Who’s Your Betamax of IoT Standards?

Image Courtesy of Flickr Creative Commons In the world of IoT/IIoT an explosion of standards has fallen upon us. While we all can agree that standards are what binds our current communication infrastructures together, it does take time for the victorious standard to rise to the top of adoption. Some of us remember the battle that arose in the video tape arena between VHS and Betamax (https://en.wikipedia.org/wiki/Videotape_format_war). While Betamax’s claim to fame was the superior picture, VHS had the longer recording time and a larger backing from the industry. In the end VHS won. And who can remember the tale of HD-DVD vs Blu-Ray, token-ring vs 10Base-T or WiMax vs LTE? Enter the IoT/IIoT wannabes.  In the communication protocol arena we have standards such as 802.15.4 (ZigBee), 802.11ah (Wi-Fi HaLow) and LoRa that want to use the 900 MHz spectrum to connect your devices back to a gateway and then to your cloud.  There are also application software framework standards such as Thread, Alljoyn, IoTivity, Arrowhead and LWM2M.  I won’t even mention all of the cloud platforms that aim to bring all of these pieces together in one place. Really, how many people think about the actual physical mechanisms that enable connectivity throughout the world? And within that, who thinks about the standards set by organizations that dictate the best method for connecting all our devices? Standards have the potential to affect ranges of communication, battery life on remote devices, signal interference, and many other things. The interesting part about the race to the top, so to speak, is that the standards mentioned above all have viable aspects that could potentially make them the ideal solution for connected infrastructure. Many of these standards have consortiums with major players such as Google, Microsoft, ARM and Samsung, all of which play at different places in the IoT/IIoT theatre.  So, unlike the tail of Betamax, many of these standards have the backing of multiple entities.  But, who’s going to win?  Which standard will come out on top? Or, will we find ourselves with multiple standards because we can’t agree on one to do the job?  What do you think? Who is your Betamax pick for IoT/IIoT?

IWCE 2016: What to expect next week?

The International Wireless Communications Expo (IWCE), is an annual event for communication technology professionals working globally in a broad range of the communications field, including energy, utilities, emergency response and municipality/infrastructure. This conference will get under way next week, from March 21-25, in Las Vegas. An estimated 7,000 individual industry experts are expected to attend from government/military; public safety (law enforcement, fire service and first responders); utility, transportation and business enterprise. IWCE will also feature around 370 exhibitors ready to show you the latest product innovations and trends forecasted this coming year. Donny Jackson editor of Urgent Communications, the official tradeshow media partner, believes that this year’s IWCE will give industry professionals a chance to get educated about the latest critical-communications technology, all while making key network contacts with industry experts. So, what else can we look forward to? IWCE promises to offer engaging content–with their 5-day comprehensive conference program; more quality time with peers; industry experts providing the latest strategies and tactics; minimal expenses–when you take advantage of conference discounts; structured networking opportunities; tangible handouts you can use throughout the year; more face-to-face learning time and more educational opportunities will be available this year. Excitement is building! Here are just a few of the people and organizations excited for next week’s event! Tune in next week for our IWCE insider recaps. Vegas here we come!

Video: What are the Future Uses of Drones?

While drones are responsible for one of the latest tech crazes to hit the mainstream, it’s safe to say that you should not expect them to invade your airspace anytime soon. However, the influx of these flying smart machines may not be as far off as you might think. With heavy-hitters like Amazon, Google and Walmart recognizing the immense opportunity of using drones for shipping and logistics purposes, its no wonder that people are saying “the drones are coming!” Industrial Applications for Drones What could prove to be more promising than the consumer-driven demand for flying drones is the use of that technology in industrial settings and applications. Already, we see companies using drones for the following scenarios: Emergency Response Enables immediate action, providing emergency response teams with fast, flexible visibility to assess critical situations. Utilities Safely allows for the quick inspection of high voltage power lines and wind turbines, helping mitigate worker risk and improve monitoring. Military & Defense Assisting with intelligent surveillance and reconnaissance missions to deliver timely, relevant, and assured information to thwart potential threats. Oil & Gas Protects and helps maintain extensive miles of pipeline covering large, remote areas that would otherwise require enormous amounts of time and resources. Agriculture Creates more efficient farms by monitoring inventory, growth, water and fertilizer levels, and crop health to facilitate production and increase yields. Public Safety Supporting firefighting operations by providing more up-to-date information at a lower cost, while reducing the number of responders in harm’s way. So what does the future hold for these next-generation technologies? It’s hard to say really. One of the biggest hurdles still to jump is figuring out how these aircrafts will fit into the Federal Aviation Administration’s (FAA) existing airspace regulations. There is no doubt there will be new policies that are drone-specific on the horizon. In fact, the FAA has already taken steps in that direction by requiring drone owners to register their aircrafts as a first step in ensuring the safety of everyone who uses the skies. Let’s just assume that over then next five years policy and technology come together and we finally have lift-off in the drone world. What’s next? Check out this video courtesy of Be Amazed that explores 10 amazing futuristic uses of drones:

