The First Mile of IoT™

2022-08-31
关注

What Is the First Mile of IoT?

For consumer internet access, bridging the last mile means stretching the cable from the curb to the house to link a customer to the web. It’s an image that evokes reaching out to make a final connection. Data and audiovisual content are sent from the cloud or servers to the network’s outer reaches.  

In the world of Smart X, which operates by “think digital first and absolutely connected” Internet of Things (IoT) enablement, it works in reverse. Everything starts at the edge, with the devices and the data they generate. That’s the First Mile of IoT, an area many IoT platform providers ignore or undervalue. 

It’s an essential puzzle piece. IoT promises better decision-making based on analytics applications. However, you can’t run actionable analytics if you are not networked with the edge device sourcing the business-critical information. IoT solution providers must architect the IoT network to collect and transmit data efficiently and securely from edge equipment to the cloud.  

Real-time communication (or near-real-time typical for low-power edge devices and sensors) with devices is crucial to effective management. In many cases, operators must establish gateways to enable data to travel securely from the edge IoT platform to third-party business systems. 

The First Mile is the beginning of a journey. Here’s a closer look at what that course entails. 

4 Steps to Get an IoT Implementation Live

1. Connecting and Securing Wireless Devices on the First Mile of IoT

The initial challenge is connecting and onboarding devices, such as: 

  • Small sensors  
  • Industrial machinery  
  • Trucks
  • Buildings  
  • Factories  

These devices could be linked physically to the network. Still, a flexible, scalable wireless connection can more readily deliver the promise of IoT digital transformation. 

Wireless IoT connections require layers of technology integration that can provide dependable connectivity, including:  

  • Enterprise-grade cellular modules  
  • SIMs
  • Data cards  

Today’s most secure modules are manufactured with individual identification and credentials, as well as embedded SIM (eSIM) functions. 

All that information is encrypted and stored inside each module at the hardware level, making it impossible to erase or change it. This sealed-in identification provides a deep level of security. Once the device is in place, network operators can remotely provision the module to begin operations. 

Secure boot is another device-level security function. It ensures the IoT provider that manufactured the module’s software originates and controls it. If a bad actor tries to hack in and modify the software, the module will automatically shut down and become unusable. 

Security features (e.g., module credentialing and secure boot) provide IoT managers with confidence that anything stored within the device, including software, can be trusted. 

2. Managing and Moving Devices and Data

IoT’s ever-growing plethora of data sources requires streamlined integration with many existing communication methods or protocols. There are many device types, data formats and business applications at play. Organizations must find ways to bridge the data divide and make devices and platforms interoperable. 

Data must be curated before it can cross the First Mile of IoT. Therefore, devices must be smart enough to transmit only actionable data when and where it’s needed. 

It requires edge intelligence to extract, transform and transfer the IoT data. Without this intelligence embedded in edge devices, organizations are strapped with massive wireless costs and inefficient operations.

Some IoT providers have introduced zero-touch onboarding to handle the complexities of device management. This feature allows companies to activate their devices and integrate them remotely with their existing platforms. Once devices are connected, a management app permits operators to view and control the edge devices’ key operating parameters and networking protocols.

This information includes:

  • Device activity
  • Carrier information
  • Signal data
  • Battery life status
  • Real-time operating data
  • Complications

They can also push down firmware updates from afar to ensure the latest security patches are in place upon release. 

Security at this level requires encryption of all communications in both directions. Modules that carry individual identification and credentials also contribute to the security level of data transfers. The IoT provider automatically recognizes their transmissions, providing additional protection against cyberattacks. 

3. Streamlined Integration

From sealed modules to encrypted data transmissions, security at the edge is essential. However, the journey is not complete when the data reaches a cloud environment. The IoT platform must be secure and allow seamless data movement into third-party business systems. 

The IoT platform should provide optimal protection against threats. Such protections include:  

  • Role-based security
  • Virtual private networks
  • Transport-layer security

Within a shared environment, it should keep each customer’s data sandboxed and secured from other customer data and the provider’s operations. 

