All Posts
Radio & RF Systems13 min read

The Anatomy of Radio Communication: RF Fundamentals, Frequency Bands, and LoRa

From HF to VHF, FSK to CSS — the physical foundations of radio communication. LoRa's chirp modulation, Spreading Factor mathematics, LoRaWAN security architecture, and Meshtastic mesh networking.

S

Sinaps Technologies

January 4, 2026

The Anatomy of Radio Communication: RF Fundamentals, Frequency Bands, and LoRa

When it comes to building communication systems that operate without internet, radio technologies still offer unmatched advantages: infrastructure independence, long range, low power consumption, and high resilience. This article examines the physical and engineering foundations of general radio communication, then takes a deep dive into the LoRa modulation technique and the LoRaWAN network protocol built on top of those foundations.

The Physical Foundation of Radio Communication

Every radio system operates on the same fundamental principle: an electrical signal is converted into an electromagnetic wave via an antenna and propagates through the air; the receiving antenna converts this wave back into an electrical signal.

Three core parameters are decisive in this process:

Frequency: The number of oscillations per second of an electromagnetic wave (Hz). Frequency directly determines the wave's behavior: lower frequencies penetrate obstacles more effectively and can travel much farther; higher frequencies can carry more data but are more sensitive to obstacles.

Bandwidth: The frequency range used by a transmission channel. Bandwidth directly limits the maximum data rate that can be carried. The Shannon-Hartley theorem establishes this relationship mathematically: capacity = bandwidth × log₂(1 + SNR).

Power (Watts/dBm): The energy the transmitting antenna imparts to the radio wave. Greater power extends range, but energy consumption and legal limits constrain power selection.

Frequency Bands and Propagation Characteristics

The radio spectrum is divided into bands with distinct physical behaviors. The most commonly used bands in radio communication are:

HF (High Frequency) — 3-30 MHz

HF's most critical property is that radio waves can reflect off the ionosphere and reach hundreds or even thousands of kilometers away (ionospheric reflection / skywave propagation). This makes HF uniquely suited for long-range communication without infrastructure. Military land communication, maritime navigation, and intercontinental amateur radio operate in this band. Disadvantages include sensitivity to atmospheric conditions and relatively limited data capacity.

VHF (Very High Frequency) — 30-300 MHz

VHF waves pass through the ionosphere, so propagation is mostly limited to Line of Sight (LoS). However, VHF penetrates obstacles better than UHF. Civil aviation communication (118-137 MHz), maritime (156-174 MHz), emergency services radios, and FM broadcasting operate in this band. Typical handheld radio range is 3-10 km in open areas and 1-3 km in urban environments.

UHF (Ultra High Frequency) — 300 MHz - 3 GHz

UHF carries indoor signals better, but offers shorter range than VHF in open terrain. PMR446 (license-free civilian radios), Wi-Fi (2.4 GHz), Bluetooth, and 4G/5G cellular networks operate in this band.

ISM Bands — 433 MHz, 868 MHz, 915 MHz, 2.4 GHz

ISM (Industrial, Scientific, Medical) bands are frequency ranges that can be used without a license. LoRa, Zigbee, Z-Wave, and many IoT devices use these bands. In Europe, the primary ISM band for LoRa is 868 MHz; in the Americas, 915 MHz is used.

Modulation: Loading Information onto a Signal

A raw radio wave carries no data on its own; information is loaded onto the wave through modulation.

AM (Amplitude Modulation): The amplitude (height) of the wave is varied according to data content. Sensitive to noise; primarily used in legacy systems and MW/LW broadcasting.

FM (Frequency Modulation): The frequency of the wave is varied according to data content. More noise-resistant than AM; the vast majority of VHF/UHF handheld radios use FM.

FSK (Frequency Shift Keying): A digital adaptation of FM. Data bits are represented by transitions between two or more frequencies.

GMSK (Gaussian Minimum Shift Keying): The modulation used by GSM. A spectrally efficient FSK variant.

CSS (Chirp Spread Spectrum): The modulation technique used by LoRa. Uses "chirp" signals whose frequency continuously rises or falls. Extraordinarily resistant to noise and interference; provides long range at low bandwidth.

LoRa: The Physical Layer

LoRa (Long Range) is a radio modulation technology developed and patented by Semtech. Its technical foundation is CSS (Chirp Spread Spectrum) modulation.

What Is a Chirp Signal?

A chirp is a signal whose frequency changes linearly over time. LoRa uses two types of chirps: upchirp (continuously rising frequency) and downchirp (continuously falling frequency). Each symbol is encoded using a combination of these chirp patterns.

The core advantage of this approach: the receiver can detect the signal even far below the noise floor. In practical terms, LoRa's receiver can correctly decode a signal even when it is 20 dB below the noise floor. By comparison, standard FSK modulation requires the received signal to be at least 6-10 dB stronger than the noise.

LoRa's Technical Parameters

LoRa performance is determined by three core parameters:

Spreading Factor (SF)
SF determines how many chips each symbol is spread across. It takes values from SF7 to SF12. As SF increases:

  • Receiver sensitivity improves (longer range)
  • Data rate decreases
  • Time on Air (airtime) increases

Numerical example at 868 MHz, 125 kHz bandwidth:

  • SF7: ~5.5 kbps — short range, high speed
  • SF9: ~1.76 kbps — medium range
  • SF12: ~293 bps — maximum range, very low speed

Bandwidth (BW)
Typical LoRa values: 125 kHz, 250 kHz, 500 kHz. Greater bandwidth increases data rate but reduces range. In Europe's 868 MHz ISM band, 125 kHz is most commonly used.

Coding Rate (CR)
Determines the amount of forward error correction added for transmission reliability: 4/5, 4/6, 4/7, or 4/8. Higher CR improves error resilience but reduces data throughput.