Sensor-2-Server (S2S): Implementing IIoT Communications

*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development and implementation. Last week, in part one of our series, we worked to define Sensor-2-Server (S2S) for IIoT communications, the access layer, and high-level applications. This week, we’re looking at the actual implementation of S2S communication systems. Implementing S2S Communications When implementing S2S networks, the operator needs to have a solid understanding of the following: What sensor data do I want to collect? What does the architecture look like? Where does the data need to come from and where does it need to go? For example, is it just going to SCADA or is it going to other data sources? These key details will drive the selection of the technology that best fits, in addition to the physical environment where it needs to transmit data. Carefully selecting the right pieces will help in architecting the network. In order to make S2S work, an operator needs to understand the physical environment needs. Everything is unique when it comes to RF in particular, and an operator must fully understand their environment if they want to be successful. The ability to collect the data is the first step in improving intelligence of Sensor-2-Server communication, which starts with technology selection. Four Tenets of Sensor-2-Server To establish the most effective S2S communications network, there are four core tenets that the technology must support: collecting the data, protecting the data, transmitting the data and controlling the data. Collect – The technology must allow the operator to collect data from any sensor – whether the sensors are analog or digital, wireless or wired. In some instances, the technology may need the extended ability to collect data at the access layer in a data logging fashion – allowing the operator to collect it, store it locally and make it available to SCADA systems. Protect- The intelligent communication must be able to protect the network against cyber-attacks. It must fix the boundary between the sensor and backbone network. Without ample security in the environment, many industries can be at risk for severe consequences such as compromised data or denial of service. Transport- The data must be transported to the appropriate location for analysis, no matter where the data is collected from. Operators should look for a system that offers seamless wireless data connectivity from Sensor-2-Server. Control- The Sensor-2-Server technology must add intelligenceto the access layer. Data logging is critical, and operators must have the capability to pull data in and control what happens with the data and where that data is stored. Users can leverage that data at the local level or back at the core network. S2S technology can be effectively deployed in the energy sector, whether it is oil and gas, electric power, solar, wind and or tide- based energy. Additionally, utilities, precision agriculture and irrigation can also benefit from intelligent S2S communication. With an intelligent communication system, operators can leverage new technology to improve the profitability of their businesses in ways previously considered impossible. For example, if an oil and gas company can use predictive analytics to estimate the price per barrel, the company can be more responsive – in real time – on its oil production levels. The data gathered from predictive analytics can help operators determine if production should be increased or decreased in certain areas, thus driving higher profitability. These technologies can also lead to cost reduction. For example, by deploying S2S technology at the oil well, the operator does not have to send as many workers out in the field to manually collect data. By enabling multiple benefits (profitability and cost reduction), S2S offers a value proposition that is getting the attention of many industrial operators. Next Week Next week, we’ll look at the benefits of intelligent Sensor-2-Server communications, as well as some of the important security considerations.