If device data is heading for third-party analytics or cloud applications (e.g., AWS, Microsoft or Azure), then the platform should provide a way into those applications. Enterprise gateways create direct paths. Organizations can receive data from inside the IoT management platform and process it in their environment with other tools. 

Data types moving through the gateway could include:  

  • Device information (e.g., maintenance updates or connection status)
  • Data collected by the devices (e.g., sensor readings from an agricultural IoT deployment) 

4. Global Support and Connectivity

Many IoT devices are on the move or placed in remote areas, such as farm fields or inside shipping containers. Keeping those devices connected to a cellular network can present additional challenges. 

Today’s IoT native connectivity solution providers offer custom data plans with eSIM, localization and roaming. These solutions work seamlessly across different regions and networks worldwide. 

Devices equipped with these capabilities can stay online as they travel. Operators pay one fee for connectivity instead of multiple carriers with varying prices and agreement terms. Providers may also offer comprehensive connectivity management tools to enable connection provisioning and management across wireless networks. 

We’re with You from the First Mile of IoT to the Last

The First Mile may be the most crucial part of the IoT journey, but it doesn’t stop there. The entire ecosystem must be secure and reliable. This feat is best performed by an expert IoT provider with integrated product and service bundles.  

Telit delivers IoT hardware, software, management portals and tools that work stand-alone or seamlessly integrated. Experienced and new customers and IoT adopters can focus on their business vision, not the complex engineering of a high-performing First Mile. 

In summary, the First Mile of IoT requires a complete set of systems services, including:  

  • Device connection and management
  • Data orchestration
    • Collection and extraction  
    • Rationalization  
    • Transformation  
    • Evaluation and analysis
    • Integration 
    • Loading and visualization
  • Security  
  • Edge logic  
  • Enterprise integration

All these IoT systems services are prerequisites for successful IoT applications.  

Telit’s expert team is always available to provide advice. Our customers can tap into a global IoT ecosystem of device suppliers and system integrators. 

With over 22 years of industry experience, Telit can help and support you on your IoT journey.


Editor’s Note: This blog was originally published on 24 July 2019 and has since been updated.

