How 5G Will Unlock Unseen Opportunities in Industrial IoT

Manufacturing industry or the Industrial Internet of Things has been one of the driving verticals for development of 5G technologies. Wide 5G deployement for Industrial IoT has long been in the pipeline but we might expect it to be a reality very soon.

The true success of 5G depends on the verticals as trends suggest that that Industrial IoT alone will triple the number of needed base stations globally. And many verticals will need efficient wireless connectivity to become successful. 5G has features that are specifically designed to address the needs of vertical sectors, such as network slicing and URLLC. The ultra-reliable low latency communications and massive machine type communications required by the IIoT will soon be realized.

Table of Contents:

How Will 5G Impact Industrial IoT?
5G Accelerations for IIoT
Industrial 5G

How Will 5G Benefit Industrial IoT?

IoT is a B2B application and users just want to get actionable data from their sensors and not worry about whether it’s old data or unreliable data. I think 5G changes this dynamic significantly over the long term by standardizing and simplifying the experience and interactions, and possibly engaging more of the industry to help solve IoT’s problems but also improve the total experience.

- Anshel Sag, analyst at Moor Insights & Strategy


• Data-Transfer Speeds

Any IoT is said to be commercially successful depending on how fast it can set up communications with other IoT devices, software based websites or applications, phones, and tablets. 5G promises exactly all of this with significant increase in transfer speeds.

5G is 10x faster than its LTE counterparts and allows IoT devices to communicate and share data faster than ever. All IoT devices will benefit from the faster speed of 5G with reduced lag and improved sending and receiving of data and notifications between connected devices.

• Greater Network Reliability

5G networks also offer more reliable and stable connection which is extremely important for any IoT including devices like locks, security cameras and monitoring systems that depend on real-time updates.

With reliable connectivity consumers will be the greater beneficiary.

It is however, imperative for manufactures to trust and invest in 5G compatible devices to reap the benefits of high-speed connectivity, very low latency, and a greater coverage that will arrive with the next generation network.

READ MORE: How Will the Emergence of 5G Affect Federated Learning?

5G Accelerations for IIoT


• Diversity in Industrial IoT

The opportunities that industrial IoT bring with is varied and its used cases span the spectrum from indoor to outdoor, less demanding to mission-critical, data rate from dozens of bps to gbps, device motion from fixed to mobility, and power source from button battery to high voltage.

Predictive maintenance, smart metering, asset tracking, and fleet management are some of the commonly known opportunities for IIoT, which be extended further by 5G through continued diversity and expansion.

• 5G Inspires Untapped Frontiers

Industrial IoT application areas such as mobile robot control in production automation and autonomous vehicles in open pit mining require wide mobility, low latency and mission-critical reliability. They rely on wireless access at 50ms to 1ms latency and service reliability from 5 nines to 6 nines.

Though 4G/LTE has attempted to address these areas of IIoT application it has failed due to unsatisfactory performance. With ultra-reliable and low latency connection, 5G will take industrial IoT to unconquered spaces.

• Managing the Enterprise 5G Network

Typically, enterprise IT is responding to the business demand from Operational Technology (OT) and mandates security, integration, visibility, control, and compatibility. In this scenario, 5G is not about “what,” but about “how”. IT needs to consider the right approach to bring 5G to the enterprise and decide whether to co-manage with the service provider (SP) or self-manage. The experience of IT in managing Industrial Ethernet and Wi-Fi may not hold when it comes to 5G. IT will likely require OT’s partnership to address complexity, security, integration, and other new challenges that 5G presents.

Industrial 5G

The potential for industrial 5G huge as it enables whole new business models.

Industrial IoT has a core requirement of the ability to connect sensors, devices, software applications, production process, workers and consumers. The connectivity requires to be seamless vertical and horizontal integrations of all layers of automation pyramids that increases operational efficiency of the plant floor and the supply chain by optimal use of data, information and analytics. This can be improved by five key elements:

• Improved Connectivity
• Availability
• Low Latency
• Flexibility
• Speed

Industrial 5G will impact these areas of the manufacturing industry to guide the success of Industrial IoT.

Industrial 5G will play a key role in helping industrial users achieve the goals of Industrial IoT. 5G offers wireless communications services with reduced latency, increased connection density, and improved flexibility compared to the current 4G generation.  5G technology has a theoretical downlink peak speed of 20 Gbps (gigabits per second), which is about 20 times faster than the current generation.

The key is to start building IoT devices with broadly adopted operating systems, built-in security all the way down to the silicon, verifiable and updatable firmware, and mainstream application development tooling.

- Anshel Sag, analyst at Moor Insights & Strategy


The push and pull in achieving 5G success in IoT will be there until technology providers and end users work together to set up a consensus on standardization. The success will also depend on best-of-breed approach allowing the introduction of new technology over the lifecycle. Software and system integration will also be important attributes to a successful 5G deployment.

READ MORE: How Will IoT Revolutionize Pharmaceutical Manufacturing?

Spotlight

TempoDB

TempoDB is the time series database service. We make it possible to store and instantly analyze the massive streams of measured data that break traditional databases. TempoDB was a member of the inaugural TechStars Cloud class of 2012, a startup accelerator focused on internet infrastructure.

