol transport layer data package
Exceptional receiver sensitivity
ПSupport for all types of energy metering devices: electricity, water, gas.
Cryptographic protection of the NB-Fi protocol
Confidentiality and integrity of information during transmission and processing due to encryption.
Ability to build a large network
A proven concept for building scalable networks.
Base stations
A key feature of the highly sensitive NB-Fi base station receiver is the ability to receive a signal with low SNR, down to zero, i.e., when the signal level does not exceed the noise level. The base stations use state-of-the-art filters to provide an unsurpassed level of dynamic range.
The NB-Fi base station can process hundreds and thousands of channels at one time, digitizing the entire frequency band in real time and simultaneously receiving messages sent at different speeds.
Safety
The NB-Fi wireless data transfer protocol for secure data exchange between the end device and the server allows you to reliably ensure the confidentiality and integrity of the transmitted information.
To provide cryptographic protection of information at the presentation layer, a scheme similar to the transport layer scheme is used. At the same time, no keys used at the transport level can be used at the presentation level, it is also impossible to disable encryption or change the encryption algorithm.
The exchange of information between the user and the WAVIOT IoT platform (“Personal Account”, HES system) is encrypted using the HTTPS/SSL protocol. For users with access to device management commands, it is possible to set up additional two-factor authorization.