Skip to content

Commit c4c8217

Browse files
author
Amanda Butler
authored
Fix phrasing in lora-tech.md
Apply changes from PR #1084 to v5.13.
1 parent 54e407e commit c4c8217

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/reference/technology/connectivity/lora-tech.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ The LoRaWAN specification defines two methods for connecting to an access networ
7979

8080
### Over the air activation (OTAA)
8181

82-
OTAA consists of an exchange of MAC messages between the device and network server. The device sends a `JOIN REQUEST` to the network server containing an app EUI, a device EUI and device nonce (random value). The device EUI is like a MAC address and uniquely identifies the device in the network. The app EUI is the application identifier allocated to the device by the network server (out of band fashion). The `JOIN REQUEST` is sent unencrypted to the network server. In response, the network server sends a `JOIN ACCEPT` message to the device, which is encrypted by using yet another key, the app key, which the network provider provides to the device (out of band) just like the app EUI. The device then uses this app key, app nonce (random value or unique to the network provider), network ID and device nonce (another random value) to locally compute the network session key and app session key.
82+
OTAA consists of an exchange of MAC messages between the device and network server. The device sends a `JOIN REQUEST` to the network server containing an app EUI, a device EUI and device nonce (random value). The device EUI is like a MAC address and uniquely identifies the device in the network. The app EUI is the application identifier allocated to the device by the network server (out of band fashion). The `JOIN REQUEST` is sent unencrypted to the network server. In response, the network server sends a `JOIN ACCEPT` message to the device, which is encrypted by the app key, which the network provider provides to the device (out of band) just like the app EUI. The device then uses this app key, app nonce (random value or unique to the network provider), network ID and device nonce (another random value) to locally compute the network session key and app session key.
8383

8484
### Activation by personalization (ABP)
8585

@@ -185,7 +185,7 @@ This class keeps the time base for the stack. It extracts the system time base f
185185

186186
##### LoRaMacCrypto class
187187

188-
You can use the `LoRaMacCrypto` class for encoding and decoding LoRaWAN packets using Mbed TLS.
188+
You can use the `LoRaMacCrypto` class for encoding and decoding LoRaWAN packets using the crypto libraries of Mbed TLS.
189189

190190
##### LoRaMacCommand class
191191

0 commit comments

Comments
 (0)