OTHER ARTICLES
IoT Security

IoT Data Visualization for Corporate Finance Business Intelligence

Article | June 27, 2023

The evolution of internet-based market models has changed the way businesses operate. Present-day businesses know that data visualization in business intelligence is integral to competitive success. Therefore, businesses are now expanding their data and intelligence retrieval capacities. As a result, IoT (Internet of Things) data visualization is gaining popularity among industrialists and researchers across various disciplines. In corporate finance, IoT-based efficient data visualization analyses data from multiple sources with the help of corporate analytics management tools and manages data quality for business intelligence to reduce the risk of leaks. Impact of IoT Data Visualization on Corporate Finance BI Data is everywhere— right from a customer's first visit to your company’s website until he signs out, all the behavioral patterns and data are tracked. All this data becomes useless unless it is utilized for a particular purpose. Analyzing this data to predict future trends is one of the significant benefits of smart data visualization tools and technologies. It helps to slice and dice the data gained from different sources of different complexity levels to the minute granular level. Business intelligence utilizes these insights and the existing database to run risk analysis. It gives an overview of your financial performance and the risks and exposures it faces. And if you switch the KPIs at the center of any dashboard, your entire team can instantly access the most important and relevant data. IoT data visualization can measure big data on customers more efficiently, allowing organizations to add value to their customers. Customized tools will analyze your customers’ data and produce reports according to specific customer needs to help you get a deeper insight. Corporations can also utilize this data to better understand their competitors’ benchmarks. Customizable IoT Data to Store Millions of Data Points in One Place IoT collects millions of data from various complex sources. The data visualization dashboard contains multiple widgets that convert this data into various forms, such as line graphs, geographical maps, bar charts, pie charts, gauges, heat maps, etc. This information, transmitted into multiple visualizations, helps organizations to unlock every piece of data into a valuable asset. The Benefits of Using IoT Data Visualization Businesses can collect, analyze and monitor a variety of data using IoT, such as internet usage data, video surveillance data, mobile app usage, and social media. It helps businesses to design products and provide personalized value-added services to drive better consumer engagement. Here are some key benefits IoT data visualization offers: Unlock multiple insights across various verticals Addressing important financial concerns proactively Combination of multiple data sources into a single insightful dashboard Multi-layered visual data. Combines new data with the existing data to analyze new business opportunities. Better performance on IoT data flow. Analyze multiple data correlations in real-time Improved Collaboration Well-coordinated and efficient performance. Cost reduction Accurate data interpretation Mitigate risk factor Better decision making Conclusion Hands down, IoT data visualization intelligence in a company’s business operations will lead to better decision-making. But, before you choose an IoT data visualization tool for your business, you should know what kind of data you need to analyze and if you need any additional historical data. Because IoT services offer data visualization tools and techniques to analyze and monitor the data accordingly to predict future trends. So, it’s important to identify the goals before selecting a tool for your organization.

Read More
IoT Security

IoT Standards and Protocols Explained

Article | June 28, 2023

For businesses, the transformative power of IoT is increasingly significant with the promise of improving operational efficiency and visibility, while reducing costs. However, IoT does not come without risks and challenges. While concerns over security and data privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The increasing number of legacy, single-vendor, and proprietary solutions cause problems with disparate systems, data silos and security gaps. As IoT successes become more dependent on seamless interoperability and data-sharing among different systems, we want to avoid the scenario of a fragmented market with numerous solutions that simply don’t work with each other.

Read More
IoT Security

How to Secure Your Network with Zero Trust Security for IoT?

Article | October 11, 2023

The concept of "never trust, always verify" is the foundation of the relatively new security architecture known as "zero trust." Zero trust requires that all users and devices be verified every time they connect, even from inside the "moat," in contrast to the conventional castle-and-moat security architecture, which automatically trusts users and devices located within a network's perimeter. Companies are being forced to reconsider how they safeguard their networks by the internet of things (IoT). Unmanaged smart gadgets connected to the internet expand the number of potential access points for hackers to compromise your security when they are added to a network. Zero Trust Security Expansion for IoT After establishing it for users and their devices, organizations must extend zero-trust security to cover unmanaged, non-user devices too. To do this, they require zero trust identity management technologies that automatically register devices, issue credentials, and offer password-less authentication. Device Visibility A device may be infected with malware or have a security breach if performance problems or bugs start to appear frequently. In addition, a malfunctioning device may be more vulnerable to attack. Therefore, organizations require device health monitoring that can automatically identify problems and flag them for remedy in order to establish and maintain zero trust security for IoT. Some cutting-edge solutions can also automatically prevent an impacted device from making further connection attempts or carrying out corrective actions without requiring human participation. The Principle of Least Privilege (PoLP) The principle of least privilege (PoLP), which argues that any user or device should only obtain the bare minimum access privileges necessary to perform their job functions, is widely used in conjunction with zero trust security. Therefore, organizations must establish the minimal level of network access required for each device to carry out its functions before limiting its potential privileges in order to deploy PoLP for IoT. Implementing identity and access management (IAM) tools and guidelines that support zero trust and PoLP for devices is one approach to accomplishing this. Security Monitoring There are other zero-trust security monitoring programs created especially for IoT, such as Palo Alto Networks' IoT Security, which was previously discussed. Businesses can also utilize tools to monitor devices and network traffic, such as next-generation firewalls and intrusion detection and prevention systems (IDS/IPS). The zero trust security solution for IoT must include monitoring in addition to as much automation as possible so that threats can be identified, contained, and remedied even when no one is there to press a button or disconnect a device manually. One of the leading causes of zero trust security projects failing over time is that people stop adhering to them once they get complicated. This is especially true for IoT security that operates on zero trust. In addition, it can be logistically challenging to keep remote, unmanaged devices at zero trust.