Can You Hear Me Now? Remote Wi-Fi in the Connected World

(Image courtesy of Tony Webster, via Flickr Creative Commons) One of the more fascinating aspects of our eternal march toward ‘the future’ is the occasional, but impacting, intersection of our critical infrastructure and the general consumer. Like a sine wave across the axis, our connected world meets at points in time that catalyze technological explosions. The transition of computers from behemoth industrial-sized calculators into the first iteration of the personal computer is a good, somewhat recent example. So is the Internet. Each of those began as a fairly raw tool used for enterprise industrial services before intersecting with the consumer and birthing new innovations and applications.Today, the connected world on the horizon, envisioned by dreamers and pragmatists alike, is taking form on the backbone of wireless connectivity in a way that has the ability to impact our critical industries, our smart cities, our homes and our daily lives like never before. Remote Wi-Fi is a tool that has enabled connectivity and data transport for industries like oil and gas, precision agriculture, utilities and seismic monitoring, leading to a boom in the use of predictive analytics to better streamline the work processes in the field for these traditionally remote areas. However, two of the main problems with traditional remote wi-fi network deployment are the security of these networks, as well as the latency of the data transmission. To combat this, these industries have turned to the use of shorthaul (between 1-5 miles) wi-fi hotspots to utilize built-in security measures and decrease latency for data-intensive applications like voice, video, data and sensor connectivity. As a result, these industries have been better able to collect and transport data throughout an entire smart ecosystem, affecting everything from decision-making in the field, to the way the consumer can track personalized utility usage. Our smart cities and municipalities depend on data collected remotely to anticipate infrastructure-related resiliency issues, like grid outages, seismic events and disaster preparedness. Companies in these industries depend on remote data to solve production, maintenance and transport problems. Wi-Fi Will Save the Connected World In early January, the Wi-Fi Alliance, a worldwide network of companies trying to standardize global Wi-Fi provision, announced a new protocol that promises to trigger changes throughout the industrial landscape. Wi-Fi HaLow, as it is called, is an addendum to the IEEE 802.11ah protocol that is set to be finalized later in 2016. HaLow operates in frequencies below 1 GHz and can potentially provide a longer range than Wi-Fi has traditionally offered. The implications for remote Wi-Fi and the Industrial Internet of Things are huge. The addendum means more efficient battery usage due to operating on a lower frequency and with a lower data rate, which, in turn means a greater range and lower transmission power. This standard is still awaiting a final vote, so before we anoint HaLow as the magic bullet for which the Internet of Things has been waiting, the IEEE standards committee will have its say. To come full circle, the potential advent of better long-range Wi-Fi in remote settings could be the next intersection of the axis and the sine wave, enabling innovation and growth at both the industrial and consumer levels of connected-world technology.

IIoT Top News: 2015 News Round-Up

Let’s take a moment and appreciate the excitement 2015 brought for the IIoT: As we look back at the top articles from the year, we were intrigued to learn that cooperative utilities actually have the largest penetration of smart grid meters per percentage of customers, according to Greentech Media and the U.S. Energy Information Administration. It’s interesting to see the largest publicly-owned utility companies in the U.S. are not the leader in deploying smart meter systems. Another topic that caught our eye this year focused on big data initiatives and how they will improve operational efficiencies by the large-scale storage and transfer of volumes of information safely and securely. Companies don’t always see the value in updating information governance policies because there isn’t always a direct reward and no direct penalty for non-compliance. Tim Jennings, Ovum chief research officer, believes as big data continues to grow within the company infrastructure, it is time to consider the security, availability, and time spent storing data. Speaking of Big Data… It is hard to grasp the magnitude of data transferred throughout the cloud. Today, as big data goes to work, it is transforming industrial facilities, and as Forbes states, “they have grown increasingly complex and yes, every machine, every pipeline, every transmission point collects data ready to be read.” Of course, a 2015 news review would not be complete without at least one mention of unmanned systems. Whether the want/need was for industrial, commercial or government applications, the thing on everyone’s mind was how many cool ways this technology could be deployed in the future. While there were many examples to choose from, DARPA certainly caught a lot of attention from its new autonomous submarine-hunting ocean drone. Yes, you read that right! Finally, as we ease our way into 2016, we would like to share the rest of the top technology and IIoT stories from 2015. This year’s round-up highlights articles about: utilities, manufacturing, oil and gas, wireless, big data, security, drones and industry analyst perspectives. Hope you enjoy this week’s roundup, and as always, tell us what we missed! Energy Six Ways IoT Enables Innovation in the Energy Industry (IT World Canada) The energy industry is learning to use IoT to its advantage. IT World Canada details six ways IoT is enabling innovation and improving overall cost and efficiency for the industry. Yogi Schulz with IT World Canada believes that “Applying these IoT advances to a range of energy industry problems will be a major factor in helping the industry return to profitability in the new, lower commodity price environment through innovation based on better data.” Manufacturing Machine Learning (The Economist) As manufacturing becomes digitized, the industry has to adjust from being a product-focused world to a services market, with smart machines installed on the shop floor. The Economist believes that “For many manufacturers—in Germany and beyond—the principal sticking-point in making this digital leap is often cultural.” Manufacturing’s Digital Future (Industry Week) The digital future of manufacturing will incorporate the data analytics, cloud and many other wireless IoT solutions. Industry Week believes “many companies are leveraging interconnectivity to improve their own factory productivity, the factory-floor blocking and tackling of reducing downtime, cutting costs, reducing cycle time, improving OEE, etc.” Oil and Gas In the Digital Oilfield, “No Wires is a No-Brainer (World Oil) With the digital progression of our world, it seems only fitting we would find IoT in the oilfield. The question we must ask is: “Why, in 2015, has wireless I/O not overtaken hardwired infrastructure as the industry standard throughout the OFS sector?” Big Data Internet of Things Transforming Oil and Gas Operations (RigZone) Analytical movement has increased as the cost of oil continues to drop, therefore forcing the oil industry to gravitate toward more big data and IoT. It has been said, “the amount of data generated by oil and gas operations is starting to explode as real-time information from sensors is being collected at a rate of four milliseconds.” Wireless Tech Darpa’s RadioMap Detects RF Spectrum Congestion (GCN) An interconnected connected wireless world has created congested airways, thus making military communication and intelligence gathering requiring radio frequencies be managed. “RadioMap adds value to existing radios, jammers and other RF electronic equipment used by our military forces in the field,” said John Chapin, DARPA program manager. Big Data The Ethics of Big Data (Tech.Co) Big data has been defined as information that has been either unstructured or multi-structured as way to transform data into value. Once you have given value to the data, it is important to realize who owns the data. Tech.CO says that “when it comes to big data ethics, privacy is not necessarily dead, shared information can still have a reasonable degree of confidentially, but big data can still compromise identity and other information that customers and businesses prefer to be confidential.” Security IoT Security Needs to Stop Being an Afterthought (PCR) In the age of smart homes and smart devices it is time to improve the IoT security across the board. The Internet Society (ISOC) recently released a white paper stating, “the vendors who use IoT should take more responsibility for the security issues that can occur with IoT products.” Drones Robo-Bulldozers Guided By Drones Are Helping Ease Japan’s Labor Shortage (The Verge) Komatsu had to find a way to complete construction projects, as Japan gets closer to the 2020 Olympics. The aging population makes it hard to find anyone able to complete the work. The fix Komatsu has found is to offer a service called Smart Construction where, “a team of robotic vehicles scoops rock and pushes dirt without a human behind the wheel. They are guided in their work by a fleet of drones, which map the area in three dimensions and update the data in real time to track how the massive volumes of soil and cement are moving around the site.” Deforestation: British Firm Developing Tree-Planting Drone to Counter Industrial-Scale Logging (The Independent) A British engineering company is hoping to get international backing for an automated tree planting drone system. The purpose of these drone planting fleet’s, would be not

