Datahub User Guide

⌘K
  1. Home
  2. /
  3. Docs
  4. /
  5. Datahub User Guide
  6. /
  7. 1. Introduction to Datahu...
  8. /
  9. 1.3 Terms & Abbreviat...

1.3 Terms & Abbreviations

The following table explains some terms and abbreviations which you may encounter in the user interface or in the general context of using the ZENNER Datahub.

Term/AbbreviationExplanation
ADRAdaptive data rate refers to a mechanism with which devices can independently adjust their data rate and the spreading factor if they achieve consistently good reception values. This principle offers the advantage that devices operating in areas with good network coverage can transmit more efficiently, but also harbors the risk that packets will no longer arrive if a gateway fails due to a spreading factor that is too low. If there is no confirmation for confirmed packages, the device increases its spreading factor again.
AESThe Advanced Encryption Standard (AES) is a symmetric encryption method, i.e. the encryption and decryption keys are identical. AES offers a very high level of security; the first theoretically interesting but practically irrelevant attack was only found more than ten years after its standardization.
AES KeyThe AES key is used in the Advanced Encryption Standard (AES) encryption method, to ensure the confidentiality and integrity of the information sent from an NB-IoT device. When transferring data in an NB-IoT network, the AES key is used to encrypt and decrypt sensitive data and is typically a randomly generated bit sequence with a length of 128, 192, or 256 bits.
AppKeyThe AppKey is the key for encrypting messages between the device and the server. This key must be unique for each sensor. Hexadecimal string with 32 digits.
BackhaulTransmission of LoRa packets from the gateways to the LNS. No longer transmitted via LoRa but via mobile radio or Ethernet, for example
DatastoreThe Datastore is the central storage location for measured values and sensor data.
DevEUI64-bit globally unique identifier assigned to a LoRaWAN device, used to uniquely identify the device on the network.
DownlinkMessage sent from the server to a device via the gateways
GatewaysReceiving stations that can receive and send LoRa packets. Communication with the LNS takes place via the gateways. “Modems for the sensors and devices”
Device classesLoRa devices can be divided into different device classes that describe the transmission and reception behavior of devices

Class A: Transmit at any time, receive after transmission at fixed intervals
Class B: In addition to A, further time intervals in which reception is possible
Class C: Can receive downlinks at any time, except during transmission
GWAGateway Administrator
HKSHAN communication scenario, HKS3 is currently supported. HAN communication scenarios 4 and 5 are currently under development.
HSMThe term hardware security module (HSM) refers to an internal or external peripheral device for the efficient and secure execution of cryptographic operations or applications.
IDUIndoor Unit
IFTTTIFTTT (the abbreviation of If This Then That) is a service provider for the individual linking of web applications.
IoTInternet of Things
JoinsDevices join the LoRa network. Device makes join request → Gateway receives the request and forwards it to the LNS → LNS checks the request and, if it matches, sends the join accept back to the device in the same way
JSONJavaScript Object Notation, or JSON for short, is a compact data format in an easy-to-read text form for the purpose of data exchange between applications.
LDAPThe Lightweight Directory Access Protocol (LDAP) is a network protocol for querying and changing information from distributed directory services.
LNSLoRaWAN network server – part of the ZENNER Datahub when using LoRa-based deployment scenarios.
LoRa frequency range
LoRa works with different frequency ranges depending on the continent.

E.g. EU: 868MHz USA: 915MHz Asia: 923MH
LoRaWANLong Range Wide Area Network (LoRaWAN) is a low-power wireless network protocol. The LoRaWAN specification is defined by the LoRa Alliance, is freely available and uses the proprietary “LoRa” chirp spread spectrum modulation technology from Semtech Corporation. It is asymmetrically geared towards the energy efficiency of IoT devices and achieves long ranges (>10 km) for uplink communication, i.e. transmission from the IoT device to the network. The data transmission rate ranges between 292 bit/s and 50 kilobit/s. Various operating levels up to quasi-continuous downlink communication are possible, although the latter comes at the expense of energy efficiency.
MAC addressUnique device number in hexadecimal notation that is permanently assigned to the respective device. Consists partly of the manufacturer ID and partly of the respective device number.
TenantsThe LoRaWAN network of the Brunata Minol ZENNER Group is divided into areas that are assigned to specific customers. These are called tenants. Logins are created for each tenant and the logged-in users then only have access to this tenant.
M-BusThe M-Bus, short for meter bus, is a technical standard whose rules can be used, for example in electricity meters, to transmit the consumption of electricity as measurement data. The consumption of gas, heat or water can also be measured and transmitted by meters with M-Bus.
MNKMulti-jet wet rotor cold water
MQTTMessage Queue Telemetry Transport (MQTT) is an open message protocol for machine-to-machine (M2M) communication that enables the transmission of telemetry data in the form of messages between devices, despite high delays or limited networks. Corresponding devices range from sensors and actuators, cell phones, embedded systems in vehicles or laptops to fully developed computers.
OAUTHOAuth (Open Authorization) is an open protocol that allows standardized, secure API authorization for desktop, web and mobile applications.
OMSThe Open Metering System (OMS) stands for a cross-manufacturer and cross-sector communication architecture for intelligent meters based on the M-Bus as part of smart metering. It is the only system definition in the world that integrates all media (electricity, gas, heat and water including submetering) into one system.
On-PremisesOn-premises refers to a usage and licensing model for server-based computer programs (software).
OTAAOver-the-air activation