Read More
IoT Security

Top Technologies in IoT Network Security for Network Resilience

Article | October 11, 2023

Building resilient IoT networks: Exploring the top technologies for enhancing IoT security and protecting as well as safeguarding against evolving cyber threats in the interconnected era of Industry 4.0. Contents 1. What is Network Resilience and Why is it Needed? 1.1 Continuous Operation 1.2 Mitigating Security Threats 1.3 Data Protection 1.4 System Availability 1.5 Risk Management 1.6 Regulatory Compliance 2. Factors to Consider for Network Resilience 3. Top Trends in IoT Security 3.1 Zero Trust and AI 3.2 Supply Chain Security 3.3 Network Segmentation and Segregation 3.4 Over-the-Air (OTA) Updates 3.5 Device Authentication and Authorization 3.6 Software-defined Networking (SDN) Security 3.7 Identity and Access Management (IAM) 4. Conclusion 1. What is Network Resilience and Why is it Needed? Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. It involves implementing measures to ensure the network remains available, reliable, and secure, even during security threats or unexpected events. Ensuring network resilience is a critical aspect of IoT network security. Network resilience refers to the ability of an IoT network to withstand and recover from disruptions, attacks, or failures while maintaining its essential functions. Ensuring network resilience in IoT network security is crucial for the following reasons: 1.1 Continuous Operation IoT networks often support critical applications and services that require uninterrupted operation. Network resilience ensures that these applications can continue functioning even during disruptions, such as network failures or security incidents. It minimizes downtime and ensures business continuity. 1.2 Mitigating Security Threats IoT networks are susceptible to various cybersecurity threats, including malware, unauthorized access, or Distributed Denial of Service (DDoS) attacks. Network resilience measures help mitigate these threats by implementing security controls, monitoring network traffic, and enabling prompt detection and response to security incidents. 1.3 Data Protection IoT devices generate and transmit vast amounts of sensitive data. Network resilience safeguards data integrity, confidentiality, and availability by implementing secure communication protocols, encryption mechanisms, and access controls. It ensures that data remains protected even during network disruptions or security breaches. 1.4 System Availability IoT systems often rely on real-time data processing and communication. Network resilience ensures that data flows seamlessly, allowing IoT devices to exchange information and execute tasks without interruptions. It supports critical functions such as monitoring, control, and decision-making processes. 1.5 Risk Management Building network resilience helps organizations effectively manage risks associated with IoT deployments. By identifying vulnerabilities, implementing protective measures, and having response plans in place, organizations can minimize the impact of security incidents, reduce financial losses, and maintain the trust of stakeholders. 1.6 Regulatory Compliance Many industries have specific regulations and standards governing the security and resilience of IoT networks. By ensuring network resilience, organizations can demonstrate compliance with these requirements, avoiding penalties, legal issues, and reputational damage. 2. Factors to Consider for Network Resilience Implementing redundancy and failover mechanisms within the network infrastructure helps mitigate the impact of single points of failure. This involves deploying backup systems, redundant network paths, and failover mechanisms to ensure continuous operation despite a failure or attack. Traffic Monitoring and Anomaly Detection for Continuous network traffic monitoring helps identify abnormal patterns or behaviours that may indicate security threats or attacks. By leveraging intrusion detection and prevention systems (IDPS) and traffic analysis tools, organizations can promptly detect and respond to network anomalies, safeguarding network resilience. Moreover, segmentation and Isolation: Dividing the IoT network into segments or zones and isolating critical devices or systems from less secure ones enhances network resilience. Implementing proper network segmentation, VLANs (Virtual Local Area Networks), or software-defined networking (SDN) enables effective control, containment, and mitigation of security incidents. DDoS attacks significantly threaten network resilience by overwhelming the network's resources and causing service disruption. Deploying robust DDoS protection measures, such as traffic filtering, rate limiting, and traffic diversion, helps mitigate the impact of such attacks and ensures network availability. Incident Response and Establishing comprehensive incident response and recovery plans specific to IoT network security incidents is crucial. These plans should outline clear procedures, roles, and responsibilities to efficiently respond to and recover from security breaches or disruptions, minimizing downtime and maintaining network resilience. In addition, regular penetration testing, vulnerability assessments, and network audits help identify weaknesses and vulnerabilities in the IoT network infrastructure. Promptly addressing these issues through patches, updates, and security configuration adjustments strengthens network resilience by proactively addressing potential security risks. By implementing these measures, organizations can enhance the resilience of their IoT networks, ensuring continuous operation, prompt threat detection, and effective response to security incidents. Network resilience plays a vital role in maintaining IoT systems' integrity, availability, and reliability in the face of evolving security challenges. 