NYC will build Power over Ethernet-based IoT system to track traffic & reboot as needed

New York City [1] officials will put Power-over-Ethernet (PoE) switches at 10,000 intersections in order to remotely repair dysfunctional stoplights.  City traffic engineers are working with vendor Transition Networks (Minneapolis, MN) to build PoE systems in which a single cable can power a number of device such as VoIP phones, IP cameras and wireless access points, the city said.

Note 1.  NYC is this author’s home town (he grew up in Manhattan). This seems to be a very real and useful IoT project!

……………………………………………………………………………………………………..

PoE systems pass electric power and data on single cable to various devices, including wireless access points, IP cameras, and VoIP phones. The Managed Hardened Gigabit PoE+ Switch from Transition is designed for outdoor environments and can supply up to 30 watts per port on all eight ports simultaneously.

The switches power cameras and sensors at intersections. The cameras track traffic and pedestrian flows while the sensors count cars and support the city’s Connected Vehicle project. The data is transmitted to the city’s traffic monitoring center.

……………………………………………………………………………………………….

Transition Networks, a unit of Communications Systems, provides services and devices for security and surveillance, data center networking, business Ethernet, Fiber-to-the-Desk and wireless backhaul. Customers include enterprises, integrators, service providers, federal agencies, and the military.

According to a company press statement, “This application brings intelligent transportation infrastructure citywide and reinforces the relevance and timeliness of Transition Networks’ strategy of developing smart city Internet of Things (IoT) solutions. Transition Networks is working with a major North American telecommunication services company on the deployment of the solution.”

Anita Kumar, a director of product management and software engineering at Transition Networks, said in a news release.”Installing smart devices across cities allows transit agencies to enact changes that improve safety and traffic flow.  Our solution provides the power and connection to make it all possible. Smart device installation will grow in importance as transit agencies look to improve service, create efficiencies and increase quality of life for growing cities.”

Transition Networks Switch Technology Powers Traffic Cameras

Photo courtesy of Transition Networks

………………………………………………………………………………………………….

The Connection Vehicle project will support Vision Zero, a plan to eliminate traffic deaths and injuries and reduce damage to vehicles and infrastructure. The NYC deployment uses vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), and infrastructure-to-pedestrian (IVP) communications. V2V communications include blind spot and lane change warnings. V2I communications track cars that speed and run red lights. IVP alerts include warnings to cars when people are in a crosswalk and guidance to blind pedestrians via cell phones.

The new system includes a reboot feature. When there is a problem with a traffic signal, a technician goes out to check the device and reset it manually. Transportation officials will use this new system to reset the devices remotely, without having to close lanes and stop traffic.

Transition’s Device Management System (DMS) software also creates an interactive map of all connected devices, making it easier for city engineers to identify problems in the system.  (DMS) software creates an interactive map to see all connected devices, enabling the agency to pinpoint issues and quickly take action. DMS has been an important function for several smart city projects including an installation at New York City’s Brooklyn Bridge.

Transition Networks, “Currently, if a device stops working at an intersection, the agency must take multiple actions prior to deploying a repair technician. This includes scheduling a technician to evaluate the issue and deploying a bucket truck to reach the device. Once the technician is at the site, the lane closures cause significant stress and traffic delays for motorists. Many times the fix only requires a reboot of the device. Transition Networks’ Auto Power Reset (APR) feature provides the ability to remotely reboot or manage Transition Networks’ equipment fixing the issue within minutes and eliminating all of the lane closure requirements. This feature alone will save the agency significant costs and lessen traffic disruptions by reducing the need to send a technician to inspect equipment.”

…………………………………………………………………………………………………….

New York City is counting on these new tools and data collection to improve safety, traffic management and transportation citywide.

New York needs all the help it can get with trafficUber and Lyft have increased traffic congestion and trucks deliver 1.5 million packages from Amazon to city residents every day. In Manhattan, the average speed is 7 mph, about 23% slower than 10 years ago.

References:

https://www.techrepublic.com/article/nyc-launching-iot-system-to-monitor-traffic-and-reboot-malfunctioning-signals/

https://www.cablinginstall.com/connectivity/article/14071326/transition-networks-takes-on-smart-city-iot-project-for-nyc

 

 

 

Newsweek: We’re Surrounded by Billions of Internet-connected (IoT) Devices. Can We Trust Them?

by Adam Piore

In 2009, just as consumers had begun to buy wifi-enabled thermostats and front-door cams and other early devices that now make up the “Internet of Things,” computer scientist Ang Cui had gotten the idea to scan the Web for “trivially vulnerable” embedded devices.

By trivial, he meant those devices that still carried the usernames and pass codes programmed into them at the factory—obvious usernames like “name” and passcodes like “1234.” Many of these codes were published in manuals available freely on the internet and easily scanned automatically with computer programs, so there was no need even to guess.

When he did his scan, Cui found more than one million vulnerable, publicly accessible devices in 144 countries. From this sample, he estimated that about 13 percent of all devices connected to the internet were essentially unlocked doors, waiting for a hacker to walk through. Even more alarming, four months later 96 percent of those devices had the same security holes.

Cui’s warning was no less terrifying for its deadpan delivery: “Widely deployed and often mis-configured, embedded network devices constitute highly attractive targets for exploitation.”

In the decade since, the number of vulnerable devices connected to the internet has increased sevenfold. The explosion comes from growing demand, fueled by hype, for smart devices. Manufacturers are now tripping over themselves to embed just about every ordinary object, it seems, with tiny computers that happily communicate wirelessly with the world around them. In this “smart” revolution, virtually any device with an on/off switch or up/down button can be controlled remotely with a cellphone or voice sensor. Do you want to turn up the heat, dim the lights and run the dryer without getting up off the sofa—simply by uttering your desire to an Amazon Echo? Do you want your toaster to send a message to the television when the bagel has popped? Do you want your oven to inform you that the casserole has cooked for the prescribed 20 minutes at 350 degrees and is now cooling in the kitchen at 200? The Internet of Things can make all such things happen.

There’s a dark side to this wireless-driven revolution in convenience. The danger goes beyond hacking. Unlike the traditional “Internet of Computers,” which is confined to a circumscribed digital “virtual” world, the Internet of Things has a direct connection to the physical one. That opens up a disturbing set of questions: What might happen if the computers inside our new-fangled toaster ovens, security cameras or smart cities were turned against us? Can we really trust the Internet of Things? Most cybersecurity experts are unequivocal in their answer to that last question. “No,” says Ben Levine, senior director, product management, cryptography at Rambus, a Sunnyvale, CA-based technology company, specializing in the performance and protection of data. “My short answer, right now, is ‘no’.”

Unlike the “Internet of Computers,” which has been created largely by technicians with a background in information technology or computer science, many manufacturers making the devices now lack the expertise necessary to build airtight systems. Some don’t realize the importance of doing so. As a result, the possibilities for mischief seem endless—a fact Cui and other cybersecurity mavens have demonstrated on multiple occasions.

Is your vibrator cheating on you?

Some of the more creative of these exploits in recent months come from the lab of Alvaro Cardenas, who challenged his students at the University of Texas at Dallas last year to crack a wide array of IoT devices. Among other things, they managed to turn on and hijack a drone and demonstrate they could use it to attack an innocent victim, Kamikaze-style, or to stream video and audio of a neighbor. They hacked into a popular children’s toy—a small, talking dinosaur networked to the internet so it could receive updates. Then they demonstrated they could take over the toy and use it to insult the child, instigate inappropriate conversations (using the trusted voice of the toy) or tell the child what to do. They showed they could take control of internet-connected cameras to spy on households. They even identified the existence of “sensitive devices”—vibrators—sometimes used by overseas military personnel to have remote virtual relations with their partners. Not only were they able to obtain private usage information, they warned it was possible to impersonate a “trusted partner” and “commit remote sexual assault.”

Cardenas reported their findings to device manufacturers and the CERT Coordination Center, a federally funded non-profit R & D group that works with business and government to improve the security of the internet. Then he submitted a paper to IEEE, a professional association for electronic engineering and electrical engineering, which published their findings in a special issue this fall.

“These attacks show how IoT technologies are challenging our cultural assumptions about security and privacy and will hopefully motivate more emphasis on the security and privacy practices of IoT developers and designers,” they wrote. (After the paper was published, all the manufacturers responded and attempted to fix the vulnerabilities, except for the drone companies).

Force multiplier

By the end of 2018, more than 23 billion IoT devices had been installed globally. Many consumers buying these smart devices currently don’t bother to hook them up to their WiFi, which means they’re essentially offline and out of reach of hackers. But that may change as manufacturers continue to tout the benefits of connectivity. And the number of devices is expected to more than triple, to 75 billion, by 2025.

