Who’s Your Betamax of IoT Standards?

Image Courtesy of Flickr Creative Commons In the world of IoT/IIoT an explosion of standards has fallen upon us. While we all can agree that standards are what binds our current communication infrastructures together, it does take time for the victorious standard to rise to the top of adoption. Some of us remember the battle that arose in the video tape arena between VHS and Betamax (https://en.wikipedia.org/wiki/Videotape_format_war). While Betamax’s claim to fame was the superior picture, VHS had the longer recording time and a larger backing from the industry. In the end VHS won. And who can remember the tale of HD-DVD vs Blu-Ray, token-ring vs 10Base-T or WiMax vs LTE? Enter the IoT/IIoT wannabes.  In the communication protocol arena we have standards such as 802.15.4 (ZigBee), 802.11ah (Wi-Fi HaLow) and LoRa that want to use the 900 MHz spectrum to connect your devices back to a gateway and then to your cloud.  There are also application software framework standards such as Thread, Alljoyn, IoTivity, Arrowhead and LWM2M.  I won’t even mention all of the cloud platforms that aim to bring all of these pieces together in one place. Really, how many people think about the actual physical mechanisms that enable connectivity throughout the world? And within that, who thinks about the standards set by organizations that dictate the best method for connecting all our devices? Standards have the potential to affect ranges of communication, battery life on remote devices, signal interference, and many other things. The interesting part about the race to the top, so to speak, is that the standards mentioned above all have viable aspects that could potentially make them the ideal solution for connected infrastructure. Many of these standards have consortiums with major players such as Google, Microsoft, ARM and Samsung, all of which play at different places in the IoT/IIoT theatre.  So, unlike the tail of Betamax, many of these standards have the backing of multiple entities.  But, who’s going to win?  Which standard will come out on top? Or, will we find ourselves with multiple standards because we can’t agree on one to do the job?  What do you think? Who is your Betamax pick for IoT/IIoT?

Difference Between Data Sheet Transmit Power & Data Stream Transmit Power

Image courtesy of Flickr Creative Commons You need to link a two production sites together in your IIoT network in order to move critical voice, video, data and sensor data (VVDS™) between the sites by deploying access points. So, you consider using industrial Wi-Fi Access Points to implement this short-haul, point-to-point (PTP) RF link between the two sites. Short-haul RF links out to 8 miles are very doable using industrial Wi-Fi Access Points with directional antennas. You evaluate potential Wi-Fi Access Points from their data sheet specs. This is given, and you select one. Now, there is one specification that is commonly misunderstood and leads to confusion when evaluating MIMO capable Wi-Fi Access Points and using them in either PTP or point-to-multipoint (PMP) IIoT networks as wireless infrastructure. Confusion and mistakes arise from the difference between the transmit power stated on the product data sheet and the transmit power of a single MIMO data stream of the Access Point. For example, a 3×3 MIMO Access Point data sheet states the transmit power is 27dBm for MCS4/12/20 data encoding in either the 2.4 or 5GHz band. This is typical, and not a surprise, but what is this transmit power really stating. The FCC limits and regulates maximum transmit power from an intentional emitter, e.g. Wi-Fi Access Points. For Wi-Fi devices, the limits apply to the aggregate transmit power of the device. In above product spec example, the transmit power stated is the aggregate transmit power for the 3 MIMO data streams. Still good? Yes. You have a Wi-Fi Access Point and the total transmit power is 27dBm. Now, you design your short-haul PTP link using Wi-Fi Access Points and directional antennas. What transmit power do you use in your RF link budget? 27dBm since it is the transmit power for the Access Point for the data encoding and the band you plan to use. Right? No. While 27dBm is the total aggregate transmit power for the Access Point, it is not the transmit power of an individual data stream. The individual data stream transmit power is roughly 5dB less than the aggregate transmit power found in the data sheet for a 3×3 MIMO product. Difference in Transmit Power versus Aggregate Power 1 Data Stream transmitting at 22dBm    —  Aggregate Transmit Power is 22dBm 2 Data Streams transmitting at 22dBm  —  Aggregate Transmit Power is 25dBm 3 Data Streams transmitting at 22dBm  —  Aggregate Transmit Power is 27dBm So here it is… If you use the transmit power from the data sheet in your RF link calculation without correction, your actual link distance will be approximately half what you expect for the planned fade margin or the link reliability will be less than what you expect for the planned link distance. When designing RF links for the IIoT networks, make certain you are using the correct transmit power in your RF link budget calculations.