3. Top Trends in IoT Security 3.1 Zero Trust and AI Zero Trust is an emerging security concept that assumes no implicit trust towards devices or users, even if they are already inside the network perimeter. Implementing Zero Trust principles in IoT networks can help mitigate the risks associated with compromised devices and unauthorized access for IoT security. In order to bolster cybersecurity measures, adopting a zero trust approach. Effectively addressing cybersecurity challenges entails not merely technological solutions but a comprehensive organizational strategy rooted in cultural and policy frameworks. Emphasizing the zero trust concept underscores the importance of policy implementation throughout the entire organization, complementing technological measures. 3.2 Supply Chain Security The complex and interconnected nature of IoT supply chains introduces security risks. The supply chain for IoT devices involves multiple stages, including device manufacturing, software development, distribution, and deployment. Each stage presents potential security risks that can compromise the integrity and security of the IoT network. This includes adopting secure supply chain management practices, such as verifying the security practices of suppliers and manufacturers, and establishing clear security requirements and standards for the entire supply chain. Conducting third-party risk assessments helps evaluate the security posture of suppliers and vendors to identify any potential vulnerabilities or weaknesses. 3.3 Network Segmentation and Segregation In IoT security, minimizing the potential impact of a compromised IoT device is crucial, and network segmentation and segregation play a vital role in achieving this goal. Network segmentation involves dividing the network into separate zones or segments, based on factors such as device type, functionality, or security requirements. The containment strategy helps minimize the impact of a security breach by isolating compromised devices and preventing lateral movement within the network. 3.4 Over-the-Air (OTA) Updates Software updates play a critical role in maintaining the integrity and security of IoT devices. IoT devices frequently require updates to address software bugs, patch vulnerabilities, or introduce new features. Over-the-Air (OTA) update mechanisms are being enhanced with robust security measures to ensure the secure delivery and installation of updates. Code signing is a prevalent practice where updates are digitally signed with cryptographic keys to verify the authenticity and integrity of the software. Secure boot is another important mechanism that establishes a chain of trust during the device boot-up process, ensuring that only authorized and tamper-free software is loaded onto the device. 3.5 Device Authentication and Authorization The increasing number of IoT devices poses a significant challenge in ensuring secure and trusted authentication and authorization. Two-factor authentication (2FA), for example, adds an extra layer of protection by requiring users or devices to provide two separate forms of authentication, such as a password and a unique code sent to a mobile device. Digital certificates, on the other hand, enable secure and trusted device authentication by leveraging public key infrastructure (PKI) technology. Each IoT device is issued a unique digital certificate, which serves as a digital identity, allowing for secure communication and verification of device authenticity. 3.6 Software-defined Networking (SDN) Security Securing Software-defined Networking (SDN) environments is paramount to protect IoT deployments. SDN offers centralized control and management of network resources, providing flexibility and scalability. This ensures that only authorized entities can access and make changes to the SDN infrastructure, preventing unauthorized access and configuration changes. Additionally, continuous traffic monitoring and analysis enable the detection of suspicious activities and potential security breaches. Encryption IoT standards and protocols should be employed to secure communication between the SDN controller, switches, and IoT devices, safeguarding data privacy and integrity. Network segmentation within the SDN environment helps limit the impact of security breaches, reducing the attack surface. 3.7 Identity and Access Management (IAM) Implementing IAM solutions, such as role-based access control (RBAC) and multi-factor authentication (MFA), within IoT networks significantly enhances network security. IAM ensures that only authorized individuals can access and interact with IoT devices and systems. RBAC enables administrators to assign specific access privileges based on user roles and responsibilities, reducing the risk of unauthorized access. Additionally, incorporating MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a unique token or biometric verification. This significantly reduces the risk of unauthorized access even if a user's credentials are compromised. 4. Conclusion The technologies discussed in this article play a crucial role in enhancing IoT network security and resilience. By leveraging these technologies, organizations can mitigate the risks associated with IoT deployments, protect against cyber threats, and ensure the reliability and continuity of their IoT networks. As the IoT landscape evolves, staying up-to-date with these top technologies will be essential for organizations to maintain a robust and secure IoT infrastructure. The transformative landscape of Industry 4.0 demands strong network security in IoT environments. The top technologies discussed in this article empower organizations to enhance network resilience, protect against cyber threats, and ensure the uninterrupted functioning of IoT networks. Embracing these technologies and staying ahead of emerging threats, helps organizations build a secure foundation for their IoT deployments and capitalize on the vast opportunities offered by the IoT ecosystem.

