Features of nRF91 Series
The nRF9160 SiP integrates an application MCU, a full LTE modem, an RF front end, and power management. With built-in GNSS support, it is a great choice for asset tracking applications.
The following figure illustrates the conceptual layout when targeting an nRF9160 Cortex-M33 application MCU with TrustZone:
Devices in the nRF91 Series are supported by the following boards in the Zephyr open source project and in nRF Connect SDK.
DK or Prototype platform
The M33 TrustZone divides the application MCU into secure and non-secure domains. When the MCU boots, it always starts executing from the secure area. The secure bootloader chain starts the Trusted Firmware-M (TF-M) when using nRF9160 DK or the Secure Partition Manager when using Thingy:91. The secure firmware component configures a part of memory and peripherals to be non-secure, and then jumps to the main application located in the non-secure area.
Secure bootloader chain
A secure bootloader chain protects your application against running unauthorized code, and it enables you to do device firmware updates (DFU). See Secure bootloader chain for more information.
Trusted Firmware-M (TF-M)
Trusted Firmware-M provides a configurable set of software components to create a Trusted Execution Environment.
It has replaced Secure Partition Manager as the default solution used by most nRF Connect SDK applications and samples when using nRF9160 DK but not for Thingy:91.
This means that when you build your application for
nrf9160dk_nrf9160_ns build target, the TF-M is automatically included in the build and when you build your application for
thingy91_nrf9160_ns build target, the Secure Partition Manager is automatically included in the build.
TF-M is a framework for functions and use cases beyond the scope of Secure Partition Manager.
Secure Partition Manager
The Secure Partition Manager sample provides a reference implementation of a Secure Partition Manager firmware. You can use Secure Partition Manager as an alternative to Trusted Firmware-M (TF-M) for running an application from the non-secure area of the memory.
To use the Secure Partition Manager instead of TF-M, do the following:
The user application runs in the non-secure domain.
Therefore, it must be built for the
thingy91_nrf9160_ns build target.
The application image might require other images to be present.
Some samples include the nRF Secure Immutable Bootloader sample (
CONFIG_SECURE_BOOT) and MCUboot (
Depending on the configuration, all these images can be built at the same time in a multi-image build.
The LTE modem handles LTE communication. It is controlled through AT commands.
The firmware for the modem is available as a precompiled binary. You can download the firmware from the nRF9160 product website (compatible downloads). The zip file contains both the full firmware and patches to upgrade from one version to another. A delta patch can only upgrade the modem firmware from one specific version to another version (for example, v1.2.1 to v1.2.2). If you need to perform a major version update (for example, v1.2.x to v1.3.x), you need an external flash with a minimum size of 4 MB.
Different versions of the LTE modem firmware are available, and these versions are certified for the mobile network operators having their own certification programs. See the Mobile network operator certifications for more information.
Most operators do not require certifications other than GCF or PTCRB. For the current status of GCF and PTCRB certifications, see nRF9160 certifications.
There are two ways to update the modem firmware:
- Full upgrade
You can use either a wired or a wireless connection to do a full upgrade of the modem firmware:
When using a wired connection, you can use either the nRF Connect Programmer, which is part of nRF Connect for Desktop, or the nRF pynrfjprog Python package. Both methods use the Simple Management Protocol (SMP) to provide an interface over UART, which enables the device to perform the update.
You can use the nRF Connect Programmer to perform the update, regardless of the images that are part of the existing firmware of the device. For example, you can update the modem on an nRF9160 DK using the instructions described in Updating the modem firmware in the nRF9160 DK Getting Started guide.
You can also use the nRF pynrfjprog Python package to perform the update, as long as a custom application image integrating the
lib_fmfu_mgmtsubsystem is included in the existing firmware of the device. See the nRF9160: Full modem firmware update using SMP Server sample for an example on how to integrate the subsystem in your custom application.
When using a wireless connection, the upgrade is applied over-the-air (OTA). See FOTA upgrades for more information.
- Delta patches
Delta patches are upgrades that contain only the difference from the last version. See Delta firmware updates for more information on delta firmware updates of modem using Modem library. When applying a delta patch, you must therefore ensure that this patch works with the current firmware version on your device. Delta patches are applied as firmware over-the-air (FOTA) upgrades. See FOTA upgrades for more information.
The nRF Connect SDK applications for the nRF9160-based devices that communicate with the nRF9160 modem firmware must include the Modem library.