Top News: Manufacturing the Fate of Our Digital World

Top News Manufacturing

Manufacturing is in the midst reinventing itself on the heels of the latest IoT innovations. The industrial automation paradigm, which some say also gave rise to the lean manufacturing management philosophy, continues to influence organizations that wish to find new ways to capitalize on business opportunities in the digital age. Through that lens we gathered the top articles from the week and found some interesting perspectives. Some reports started suggesting manufacturing is in a time of trouble, both in the U.S. and around the globe, namely in places like China. But upon further investigation, we also find exciting trends that are shaping the evolution of manufacturing. We hope you enjoy this week’s roundup, and be sure to comment on your top articles of the week below! Chinese manufacturing fall adds to evidence of sharp global downturn (The Guardian) As the world watches Chinese manufacturing slow, many believe this is evidence of a major global downturn. The Guardian reminds us all that, “In another sign that manufacturers are braced for a long period of chasing business from a diminishing number of customers, they continued to lower their prices in February.”   American Manufacturing in Peril (U.S. News) Gone are the golden days of domestic manufacturing, analysts now believe American manufacturing is in serious trouble. Andrew Soergel with U.S. News suggests that part of the problem for manufacturing is that, “The job market has changed. The generation has changed. The skill requirements to work in factories have changed.”   The Manufacturing Side of CPG’s Digital Disruption (Automation World) In this era of digital disruption, consumer buying behavior will impact manufacturing practices. According to Stephanie Neil with Automation World, she thinks manufacturing could benefit from, “The use of standardized, reusable software modules simplifies configuration of robotic movements and integration with machine control functions. This allows machine builders to focus on increasing machine performance, added functionality, and equipment energy efficiency.” Despite all this talk about downturn and disruption in the manufacturing industry, there are some positive trends we should mention as well.   Top 10: Manufacturing Trends of 2015 (Manufacturing Global) IoT, nanotechnology, SMAC Stack and greater visibility were all key manufacturing trends last year.  According to Manufacturing Global’s trends, “Additive manufacturing, or 3d printing, is big news in the manufacturing sector. The new technology has captured the imagination of the general public and manufacturing executives alike, however it has also proven to be a game-changer for the industry.”   3-D Printing Poised to Shake up US Manufacturing (New York Post) In the last year 3-D printing has shown up in the medicine cabinet, operating rooms and even New York Fashion week. U.S. Manufacturing is getting a serious shake up with the launch of more 3-D printers. Catherine Curan with New York Post states that, “The 3-D printing boom isn’t big enough to single-handedly revive local manufacturing, but it will help.”  