Read More

Spotlight

TempoDB

TempoDB is the time series database service. We make it possible to store and instantly analyze the massive streams of measured data that break traditional databases. TempoDB was a member of the inaugural TechStars Cloud class of 2012, a startup accelerator focused on internet infrastructure.

Related News

Industrial IoT

Casa Systems Unveils New AurusXT 5G Industrial IoT Router Series Featuring the World’s First Dynamic Slicing Support

Casa Systems | January 10, 2024

Casa Systems (Nasdaq: CASA), provider of innovative access network solutions serving customers worldwide, today announced the launch of the first solution in its AurusXT 5G Industrial IoT (IIoT) Series, the NTC-500 5G IIoT router, which leverages the speed and coverage of a 5G network to provide high-speed Ethernet-to-cellular connectivity. Casa’s NTC-500 is the first 5G IIoT router to support dynamic network slicing capabilities, allowing operators to provide new and tailored services to their enterprise customers. Casa’s AurusXT Series will offer a range of 5G IIoT devices designed to deliver reliable connectivity to a broad range of both fixed and mobile use cases. The NTC-500 is the first of the AurusXT Series to disrupt the IIoT market with a cost-effective 5G IIoT Router that utilizes the speed and coverage of a 5G Sub-6 GHz network to deliver a fast and reliable connection to machines, equipment, and vehicles. Casa’s industry-first and proprietary 5G Dynamic Slicing Technology sets the NTC-500 apart from every other IIoT router on the market. Other 5G IIoT routers are limited to static slicing, forcing end users to endure labor- and time-intensive manual, on-site reconfigurations whenever they want to make a slicing change. Casa’s Dynamic Slicing Technology empowers mobile operators to unlock new revenue streams by allowing their customers to flexibly establish and rescind network priority on demand. “The proliferation of 5G networks coupled with the sunset of global 3G networks has created a groundswell of demand for 5G IIoT devices,” said Steve Collins, SVP of Access Devices, Casa Systems. “Our AurusXT Series is designed to deliver cost-effective 5G IIoT solutions that will address most use cases. With our dynamic network slicing capabilities, mobile operators will be able to unlock new revenue streams by offering tailored service plans to meet their enterprise customers’ individual requirements.” IIoT routers can be found in installations around the world – wherever Ethernet-to-cellular connectivity is in demand – from remote security cameras in industrial sites or on roadways, to digital signs in shopping malls or other public venues, to standalone ticketing and other vending machines, to anywhere an IIoT device in any industry needs wireless connectivity to transmit data. Enterprises facing the inescapable sunsetting of 3G technology now have a cost-effective and future-proof option for upgrading the hundreds, thousands, or even tens of thousands of IIoT routers within their domain. By opting to deploy Casa’s NTC-500, operators can bypass the adoption of 4G devices and minimize costly truck rolls to replace both 3G and 4G IIoT routers. The NTC-500 supports the latest 3GPP Release 16 features, including 5G Non-standalone (NSA) and 5G Standalone (SA) with failover to 4G LTE. This ensures it will not become obsolete when 4G technology phases out, minimizing the operational impact of updating hardware. The NTC-500 is compatible with both 4G and 5G, enabling customers to enjoy the benefits of 5G with the added assurance that existing 4G devices will deliver the best possible performance. Casa Systems is currently welcoming new resellers globally. Resellers or system integrators interested in becoming a Casa Systems IIoT device reseller are encouraged to contact Casa at https://www.casa-systems.com/. About Casa Systems Casa Systems, Inc. (Nasdaq: CASA) is a next-gen technology leader that supports mobile, cable, and wireline communications services providers with market leading solutions. Casa’s virtualized and cloud-native software solutions modernize operators’ network architectures, expand the range of services they can offer their consumer and commercial customers, accelerate time to revenue, and reduce the TCO of their network infrastructure and operations. Casa’s suite of open, cloud-native network solutions unlocks new ways for service providers to quickly build flexible networks and service offerings that maximize revenue-generating capabilities. Commercially deployed in more than 70 countries, Casa Systems serves over 475 Tier 1 and regional service providers worldwide. For more information, visit http://www.casa-systems.com/.

Read More

Industrial IoT

Ceva Extends its Connect IP Portfolio with Wi-Fi 7 Platform for High-End Consumer and Industrial IoT