The sheer number of vulnerable devices gives hackers powerful leverage. The Mirai attack of 2016, which may have been inspired by Cui’s original paper, illustrates how dangerous the threat has grown. Paras Jha, a quiet, socially awkward college dropout from New Jersey, ran a lucrative business renting space on his own private computer server to fellow aficionados of the video-game Minecraft, so they could play privately with their friends. It sounds pleasant, but the business is cutthroat. A common tactic of Jha and his rivals was to hack into the home computers of unsuspecting people, hijack them with malware and instruct them to send torrents of unwanted messages and data to the machines of their rivals, overwhelming them and hopefully shutting them down—known as a Distributed Denial of Service Attack (DDoS). Unsuspecting customers, frustrated by the “unreliable” service, were then easy targets for poaching.

In 2016, Jha and two Minecraft friends he’d met online decided to do his rivals one better. They hacked not only desktop computers but also the myriad security cameras, wireless routers, digital video recorders, household appliances and other IoT devices. Like Cui before him, Jha and his friends wrote a program that scanned the internet to locate vulnerable devices. But unlike Cui, they actually planted malware on the machine and took control of them. Leveraged by the proliferation of smart devices, Jha’s zombie bot army grew faster than he could have imagined–by the end of the first day, he had appropriated 65,000 devices; by some estimates his zombie army reached 600,000.

The attack, nicknamed “Mirai” (“the future”) after a Japanese television series, was so powerful that Jha wasn’t content with taking down his small-fry Minecraft rivals. He also trained the new weapon on the huge French telecom provider OVH, which hosted a popular tool that his rivals relied on to defend themselves against his attacks. Eventually, the cops took notice. Jha was fined $8.6 million and 2,500 hours of community service working for the FBI.

Cui, now the 36-year-old founder and CEO of Red Balloon Security, often gives talks at hacker conferences wearing a tee-shirt, a bead necklace, and a man bun and makes a good living advising companies how to protect themselves in a hostile cyber-world. He continues to marvel at how little has been done to patch not just the vulnerability his paper identified but also many others that he believes could arguably cause even more damage. While the security firms serving large well-financed companies like those targeted in the Mirai attacks have come up with new ways to defend client servers against DDoS attacks, many manufacturers of IoT devices are doing little if anything to protect the rest of us from cyber mischief—not just zombie device conscription, but also spying, sabotage and exploits that security experts argue should raise profound privacy and safety concerns.

What accounts for the neglect, Cui believes, is a gold-rush mentality to grab market share in the burgeoning IoT device business. Over the last five years, the hype over IoT has become so hot that many VC-funded startups in the consumer-device field—and even some major manufacturers—are adding internet connectivity, rushing their products to market, and resolving to fix any security flaws later. Some haven’t even thought about security at all. “You have to put in the time and resources to care about security,” says Cui. “But there’s a lot of VC money, and they want to very quickly roll out a thing that has an IoT feature that they think the market might like.”

The money is primarily spent to develop new devices. “The problem at the moment is that there’s really no incentive for security,” Cardenas told Newsweek. “Security usually gets in the back burner of these products.” Most consumers aren’t aware of the dangers and aren’t demanding protection. And the device manufacturers are under no obligation to provide it.

In a lab at the Georgia Institute of Technology, Manos Antonakakis, an associate professor in the school of electrical and computer engineering, and research scientist Omar Alrawi, have also been probing the gaping security vulnerabilities of the emerging IoT. Antonakakis notes that while there’s a class of well-known vendors that “at least try to get the security right in some cases,” even large manufacturers are under pressure to rush new IoT products onto the current market. “It takes a lot of quality assurance and testing, and penetration analysis and vulnerability analysis to get it right,” he says. But the rush to market “comes into violent disagreements with proven security practices.”

Many of the largest tech companies have invested heavily in tapping into the market for “smart home” devices, one of the fastest growing areas for IoT devices. Amazon is among those dominating the market for smart hubs, along with Google, which purchased the digital thermostat maker Nest in 2014 for $3.2 billion. Google has since expanded it to become a digital hub that also includes smoke detectors and security systems like smart doorbells and locks. Samsung has the SmartThings hub, which it acquired in 2014 for $200 million, and now connects to air conditioners, washers and TVs. Apple has a home kit which can control any number of devices through voice commands delivered in range of its HomePod.

Gaping vulnerabilities

Once these systems are installed, devices from a growing number of companies can be added to the home network, including those made by well-known home appliance manufacturers like GE, Bosch and Honeywell. Belkin makes a line of connected appliances that includes a Crock-Pot WeMo Smart Slow Cooker, smart Mr. Coffee maker and a smart home humidifier. There’s a lot of money to be made. All told by the end of 2019, more than $490 billion in profits will have been earned on the nearly 2 billion consumer devices sold over the previous 12 months, according to the property management consulting firm iProperty Management.

To try to draw attention to the dangers—and the things consumers should be asking questions about when buying new IoT products—Antonakakis and Alrawi, in collaboration with researchers at the University of North Carolina at Chapel Hill, have developed a rating system and begun evaluating the security of a wide array of IoT devices. And surprisingly they found gaping vulnerabilities in devices and systems produced by even some of the most tech-savvy companies.

The vulnerability of IoT devices goes well beyond holes in password protection, the vulnerability exposed by the Mirai attack, they argue. IoT devices can also be accessed and taken over directly through the home network they are connected to, and that home network is only as strong as its weakest link. That means that even if each device comes with a unique password and username, it’s not necessarily secure. Once hackers find a way onto the home network through one vulnerable device, the path is often wide open to the rest of the network.

To secure an IoT device, they argue, manufacturers need to patch vulnerabilities in four different areas : direct access to the device itself, the mobile app used to run it, the way it communicates with its home network and, in many cases, the cloud-based server that manufacturers use to push out updates, collect user data, or provide new services.

Getting all that right is not easy. For a vendor to secure all four parts, Alrawi notes, it needs a good mobile-app developing team “that knows secure development,” a “system team that does very good embedded system development and secure development” and cloud experts who can design a secure cloud “backend” that allows the device to be managed without exposing it to additional risk. Finally, the device manufacturers need somebody who has network knowledge on how to build efficient and secure internet protocols and what protocols to avoid.

“They have to balance all this with usability,” he says “So you can see that this is already getting really hard to manage just mentally. When a startup team that comes up with this great idea wants to push a product to market, they’re usually a small team that doesn’t have all this expertise. But even with big vendors, some of these problems are really hard to pin down and manage.”

Indeed, while Antonakakis, Alrawi and their team give relatively high marks for device security to the mainstream products like the Amazon Echo and the Belkin Netcam, they gave them Cs, Ds, and Fs for network security—a measure of how protected these devices are from intruders who manage to access the home wireless network through other vulnerable devices. And while a number of devices associated with Google‘s Nest smart home products (like thermostats, smoke detectors, smart locks and doorbells) receive As and Bs for device and network security, they got Cs and Ds for mobile and cloud protections—meaning a resourceful hacker intent on say, unlocking the front door, could still access a home.

The cloud category is the most worrisome. Since many of these services are cloud based and connected to central company servers, if a determined, well-financed hacker—say, China, North Korea or Russia—were to use the same kind of sophisticated exploits they have used to bypass security on the traditional internet of computers, there’s no telling what they might do.

“You’re talking about getting access to potentially millions of people’s homes, and when that happens, think about all of the microphones and cameras and actuators that you have around your house, and multiply that out by all the people who use these things,” Cui says.

“Many consumers don’t fully understand the risks associated with installing some of these devices in their homes,” adds Alrawi.

Until they do, the situation is unlikely to change. Many experts wonder how big a price we will have to pay before that happens. “It’s a mess,” says David Kennedy, a cybersecurity expert who designs security for a wide array of manufacturers and has testified before Congress on the IoT. “An absolute mess. We’re going into this very blind, without a lot of security discussions around what the impacts are going to be to our lives and to our safety.”

Kennedy, whose current title is CEO of the company TrustedSec, has hacked into his share of devices over the years to make a point, including smart TVs, thermostats, smart fridges, robotic house cleaners and controllers that are connected to the energy grid. But Kennedy’s biggest concern at the moment is in the area of automotive safety.

There have already been some cautionary tales. In 2015, Fiat Chrysler had to issue a safety recall affecting 1.4 million vehicles in the United States so it could patch software vulnerabilities, after two security researchers hacked into the internet-connected entertainment system of a Jeep Cherokee carrying a magazine reporter, took control of the vehicle, blasted the radio and AC, then brought traffic to a standstill in the middle of a freeway.