Sensor-2-Server: Benefits & Security for IIoT Communications

*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development, security and implementation. For the past two weeks, we’ve taken an in-depth look at what Sensor-2-Server communications are, how to implement these systems, and some of the specific aspects of communication that these systems facilitate. This week, for our final installment, we’ll examine some of the benefits, as well as security considerations, for S2S communications. Benefits of Sensor-2-Server Communications From a technology partnership perspective, Big Data vendors face the challenge of comparing data in motion versus data at rest. If the data has already moved through a SCADA system and has been aggregated, changed, stalled, or is not quite granular enough, it can be difficult to deliver high-value predictive analytics. The concept of predictive analytics is that an operator can make an accurate estimate that certain things can happen during operations. However, the operator needs to determine what the drivers are for the predicted actions to happen and must look at active data to determine if this is, in fact, happening. Without insight into the active data in motion, they are lacking an essential piece of the predictive analytics. This ability to compare data in motion at the access layer could benefit Big Data vendors when it comes to predictive analytics because it allows them to give higher value to their customers, which drives additional revenue. With S2S technology, they can deploy a tiered application infrastructure that allows data to intelligently move from one point to another. S2S also enables operators to go beyond a legacy SCADA data network. To operate a SCADA network, it requires a lot of institutional knowledge to truly understand, manage and work within the environment. S2S expands beyond moving the data into SCADA systems and allows operators to leverage more advanced technology, like predictive analytics. Essentially, S2S communications provide the opportunity to take advantage of new advanced tools, but the operator doesn’t necessarily have to sacrifice the institutional knowledge built into the SCADA data systems. As new generations enter the workforce, it’s likely that there will be a shift and some of that institutional knowledge will be replaced with technology that will allow operators to do more than they ever could before. The addition of new technology and IoT networks is where operators are starting to see the functional lines blur between the IT and production groups. As more technology is leveraged, these two disparate groups will have to work together more often. There is now a drive for a more holistic picture of what is going on in IT, what is going on in the field, and whether the technology used will be compatible with future needs. SCADA will likely always have value for industrial communications but, going forward, there will be an increase in the use other technologies as well. Additionally, with more technology physically in the field, there is always going to be a focus on data security. Security Sensors at the access layer present interesting security challenges. For example, consider a data concentrator sitting on an oil pad that is collecting data. This device is collecting data from a number of sensors and has data logging capabilities, which also means the other devices sitting at the remote site contain historical data. Technology providers need to insure that the technology used is taking advantage of all the security features that are available to make sure their data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. With the growing interest in IIoT, the system is providing a communication path with highly valuable information. These sensors may be running an application on the edge of the network, and many of these devices are using IP. When there are Ethernet and IP devices going out to edge devices in the field, each one of those devices has the potential to become a threat to the entire corporate network if they’re not secure. Operators in IIoT environments need to be concerned with everything that could be introduced to the network at every single connection point. Data protection data is a fundamental and extremely important element in determining the effectiveness of S2S communication. Technology vendors must be mindful of security in every step of the design and installation process, and operators must require security features that will protect their data and networks. In addition to data security, the threat to physical infrastructures in very remote locations is driving the need for new security solutions such as intelligent video surveillance designed to maximize security and minimize cost. S2S solutions need to be physically capable of delivering the bandwidth to enable these new solutions. Where Do We Go From Here? Industrial communication is changing in the sense that IIoT enables the possibility for every device in a network to be connected – including those in the outer access layer. This has created a convergence of OT and IT operations in many instances or – at the very least – has brought the two departments to a closer working capacity. IoT and technology at the access layer enable the option for Sensor-2-Server, a form of intelligent communications that can move the sensor data to a specific server for detailed analysis. New data and technology are allowing operators to do things they’ve never done before, such as predictive analytics. As this shift continues, SCADA is not becoming an obsolete technology; rather it will become a piece in the bigger technology picture. Any operator choosing S2S technology, or any technology for that matter, must carefully consider the options and keep security as a top priority.

Top News: IoT Rules at Mobile World Congress (MWC)