Ceva, Inc. | January 05, 2024

Ceva, Inc. (NASDAQ: Ceva), the leading licensor of silicon and software IP that enables Smart Edge devices to connect, sense and infer data more reliably and efficiently, today announced the general release of its next generation RivieraWaves Wi-Fi 7 IP platform, further expanding its widely-licensed portfolio of connectivity IP, targeting high-end consumer and industrial applications including gateways, TVs, set-top-boxes, streaming media devices, AR/VR headsets, personal computing and smartphones. The RivieraWaves Wi-Fi 7 IP leverages all the latest advanced features of the IEEE 802.11be standard to deliver a premium high performance, cost- and power-optimized Wi-Fi solution for integration into the next wave of Wi-Fi Access Point (AP) and Station (STA) products. According to global technology intelligence firm ABI Research, annual Wi-Fi enabled chipset shipments will exceed 5.1 billion by 2028, with more than 1.7 billion of these chipsets supporting the Wi-Fi 7 standard. As Wi-Fi enabled device shipments continue to grow, increasing numbers of semiconductor companies and OEMs are choosing to integrate Wi-Fi connectivity into their chip designs, and need access to high quality Wi-Fi IP to reduce the development costs and risks. Spanning Wi-Fi 4/5/6 over the past decade, Ceva has already established a considerable leadership position in Wi-Fi IP licensing, with more than 40 licensees for its RivieraWaves Wi-Fi 6 IP family, serving a wide range of end markets and applications, from end points to access points, across the IoT sphere. Expanding on this leadership position, Ceva's RivieraWaves Wi-Fi 7 IP provides a unique, comprehensive 802.11be MAC and PHY solution for integration into the next generation of Wi-Fi SoC products. Andrew Zignani, Senior Research Director, ABI Research, commented: "Ceva's wireless connectivity IPs play an integral role in the proliferation of connectivity standards in the broad IoT markets, as is evident from their customer's success in shipping more than 1 billion connectivity chips annually. With the introduction of their RivieraWaves Wi-Fi 7 IP platforms, semiconductor companies and OEMs have a trusted partner to develop differentiated, high-performance Wi-Fi 7 chipsets for their connectivity roadmaps, with lower risk and a lower cost of ownership." Tal Shalev, Vice President and General Manager of the Wireless IoT BU at Ceva, stated: "The relentless expansion of Wi-Fi usage has pushed the Wi-Fi 7 standard to offer enhanced data throughput, improved latency and support more spectrum in the face of mounting network congestion. Achieving this requires highly complex, cutting-edge functionalities like 4K QAM modulation, Multi Link Operation and Multi Resource Unit to optimize link efficiency across the available bands. Our RivieraWaves Wi-Fi 7 IP platform incorporates all the features of this latest-generation, wireless standard, dramatically simplifying development and time-to-market for companies looking to add Wi-Fi 7 connectivity to their products." Wi-Fi 7's 4K QAM modulation scheme is a substantial increase on the previous 1K QAM of Wi-Fi 6, while Multi Link Operation (MLO) introduces dynamic channel aggregation, seamlessly combining heterogenous channels from the same or different bands to navigate interference and boost throughput. Similarly, Multi Resource Units (MRU) enables the creation of larger channel bandwidths by intelligently stitching together punctured or disjointed Resource Units within the same band. The outcome is not only a remarkable up to 5 times increase in raw speeds but also significantly reduced latency, thanks to diminished contentions and retries. About Ceva, Inc. At Ceva, we are passionate about bringing new levels of innovation to the smart edge. Our wireless communications, sensing and Edge AI technologies are at the heart of some of today's most advanced smart edge products. From Bluetooth connectivity, Wi-Fi, UWB and 5G platform IP for ubiquitous, robust communications, to scalable Edge AI NPU IPs, sensor fusion processors and embedded application software that make devices smarter, we have the broadest portfolio of IP to connect, sense and infer data more reliably and efficiently. We deliver differentiated solutions that combine outstanding performance at ultra-low power within a very small silicon footprint. Our goal is simple – to deliver the silicon and software IP to enable a smarter, safer, and more interconnected world. This philosophy is in practice today, with Ceva powering more than 17 billion of the world's most innovative smart edge products from AI-infused smartwatches, IoT devices and wearables to autonomous vehicles and 5G mobile networks. Our headquarters are in Rockville, Maryland with a global customer base supported by operations worldwide. Our employees are among the leading experts in their areas of specialty, consistently solving the most complex design challenges, enabling our customers to bring innovative smart edge products to market.

Read More

Industrial IoT

Energous and InPlay Launch Low Maintenance Wireless Sensors for IoT industrial Applications

Business Wire | September 27, 2023

Energous Corporation (NASDAQ: WATT), an industry leader in RF-based wireless power network solutions, has partnered with InPlay Inc., a fabless semiconductor company dedicated to engineering advanced low-power wireless communication technologies for the Industrial IoT market, to demonstrate a battery-free temperature and humidity IoT sensor solution. This innovation harnesses the strengths of Energous' PowerBridge technology and InPlay's cutting-edge Bluetooth low-energy beacon system. This solution has the potential to expand into multiple markets within the Industrial IoT ecosystem that Energous is currently focusing on. This collaborative endeavor aims to offer these industries a reliable, cost-effective, and energy-efficient sensor solution. As IoT expands, particularly within industrial applications, the need to retrofit costly sensor solutions becomes evident. By eliminating cables, removing disposable batteries, and cutting down maintenance costs, we can significantly reduce overall expenses and help deploy sensors at a much larger scale, stated Cesar Johnston, CEO of Energous. Our PowerBridge technology delivers consistent power to multiple devices simultaneously, offering greater design flexibility, waterproofing capabilities, and alleviating power-related challenges. “Energous PowerBridge technology enables wireless power transmission with minimal size and maximum power and cost efficiency,” said Jason Wu, CEO of InPlay. “Our InPlay NanoBeacon SoC solution benefits wireless sensors customers by providing ultra-low-cost, low-power and a programming free design where manufacturers are able to cut down on development costs and achieve a shorter time to market.” Energous and InPlay will be at the Wireless IoT Tomorrow in Wiesbaden (near Frankfurt airport), Germany from October 18-19, 2023. To schedule a demo at the event, please visit https://energous.com/schedule-a-demo/ or stop by the Energous booth #1 or the InPlay booth #6. About Energous Corporation Energous Corporation (NASDAQ: WATT) has been pioneering wireless charging over distance technology since 2012. Today, as the global leader in wireless charging over distance, its networks are safely and seamlessly powering its customers’ RF-based systems in a variety of industries, including retail, industrial, healthcare and more. Its total network solution is designed to support a variety of applications, including inventory and asset tracking, smart manufacturing, electronic shelf labels, IoT sensors, digital supply chain management, inventory management, loss prevention, patient/people tracking and sustainability initiatives. The number of industries and applications it serves is rapidly growing as it works to support the next generation of the IoT ecosystem.

