Simplicity is the key to our technology: NeoCortec is offering a professional, agile, scalable, and ultra low power wireless connectivity solution with very few limitations and a strong focus on user-friendliness and short time-to-market. With NeoMesh it has never been easier to create a complete, autonomous and self-containing wireless mesh-network targeting sensor type applications.
Unlike many other low power wireless IoT connectivity solutions, mesh-network is a mature technology that has been known for years and been subject to substantial improvements over time. We have taken mesh technology even further by finding completely new ways to address power consumption, scalability and security.

PLUG-AND-PLAY

Attach an antenna, power on the small node and the protocol stack automatically forms an agile network without the need of a network manager to supervise the process. Read More

more on PLUG-AND-PLAY

The NeoMesh security and reliability features

The NeoMesh technology has security and reliability features built into the core of the protocol stack. To make sure payload data or network communication in general can’t be monitored by an untrusted entity, all wireless communication between the nodes is encrypted using AES128. To prevent playback attacks, each payload data exchange between a source node and a sink node is protected with a challenge-response mechanism that will make it impossible to simply record a previous transmission, and re-transmit it again. This happens without adding transmission latency.

In addition to the security features, there are a number of features which helps to increase the reliability of the data transmission: Local ACK/NACK ensures that when the payload data travels from one node to the next, the sending node gets notified whether the transmission was successful or not. End-to-end ACK/NACK ensures that once the payload data has been delivered at the sink node, an acknowledgement package is routed back to the source node. This acknowledgement is delivered at the application layer. Alternatively, if the payload data did not reach its destination before the user programmable timeout period has been reached, a non-acknowledge will be generated by the protocol stack and delivered at the application layer. All this happens “under the hood”, and the application layer does not need to worry about it.

To fight radio noise – be it noise in general or communication signals from other technologies operating in the same unlicensed frequency band – Frequency Hopping Spread Spectrum is used to spread the transmission evenly in the frequency band. Each node has its own randomly selected hopping scheme, which means that it will transmit on a new channel each time it transmits.

EASY TOGET STARTED

Our evaluation kit takes you through a few preliminary steps and you are ready to build your own application. The system is integrated into modules, meaning you can quickly design the network you need, thereby reducing time-to-market. Read More

more on EASY TOGET STARTED

The NeoMesh security and reliability features

The NeoMesh technology has security and reliability features built into the core of the protocol stack. To make sure payload data or network communication in general can’t be monitored by an untrusted entity, all wireless communication between the nodes is encrypted using AES128. To prevent playback attacks, each payload data exchange between a source node and a sink node is protected with a challenge-response mechanism that will make it impossible to simply record a previous transmission, and re-transmit it again. This happens without adding transmission latency.

In addition to the security features, there are a number of features which helps to increase the reliability of the data transmission: Local ACK/NACK ensures that when the payload data travels from one node to the next, the sending node gets notified whether the transmission was successful or not. End-to-end ACK/NACK ensures that once the payload data has been delivered at the sink node, an acknowledgement package is routed back to the source node. This acknowledgement is delivered at the application layer. Alternatively, if the payload data did not reach its destination before the user programmable timeout period has been reached, a non-acknowledge will be generated by the protocol stack and delivered at the application layer. All this happens “under the hood”, and the application layer does not need to worry about it.

To fight radio noise – be it noise in general or communication signals from other technologies operating in the same unlicensed frequency band – Frequency Hopping Spread Spectrum is used to spread the transmission evenly in the frequency band. Each node has its own randomly selected hopping scheme, which means that it will transmit on a new channel each time it transmits.

NO ADDITIONAL COSTS

With NeoMesh you own the entire wireless eco-system with no additional costs to third party providers. Read More

more on NO ADDITIONAL COSTS

The NeoMesh security and reliability features

The NeoMesh technology has security and reliability features built into the core of the protocol stack. To make sure payload data or network communication in general can’t be monitored by an untrusted entity, all wireless communication between the nodes is encrypted using AES128. To prevent playback attacks, each payload data exchange between a source node and a sink node is protected with a challenge-response mechanism that will make it impossible to simply record a previous transmission, and re-transmit it again. This happens without adding transmission latency.

In addition to the security features, there are a number of features which helps to increase the reliability of the data transmission: Local ACK/NACK ensures that when the payload data travels from one node to the next, the sending node gets notified whether the transmission was successful or not. End-to-end ACK/NACK ensures that once the payload data has been delivered at the sink node, an acknowledgement package is routed back to the source node. This acknowledgement is delivered at the application layer. Alternatively, if the payload data did not reach its destination before the user programmable timeout period has been reached, a non-acknowledge will be generated by the protocol stack and delivered at the application layer. All this happens “under the hood”, and the application layer does not need to worry about it.

To fight radio noise – be it noise in general or communication signals from other technologies operating in the same unlicensed frequency band – Frequency Hopping Spread Spectrum is used to spread the transmission evenly in the frequency band. Each node has its own randomly selected hopping scheme, which means that it will transmit on a new channel each time it transmits.

ULTRA LOW ENERGY CONSUMPTION

Don’t worry about power supply, the system is designed for longevity. Power consumption is ultra low, allowing for battery lifespans of several years. Read More

more on ULTRA LOW ENERGY CONSUMPTION

The NeoMesh security and reliability features

The NeoMesh technology has security and reliability features built into the core of the protocol stack. To make sure payload data or network communication in general can’t be monitored by an untrusted entity, all wireless communication between the nodes is encrypted using AES128. To prevent playback attacks, each payload data exchange between a source node and a sink node is protected with a challenge-response mechanism that will make it impossible to simply record a previous transmission, and re-transmit it again. This happens without adding transmission latency.