After a week of everything mobile, at least in Barcelona at the Mobile World Congress (MWC), it is only fitting this week’s top news recap focuses on the other three letter acronym so hotly discussed from the show – IoT. Whether you have been living under a rock or just hadn’t embraced the fascination with the latest handheld smart technologies and cellular networking, this week’s Mobile World Congress (MWC) presented by GSMA, brought together around 800 mobile operators from more than 250 companies from around the globe to discuss the latest products, software and innovations that will push the IoT space even further into maturity. Some of the key themes to come out of this year’s MWC were the fifth generation wireless systems or 5G, the impact this next-gen tech and mobile will have on the Internet of Things (IoT) and the booming IoT businesses laying the foundations of the connected world. Now as you nestle up to your favorite mobile device or smart tablet, relax and dive into this week’s IoT news roundup from MWC!   MWC: 5G Key to unlocking IoT … Just Not Yet (IndustryWeek) As the MWC surged forward with excitement for 5G to finally unlock IoT, experts warn the connective battle isn’t over, as the world dives into incorporating 5G throughout. Agence France-Presse with Industry Week reports that, “5G is the term on everyone’s lips at the Mobile World Congress in Barcelona and a global race to develop it is under way.”   IoT Race Heats up at MWC 2016 (RCR Wireless) The race heats up for IoT, as 2G networks scramble to find a new way to connect with the announcement of 5G at MWC 2016. “Mobile World Congress is all about the newest wireless technologies, but this year the end of an old technology is driving conversations around the Internet of Things.”   This Week’s 5G Buzz Indicates IoT is Finally Kick-Starting (VentureBeat) The hot topic on everyone’s mind this week had to be 5G and the need for more IoT connectivity. Leon Hounshell, with Greenwave Systems reminds us that, “Regardless of the hype, CES and MWC do not reveal an IoT revolution, but they certainly show us a determined evolution, where devices will unceasingly become more connected, open, and smart.”   Mobile World Congress: Internet of Things Business is Humming (USA TODAY) This week may have shown us a lot of shiny new IoT products for consumers, but the truth is IoT for business will really dominate deal-making. USA TODAY believes that, “It’s not hard to see why. Gartner forecasts that the market for IoT services will top $101 billion this year, nearly 30% more than the $78 billion that businesses spent last year. By 2020, spending for services like network deployment, operations management and data analytics is forecasted to balloon to $257 billion.” Mobile World Congress: Why Every Brand Should Become a Tech Brand (Campaign Live) Connectivity is everything, and moving forward in this technological age the MWC believes all companies should become a tech brand in order to incorporate IoT. Natalie Bell with Campaign Live states that, “We are now in an era of connecting everyone and everything. So, while Mark Zuckerberg is urging us to focus on the former and ensure wider basic connectivity across the entire globe, there’s a huge tech focus on the latter — the Internet of Things, which will be greater enabled by the increasing capacity in 5G. It’s this vast array of connected objects that have caught my attention this year.”

Sensor-2-Server (S2S): Implementing IIoT Communications

*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development and implementation. Last week, in part one of our series, we worked to define Sensor-2-Server (S2S) for IIoT communications, the access layer, and high-level applications. This week, we’re looking at the actual implementation of S2S communication systems. Implementing S2S Communications When implementing S2S networks, the operator needs to have a solid understanding of the following: What sensor data do I want to collect? What does the architecture look like? Where does the data need to come from and where does it need to go? For example, is it just going to SCADA or is it going to other data sources? These key details will drive the selection of the technology that best fits, in addition to the physical environment where it needs to transmit data. Carefully selecting the right pieces will help in architecting the network. In order to make S2S work, an operator needs to understand the physical environment needs. Everything is unique when it comes to RF in particular, and an operator must fully understand their environment if they want to be successful. The ability to collect the data is the first step in improving intelligence of Sensor-2-Server communication, which starts with technology selection. Four Tenets of Sensor-2-Server To establish the most effective S2S communications network, there are four core tenets that the technology must support: collecting the data, protecting the data, transmitting the data and controlling the data. Collect – The technology must allow the operator to collect data from any sensor – whether the sensors are analog or digital, wireless or wired. In some instances, the technology may need the extended ability to collect data at the access layer in a data logging fashion – allowing the operator to collect it, store it locally and make it available to SCADA systems. Protect- The intelligent communication must be able to protect the network against cyber-attacks. It must fix the boundary between the sensor and backbone network. Without ample security in the environment, many industries can be at risk for severe consequences such as compromised data or denial of service. Transport- The data must be transported to the appropriate location for analysis, no matter where the data is collected from. Operators should look for a system that offers seamless wireless data connectivity from Sensor-2-Server. Control- The Sensor-2-Server technology must add intelligenceto the access layer. Data logging is critical, and operators must have the capability to pull data in and control what happens with the data and where that data is stored. Users can leverage that data at the local level or back at the core network. S2S technology can be effectively deployed in the energy sector, whether it is oil and gas, electric power, solar, wind and or tide- based energy. Additionally, utilities, precision agriculture and irrigation can also benefit from intelligent S2S communication. With an intelligent communication system, operators can leverage new technology to improve the profitability of their businesses in ways previously considered impossible. For example, if an oil and gas company can use predictive analytics to estimate the price per barrel, the company can be more responsive – in real time – on its oil production levels. The data gathered from predictive analytics can help operators determine if production should be increased or decreased in certain areas, thus driving higher profitability. These technologies can also lead to cost reduction. For example, by deploying S2S technology at the oil well, the operator does not have to send as many workers out in the field to manually collect data. By enabling multiple benefits (profitability and cost reduction), S2S offers a value proposition that is getting the attention of many industrial operators. Next Week Next week, we’ll look at the benefits of intelligent Sensor-2-Server communications, as well as some of the important security considerations.