Read More

Industrial IoT

Casa Systems Unveils New AurusXT 5G Industrial IoT Router Series Featuring the World’s First Dynamic Slicing Support

Casa Systems | January 10, 2024

Casa Systems (Nasdaq: CASA), provider of innovative access network solutions serving customers worldwide, today announced the launch of the first solution in its AurusXT 5G Industrial IoT (IIoT) Series, the NTC-500 5G IIoT router, which leverages the speed and coverage of a 5G network to provide high-speed Ethernet-to-cellular connectivity. Casa’s NTC-500 is the first 5G IIoT router to support dynamic network slicing capabilities, allowing operators to provide new and tailored services to their enterprise customers. Casa’s AurusXT Series will offer a range of 5G IIoT devices designed to deliver reliable connectivity to a broad range of both fixed and mobile use cases. The NTC-500 is the first of the AurusXT Series to disrupt the IIoT market with a cost-effective 5G IIoT Router that utilizes the speed and coverage of a 5G Sub-6 GHz network to deliver a fast and reliable connection to machines, equipment, and vehicles. Casa’s industry-first and proprietary 5G Dynamic Slicing Technology sets the NTC-500 apart from every other IIoT router on the market. Other 5G IIoT routers are limited to static slicing, forcing end users to endure labor- and time-intensive manual, on-site reconfigurations whenever they want to make a slicing change. Casa’s Dynamic Slicing Technology empowers mobile operators to unlock new revenue streams by allowing their customers to flexibly establish and rescind network priority on demand. “The proliferation of 5G networks coupled with the sunset of global 3G networks has created a groundswell of demand for 5G IIoT devices,” said Steve Collins, SVP of Access Devices, Casa Systems. “Our AurusXT Series is designed to deliver cost-effective 5G IIoT solutions that will address most use cases. With our dynamic network slicing capabilities, mobile operators will be able to unlock new revenue streams by offering tailored service plans to meet their enterprise customers’ individual requirements.” IIoT routers can be found in installations around the world – wherever Ethernet-to-cellular connectivity is in demand – from remote security cameras in industrial sites or on roadways, to digital signs in shopping malls or other public venues, to standalone ticketing and other vending machines, to anywhere an IIoT device in any industry needs wireless connectivity to transmit data. Enterprises facing the inescapable sunsetting of 3G technology now have a cost-effective and future-proof option for upgrading the hundreds, thousands, or even tens of thousands of IIoT routers within their domain. By opting to deploy Casa’s NTC-500, operators can bypass the adoption of 4G devices and minimize costly truck rolls to replace both 3G and 4G IIoT routers. The NTC-500 supports the latest 3GPP Release 16 features, including 5G Non-standalone (NSA) and 5G Standalone (SA) with failover to 4G LTE. This ensures it will not become obsolete when 4G technology phases out, minimizing the operational impact of updating hardware. The NTC-500 is compatible with both 4G and 5G, enabling customers to enjoy the benefits of 5G with the added assurance that existing 4G devices will deliver the best possible performance. Casa Systems is currently welcoming new resellers globally. Resellers or system integrators interested in becoming a Casa Systems IIoT device reseller are encouraged to contact Casa at https://www.casa-systems.com/. About Casa Systems Casa Systems, Inc. (Nasdaq: CASA) is a next-gen technology leader that supports mobile, cable, and wireline communications services providers with market leading solutions. Casa’s virtualized and cloud-native software solutions modernize operators’ network architectures, expand the range of services they can offer their consumer and commercial customers, accelerate time to revenue, and reduce the TCO of their network infrastructure and operations. Casa’s suite of open, cloud-native network solutions unlocks new ways for service providers to quickly build flexible networks and service offerings that maximize revenue-generating capabilities. Commercially deployed in more than 70 countries, Casa Systems serves over 475 Tier 1 and regional service providers worldwide. For more information, visit http://www.casa-systems.com/.

Read More

Industrial IoT

Ceva Extends its Connect IP Portfolio with Wi-Fi 7 Platform for High-End Consumer and Industrial IoT