The problem, says Kennedy, is that most cars have scores of different pieces of technology in them, many of which are connected directly to the internet to allow them to transmit data needed for preventive maintenance. But the manufacture of these different IoT devices is often subcontracted out to scores of different contractors, which makes it logistically difficult to provide security updates and patches when new security vulnerabilities are discovered. (He pointed to Tesla as the major exception because, he argues, it is “a software manufacturer first and car manufacturer second,” and thus knows how to build secure systems.)

The idea of regularly pushing out preventive security updates to patch newly discovered vulnerabilities in IoT-networked cars—a standard practice for products like Microsoft windows and the Apple iPhone—is new and has not yet been incorporated into the automotive industry. “I can’t talk about which car manufacturers I’ve done assessment work for, but I can tell you that I’ve worked for a number of them, and security practices need a lot of work,” he says. “They’re not pushing patches out to the cars, which makes them extremely vulnerable to specific attacks—everything from eavesdropping in your car to driving them off the road.”

The nightmare scenario is a mass fleet takeover, where a bad actor hacks different cars across the world to cause mass mayhem. “That’s definitely something that’s possible now with these interconnected cars, no question about it,” Kennedy says. “Someone will lose their life and then eventually they’ll kind of knee jerk into fixing the whole industry. I think that’s what it will take to change the mentality of car manufacturers.”

Lawmakers in some jurisdictions are beginning to wade into the murky waters of IoT regulation. In January, California will become the first state to implement an IoT security law. The bill, passed in 2018 with a January 2020 deadline, will require companies that make connected devices to equip them with “reasonable security features,” explicitly requiring that each device come with either a unique passcode or require the user to generate one before using the IoT device for the first time—taking aim at patching the vulnerability exploited so successfully in the Mirai exploit and the copycat attacks that have followed. Beyond that, however, the law seems to have been written to be purposely vague, allowing room for further state guidance in the future.

Cybersecurity experts have called on the Federal government in the U.S. to step in to regulate the industry. The U.S. House of Representatives last March introduced a bill, for the third session in a row, that would require the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce to develop recommended standards for IoT devices, and would assign the Office of Management and Budget (OMB ) the task of issuing guidance to agencies that aligns with NIST‘s requirements. The law would also require NIST to offer guidance on vulnerability disclosure and report on IoT cybersecurity threats.

Two and half years ago, NIST started a program to look at the issue and this past summer solicited public comment on a voluntary set of minimum “baseline” security functions that any internet capable device should offer, whether it is intended for consumers, businesses or federal agencies, says Katerina “Kat” Megas NIST program manager, Cybersecurity for Internet of Things.

Among them, every single device must have a unique number or identifier associated with it that shows up on the network, which would make it easy to locate quickly and unplug the source of any problems that arise—a feature that many IoT devices currently do not offer. Other features would manage access to each device through secure methods of user authentication; protect data by encrypting it; and provide secure updates and log cyber-events so investigators can track how problems develop.

Few experts have illusions these measures will solve the problem soon. The standards would be voluntary. And even if Congress were to enact laws mandating security standards, a profound security vulnerability would remain: users themselves.

“No matter how strong your system is, it’s only as strong as your weakest link—and the weakest link is always the human,” says Jason Glassberg, cofounder of Casaba Security, a leading cybersecurity firm. “The largest breaches, the largest attacks for the most part have not been because of some super significantly technical attack. It’s been because someone’s been fooled into giving up their credentials. They’ve been fooled into clicking on a link which installed malware or asked them to provide their password. And it certainly doesn’t change in the Internet of Things world.

Original article is at:

https://www.newsweek.com/2019/11/01/trust-internet-things-hacks-vulnerabilities-1467540.html

 

Gartner: 5G IoT endpoints to triple between 2020 and 2021; Surveillance cameras to be largest market over next 3 years

Executive Summary:

After 3GPP release 16 has been completed and included in IMT 2020 RIT/SRIT, 5G networks will offer ultra-reliable, ultra-low-latency and high-bandwidth capabilities.  That will open up new enterprise market opportunities for communications service providers/wireless network operators.  Therefore, understanding the future market is key to an effective strategy. Gartner Inc. says that IoT use cases like surveillance cameras and connected cars will offer the biggest markets for 5G IoT.

Outdoor surveillance cameras will be the largest market for 5G Internet of Things (IoT) solutions worldwide over the next three years, according to Gartner.  These cameras will represent 70% of the 5G IoT endpoint installed base in 2020, before contracting to 32% by the end of 2023.5G IoT installed endpoints for outdoor surveillance cameras will reach 2.5 million in 2020, 6.2 million units in 2021 and 11.2 million units in 2022, but will be surpassed by connected cars in 2023. “Cameras deployed by city operators or used to ensure building security and provide intruder detection offer the largest addressable market as they are located outdoors, often across cities, and require cellular connectivity,” said Stephanie Baghdassarian, senior research director at Gartner Inc.
Gartner predicts that the 5G IoT endpoint installed base will more than triple between 2020 and 2021, from 3.5 million units in 2020 to 11.3 million units in 2021. By 2023, the 5G IoT endpoint installed base will approach 49 million units (see Table 1).
5G capabilities open up new enterprise market opportunities, so communications service providers (CSPs) need to assess the many use cases with a view to prioritizing investment in the building of IoT solutions.
“Their investments should focus on outdoor surveillance cameras, connected cars, and government and physical security,” said Ms. Baghdassarian.Table 1: 5G IoT Endpoint Installed Base, Worldwide, 2020 and 2023 (Thousands of Units)

Segment 2020

Volume

2020

Market Share (%)

2023

Volume

2023

Market Share (%)

Connected cars — embedded (consumer and commercial)  

393

 

11

 

19,087

 

39

 

Outdoor surveillance cameras

 

2,482

 

70

 

15,762

 

32

 

Fleet telematics devices

 

135

 

4

 

5,146

 

11

 

In-vehicle toll devices

 

50

 

1

 

1,552

 

3

 

Emergency services

 

61

 

2

 

1,181

 

2

 

Others

 

400

 

11

 

5,863

 

12

 

Total

 

3,522

 

100

 

48,590

 

100

Due to rounding, figures may not add up precisely to the totals shown

Source: Gartner (October 2019)

Connected Cars Will Offer the Biggest Opportunity for 5G IoT in the Long Term:

In 2023, the automotive industry will become the largest market opportunity for 5G IoT solutions. It will represent 53% of the overall 5G IoT endpoint opportunity in that year.

Within the automotive sector, embedded connected-car modules are the major use case for 5G. Embedded endpoints in connected cars for commercial and consumer markets will represent an installed base of 19.1 million units out of a total of 25.9 million 5G endpoints in the automotive sector in 2023.

“The addressable market for embedded 5G connections in connected cars is growing faster than the overall growth in the 5G IoT sector,” said Ms. Baghdassarian. “Commercial and consumer connected-car embedded 5G endpoints will represent 11% of all 5G endpoints installed in 2020, and this figure will reach 39% by the end of 2023.”

In addition, the share of 5G-connected cars actively connected to a 5G service will grow from 15% in 2020 to 74% in 2023. This figure will reach 94% in 2028, when 5G technology will be used for Cellular V2X communications that enable messages to be sent and received within vehicles and between vehicles, infrastructure, pedestrians, cyclists and more. Ultimately, connected cars actively connected to a 5G service will help keep traffic moving and improve road safety.

“As the automotive industry will be the largest sector for IoT endpoints and 5G IoT use cases in the long term, we recommend that CSPs that want to be relevant in the 5G IoT market put this industry at the forefront of their investments. They should do this in terms of personnel who understand the sector and of partnerships that will move the market forward,” said Ms. Baghdassarian.

Surveillance cameras to be biggest market for 5G IoT solutions

Other Analyst and Industry Opinions:

“The industrial IoT market is among the most fractured especially amongst the verticals like healthcare and automotive,” said Lee Doyle, principal analyst with Doyle  Research. “Large companies such a Cisco, HP and IBM have been challenged to address it because it is so fractured. It’s not at all clear any one of them has the overall network architecture to handle it all.”  Vendors need to show users on a case-by-case, application-by-application basis what works, Doyle said.

…………………………………………………………………………………………………………………………………………………………………………………………………………

“With 5G, you can put more video cameras up in a big facility to monitor where folks are going and what they’re doing. Then bring analytics into the picture to increase efficiency. Speed really matters when you’re adding that many cameras,” said Samsung Networks’ VP of Networks Strategy & Marketing Alok Shah.

Shah believes the most “magical” element of 5G for enterprise users is decreased latency (so does this author, but it won’t happen till 3GPP Release 16 is finalized). “Bringing latency down substantially allows the user to perform from a remote perspective much more.  Robotics in factories can be manipulated without being there in person,” he elaborated.