In addition to the security features, there are a number of features which helps to increase the reliability of the data transmission: Local ACK/NACK ensures that when the payload data travels from one node to the next, the sending node gets notified whether the transmission was successful or not. End-to-end ACK/NACK ensures that once the payload data has been delivered at the sink node, an acknowledgement package is routed back to the source node. This acknowledgement is delivered at the application layer. Alternatively, if the payload data did not reach its destination before the user programmable timeout period has been reached, a non-acknowledge will be generated by the protocol stack and delivered at the application layer. All this happens “under the hood”, and the application layer does not need to worry about it.

To fight radio noise – be it noise in general or communication signals from other technologies operating in the same unlicensed frequency band – Frequency Hopping Spread Spectrum is used to spread the transmission evenly in the frequency band. Each node has its own randomly selected hopping scheme, which means that it will transmit on a new channel each time it transmits.

EXTREME SCALABILITY

The network forms automatically, and it can grow really big. The protocol stack allows for up to 65K nodes in one network. Read More

more on EXTREME SCALABILITY

The NeoMesh security and reliability features

The NeoMesh technology has security and reliability features built into the core of the protocol stack. To make sure payload data or network communication in general can’t be monitored by an untrusted entity, all wireless communication between the nodes is encrypted using AES128. To prevent playback attacks, each payload data exchange between a source node and a sink node is protected with a challenge-response mechanism that will make it impossible to simply record a previous transmission, and re-transmit it again. This happens without adding transmission latency.

In addition to the security features, there are a number of features which helps to increase the reliability of the data transmission: Local ACK/NACK ensures that when the payload data travels from one node to the next, the sending node gets notified whether the transmission was successful or not. End-to-end ACK/NACK ensures that once the payload data has been delivered at the sink node, an acknowledgement package is routed back to the source node. This acknowledgement is delivered at the application layer. Alternatively, if the payload data did not reach its destination before the user programmable timeout period has been reached, a non-acknowledge will be generated by the protocol stack and delivered at the application layer. All this happens “under the hood”, and the application layer does not need to worry about it.

To fight radio noise – be it noise in general or communication signals from other technologies operating in the same unlicensed frequency band – Frequency Hopping Spread Spectrum is used to spread the transmission evenly in the frequency band. Each node has its own randomly selected hopping scheme, which means that it will transmit on a new channel each time it transmits.

BUILT-IN SECURITY RESILIENCE

The network has security and reliability built into the core of the protocol stack. Read More

more on BUILT-IN SECURITY RESILIENCE

The NeoMesh security and reliability features

The NeoMesh technology has security and reliability features built into the core of the protocol stack. To make sure payload data or network communication in general can’t be monitored by an untrusted entity, all wireless communication between the nodes is encrypted using AES128. To prevent playback attacks, each payload data exchange between a source node and a sink node is protected with a challenge-response mechanism that will make it impossible to simply record a previous transmission, and re-transmit it again. This happens without adding transmission latency.

In addition to the security features, there are a number of features which helps to increase the reliability of the data transmission: Local ACK/NACK ensures that when the payload data travels from one node to the next, the sending node gets notified whether the transmission was successful or not. End-to-end ACK/NACK ensures that once the payload data has been delivered at the sink node, an acknowledgement package is routed back to the source node. This acknowledgement is delivered at the application layer. Alternatively, if the payload data did not reach its destination before the user programmable timeout period has been reached, a non-acknowledge will be generated by the protocol stack and delivered at the application layer. All this happens “under the hood”, and the application layer does not need to worry about it.

To fight radio noise – be it noise in general or communication signals from other technologies operating in the same unlicensed frequency band – Frequency Hopping Spread Spectrum is used to spread the transmission evenly in the frequency band. Each node has its own randomly selected hopping scheme, which means that it will transmit on a new channel each time it transmits.

Q and A

Does a router- and/or destination node need mains power?

No, all nodes in a Neocortec system can be battery powered as they all consumes approx. the same amount of power.

How many destination nodes can you have in a network ?

Out of the 65K nodes possible in a Neocortec network, 127 of those can receive data and present data to the application layer

How do you install a network the first time ?

When you power up the nodes in a Neocortec Network – given the NetworkID in each node is the same – the protocol stack forms the network completely without any kind of user involvement.

Can I determine the average power consumption per node when designing a network ?

Yes, we have a tool which quite accurately calculate the power consumption per node in a given network.

Can a NeoCortec network communicate with other wireless solutions like Zigbee, Z-wave, LoRa or others ?

No, the NeoMesh protocol stack is a 100% proprietary solution which has been developed exclusively to address the known weaknesses from existing LP wireless mesh-solutions.

Can I run my own application code in a module ?

No, a present it is not possible to write and run own application code in the module. However we do support a series of temperature, humidity and other sensors which can be directly interfaced to the module.

How can I get started ?

We offer different options, but the fastest and easiest way is to acquire our EVK (evaluation kit). It comes with five fully operational nodes incl. batteries, cables and Software. You will be up and running in seconds. Alternatively, use our reference design and build you own nodes. The SW can be downloaded from our website

Can I run more networks in parallel ?

Yes, multiple networks with different Network-IDs can seamlessly run in parallel. The messages in different networks are encrypted differently

Can I use the Evaluation kit efficiently to measure range ?

No, the evaluation kit is not optimized for ideal range nor for power consumption measurements. For optimal range we can provide the customer with recommended antenna designs. To minimize power consumption, we provide tools that can help determine the optimal settings.

Interested in knowing more about neocortech contact us
by clicking the button below.

Get in touch with us