Guest Post: IHS Predicts IIoT Cybersecurity Will Increasingly Be Implemented in Hardware

By Sam Lucero, Sr. Principal Analyst, M2M & IoT at IHS Technology IIoT & Cybersecurity As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks. Although the use of secure processors in smartcard applications, such as bank cards, mobile phone SIM cards, and digital ID documents is common, IIoT developers have barely begun to adopt a hardware-enabled approach. Instead, “root of trust” technologies, such as secure key storage, cryptography, and secure boot, are handled in software on the main application processor of the device. IHS estimates that in 2015 only 9.8% of all secure processors shipped were intended for IoT applications (that is, all of IoT, not just IIoT). The challenge with this software-based approach is that security functions on the application processor share common memory resources with other functions and are therefore exposed and vulnerable to malicious attack. Hardware isolation reduces (but cannot completely eliminate) this exposure and therefore dramatically increases the security of the device. This increased security is fundamentally why bankcards, mobile phones, and now ePassports, have shifted to the use of hardware-based security. Looking Ahead A lingering question regarding the use of secure processors in IIoT applications is whether implementation will be in the form of a second coprocessor chip placed alongside the host application processor, or whether cybersecurity hardware intellectual property will be integrated directly into an application processor. (Integration of cybersecurity circuitry still achieves hardware isolation in contrast to software, although some physical security measures may become impractical.) Chip companies such as Atmel, NXP, and Renesas Electronics have adopted this integrated approach for at least some of their respective portfolios targeting the IoT. It remains to be see whether an integrated approach will be successful. While integration helps to reduce overall device bill-of-materials, it can increase cost and complexity for cybersecurity certification, relative to a “two-chip” solution. About Sam Lucero Sam Lucero is a seasoned industry analyst with over 14 years of experience analyzing telecommunications and networking technology markets. He has spent the last ten years assessing the markets for machine-to-machine (M2M) and Internet of Things (IoT) applications. Sam has established leading M2M market research programs and managed international teams of industry analysts. He has authored numerous reports, forecast databases, and topical articles covering various aspects of the M2M/IoT market opportunity and has been widely quoted in news and trade journals, from the New York Times and the Economist to CNET and Wireless Week. Furthermore, Sam has moderated, presented, and judged at a number of industry events, including CTIA and Connected World. In 2014 Sam was named one of six “Augural Analysts” for M2M by Connected World Magazine.