In addition, with 5G, the number of IoT sensors that can be implemented can skyrocket. “It can go up to a million sensors around a facility, which is huge,” Shah stated. “It’s a combo of these different things. You don’t get all of this at once because different devices have different requirements, but network slicing will help with this,” Shah added.

……………………………………………………………………………………………………………………………………………………………………

Ericsson’s new 5G business potential report considers a set of “5G-enabled B2B use case clusters” as drivers of industrial 5G revenues. Among these use case clusters, it said “enhanced video services” represents the largest opportunity for telecoms providers in terms of value across industrial sectors, worth up to 17 per cent or $118 billion of the total value by 2030.

Ericsson said enterprise 5G services will drive up to $700 billion of new revenues in the period. However, the total market, of 5G services for industry will be worth more than twice that, it said. The $700 billion operators can go for corresponds to 47 per cent of the total 5G business-to-business (B2B) market to be served by ICT players.   Network  operators must extend their reach “beyond connectivity” and consider newer roles for their services and expertise within the B2B value chain, and “what use case clusters to address.”  Operators must act urgently, Ericsson warned, if they are to capture new value from industrial transformation services, as revenues for existing airtime services will remain stagnant through to 2030.

The chart below superbly illustrates the dire dilemma of network operators- traffic increasing exponentially, revenues (measured by ARPU) decreasing!

Jan Karlsson, senior vice president and head of B2B digital services at Ericsson, said: “The journey to grow the 5G business starts now by building momentum and identifying 5G-enabled B2B opportunities.”

Ericsson looked at the following industrial sectors for its report: manufacturing, automotive, energy and utilities, public safety, healthcare, media and entertainment, public transport, financial services, retail, and agriculture.

Other use cases in the report, besides enhanced video, include real-time automation, connected vehicles, and augmented/virtual reality.  The company said use case examples building up these ‘clusters’ include live streaming of events, real-time monitoring of distributed energy, and autonomous cars.

–>Please refer to my comment in box below this article for more on the Ericsson report.

……………………………………………………………………………………………………………………………………………………………………

“Clearly there is no single access technology out there that solves all the problems and challenges of networking especially in the industrial arena where customers have one of every type of communications device imaginable, but 5G and Wi-Fi 6 will deliver a whole bunch of new use cases and address many multi-access  requirement challenges,” said Liz Centoni, senior vice president and general manager of Cisco’s Internet of Things Business Unit, in an interview with Network World.

“Many industrial IoT use cases mandate wide mobility, low latency, and mission-critical reliability, such as mobile-robot control in production automation and autonomous vehicles in open-pit mining. These use cases rely on wireless access at 50ms to 1ms latency and service reliability from 5 nines to 6 nines,” Centoni wrote in a recent blog about 5G.

“4G/LTE has attempted to address these use cases but has often failed due to unsatisfactory performance. 5G’s combination of ultra-reliable and low-latency connection will extend industrial IoT to unconquered spaces,” Centoni.

Cisco’s Scott Harrell, senior vice president and general manager of enterprise networking told Network World the company expects to see a lot of 5G being used in branches as a faster backup and bandwidth alternative to current 4G or LTE links. Keeping an enterprise’s branch and campus locations all connected to each other and the internet has traditionally fallen to wired technologies like T1/E1 and xDSL, Harrell said. Today, 4G is often used to quickly bring up sites or as a back-up link, but it’s seldom used as a primary link, due to bandwidth limitations and cost, Harrell said.

https://www.networkworld.com/article/3446457/cisco-pushes-5g-to-hasten-industrial-iot.html

https://blogs.cisco.com/news/how-5g-will-accelerate-industrial-iot

https://www.ericsson.com/assets/local/5g/the-5g-for-business-a-2030-compass-report-2019.pdf

 

 

 

LPWAN to Application standardization within the IETF

By Juan Carlos Zuniga, Sigfox, IETF Internet Area Co-Chair, (edited by Alan J Weissberger)

Introduction:

Amongst the plethora of different Internet of Things (IoT) technologies [see Addendum], Low Power Wide Area Networks (LPWANs) [1] offer mature and well-established solutions for the Industrial Internet of Things (IIoT).

Note 1.  A LPWAN is a type of wireless telecommunication wide area network designed to allow long range communications with low power consumption, low cost interface and a relatively low bit rate for the IIoT.  There are many types of LPWANs.  Some like LTE-M and NB-IoT use licensed spectrum, while others such as Sigfox and LoRaWAN use unlicensed spectrum.

LPWANs enables IoT systems to be designed for use cases that require devices to send small amounts of data periodically over often-remote networks that span many miles and use battery-powered devices that need to last many years.

LPWANs achieve those attributes by having the IoT devices (“things”) send only small packets of information periodically or even infrequently—status updates, reports, etc.—upon waking from an external trigger or at a preprogrammed time interval.

………………………………………………………………………………………………

In order to enable these IIoT connectivity solutions, a common standard is needed to allow the various types of LPWANs to communicate with applications using a common language.  For this to occur, each network must have the ability to connect to the Internet.  However, due to the severely restrictive nature of LPWANs, the abilities of Internet Protocols, specifically IPv6, cannot sufficiently meet the needs of these networks.

To overcome these issues, the Internet Engineering Task Force (IETF) chartered the LPWAN working group (WG) in 2016 to identify common functionality needs across LPWANs and to standardize the protocols that could enable these functionalities across the various networks.

The goal of the IETF LPWAN WG is to converge the diverse LPWAN radio technologies toward a common hourglass model that will provide users with a standard management strategy across networks and enable common Internet-based services to the applications.

To achieve this goal, the IETF LPWAN WG has produced the Static Context Header Compression and Fragmentation (SCHC) [2] specification, an ultralightweight adaptation layer uniquely designed to support the extremely restricted communication resources of LPWAN technologies.

Note 2.  SCHC is expected to become a recognized acronym like several  other IETF protocols (e.g. HTTP, TCP, DHCP, DNS, IP, etc.).  Please see illustration below of SCHC Architecture.

………………………………………………………………………………………………….

SCHC will soon be published as a new IETF RFC.  Again, it’s objective is to achieve interoperability across the leading LPWANs, including Sigfox, LoRaWAN, NB-IoT and IEEE 802.15.4w(LPWA) [3].

Note 3.  IEEE 802.15.4w or LPWA

Low Power Wide Area Network (LPWAN) extension to the IEEE Std 802.15.4 LECIM PHY layer to cover network cell radii of typically 10-15km in rural areas and deep in-building penetration in urban areas. It uses the LECIM FSK (Frequency Shift Keying) PHY modulation schemes with extensions to lower bit-rates (e.g. payload bit-rate typically < 30 kb/s). Additionally, it extends the frequency bands to additional sub-GHz unlicensed and licensed frequency bands to cover the market demand. For improved robustness in channels with high levels of interference, it defines mechanisms for the fragmented transmission of Forward Error Correction (FEC) code-words, as well as time and frequency patterns for the transmission of the fragments. Furthermore, it defines lower code rates of the FEC in addition to the K=7 R=1/2 convolutional code. Modifications to the Medium Access Control (MAC) layer, needed to support this PHY extension, are defined.

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

Why do LPWANs need their own interoperability standard?

The common characteristics of LPWANs include a power-optimized radio network, a simple star network topology, frame sizes in the order of tens of bytes transmitted a few times per day at ultra-low speeds, and a mostly upstream transmission pattern that allows devices to spend most of their time in sleep mode. These characteristics lead to ultra-long-range networks that allow for connected devices to have an extremely long battery life and be sold at a very low cost, enabling simple and scalable deployments.

LPWANs are especially well-suited for deployments in environments where battery recharging or swapping is not an option and where only a very low rate of data reporting is required. Also, LPWAN networks are fundamentally different than other networks, as they have been designed to handle infrequent message exchanges of payloads as small as approximately 10 bytes.

To manage these very specific constraints, the IETF has developed the SCHC adaptation layer, which is located between the network layer (e.g. IPv6) and the underlying LPWAN radio technology. SCHC comprises two independent sublayers – header compression and fragmentation – which are critical to meeting the specific characteristics of LPWANs.

The SCHC header compression sublayer has been tailored specifically for LPWAN technologies, and it is capable of compressing protocols such as IPv6, UDP and CoAP. It relies on the infrequent variability of LPWAN applications to define static contexts that are known a priori to both protocol end points.