IIoT Top News: Utilities Powering Tomorrow

We’re fresh off a great week at DistribuTECH 2016 where we saw a gamut of technologies, thought leaders and trends. With utilities and energy still top-of-mind, our focus this week is on the changing face of the industry. This digital age means we have come to expect that the power will always charge, operate and run our numerous IoT devices. That’s why this week’s IIoT top news is dedicated to powering our electrical future.  So, it should come as no surprise that, the electric power industry has made it their mission to protect and secure this precious power at all costs. The power initiative has teamed up with federal agencies, National Institute of Standards and Technology, and the North American Electric Reliability Corporation to continue to build its capabilities. Now as you hold tight to your digital devices, take a breath, relax, and enjoy this week’s top news roundup. Industry Pioneer: The Road to Electric Utility of the Future is Paved With Prosumer Technology (Forbes) Years later, after the initial big push for IoT with utilities, we are still hoping for better, cheaper and smarter utility solutions. Forbes suggests the future of utilities will be paved in prosumer technology. William Pentland writes, “In 2009, the U.S. government made the single largest investment ever in modernizing the U.S. power system. Nearly seven years and more than five billion in federal tax dollars later, the electric grid is technically a lot smarter than it used to be. So why do utility rates seem to be getting more – not less – stupid?”   Utilities to Lead Surge of Electric-Car Charging in Southern California (Green Car Reports) Southern California now has the lead on electric-car charging stations as utility companies in the area task themselves with an aggressive plan to expand the number of station in the region.  A recent report from Navigant Research suggests that, “The commencement of these projects marks a major transition for electric-car charging in California, as it marks the beginning of significant involvement from utilities.”   Michigan Utilities Expected to Surpass Renewables Mandate (North American Wind Power) Each year the state of Michigan sets a level of renewable energy that must be met, only this year the Michigan Utilities is expected to surpass that mandate with a surprising amount of growth. According to the six-annual report from the Michigan Public Service Commission (MPSC), “There has been significant growth of wind generation in Michigan’s renewable energy certificate portfolio, from 7 percent in 2009 to 44 percent in 2014.” NRG Proved How Tough It Is To Change. So Who’s Poised to Become the Utility of the Future? (BreakingEnergy.com) A short time ago NRG set its sights on becoming the Google of the energy world, but as the IoT evolves it is very likely an unknown company will be the next market leader for energy worldwide. GreenTech Media argues that “the utility of the future will also have to be so much more to succeed — leveraging data, new technologies and personalization to transform the way customers consume and deliver power.”   What Are Utilities Thinking Today About the Importance of Engaging with Their Customers? (Intelligent Utility) As world continues to become all things IoT, utilities need to consider how engaged they would like to be with their customers. ONZO survey results at DistribuTECH 2016 show, “Most utilities also plan to increase their investment in improving customer engagements and think that analytics are key to their ability to do so.”  