The Modem library is released as an OS-independent binary library in the nrfxlib repository and it is integrated into nRF Connect SDK through an integration layer,
The Modem library integration layer fulfills the integration requirements of the Modem library in nRF Connect SDK. For more information on the integration, see Modem library integration layer.
You can upgrade the firmware of the device over the air, thus without a wired connection. Such an upgrade is called a FOTA (firmware over-the-air) upgrade. FOTA upgrades can be used to apply delta patches to the LTE modem firmware, full LTE modem firmware upgrades, and to replace the upgradable bootloader or the application.
Even though the Trusted Firmware-M and the application are two individually compiled components, they are treated as a single binary blob in the context of firmware upgrades. Any reference to the application in this section is meant to indicate the application including the Trusted Firmware-M.
To perform a FOTA upgrade, complete the following steps:
- Make sure that your application supports FOTA upgrades.
To download and apply FOTA upgrades, your application must use the FOTA download library. This library deduces the type of upgrade by inspecting the header of the firmware and invokes the DFU target library to apply the firmware upgrade. In its default configuration, the DFU target library is set to support all the types of FOTA upgrades except full modem firmware upgrades, but you can freely enable or disable the support for specific targets.
In addition, the following requirements apply:
If you want to upgrade the modem firmware through modem delta updates, neither MCUboot nor the immutable bootloader are required, because the modem firmware upgrade is handled by the modem itself.
If you want to perform a full modem firmware upgrade, an external flash memory with minimum 4 MB is required.
Create a binary file that contains the new image.
This step does not apply for upgrades of the modem firmware. You can download delta patches and full binaries of the modem firmware from the nRF9160 product website (compatible downloads).
To create a binary file for an application upgrade, make sure that
CONFIG_BOOTLOADER_MCUBOOTis enabled and build the application as usual. The build will create several binary files (see Using MCUboot in nRF Connect SDK). The
app_update.binfile is the file that should be uploaded to the server.
To create binary files for a bootloader upgrade, make sure that
CONFIG_BUILD_S1_VARIANTare enabled and build MCUboot as usual. The build will create a binary file for each variant of the upgradable bootloader, one for each bootloader slot. See Second-stage Upgradable bootloader for more information.
- Make the binary file (or files) available for download.
Upload the serialized
.cborbinary file or files to a web server that is compatible with the Download client library.
The full FOTA procedure depends on where the binary files are hosted for download.
FOTA upgrades using nRF Cloud
FOTA upgrades can be managed through a comprehensive management portal on nRF Cloud, either fully hosted on nRF Cloud or accessible from a customer cloud using the nRF Cloud REST API. If you are using nRF Cloud, see the nRF Cloud Getting Started FOTA documentation for instructions.
Currently, delta modem firmware FOTA files are available in nRF Cloud under Firmware Updates in the Device Management tab on the left. If you intend to obtain FOTA files from nRF Cloud, see the additional requirements in Firmware over-the-air (FOTA) updates.
You can upload custom application binaries to nRF Cloud for application FOTA updates. After Connecting the DK to nRF Cloud, you can upload the files to your nRF Cloud account as a bundle after navigating to Device Management on the left and clicking Firmware Updates.
FOTA upgrades using other cloud services
FOTA upgrades can alternatively be hosted from a customer-developed cloud services such as solutions based on AWS and Azure. If you are uploading the files to an Amazon Web Services Simple Storage Service (AWS S3) bucket, see the AWS FOTA documentation for instructions. Samples are provided in nRF Connect SDK for AWS (nRF9160: AWS FOTA sample) and Azure (nRF9160: Azure FOTA sample).
Your application must be able to retrieve the host and file name for the binary file. See the FOTA download library documentation for information about the format of this information, especially when providing two files for a bootloader upgrade. You can hardcode the information in the application, or you can use a functionality like AWS jobs to provide the URL dynamically.
Samples and applications implementing FOTA
nRF9160: HTTP full modem update sample - performs a full firmware OTA update of the modem.
nRF9160: HTTP modem delta update sample - performs a delta OTA update of the modem firmware.
nRF9160: HTTP application update sample - performs a basic application FOTA update.
nRF9160: AWS FOTA sample - performs a FOTA update using MQTT and HTTP, where the firmware download is triggered through an AWS IoT job.
nRF9160: Azure FOTA sample - performs a FOTA update from the Azure IoT Hub.
nRF9160: Asset Tracker v2 application - performs FOTA updates of the application, modem (delta), and boot (if enabled). It also supports nRF Cloud FOTA as well as AWS or Azure FOTA. Only one must be configured at a time.