The SCHC fragmentation sublayer, on the other hand, offers a generic approach to provide both data reliability and the capability of transmitting larger payload sizes over the extremely constrained LPWAN packet sizes and the extremely severe message rate limitations. Even though the fragmentation sublayer mechanisms have been designed to transport long IPv6 packets, they can equally be applied to non-IP data messages and payloads, as the functionality can be implemented independent of the header compression.

In order to be fully operational across LPWAN technologies, SCHC has been developed by the IETF under a generic and flexible approach that aims to address the common and unique requirements of these networks. The SCHC specification offers enough flexibility to optimize the parameter settings that need to be used over each LPWAN technology.

The IETF LPWAN WG is now working on the development of different SCHC profiles optimized for each individual LPWAN technology, including Sigfox, LoRaWAN, NB-IoT and IEEE 802.15.4w. Future work also includes definition of data models to represent the static contexts, as well as operation, administration and management (OAM) tools for LPWANs.

Here’s an illustration of the Sigfox SCHC:

…………………………………………………………………………………………………..

From the early stage IETF Sigfox SCHC profile spec:

The Static Context Header Compression (SCHC) specification describes a header compression scheme and a fragmentation functionality for Low Power Wide Area Network (LPWAN) technologies.
SCHC offers a great level of flexibility that can be tailored for different LPWAN technologies. 
The present (early stage) document provides the optimal parameters and modes of operation when SCHC is implemented over a Sigfox LPWAN.

………………………………………………………………………………..

Addendum –by Alan J Weissberger

IEEE definition of IoT:

“An IoT system is a network of networks where, typically, a massive number of objects, things, sensors or devices are connected through communications and information infrastructure to provide value-added services via intelligent intelligent data processing processing and management management for different different applications (e.g. smart cities, smart health, smart grid, smart home, smart transportation, and smart shopping).”
— IEEE Internet of Things Journal

IoT communications over LPWANs should be:
 Low cost,
 Low power,
 Long battery life duration,
 High number of connections,
 Low bitrate,
 Long range,
 Low processing capacity,
 Low storage capacity,
 Small size devices,
 Simple network architecture and protocols

Also see IETF draft RFC 8376  LPWAN Overview

……………………………………………………………………………………………….

Sigfox Network Characteristics:

 First LPWAN Technology
 The physical layer based on an Ultra-Narrow band wireless modulation
 Proprietary system
 Low throughput ( ~100 bps)
 Low power
 Extended range (up to 50 km)
 140 messages/day/device
 Subscription-based model
 Cloud platform with Sigfox –defined API for server access
 Roaming capability

………………………………………………………………………………………

References:

https://www.ackl.io/blog/ietf-standardization-working-group-enabling-ip-connectivity-over-lpwan

https://techblog.comsoc.org/2017/10/25/lora-wan-and-sigfox-lead-lpwans-interoperability-via-compression/

https://tools.ietf.org/html/draft-ietf-lpwan-schc-over-sigfox-00

 

2019 IoT World: Market Research from Ovum & Heavy Reading; LPWAN Market to be >$65 billion by 2025

I.  IoT World May 14, 2019 presentation by Alexandra Rehak, Practice Leader IoT, Ovum and Steve Bell,  Sr. Analyst, Heavy Reading.

Edited by Alan J Weissberger

Ovum Forecasts:

  • IoT devices will grow to 21.5bn by 2023, while revenue will nearly double to $860bn.
  • Key trends driving IoT evolution in 2019: enabling technologies, new business models, (industry) verticalization, big data & analytics, new tools, e.g. AI/ML.
  • Drivers for IoT deployment still focus on efficiency and customer
    experience, but many enterprises are looking for new revenue.  Top 4 IoT drivers are to improve: operation efficiency, customer engagement & experience, strategic decision making based on actionable insights, new revenue streams from value added products/services.
  • The biggest enterprise IoT challenge is data – how to secure it, how
    to derive analytics value from it, how to integrate it.  Top 3 barriers to enterprise IoT deployment: data security & privacy (has been top concern for last 10+ years), data analytics skills/data scientists, difficult to integrate with existing IT (and likely OT too), complexity of technical implementation (and systems integration).

Enabling Technologies:

 1.  LPWAN will be a key enabler for cheaper, massive scale IoT
connectivity – and 2019 will be the year it finally takes off (Alan has heard that for several years now!  However, NB-IoT and LoRa are growing very quickly in 2019.)

• <$1 per month connectivity

• <$10 modules

• Low bandwidth, long battery life, extended coverage characteristics

• Use cases: smart cities, consumer IoT, asset monitoring, environmental monitoring

•  NB-IoT, LTE-M, LoRa, Sigfox are the big four LP WANs

2.  5G enables enhanced IoT digital capabilities:

▪ High bandwidth services – eg UHD video
▪ Critical applications, which require low latency – e.g., autonomous driving, industrial applications (3GPP Release 16 and IMT 2020 approved standard)
▪ High bandwidth, low latency services – e.g., augmented reality
▪ Information intensive routines, which require low latency performance– eg smart advertising, True AI (is what we have today fake AI?)
▪ Services that can – but don’t readily – work over 4G, e.g., mobile video conferencing

3.  Edge and the IoT opportunity:

Virtualized services (including gateways and vCPE), FOG nodes, life cycle management, linking silos (systems and data), many different applications, data analytics, AI/ML/DL, threat intelligence, device management services, security credential management.

4. Blockchain is still early-stage as an IoT enabler, but promising use
cases are emerging

  • Authentication of devices joining IoT network
  • Supply chain management and verification
  • Smart grid microcontracts
  • Autonomous vehicles

Blockchain will not suit all IoT security and contract requirements.  That’s because it’s: Complex, heavy processing load, not yet fully commercialized, private blockchain space is fragmented, need for supporting regulatory/legal frameworks Autonomous vehicles.

………………………………………………………………………………………………………….

Industrial IoT (IIoT):

It’s becoming a core focus for the market – and an important testbed for 5G. Requires ultra reliable and very low latency.

IIoT is moving beyond efficiency gains:
• IIoT will grow in importance in 2019
• Drivers: efficiency and margins, competitive positioning, ‘job lots of one’
• Challenges: IT/OT integration, security, traditional business models
• Applications: simple asset tracking/monitoring to complex propositions (predictive maintenance, digital twin, robotics, autonomy)
• IoT, 5G, and AI form virtuous circle for industrial sector and factory
campuses
Private LTE as another enabler (Steve Bell of Heavy Reading was very optimistic on this during the Thursday morning, May 17th round table discussion on 5G and LTE for IoT).  So is this author!

……………………………………………………………………………………………………..

IoT value chain: evolution from ‘platform providers’ to ‘end-to-end
solution providers,’ simplifying the buying process.  An end-to-end solution requires: sensors/devices/hardware, connectivity, platform (connectivity and device control/management), applications, analytics, integration.

Value chain evolution is also driving IoT business model innovation, for both enterprises and providers.  For connectivity, this includes: flat rate IoT connectivity pricing (e.g. $5 per year), bundled IoT device connectivity, alternative IoT connectivity providers (e.g. Sigfox, Zigbee mesh, BT mesh, etc), private LTE (licensed frequencies so not contention for bandwidth as with WiFi).

…………………………………………………………………………………………………….

Summary and Recommendations:

  • Enabling IoT technologies: 5G, LPWAN, edge, blockchain – developing
    quickly – but shouldn’t be seen in isolation.
  • IoT data usage & security: Focus of customer concern – stronger support,
    simpler tools needed to deliver value through analytics, eventually AI.
  • Vertical strategies: Industries face significant disruption – understand
    how IoT will help your customer to transform and address these shifts.
  • New IoT business models: increasingly sophisticated – end customers
    very interested, but need help to understand them, manage risk.

……………………………………………………………………………………………………………

II.  LPWAN Market Forecast from Global Market Insights, Inc.

The LPWAN market is set to grow from its current market value of more than $1.5 billion (€1.3 billion) to over $65 billion (€58.2 billion) by 2025, according to a new research report by Global Market Insights, Inc.

Low power wide area network market growth is driven by the growing deployment of LPWA technologies, including LoRa, NB-IoT, and LTE-M, offering a wide range of connectivity options to enterprises. These technologies provide broader network coverage and better battery life to connect various devices. LPWAN networks are becoming very popular among enterprises to support various IoT use cases for verticals including healthcare, manufacturing, agriculture, logistics, and utilities.

For instance, the rising penetration of Industrial IoT (IIoT) in the manufacturing industry has increased the demand for LPWA technologies, particularly NB-IoT and LTE-M, to enable reliable machine-to-machine communication. Industrial IoT connections are expected to increase nearly five times between 2016 and 2025, from 2.4 billion to around 14 billion connections.