IIoT Bold Prediction Series Part 5: Discrete RF Manufacturers Obsolete in Three Years

What a week it has been for the connected world! As we grow closer to the end of 2015, there are plenty of movers and shakers in the IoT space, and for good reason – the excitement around the industry is palpable. In fact, it’s hard to keep a pulse on all the activity as there seems to be innovations occurring daily. Additionally, the IoT provider ecosystem itself continues to grow rapidly as the influx of companies – from device manufacturers and software vendors to IT and Cloud services as well as industry groups and regulators – continue to push the bounds of possibility not just for consumers, but businesses as well. To further add to the end of year developments in IoT, our 2016 IIoT Bold Prediction Series ends the week with a bang – after all, it’s not every day that the CEO of a company predicts the demise of its own industry! However, Kim Niederman, CEO of FreeWave Technologies, is making the bold prediction that discrete Radio Frequency (RF) technology manufacturers will be obsolete within the next three years. Prediction #5: The obsolescence of discrete RF manufacturers will occur by 2019 The catalyst that will drive this change will be the open standards in place that will eventually commoditize the market by bringing backwards compatibility and interoperability between different radio manufacturers. Large chip manufacturers are going to drive physical layer standards, meaning the chipsets themselves are going to be more ubiquitous and will make it increasingly difficult for discrete radio manufacturers to find and capitalize on business opportunities in the marketplace. Companies will continue to drive the adoption of open standards and the concept of the software-defined radio will soon become meaningless. Stay tuned for more on this bold IIoT prediction!

IIoT Bold Prediction Series Part 4: New Networking Protocol Changes IoT Connectivity

Before we move on to the next prediction in our IIoT Predictions series, let’s take a quick look back at the first three: A major security breach of an industrial SCADA system will bring new focus to IoT security. The government will become heavily involved in the regulation of IoT and IIoT devices. Predictive analytics will alter fundamental IT/OT practices. Part of the difficulty in procuring “predictions” for something like the Internet of Things is that the possibilities are truly endless. We know that “IoT” as a concept will increasingly touch on almost every single facet of our daily lives with each passing month, so part of the excitement is being attuned to the new concepts, technologies and thought leaders that seem to pop up near daily. It is an interesting time to be both a creator and user of technology! Today’s prediction, courtesy of Brad Gilbert, director of product management at FreeWave, continues our path toward the more technical side of the Industrial Internet of Things. We know that the technology will continue to progress, but what about the “internet” side of IoT – the enabler of the comprehensive connectivity we’ve come to expect? Prediction #4: Wireless Networking Protocol will Change the Way We Think about IoT Connectivity 802.11ah is a new wireless networking protocol that has the potential to enable a range of connectivity that was previously deemed improbable to obtain – greater sensor connectivity and the potential for even faster data transmission. It is scheduled to be released in mid-2016, and Brad predicts it will garner quick adoption. Here’s the why behind it: 802.11ah Unifies GHz and sub-GHz bands with a Wi-Fi protocol Reduces the need for protocol conversions and gateways Highly congested 2.4GHz band can now be offloaded to either 5GHz or now 900MHz The essence of these features is that they provide a greater diversity for device enablement by offering more networking and frequency band options. The unification of bands reduces the potential for interference and offloads traffic from the 2.4GHz band that is used for wide-range networking needs. 802.11ah Addresses long range communication and battery operation not met with existing 802.11 standards Much needed for IIoT applications, especially those in remote and hazardous locations Better RF propagation than 2.4GHz or 5GHz frequency bands In conjunction with band unification, the new protocol will enable the extension of high-speed connectivity to rural areas without overloading cell tower traffic. It will allow devices to use less battery power by predetermining wake and doze times, and by incorporating relay access points, it will allow networking stations to transmit data more quickly, reducing the overall wake time. Chipset availability The availability of chipsets (specifically SoC technology) will enhance data transmission even further by better managing integrated components and data flow to and from different networks and IoT enabled devices. What’s next? So far, most IIoT devices have been built with traditional band usage in mind. Introducing a new and efficient networking protocol will allow for a greater diversification of device capabilities, as well as a proliferation of sensor networks at a scale that would be unachievable with current standards.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.