An nRF9160-based device is a highly versatile device that integrates both cellular and GNSS functionality. Note that GNSS functionality is only available on the SICA variant and not on the SIAA or SIBA variants. See nRF9160 SiP revisions and variants for more information.
There are many GNSS constellations (GPS, BeiDou, Galileo, GLONASS) available but GPS is the most mature technology. An nRF9160-based device supports both GPS L1 C/A (Coarse/Acquisition) and QZSS L1C/A at 1575.42 MHz. This frequency band is ideal for penetrating through layers of the atmosphere (troposphere and ionosphere) and suitable for various weather conditions. GNSS is designed to be used with a line of sight to the sky. Therefore, the performance is not ideal when there are obstructions overhead or if the receiver is indoors.
The GNSS operation in an nRF9160-based device is time-multiplexed with the LTE modem. Therefore, the LTE modem must either be completely deactivated or in RRC idle mode or Power Saving Mode (PSM) when using the GNSS receiver. See the nRF9160 GPS receiver Specification for more information. Customers who are developing their own hardware with the nRF9160 are strongly recommended to use the nRF9160 Antenna and RF Interface Guidelines as a reference. See GPS interface and antenna for more details on GNSS interface and antenna.
Starting from nRF Connect SDK v1.6.0 (Modem library v1.2.0), the GNSS socket is deprecated and replaced with the GNSS interface.
GNSS provides lots of useful information including 3D location (latitude, longitude, altitude), time, and velocity.
The time to obtain a fix (also referred to as Time to First Fix (TTFF)) will depend on the time when the GNSS receiver was last turned on and used.
Following are the various GNSS start modes:
Cold start - GNSS starts after being powered off for a long time with zero knowledge of the time, current location, or the satellite orbits.
Warm start - GNSS has some coarse knowledge of the time, location, or satellite orbits from a previous fix that is more than around 37 minutes old.
Hot start - GNSS fix is requested within an interval of around 37 minutes from the last successful fix.
Ephemeris data - Provides information about the orbit of the satellite transmitting it. This data is valid for four hours and becomes inaccurate after that.
Almanac data - Provides coarse orbit and status information for each satellite in the constellation. Each satellite broadcasts Almanac data for all satellites.
The data transmission occurs at a slow data rate of 50 bps. The orbital data can be received faster using A-GPS.
Due to the clock bias on the receiver, there are four unknowns when looking for a GNSS fix - latitude, longitude, altitude, and clock bias. This results in solving an equation system with four unknowns, and therefore a minimum of four satellites must be tracked to acquire a fix.
When GNSS has not been in use for a while or if the device is in relatively weak signaling conditions, it might take longer to acquire a fix. To improve this, Nordic Semiconductor has implemented the following methods for acquiring a fix in a shorter time:
A-GPS or P-GPS or a combination of both
Low accuracy mode
Assisted GPS (A-GPS)
A-GPS is commonly used to improve the Time to first fix (TTFF) by utilizing a connection (for example, over cellular) to the internet to retrieve the Almanac and Ephemeris data. A connection to an internet server that has the Almanac and Ephemeris data is several times quicker than using the slow 50 bps data link to the GPS satellites. There are many options to retrieve this A-GPS data. Two such options are using nRF Cloud and SUPL. nRF Connect SDK provides example implementations for both these options. The A-GPS solution available through nRF Cloud has been optimized for embedded devices to reduce protocol overhead and data usage. This, in turn, results in the download of reduced amount of data, thereby reducing data transfer time, power consumption, and data costs. See A-GPS data for more information about the retrieval of A-GPS data.
Predicted GPS (P-GPS)
P-GPS is a form of assistance, where the device can download up to two weeks of predicted satellite Ephemerides data. Normally, devices connect to the cellular network approximately every two hours for up-to-date satellite Ephemeris information or they download the Ephemeris data from the acquired satellites. P-GPS enables devices to determine the exact orbital location of the satellite without connecting to the network every two hours with a trade-off of reduced accuracy of the calculated position over time. Note that P-GPS requires more memory compared to regular A-GPS.
Also, note that due to satellite clock inaccuracies, not all functional satellites will have Ephemerides data valid for two weeks in the downloaded P-GPS package. This means that the number of satellites having valid predicted Ephemerides reduces in number roughly after ten days. Hence, the GNSS module needs to download the Ephemeris data from the satellite broadcast if no predicted Ephemeris is found for that satellite to be able to use the satellite.