By deploying LPWAN connections, manufacturing companies can increase their operational efficiencies to drive high productivity. Another factor fuelling the LPWAN market growth is increasing investments by companies in LPWAN technologies. For instance, in June 2017, Cisco contributed to a US$ 75 million Series D funding round for Actility, a LPWAN startup. Cisco’s investments in Actility enabled it to accelerate the development of IoT solutions.

The LPWAN platforms held a major market share of over 70% in 2018 owing to the deployment of various platforms, including NB-IoT, LoRaWAN, Sigfox, and LTE-M. Massive IoT deployments in various industry verticals, including utilities, manufacturing, transportation, and healthcare, has increased the demand for LPWAN platforms to support connected devices requiring low power consumption, long range, and low costs. Among all the platforms, LoRaWAN platforms held the highest market share of over 50% in 2018 as they use unlicensed spectrum and are best suited for applications that generate low traffic and require low-cost sensors.

In the services segment, the managed services segment is expected to hold low power wide area network market share of around over 30% in 2025. Managed services enable organisations to accelerate the deployment of LPWAN and reduce the time & expenses spent on training the IT staff. The on-premise deployment model is expected to grow at a CAGR of over 50% over the projected timeline. The demand for this deployment model will increase as it enables organisations to build & manage their own LPWAN for IoT-based applications.

 

References:

Ovum’s latest video on IoT with Alexandra Rehak: https://ovum.informa.com/products-and-services/research-services/internet-of-things

https://ovum.informa.com/resources/product-content/lpwan-tracker-update-lorawan-leads-live-network-deployments-iot002-000005

http://images.intelligence.informa.com/Web/InformaUKLimited/%7B1307c76d-8210-41e4-bec3-ff2db28b0403%7D_Research_Agenda_2019_-IoT.pdf

https://www.gminsights.com/industry-analysis/low-power-wide-area-network-lpwan-market

https://www.iot-now.com/2019/05/22/96056-low-power-wide-area-network-market-valued-us65bn-2025-gmi-report-says/

 

2019 IoT World: T-Mobile is Changing the Game for Massive IoT via NB-IoT

Introduction:

T-Mobile USA was the first U.S. wireless carrier to provide nationwide NB-IoT coverage last July.  The “uncarrier” is very proud to have 81 million cellular customers and a very low churn rate.  The company has invested billions of dollars in the last five years to modernize and transform its wireless network. As of February 7, 2019,  T-Mobile’s LTE network now covers 325 million people, according to a recent earning report..

During his May 14th 2019 IoT World keynote, Balaji Sridharan, VP of IoT & M2M at T-Mobile US, described the challenges to overcome to realize massive IoT at scale and T-Mobile’s wireless networks that might be used for three different classes of IoT connectivity.  Balaji also enumerate key features and attributes of NB-IoT and showed an interesting comparison chart of LPWANs.  He said its 600 MHz spectrum is deployed throughout the U.S.  [1]

Note 1.  During its April 2019 earnings call, CTO Neville Ray said: “we have over 1 million square miles of 600 megahertz LTE rolled out.  It’s working in 44 states and Puerto Rico. And we have a 100 million covered PoPs on 600 megahertz LTE. So we’ve said that in 2020, we’ll have a nationwide footprint on 5G. 

…………………………………………………………………………………………

IoT Classification and Characteristics [from Ericsson white paper]:

Massive IoT: Connecting billions of devices, small amounts of data volumes, (mostly) sent infrequently, low power required for long battery life (years not days, weeks or months).

Broadband IoT will need high throughput and/or low latency.; large data volumes.

Critical IoT will require ultra high reliability/availability and very low latency.  Industrial automation (and robotic surgery) will require time sensitive information delivery and precise positioning of devices.

Industrial Automation is tailored for advanced industrial automation in conjunction with the other cellular IoT segments. It includes Radio Access Network (RAN) capabilities to facilitate the support of deterministic networks which, together with ethernet-based protocols and other industrial protocols, will enable many advanced industrial automation applications. 

These applications have extremely demanding connectivity requirements and require very accurate indoor positioning and distinct architecture and security attributes. Industrial Automation IoT reinforced by Critical IoT connectivity is the key enabler for the full digitalization of Industry 4.0 for the world’s manufacturers, the Oil and Gas sectors as well as smart grid components for energy distribution companies. 

Figure 1: Cellular IoT segments

Above chart courtesy of Ericsson.

……………………………………………………………………………………………

T-Mo has wireless networks to meet all of the above IoT market segmants.  In particular, NB-IoT, 4G-LTE, and (soon) 5G.

……………………………………………………………………………………………

Challenges to overcome for Massive IoT:

  • Support billions of devices at scale (that includes provisioning and (re) configuration).
  • Long battery life (via low power consumption of devices/things)
  • Coverage enhancements
  • Global reach

……………………………………………………………………………………………

NB-IoT meets the requirements for Massive IoT:

Operates in guard bands of T-Mobile’s LTE network. [2]

Wide range of devices to be connected to the Internet using existing mobile networks (rather then new network infrastructure).

Key benefits include:  better battery life (again via low power consumption for connectivity), cheaper device costs ($5 certified NB-IoT module is now available), optimized data usage, reduced IP header and ability to transmit/receive non-IP data (which results in 30% to 40% less data transmission than if traditional IP was used), enhanced security via GSMA standards, licensed spectrum (no interference),, SIM based, and encryption.

Balaji said: “Improved network coverage is achieved via repetitions, which are used to enhance coverage.”  [3.]

Note 2. NB-IoT can also be implemented in “standalone” for deployments in dedicated spectrum.

Note 3. From an IEEE published paper titled: Enhancing Coverage in Narrow Band-IoT Using Machine Learning:

NB-IoT needs only a small portion of the existing available cellular spectrum to operate without interfering with it. Hence, NB-IoT provides more reliability and more quality of service (QoS) as it operates in regulated spectrum. Moreover, NB-IoT uses existing cellular network infrastructure, which reduces the deployment costs.

However, since repeating transmission data and control signals has been selected as a major solution to enhance coverage of NB-IoT systems, this leads to reducing the system throughput and thereby a spectral efficiency loss.

…………………………………………………………………………………………………………………….

Here’s a comparison chart showing: 2G,  licensed spectrum NB-IoT vs unlicensed band Sigfox and LoRa (WAN):

Chart courtesy of T-Mobile USA

…………………………………………………………………………………………………………………….

Balaji highlighted several Massive IoT applications that could effectively  use NB-IoT for connectivity.  Those include: asset tracking, smart metering, smart lighting, equipment monitoring, smart packaging, and intelligent waste management.

In addition to the $5 NB-IoT modules now available Balaji revealed T-Mo has a $5/year NB-IoT service plan.  

T-Mo hosted the U.S.’ first NB-IoT Hackathon to develop IoT applications that would leverage NB-IoT as a viable wireless network.  Sensing the presene of forest fires was an example he provided.

T-Mo partnered with Twillio to get NB-IoT to market.  They created a new development kit that allowed Hackathon participants to access the NB-IoT network.  [4.]

Note 4.  More than 100 new and seasoned developers descended on T-Mobile HQ to help shape the future of NB-IoT at the Hackathon.  20 creative and unique IoT concepts for prospective IoT solutions emerged that could leverage the low cost and power efficiency of NB-IoT and its reliability over long distances.

……………………………………………………………………………………………………………………………

U.S. Carrier Comparison for NB-IoT Deployments:

T-Mobile launched its NB-IoT network last July. AT&T’s NB-IoT network went live two weeks ago. Sprint said it is testing NB-IoT technology, but it plans to merge with T-Mobile in the not-too-distant future so may not roll out its own NB-IoT offering.

…………………………………………………………………………………………………………………………

NB-IoT Chipset Forecast:

Research & Markets predicts the NB-IoT chipset market is expected to grow from USD 272 million in 2019 to USD 2,002 million by 2024 at a CAGR of 49.1%.

…………………………………………………………………………………………………………………………

References:

https://www.t-mobile.com/news/americas-first-narrowband-iot-network

https://iot.t-mobile.com/narrowband/

https://techblog.comsoc.org/2019/04/27/t-mobile-u-s-profit-beats-estimates-plan-to-launch-5g-on-600-mhz-in-2h-2019/

https://www.gsma.com/iot/wp-content/uploads/2018/04/NB-IoT_Deployment_Guide_v2_5Apr2018.pdf

https://iot.t-mobile.com/hackathon/

https://iot.t-mobile.com/wp-content/themes/T-Mobile/device_images/pdf_download/Whitepaper_NarrowBand_IoT_March2019.pdf

https://techblog.comsoc.org/2019/05/15/2019-iot-world-verizons-narrowband-iot-nb-iot-network-now-covers-92-of-u-s/

 

2019 IoT World: Verizon’s Narrowband IoT (NB-IoT) Network now covers 92% of U.S.

Verizon announced yesterday that its NB-IoT network is now available coast-to-coast covering more than 92% of the U.S. population. NB-IoT focuses on applications needing data rates below 100K bits/sec which makes it ideal for solutions that aren’t designed to be always mobile such as alarm panels, environmental sensors, industrial appliances, factory equipment and parking meters.