A procedure in which the application key (AppKey) is stored in the LNS before a device is activated. This allows the LNS to generate the necessary keys and exchange them with the device. The AppKey is never transmitted via LoRa. During the join request, the device transmits its information to the network and “asks” the network for access. The LNS then checks whether the stored information matches and, if it does, sends a Join Accept to the device.
Parser“Translator” that translates the payload from the packets into human-readable values and displays them accordingly
PayloadData content of the LoRa packet in hexadecimal notation
Provisioning / DeprovisioningProvisioning or deprovisioning sensors means that they are assigned to or removed from a specific tenant
RLMRecording power measurement (RLM), also known as recording load profile measurement, describes a measurement process by energy suppliers for customers with an annual consumption of more than 100 MWh of electrical energy or more than 1.5 GWh of gas. The measuring device records an average power value per measuring period (15 minutes for electricity, 60 minutes for gas).
RSRPReferenced Signal Received Power

The RSRP value is a factor for the signal strength. The closer the value is to 0, the better. The typical value range here is between -50 and -140. -50 is a good value here. The normal range is -70 to -95. Reception is significantly impaired from -100.
RSRQReferenced Signal Received Quality

The RSRQ value is a factor for the quality of the signal. This quality can be calculated from the other factors (RSSI and RSRP). Good values are between -5 and -8. -9 to -11 can still be received well. From -12 and below, reception can sometimes be severely impaired.
RSSIReceived Signal Strength Indicator – factor for reception quality

Good values (0 to -100) – poor values (-110 to -140)
RTKRing-necked plover
SaaSSoftware as a Service (SaaS) is a sub-sector of cloud computing. The SaaS model is based on the principle that the software and IT infrastructure are operated by an external IT service provider and used by the customer as a service.
ShardingA distinction is made between horizontal and vertical fragmentation. In horizontal fragmentation (sharding), the entirety of all data records of a relation is divided into several tables. If these tables are located on the same server, this is usually partitioning. Horizontal fragmentation does not create redundancy of the stored data, but of the structures. If a relation needs to be changed, then not only one table needs to be changed, but all tables across which the data from the relation in question is distributed need to be changed.
SNRSignal-to-noise ratio – factor for reception quality

Good values (+20 to -4) – poor values (-11 to -20)
Spreading factorLoRa packets can be sent using six different spreading factors (SF7 to SF12). Increasing the spreading factor significantly increases the range at which a packet can be received, but at the expense of the data rate and therefore also the transmission speed.
SubmeteringSubmetering comprises the consumption-based recording and billing of heating and water costs in buildings as well as the provision of the necessary measuring equipment such as heat cost allocators or heat and water meters. Each tenant receives a bill for their individual energy consumption, regardless of whether it is for heating or hot water. The landlord receives the total bill for the residential building.
UAAService to which almost all directory services can be connected, e.g. LDAP or Active Directory
UASUser Authentication Server – module of the ZENNER Datahub for user and access management
Unique IdentifierUnique identification number of an NB-IoT device. Specific alphanumeric or numeric code This also corresponds to the serial number normally printed on the device.
UDPThe User Datagram Protocol, UDP for short, is a minimal, connectionless network protocol that belongs to the transport layer of the Internet protocol family. UDP enables applications to send datagrams in IP-based computer networks.
UplinkMessage sent from the device to the server via a gateway
wMBusSee ‘OMS’ above
wMSBCompetitive metering point operator
Scroll to Top