For more information on the various trade-offs of using A-GPS compared to using P-GPS, see the nRF Cloud Location Services documentation.
nRF Cloud A-GPS compared with SUPL library
The nRF Cloud A-GPS library is more efficient to use when compared to the SUPL library, and the latter takes a bit more memory on the device. Another advantage of nRF Cloud A-GPS library is that the data is encrypted whereas SUPL uses plain socket. Also, no licenses are required from external vendors to use nRF Cloud A-GPS, whereas for commercial use of SUPL, you must obtain a license. The nRF Cloud A-GPS library is also highly integrated into Nordic Semiconductor’s IoT cloud platform.
Low Accuracy Mode
Low accuracy mode allows the GNSS receiver to accept a looser criterion for a fix with four or more satellites or by using a reference altitude to allow for a fix using only three satellites. This has a tradeoff of reduced accuracy. This reference altitude can be from a recent valid normal fix or it can be artificially injected. See Low accuracy mode for more information about low accuracy mode and its usage.
There are many examples in nRF Connect SDK that use GNSS. Following is a list of the samples and applications with some information about the GNSS usage:
nRF9160: Asset Tracker v2 application - Uses nRF Cloud for A-GPS or P-GPS or a combination of both. The application obtains GNSS fixes and transmits them to nRF Cloud along with sensor data.
nRF9160: Serial LTE modem application - Uses AT commands to start and stop GNSS and has support for nRF Cloud A-GPS and P-GPS. The application displays tracking and GNSS fix information in the serial console.
nRF9160: GNSS sample - Does not use assistance by default but can be configured to use nRF Cloud A-GPS or P-GPS or a combination of both. The sample displays tracking and fix information as well as NMEA strings in the serial console.
An nRF9160-based device supports GNSS in LTE-M and NB-IoT. Concurrent operation of GNSS with optional power-saving features, such as extended Discontinuous Reception (eDRX) and Power Saving Mode (PSM), is also supported, and recommended.
The following figure shows how the data transfer occurs in an nRF9160-based device with power-saving in place.
See Energy efficiency for more information.
Asset Tracker enables the concurrent working of GNSS and LTE in eDRX and PSM modes when the device is in RRC idle mode. The time between the transition of a device from RRC connected mode (data transfer mode) to RRC idle mode is dependent on the network. Typically, the time ranges between 5 seconds to 70 seconds after the last data transfer on LTE. Sensor and GNSS data are sent to the cloud only during the data transfer phase.
The band lock is a functionality of the application that lets you send an AT command to the modem instructing it to operate only on specific bands. The band lock is handled by the LTE Link Control driver. By default, the functionality is disabled in the driver’s Kconfig file.
The modem can operate in the following E-UTRA Bands: 1, 2, 3, 4, 5, 8, 12, 13, 17, 18, 19, 20, 25, 26, 28, and 66. To check which bands are supported for a particular modem firmware version, see the nRF9160 product website (compatible downloads).
You can use the band lock to restrict modem operation to a subset of the supported bands, which might improve the performance of your application. To check which bands are certified in your region, visit nRF9160 Certifications.
Then, enable the LTE band lock feature and the band lock mask in the configuration file of your project, as follows:
The band lock mask allows you to set the bands on which you want the modem to operate.
Each bit in the
CONFIG_LTE_LOCK_BAND_MASK option represents one band.
The maximum length of the string is 88 characters (bit string, 88 bits).
The band lock is a non-volatile setting that must be set before activating the modem. It disappears when the modem is reset. To prevent this, you can set the modem in power off mode, by either:
Sending the AT command
lte_lc_power_off()function while the LTE Link Control Library is enabled.
Both these options save the configurations and historical data in the Non-Volatile Storage before powering off the modem.
As a recommendation, turn off the band lock after the connection is established and let the modem use the historical connection data to optimize the network search, in case the device is disconnected or moved.
For more detailed information, see the band lock section in the AT Commands reference document.
The modem supports LTE-M (Cat-M1) and Narrowband Internet of Things (NB-IoT or LTE Cat-NB). By default, the modem starts in LTE-M mode. However, this is highly configurable.
To start in NB-IoT mode without the driver, send the following command before starting the modem protocols (by using
To change the mode at runtime, set the modem to LTE RF OFF state before reconfiguring the mode, then set it back to normal operating mode:
AT+CFUN=4 AT%XSYSTEMMODE=0,1,0,0 AT+CFUN=1
If the modem is shut down gracefully before the next boot (by using
AT+CFUN=0), it keeps the current setting.
For more detailed information, see the system mode section in the AT Commands reference document.