NB-IoT is specifically designed for IoT applications that could benefit from access to lower cost chipsets, superior coverage and significantly prolonged battery life. The NB-IoT Network provides the ability to manage both IP and non-IP data traffic. This ability to handle non-IP data traffic allows for the creation of much simpler and more cost-effective IoT devices which are ideal for solutions that aren’t designed to be always mobile such as alarm panels, environmental sensors, industrial appliances, factory equipment and parking meters.

Other viable use cases for NB-IoT include:

  • Smart cities – improve citizen experience and municipal operations through parking sensors, waste management and smart lighting.
  • Smart buildings – enhance building safety and incident response times through connected smoke detectors including regular auto-test, battery check and real-time alerts to the relevant parties in case of fire.
  • Industrial – improved machinery maintenance cycles and factory safety through machinery control such as equipment status, factory control, and process and safety monitoring.
  • Environment monitoring – increase focus on environmental responsibility through status reporting of manhole covers, fire hydrants and chemical emission levels.
  • Agricultural – improve efficiency in the agricultural industry with livestock tracker, connected greenhouse, stationary tracking and monitoring of air quality, humidity, moisture, temperature, and weather conditions of air and soil.
  • Asset Tracking – improve efficiency and decrease costs by using pallet tracking and geo-fencing.
  • Utilities – improve efficiency and decrease waste by using gas and water metering, including smart meter consumption tracking and pipeline monitoring.

Verizon has partnered with chipset and module manufacturers for its NB-IoT network. The carrier said three module makers – Telit, SIM-COM and Quectel, are in the final stages of testing modules, and will be available for use in IoT development on the new network.

NB-IoT adds another connection option for businesses:

Verizon maintains a strong leadership position in IoT technology and solutions with a history of providing customers with many options to meet their needs including nationwide deployment of 4G LTE, LTE Cat 1, and LTE Cat M1 networks. While CAT-M1 targets a wide range of applications for business customers such as wearables, fleet and asset management, NB-IoT focuses on applications needing data rates below 100 kbps. NB-IoT technology occupies a dedicated frequency of 180 kHz bandwidth designated for IoT applications which does not share spectrum resources with commercial smartphone traffic.

“We have engineered our NB-IoT network in the Guard Band of our spectrum. By using the more complex Guard Band solution for our Narrow Band IoT Network, we are demonstrating very efficient use of spectrum assets while giving customers the breadth of options they need to best meet their needs. This strategic use of spectrum is one of the many variables that has resulted in Verizon’s continued performance superiority and strong capital management over the years,” said Bill Stone, Vice President of Technology Development and Planning at Verizon.

During his IoT World Tuesday keynote speech, Shamik Basu, Director of IoT Products at Verizon, said that massive IoT sensor networks could be deployed today using Verizon’s NB-IoT or LTE-M networks.  “They make critical infrastructure intelligent….NB-IoT and LTE-M will co-exist in some networks (i.e. the IoT device module supports both as does the wireless base station).  You don’t need gateways to deploy massive sensor networks today.”

Verizon is ready to support developers and manage commercial traffic:

Verizon continues to expand its already robust ecosystem of partners to help develop, bring to market, connect and manage IoT solutions. Verizon has partnered with leading chipset and module manufacturers so that IoT makers can immediately start working towards building their devices for the Verizon NB-IoT network. Three module manufacturers in final stages of testing – Telit, SIM-COM and Quectel – have modules on Verizon’s Network which are ready to be used in development efforts. Additionally, customers will be able to manage their connections securely using the integrated ThingSpace platform that supports connectivity management, location and device security.

Verizon has announced an initial NB-IoT Standard Price Plan, offering 50 KB of data with a $1.00 monthly access fee per device. The data allowance can be shared with other NB-IoT devices on the same price plan and on the same account.

…………………………………………………………………………………………………………………………………………

Verizon at IoT World 2019, Santa Clara, CA:  Booth 510

Verizon’s NB IoT demo, permits conference attendees to experience Verizon’s NB IoT network in action.

At Verizon’s 5G for enterprise demo, conference attendees will explore the possibilities that will result from the ultra-low latency and massively scalable characteristics of the Verizon’s 5G technology.

Mixed reality developer Arvizio will be on hand demonstrating their MR Studio mixed reality platform for XR experiences on Microsoft HoloLens. Arvizio has converged Verizon’s ThingSpace IoT platform and augmented/mixed reality technologies to transform how businesses connect and use the data flow from IoT devices.

At the ThingSpace Ready demo, conference attendees will learn about ThingSpace Ready, Verizon’s IoT Accelerator program, which enables easier IoT onboarding with Verizon. We curated partnerships with design houses, system integrators, module/modem providers, and SIM manufacturers, so OEMs (device makers) get easy access to the hardware and solutions needed to create the next generation of IoT devices, all with upfront and transparent pricing.

At the ThingSpace Manage demo, conference attendees will learn how Verizon’s ThingSpace Manage platform will enable customers to provision, monitor, diagnose and control their IoT devices using connectivity APIs, as well as value-added microservices. The exhibit will demonstrate key capabilities on the ThingSpace Manage Portal such as device activation, network diagnostics, and coarse location. A demonstration of SIM-secure will also showcase how Verizon can help protect devices if the SIM are removed.

At the Critical Asset Sensor demo, conference attendees will experience how Verizon made it simple for customers using public clouds to get the data they need to drive their businesses. Critical Asset Sensor is an Edge to Enterprise solution with 7 sensors, GPS, LTE-M connectivity, and the ThingSpace platform with APIs to consume data into Amazon Web Services or any other cloud platform that drives your business.

Deploying IoT Massive Sensor Networks:

In his IoT World keynote, Mr. Basu suggested that companies deploying IoT massive sensor networks match the technology to their needs.  Those needs might include:  long battery life (10+ years), long range (network) coverage, ubiquitous, low improvement cost, security, reliability/availability, and longevity.  Putting a NB-IoT interface in a sensor module facilitates data collection in real time which can then be tabulated and analyzed at the edge or in the cloud.

Shamik recommended Verizon’s ThingSpace to manage a rich suite of services for IoT.  Companies can then monetize their IoT solutions and use public clouds, like Amazon Web Services (AWS).  By pre-integrating software on development kits pre-approved by Verizon and Amazon, developers have all the key building blocks to create an IoT solution out of the box. AWS’s reliability and scalability make it an ideal foundation for your solution.

The ThingSpace Cloud Connectors program allows you to build a powerful IoT solution by combining your AWS solution, the Verizon network and ThingSpace device lifecycle management tools.

Conclusions:

In summary, NB-IoT combined with Verizon’s ThingSpace IoT accelerator/ management platform, new pricing and rich ecosystem of partners who have modules ready for development, enterprise customers have the ability to bring unique NB-IoT solutions to market quickly.

 

References:

https://www.verizon.com/about/news/verizon-extends-iot-leadership

https://thingspace.verizon.com/partners/aws/

Narrowband – Internet of Things (NB-IoT)

Rogers Communications to launch national LTE-M network for IoT in Canada

Rogers plan to launch an LTE Cat M1 network (LTE-M) to help businesses connect and track their assets in real time – using solutions such as logistics tracking, alarm monitoring, and smart metering. LTE-M will connect fixed and mobile low-power IoT devices to carry critical information over long distances, with longer battery life and better network coverage in hard to reach areas. This investment in LTE-M will make IoT solutions more accessible for Canadian businesses, to help them innovate and save money and time.   Network speeds and pricing weren’t announced.

LTE-M is used for fixed and mobile low-power IoT devices sending/receiving data over long distances, particularly for devices needing longer battery life and better network coverage in hard to reach areas.  Telecommunications companies have a long list of potential IoT uses including monitoring pipelines, tracking tools, pallets and factory equipment, home smart meters, monitoring waste bins, street lighting sensors and building infrastructure (HVAC).

“As leaders in IoT, we are committed to supporting our customers as they explore the capabilities and benefits available through Rogers rapidly growing IoT ecosystem,” said Dean Prevost, President, Enterprise, Rogers Communications. “With the launch of LTE-M, we are empowering the adoption of reliable, low cost, and secure IoT solutions that support a variety of use cases such as asset tracking, smart cities, utilities, transportation, and supply chain management.”