Link Budget: The Equation That Determines Range

The range of a LoRa link is estimated through link budget calculation:

Link Budget (dB) = TX Power (dBm) + TX Antenna Gain (dBi)
                 - Cable Losses (dB)
                 - Path Loss (dB)
                 + RX Antenna Gain (dBi)
                 - RX Sensitivity (dBm)

LoRa's receiver sensitivity at SF12 is approximately -137 dBm — one of the most sensitive receivers in the industry. A typical LoRa module's total link budget is approximately ~157 dB.

In practice, this translates to:

  • Open rural terrain: 15-40 km range
  • Urban environment: 1-5 km range
  • Indoors: 200 m - 2 km (depending on floor count)

LoRaWAN: The Network Protocol Layer

LoRa is only a modulation technique; the LoRaWAN protocol handles network management. LoRaWAN is an open network protocol standard defined by the LoRa Alliance.

Network Topology

LoRaWAN uses a star-of-stars topology:

[End Devices] → [Gateways] → [Network Server] → [Application Server]

End Devices: Sensors, meters, tracking devices. Transmit data to gateways via radio.

Gateways: Consist of a LoRa radio receiver and an internet connection. Receive packets from end devices and forward them to the Network Server over IP. A single gateway can communicate with multiple end devices simultaneously.

Network Server: Manages packet deduplication (when the same packet arrives from multiple gateways), ADR (Adaptive Data Rate — automatic SF/power optimization), and device authentication.

Application Server: Delivers decoded data to the application layer.

Device Activation Methods

Devices join a LoRaWAN network using two methods:

OTAA (Over-The-Air Activation): The device sends a "join request" on first network entry. The Network Server validates the device's AppEUI and DevEUI identifiers and derives a session key. This is the security-preferred method.

ABP (Activation By Personalization): Keys and address are pre-written to the device. No join procedure is required, but since session keys do not rotate, this can introduce long-term security vulnerabilities.

Encryption and Security

LoRaWAN v1.1 uses two separate encryption layers:

NwkSKey (Network Session Key): Ensures network-layer integrity. Used to generate the MIC (Message Integrity Code), allowing the network server to detect forged packets.

AppSKey (Application Session Key): Encrypts the application payload. The Network Server does not have this key; it exists only on the Application Server and the end device. This layer provides end-to-end data confidentiality independent of the network operator.

Both layers use AES-128.

Frame Counter and Replay Attack Protection

Each packet contains an incrementing frame counter. The Network Server rejects packets with lower counters, preventing replay attacks.

LoRa vs. Other Technologies

Parameter LoRa Sigfox NB-IoT Zigbee Bluetooth LE
Frequency 868/915 MHz 868/915 MHz Licensed LTE 2.4 GHz 2.4 GHz
Range 2-40 km 10-50 km 1-10 km 10-100 m 10-100 m
Data Rate 0.3-50 kbps 100-600 bps 200 kbps 250 kbps 1-3 Mbps
Power Very low Very low Low Low Very low
Infrastructure Optional / independent Required Required Mesh P2P/Mesh
License Unlicensed Unlicensed Licensed Unlicensed Unlicensed

LoRa's decisive advantage over its competitors is private network flexibility. While Sigfox and NB-IoT require operator infrastructure, LoRa gateways can be privately deployed — enabling the construction of closed, independent networks.

Duty Cycle Constraint: Europe's ISM Rules

In Europe, devices using the 868 MHz ISM band are subject to duty cycle restrictions. A device cannot exceed a set percentage of transmission time within a given period.

In the 868.0-868.6 MHz band, the duty cycle limit is 1%. This means a device can transmit no more than 36 seconds per hour. This constraint is not a problem for low-frequency sensor applications (such as hourly temperature readings), but it is a serious design constraint for applications requiring real-time tracking or frequent updates.

Practical Use Cases

Smart city infrastructure: Remote reading of electricity, water, and gas meters. A few gateways covering a city center can read hundreds of meters several times per day.

Agriculture and environmental monitoring: Soil moisture, temperature, rainfall, and air quality sensors. Battery life can last years; operates outside GSM coverage.

Asset tracking: Vehicle, container, and equipment tracking. The LoRa + GPS combination provides an energy-efficient solution for periodic location updates.

Emergency communication: Self-contained LoRa networks can sustain basic data communication in disaster zones when cellular infrastructure has failed. Open-source projects like Meshtastic enable mesh messaging networks to be built over LoRa.

Critical infrastructure monitoring: Monitoring of bridges, dams, and pipeline sensors. LoRa coverage can be established in remote locations even without GSM.

Meshtastic: Infrastructure-Free Mesh over LoRa

Meshtastic is an open-source mesh communication project using LoRa modules. Each device acts as both source and router; no central gateway or server is required.

The technical infrastructure works as follows: messages propagate through the network using a flooding algorithm. Each device forwards a received message to its neighbors if it has not seen it before. A TTL (Time to Live) value limits the number of transmissions. A CSMA/CA-like access control mechanism is used to prevent simultaneous transmission from multiple devices.

Meshtastic can transmit encrypted text messages, location sharing, and telemetry data over LoRa. It operates without cellular or internet infrastructure, making it a complementary layer for ATAK-like applications.

Conclusion

Radio communication continues to serve as the foundational resilience layer in every scenario requiring infrastructure independence. Once the fundamentals of RF physics — frequency, bandwidth, modulation — are understood, it becomes clear why LoRa is such a powerful tool: CSS modulation's noise resistance, LoRaWAN's layered security architecture, and private network flexibility combine to make it possible to build secure data communication networks that operate outside GSM coverage, powered by batteries for years. Understanding this infrastructure is the prerequisite for correctly managing both design decisions and operational limitations.