FILTER BY CATEGORY:
eSIM (eUICC) is introducing possibilities which were not possible before. Yet, every innovation comes with technical aspects that need to be considered. In our eSIM Series, we have already covered how eSIM technically works. Also, we have learned that the two new main components for eSIM are Subscription Manager Data Preparation server (SM-DP) and Subscription Manager Secure Routing server (SM-SR). The first, SM-DP, is the database where carrier (telecom) profiles are stored. And the SM-SR handles the secure information passing between the server and the eSIM.
At the time when everyone is talking about eSIM, new solutions are developed to make remote SIM provisioning more advanced. Let's look behind the similar looking acronyms that are all dealing with the subscriber identity module.
An Access Point Name is a link between a mobile network and the internet. The device trying to connect to the internet needs to have this parameter configured and presented to the carrier, who can then decide which IP address to assign the device and which security method to use. So the carrier is being responsible for the creation of a network connection using APN information. Furthermore, it is good to know that APN is not only used for internet or private network connectivity but also for Multimedia Messaging Service (MMS).
There is no doubt that eSIM is going mainstream in the future, the only question is when it happens and how smooth the roll-out will be. One element holding back global eSIM adoption are certainly doubts or missing information about how the hardware used today will manage remote SIM provisioning in the future.
1oT is excited to announce that it will feature a new blog post series - IoT Hacking Series.We want to bring insight into cellular hardware with technical blog posts and DIY hardware projects, that can be fun to experiment but also helpful to start with your product prototyping. Let’s kick off this series with a hardware guide for newcomers!
NarrowBand IoT and LTE Cat M1 are the hottest keywords when it comes to IoT connectivity in the last two years. More and more cellular module makers are offering them, clients hear about the benefits and want to deploy them, carriers themselves are heavily advertising them. After all, the GSMA has standardised and licensed them and 51 commercial Mobile IoT networks are already deployed. So, is it really time to say goodbye to 2G, 3G, & 4G modules and instead deploy devices with NB-IoT or LTE Cat M1?
So you want to be able to develop a bike-sharing service, or perhaps you have another inventive sharing concept in mind. There is an obvious need to track and maintain the products that you have put into the world, and this is one of the many areas where the Internet of Things and sharing economies go hand in hand.
It was “only” 28 years ago when the GSM standards and 2G phones were deployed. The rise of the internet brought us cellular networks just a few years later. By 2018, many carriers have already shut down their 2G networks and many more are going to do it soon. The same might happen for 3G soon. Why and where is this happening?
Whether you’re in the prototype phase or have already developed a wireless IoT or M2M device to bring to market, the task of navigating the maze of certification in North America may seem daunting at first. The proper certification is as important as any other step in designing a wireless device and preparing to launch it. While certificates can seem like an afterthought or the last step of product development it is important to remember that missing certificates can cause setbacks in getting products to market according to your timeline.
Developing IoT products is a multifaceted process - writing software, designing hardware, connecting it all to a cloud. There are many points that can go wrong, which is why it is really important to have good tools for debugging. If the problem is somewhere between the network and the modem, this article might help.
If you are living in an urban environment, you probably run into bicycles on a daily basis or perhaps even ride one. Something you might have noticed is that more and more bicycles around us are gaining extra features like electrical motor in the rear hub, smart turn signals, GPS tracking or smart bike locks integrated to them. It is quite easy to spot a bulky frame or big battery attached to a bicycle.
In this day and age, people are constantly surrounded by devices that are online. Usually, it is a phone or a computer but with the growing popularity of different smart home solutions, this device can be a microphone, a camera or something simpler like a temperature sensor or a lightbulb. Apart from being connected to the internet, these devices have one other thing in common – they make our day-to-day life more comfortable and convenient. While really useful, this creates vulnerabilities that might enable your data to fall into the wrong hands.
2G, 3G and 4G/LTE represent the evolution of mobile networks. We are all using mobile internet on daily basis and are well aware of the disturbing problem regarding the network coverage and data transfer speed, especially at crowded events or indoors. Even today we still have areas where only GPRS, EDGE or 3G coverage is available. If you are used to the 4G/LTE network, older generations feel painfully slow. But, all of this is about to change in the near future when 5G will be launched.
Smart Cities, Transformed Cities, Enhanced Cities – whatever you want to call them, are here to stay. The word pair “Smart City” stands for the vision of improving city living through technology and Internet of Things (IoT) in particular. More broadly speaking, it can be taken as a symbol for fighting against urbanisation and pollution, while making urban living more efficient, environmentally friendly and valuable. Here is a list of trending smart city solutions that cities are looking at or are already benefitting from.
In case you didn’t know, the European Commission has been working in the recent years (they started in 2007!) to abolish the often ridiculously expensive roaming charges within the European Union countries. That is a very important step towards the bigger goal of converting the EU into a Digital Single Market.
The evolution of mobile networks infrastructure and protocols go back a long way and every new generation of mobile network has served new opportunities for end users. As of today we have three concurrent network types in use: 2G, 3G and 4G. But, when it comes to picking the right network type for your cellular-based IoT project, decision-making might get tough. Which one should you go for?
A botnet is a network of computers, all infected with the same malware that enables the attacker to control them. It is usually carried out through a command-and-control (C&C) server, but there are also some peer-to-peer (P2P) botnets. Botnets are often used to perform distributed denial-of-service (DDoS) attacks, send spam and to infect other devices to grow the botnet.
NarrowBand IoT, also known as LTE Cat NB1 or LTE-M2, serves the need to better accommodate IoT use-cases with large numbers of devices and low data requirements. This wireless network technology is expected to dominate the Low-Power WAN (LPWAN) field in 2-3 years time and overpower other players like Sigfox and LoRaWAN.
Dropping mobile data prices together with development of eSIMs (eUICC) and soft-SIMs that make switching between mobile carriers dynamic and easy, are creating more and more new business opportunities for emerging Internet of Things (IoT) device manufacturers (OEMs). Devices that have never been connected to internet before can now be connected to a cellular network easily and affordably.
Cellular connectivity is the most reliable and widespread connectivity method for IoT (Internet of Things) and M2M (Machine-to-Machine) devices, but in order to identify a device to a carrier, it needs a Subscriber Identity Module, or as most people call it, a SIM. The size and type of SIM you need to select depends on device's purpose, functionality and space available to host a SIM card or chip.