Sensor-2-Server: Intelligent Communication at the Access Layer

*This is the first in a series of blogs examining Sensor-2-Server communications, development and implementation. Throughout history, industrial revolutions have hinged on the power of automating processes. While automation today offers many benefits, imagine if you could automate thousands – or even millions – of processes simultaneously? This is the next potential wave of innovation, and it’s the organizations that are “geographically dispersed” or “automation heavy” that will benefit the most. While long-range communications and connectivity have become increasingly easier to attain, businesses need to be able to break down their isolated islands of automation in industry to achieve comprehensive and connected automation at scale. For example, there always has been a clear line dividing operations technology (OT) and information technology (IT) networks. The emergence of the Internet of Things (IoT) blurs that line as industrial operations head in the direction of complete connectivity for all devices on a network – including those remotely located in the field. With new dedicated access layer platforms, IoT data can be analyzed, acted upon and transmitted from anywhere in an Industrial IoT (IIoT) network. The increasing shift toward Industrial Internet of Things (IIoT) tends to bring up a lot of questions about the continued value of Supervisory Control and Data Acquisition (SCADA) systems that have traditionally served as the driver for monitoring and control in industrial markets. Although OT and IT are beginning to converge, there is still high demand for SCADA data. However, new technology offers the opportunity for data to be used in ways that were previously not possible, such as predictive analytics. This doesn’t make SCADA obsolete, as many operators are using it and will continue to employ it. Going forward, industries will leverage new technologies designed to help them make better business decisions than with SCADA alone. Sensor-2-Server™  (S2S™) intelligent communications for the access layer can collect and transport the data that supports higher-level analytics. As IoT becomes adopted by industrial markets, there is going to be an increased demand for video, voice, data and sensor data communication from the outermost layer of the network (think sensors on oil pads or water tanks). Industries like oil and gas, electric power, agriculture and utilities are starting to pick up on the benefits of S2S when it comes to profitability and cost savings through more advanced data analytics. Defining Sensor-2-Server S2S is intelligent communication that begins at the sensor level and targets servers for specific reasons. These servers could include anything from a SCADA data server that collects and monitors through the SCADA system or a Big Data engine. S2S could be leveraged in a predictive analytics engine that compares data at rest stored in a database to data in motion in real time from the access layer of the network. The concept of S2S extends beyond transmitting data. It is about creating intelligent transmission from a specific location back to the appropriate server with the appropriate intelligence to drive action for change. What is the Access Layer? The access layer is the edge of the IT network. An IT infrastructure has a core that is home to all the Big Data and data analytics. At this core, the data is “at rest” because it has reached its final destination. Next is the distribution layer of the IT infrastructure which is where the major plants, sites and facilities are located. Further out is the aggregate layer where data at the next level in the network is collected. Extending out even further is the access layer.   The access layer is the layer at the far edge of the IT network. In oil and gas, for example, oil pads would be part of the access layer because they are typically remotely located at the edge of the network. It is highly likely that sensors physically exist in this layer for monitoring and control of these devices. Additional examples of the access layer are tanks, refinery sites and ocean exploration vessels. In water/wastewater, the access layer could be the treatment facility that has the water meters, pumps, smart meters, etc. Essentially, in an industrial site, the S2S access layer is the furthest point at which the operators are collecting sensor data. Industrial organizations today need intelligent secure communication and transmission from the sensor data back to the appropriate server, and there are a number of available options. What’s Next? Next week, we’ll continue our Sensor-2-Server series with a look at implementation and some of the core tenets of communication system development.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.

Did you find what you were looking for?

Please let us know if you didn’t find what you were looking for so we can help make the site better for you.