Ceva, Inc. | January 05, 2024

Ceva, Inc. (NASDAQ: Ceva), the leading licensor of silicon and software IP that enables Smart Edge devices to connect, sense and infer data more reliably and efficiently, today announced the general release of its next generation RivieraWaves Wi-Fi 7 IP platform, further expanding its widely-licensed portfolio of connectivity IP, targeting high-end consumer and industrial applications including gateways, TVs, set-top-boxes, streaming media devices, AR/VR headsets, personal computing and smartphones. The RivieraWaves Wi-Fi 7 IP leverages all the latest advanced features of the IEEE 802.11be standard to deliver a premium high performance, cost- and power-optimized Wi-Fi solution for integration into the next wave of Wi-Fi Access Point (AP) and Station (STA) products. According to global technology intelligence firm ABI Research, annual Wi-Fi enabled chipset shipments will exceed 5.1 billion by 2028, with more than 1.7 billion of these chipsets supporting the Wi-Fi 7 standard. As Wi-Fi enabled device shipments continue to grow, increasing numbers of semiconductor companies and OEMs are choosing to integrate Wi-Fi connectivity into their chip designs, and need access to high quality Wi-Fi IP to reduce the development costs and risks. Spanning Wi-Fi 4/5/6 over the past decade, Ceva has already established a considerable leadership position in Wi-Fi IP licensing, with more than 40 licensees for its RivieraWaves Wi-Fi 6 IP family, serving a wide range of end markets and applications, from end points to access points, across the IoT sphere. Expanding on this leadership position, Ceva's RivieraWaves Wi-Fi 7 IP provides a unique, comprehensive 802.11be MAC and PHY solution for integration into the next generation of Wi-Fi SoC products. Andrew Zignani, Senior Research Director, ABI Research, commented: "Ceva's wireless connectivity IPs play an integral role in the proliferation of connectivity standards in the broad IoT markets, as is evident from their customer's success in shipping more than 1 billion connectivity chips annually. With the introduction of their RivieraWaves Wi-Fi 7 IP platforms, semiconductor companies and OEMs have a trusted partner to develop differentiated, high-performance Wi-Fi 7 chipsets for their connectivity roadmaps, with lower risk and a lower cost of ownership." Tal Shalev, Vice President and General Manager of the Wireless IoT BU at Ceva, stated: "The relentless expansion of Wi-Fi usage has pushed the Wi-Fi 7 standard to offer enhanced data throughput, improved latency and support more spectrum in the face of mounting network congestion. Achieving this requires highly complex, cutting-edge functionalities like 4K QAM modulation, Multi Link Operation and Multi Resource Unit to optimize link efficiency across the available bands. Our RivieraWaves Wi-Fi 7 IP platform incorporates all the features of this latest-generation, wireless standard, dramatically simplifying development and time-to-market for companies looking to add Wi-Fi 7 connectivity to their products." Wi-Fi 7's 4K QAM modulation scheme is a substantial increase on the previous 1K QAM of Wi-Fi 6, while Multi Link Operation (MLO) introduces dynamic channel aggregation, seamlessly combining heterogenous channels from the same or different bands to navigate interference and boost throughput. Similarly, Multi Resource Units (MRU) enables the creation of larger channel bandwidths by intelligently stitching together punctured or disjointed Resource Units within the same band. The outcome is not only a remarkable up to 5 times increase in raw speeds but also significantly reduced latency, thanks to diminished contentions and retries. About Ceva, Inc. At Ceva, we are passionate about bringing new levels of innovation to the smart edge. Our wireless communications, sensing and Edge AI technologies are at the heart of some of today's most advanced smart edge products. From Bluetooth connectivity, Wi-Fi, UWB and 5G platform IP for ubiquitous, robust communications, to scalable Edge AI NPU IPs, sensor fusion processors and embedded application software that make devices smarter, we have the broadest portfolio of IP to connect, sense and infer data more reliably and efficiently. We deliver differentiated solutions that combine outstanding performance at ultra-low power within a very small silicon footprint. Our goal is simple – to deliver the silicon and software IP to enable a smarter, safer, and more interconnected world. This philosophy is in practice today, with Ceva powering more than 17 billion of the world's most innovative smart edge products from AI-infused smartwatches, IoT devices and wearables to autonomous vehicles and 5G mobile networks. Our headquarters are in Rockville, Maryland with a global customer base supported by operations worldwide. Our employees are among the leading experts in their areas of specialty, consistently solving the most complex design challenges, enabling our customers to bring innovative smart edge products to market.

Read More

Industrial IoT

Energous and InPlay Launch Low Maintenance Wireless Sensors for IoT industrial Applications

Business Wire | September 27, 2023

Energous Corporation (NASDAQ: WATT), an industry leader in RF-based wireless power network solutions, has partnered with InPlay Inc., a fabless semiconductor company dedicated to engineering advanced low-power wireless communication technologies for the Industrial IoT market, to demonstrate a battery-free temperature and humidity IoT sensor solution. This innovation harnesses the strengths of Energous' PowerBridge technology and InPlay's cutting-edge Bluetooth low-energy beacon system. This solution has the potential to expand into multiple markets within the Industrial IoT ecosystem that Energous is currently focusing on. This collaborative endeavor aims to offer these industries a reliable, cost-effective, and energy-efficient sensor solution. As IoT expands, particularly within industrial applications, the need to retrofit costly sensor solutions becomes evident. By eliminating cables, removing disposable batteries, and cutting down maintenance costs, we can significantly reduce overall expenses and help deploy sensors at a much larger scale, stated Cesar Johnston, CEO of Energous. Our PowerBridge technology delivers consistent power to multiple devices simultaneously, offering greater design flexibility, waterproofing capabilities, and alleviating power-related challenges. “Energous PowerBridge technology enables wireless power transmission with minimal size and maximum power and cost efficiency,” said Jason Wu, CEO of InPlay. “Our InPlay NanoBeacon SoC solution benefits wireless sensors customers by providing ultra-low-cost, low-power and a programming free design where manufacturers are able to cut down on development costs and achieve a shorter time to market.” Energous and InPlay will be at the Wireless IoT Tomorrow in Wiesbaden (near Frankfurt airport), Germany from October 18-19, 2023. To schedule a demo at the event, please visit https://energous.com/schedule-a-demo/ or stop by the Energous booth #1 or the InPlay booth #6. About Energous Corporation Energous Corporation (NASDAQ: WATT) has been pioneering wireless charging over distance technology since 2012. Today, as the global leader in wireless charging over distance, its networks are safely and seamlessly powering its customers’ RF-based systems in a variety of industries, including retail, industrial, healthcare and more. Its total network solution is designed to support a variety of applications, including inventory and asset tracking, smart manufacturing, electronic shelf labels, IoT sensors, digital supply chain management, inventory management, loss prevention, patient/people tracking and sustainability initiatives. The number of industries and applications it serves is rapidly growing as it works to support the next generation of the IoT ecosystem.

Read More

Events