The national rollout of LTE-M will start with an initial launch in Ontario by the end of 2018, followed by additional provinces throughout 2019, and a full national rollout completed by 2020. This investment is a stepping stone in Rogers multi-year technology plan to bring 5G to Canadians with its network partner, Ericsson.

“Rogers has a strong history of innovation in IoT. LTE-M continues that leadership and is a key part of our plan towards building a 5G-ready network,” said Jorge Fernandes, Chief Technology Officer, Rogers Communications. “LTE-M will bring Massive IoT to life – a market with tremendous scale for connected devices – and will fundamentally improve how Canadian businesses and cities operate.”

LTE-M is also a great alternative option for all machine-to-machine connections that are still using the 2G network. As LTE-M is rolled out, Rogers will provide its customers with clear and simple options to enhance their service experience when they choose to migrate and upgrade their 2G IoT devices and benefit from all the new capabilities provided by LTE-M. In addition, LTE-M will also enable future consumer IoT applications such as wearables, monitoring and tracking solutions.

“IoT is now a mainstream tool of Canadian businesses, with 81% of medium and large-sized Canadian organizations using IoT solutions today, up from 70% last year[1],” said Nigel Wallis, Vice President, Internet of Things and Industry Research, IDC Canada. “The development of industry-specific IoT solutions addresses unique business needs, like smart utilities and smart asset tracking. Low-power wide area networks (LPWAN) enable businesses to re-think traditional operations practices, and to innovate in ways they would not have attempted before.”

Rogers’ LTE-M website notes that while an IoT device can be installed in an underground parking garage, thick concrete walls can impact coverage, An LTE-based network will help.

The site says LTE-M will offer enhanced wireless coverage; low device cost, because devices for that network are less expensive than current devices; less power drain and extended battery life. LTE-M also can handoff from a Wi-Fi to a cellular network, making it practical for mobile asset tracking needs such as monitoring shipping containers, fleet vehicles or people (for example, patient monitoring). LTE-M supports voice recognition, which is important for alarms and security applications.

Rogers is expanding its portfolio of IoT solutions to meet the needs of Canadian businesses and municipalities. IoT solution providers who are interested in working with Rogers, or participating in LTE-M field trials are invited to submit an application here.

To learn more about LTE-M, visit the Rogers Business Forum.

About Rogers:
Rogers is a leading diversified Canadian communications and media company. We are Canada’s largest provider of wireless communications services and one of Canada’s leading providers of cable television, high-speed Internet, information technology, and telephony services to consumers and businesses. Through Rogers Media, we are engaged in radio and television broadcasting, sports, televised and online shopping, magazines, and digital media. Our shares are publicly traded on the Toronto Stock Exchange (TSX: RCI.A and RCI.B) and on the New York Stock Exchange (NYSE: RCI).

1 State of IoT Adoption in Canada: 2018, IDC Canada

SOURCE Rogers Communications Canada Inc

CONTACT: media@rci.rogers.com, 647-747-5118

Superb Article on What’s Wrong with Communications Industry by Steve Saunders, co-founder of Light Reading

Here’s the url for Steve Saunder’s spot on the money article:  https://www.linkedin.com/pulse/future-communications-steve-saunders/

The only add on I have to Steve’s  exquisite post is that the lack of standards is pervasive throughout the WAN space:

  1. SD WANs are a single vendor solution  – no UNI or NNI specified or being worked on by an accredited standards body.
  2. NFV: No standards for exposed interfaces, APIs (NFV orchestrator (NFVO) to/from virtual appliances), no backward compatibility between virtual appliances and physical appliances, no standard for network management or fault isolation/repair, etc.
  3. Every major Cloud Service Provider (CSP) has their own defacto standards/specs and APIs, e.g. Amazon, Google, MSFT, etc
  4. Every major CSP has their own connectivity solution(s) from customer premises network to their point of presence (PoP);  and their own method for realizing a virtual private cloud (VPC)
  5. Every CSP and network service provider has their own definition and implementation of SDN, including one or more southbound API (s) to/from Control Plane to data plane.  That southbound API was supposed to be ONLY OpenFlow according to the ONF.  The Northbound API was never standardized and there are many  options.  Many SDNs use an overlay network and virtualization of network functions while others do not.  Equipment and software built for one provider’s SDN won’t operate on another’s as the specs are different and usually proprietary.
  6. Far too many LPWANs for IoT:  Sigfox (by company with same name), LoRa WAN,  Weightless SIG (unidirectional Weightless-N, bidirectional Weightless-P and Weightless-W), NB-IoT, LTE Cat M1, many other proprietary versions like RPMA (from Ingenu).
  7. The message sets between “things”/IoT devices  and the cloud controller have not been standardized.  Neither is the functions of an “IoT Platform” which has become a wild west menagerie of incompatible platforms from hundreds of vendors.
  8. Every so called “5G” deployment planned before IMT 2020 has been completed (end of 2020) is proprietary.  The only thing in common seems to be use of 3GPP release 15 “5G New Radio” which is not a standard.   That implies mobile 5G will have severe roaming problems when moving from one 5G carrier to another.

 

And the list goes on and on and on……………………………………….

Without agreed upon standards, the upshot is that the big cloud players (Google, Amazon, FB, Microsoft, Tencent, Alibaba, Baidu, etc) will dominate communications in the future (I think they already dominate all of IT!!)

Also, the rise of open source hardware organizations (OCP, TIP, ONF, etc) along with Taiwan/China ODMs have profoundly changed the communications industry.  With so many open source white boxes and bare metal switches available, there is little or no value add for vendor specific network equipment other than possibly higher performance (e.g. throughput).

Global Data: 5G Enterprise Market Business Case May NOT Be Compelling

Is it possible for anyone to throw cold water on the 5G market potential  and diminish ultra hyped expectations?  YES!

5G use cases may not be compelling enough for massive uptake by businesses, according to Kathryn Weldon, technology research director at GlobalData.  Weldon offered her view on upcoming challenges for mobile operators:

“While 5G services are not yet ‘live’ this next generation of wireless technology is already top of mind for service providers, original equipment manufacturers (OEMs) and other telecom market ecosystem players. Aside from gearing up to build out the technology, they will be working together to make sure that 5G use cases are compelling – that is, different enough from 4G to matter to customers. As with any new generation of wireless, the stakes are high, and operators are hoping that they’ll make back their substantial investments in 5G. For most operators, this should come via a ‘massive’ uptake of connectivity, plus revenues from advanced services spanning both consumers and business customers.”

Operators need to move beyond their current barrage of technology build-out narratives and discussions of fixed vs. mobile services, she emphasized. “Rather, it’s the use cases and business outcomes that will make the difference. Operators need to deliver novel and compelling capabilities that change how business customers see and use cellular services.”

Enterprises have different requirements than consumers:

“As 5G communications traffic is expected from Internet of Things (IoT) sensors in industrial robots, roads, and vehicles and can leverage the technology’s reliability and low latency to control critical services and infrastructure for public safety, healthcare, government organizations, and utilities. But the ROI for these applications must be compelling.”

Weldon further acknowledged that questions remain:“Will the enterprise appetite to spend more to use these futuristic use cases exist when 5G networks become a reality? Will devices to support these applications be in place once those networks are ready? Will businesses finally see wireless as a valid replacement for wireline broadband? And lastly, will operators be able to offer all these futuristic services profitably? Only time will tell.

………………………………………………………………………………………………………………………………………………………………………………………………..

Last year, Global Data said 5G networks will become mainstream by 2020, but Europe will lag behind Asia and the US, as operators seek to make the most of 4G, according to GlobalData, a recognized leader in providing business information and analytics. The company’s 5G report forecasts that while over half of all mobile subscriptions will be 5G-capable in South Korea by 2022, compared only around 7% in Europe.

5G will, for the first time, go beyond increased bandwidth and capacity, as was the focus in previous wireless generations, adding low latency, high density and high reliability. These capabilities will enable a variety of use cases, opening the door to new, predominantly business-focused services such as self-driving cars and smart cities. 5G also supports the focus that many operators have in looking for new, adjacent revenue streams, including fixed-mobile integration, digital content and the Internet of Things.

Peter Jarich, Chief Analyst for GlobalData Technology, adds: “Hopes are running high for the potential of 5G to truly transform mobile business models, and tap new revenue opportunities moving beyond consumers and into diverse digital industries. The implications go beyond any individual operator to impact national and regional competitiveness.

“Despite this, for all the efforts to fast-track early 5G deployments, it’s important to recognize that 5G rollouts will take years to complete; no region or country has won or lost the race to 5G yet.”

 

Recent Posts