参考译文
物联网第一英里™
对于消费者上网来说,连接最后一英里意味着把电缆从路边延伸到家里,把消费者连接到网络上。这是一个让人联想到最后联系的画面。数据和视听内容从云或服务器发送到网络的外部。在Smart X的世界中,它的运作方式是“先考虑数字,绝对连接”的物联网(IoT)实现,它的工作方式正好相反。 一切都从边缘开始,包括设备和它们产生的数据。这就是  物联网第一英里,许多 物联网平台 供应商忽略或低估了这一领域。这是一个重要的拼图。物联网提供了基于分析应用的更好的决策。但是,如果您没有与提供业务关键信息的边缘设备联网,就无法进行可操作的分析。物联网解决方案提供商必须构建物联网网络,以高效、安全地从边缘设备收集和传输数据到云端。与设备之间的实时通信(或低功率边缘设备和传感器的典型实时通信)对于有效管理至关重要。在许多情况下,运营商必须建立网关,使数据能够安全地从边缘物联网平台传输到第三方业务系统。第一英里是旅程的开始。让我们来仔细看看这门课程需要什么。最初的挑战是连接和安装设备,例如:这些设备可以物理地连接到网络上。尽管如此, 灵活、可伸缩的无线连接 可以更容易地交付物联网数字转型的承诺。无线物联网连接需要能够提供可靠连接的技术集成层,包括: 当今最安全的模块都是带有个人身份和凭证的,以及嵌入式SIM (eSIM)功能。所有这些信息都被加密并存储在硬件级别的每个模块中,因此不可能删除或更改。这种密封的身份证明提供了深层次的安全保障。一旦设备到位,网络操作员就可以远程提供模块,开始操作。安全引导是另一个设备级安全功能。它确保了制造模块软件的物联网供应商产生并控制它。如果有坏人试图入侵并修改软件,模块将自动关闭并变得不可用。安全特性(例如,模块认证和安全引导)为物联网管理人员提供了信心,相信设备中存储的任何东西,包括软件,都是可信的。物联网日益庞大的数据源需要与许多现有通信方法或协议进行简化集成。有许多设备类型、数据格式和业务应用程序在发挥作用。企业必须找到方法来弥合数据鸿沟,并使设备和平台可互操作。数据必须经过策划,才能跨越物联网的第一英里。因此,设备必须足够智能,只在需要的时间和地点传输可操作的数据。物联网数据的提取、转换和传输需要边缘智能。如果没有在边缘设备中嵌入这种智能,企业就会被大量的无线成本和低效的操作所束缚。一些物联网供应商引入了零接触入职,以处理设备管理的复杂性。该功能允许公司激活他们的设备,并将其与现有平台远程集成。一旦设备连接起来,一个管理应用程序允许操作员查看和控制边缘设备的关键运行参数和网络协议。这些信息包括:他们还可以从远处推送固件更新,以确保最新的安全补丁在发布时到位。 这个级别的安全性要求对双向的所有通信进行加密。携带个人身份和凭证的模块也有助于数据传输的安全级别。物联网供应商自动识别他们的传输,提供额外的保护,防止网络攻击。从密封模块到加密数据传输,边缘的安全至关重要。然而,当数据到达云环境时,这一旅程还没有结束。物联网平台必须是安全的,并允许数据无缝移动到第三方业务系统。物联网平台应该为应对威胁提供最佳保护。这样的保护包括:在共享环境中,应该对每个客户的数据进行沙箱处理,使其不受其他客户数据和提供商操作的影响。如果设备数据正流向第三方分析或云应用(如AWS、微软或Azure),那么该平台应该提供进入这些应用的途径。企业网关创建直连路径。组织可以从物联网管理平台内部接收数据,并在其环境中使用其他工具处理数据。通过网关移动的数据类型可能包括:许多IoT设备正在移动或放置在偏远地区,如农场或集装箱内。让这些设备连接到蜂窝网络会带来额外的挑战。如今的IoT原生连接解决方案提供商提供eSIM、本地化和漫游的定制数据计划。这些解决方案在世界各地的不同地区和网络上无缝工作。具备这些功能的设备可以在旅行时保持在线。运营商为连接支付一笔费用,而不是多家运营商支付不同价格和协议条款的费用。提供商还可以提供全面的连接管理工具,以实现跨无线网络的连接供应和管理。第一英里可能是物联网旅程中最关键的部分,但它不止于此。整个生态系统必须是安全可靠的。这一壮举最好由具有集成产品和服务包的专家物联网供应商完成。Telit提供独立或无缝集成的物联网硬件、软件、管理门户和工具。有经验的新客户和物联网采用者可以专注于他们的业务愿景,而不是高性能第一英里的复杂工程。综上所述,物联网第一英里需要一套完整的系统服务,包括:所有这些物联网系统服务是物联网应用成功的先决条件。泰利特的专家团队随时为您提供建议。我们的客户可以进入由设备供应商和系统集成商组成的全球物联网生态系统。凭借超过22年的行业经验,Telit可以帮助和支持您的物联网之旅。编者注:本博客最初发布于2019年7月24日,并已进行更新。
  • en
您觉得本篇内容如何
评分

相关产品

EN 650 & EN 650.3 观察窗

EN 650.3 version is for use with fluids containing alcohol.

Acromag 966EN 温度信号调节器

这些模块为多达6个输入通道提供了一个独立的以太网接口。多量程输入接收来自各种传感器和设备的信号。高分辨率,低噪音,A/D转换器提供高精度和可靠性。三路隔离进一步提高了系统性能。,两种以太网协议可用。选择Ethernet Modbus TCP\/IP或Ethernet\/IP。,i2o功能仅在6通道以太网Modbus TCP\/IP模块上可用。,功能

雷克兰 EN15F 其他

品牌;雷克兰 型号; EN15F 功能;防化学 名称;防化手套

Honeywell USA CSLA2EN 电流传感器

CSLA系列感应模拟电流传感器集成了SS490系列线性霍尔效应传感器集成电路。该传感元件组装在印刷电路板安装外壳中。这种住房有四种配置。正常安装是用0.375英寸4-40螺钉和方螺母(没有提供)插入外壳或6-20自攻螺钉。所述传感器、磁通收集器和壳体的组合包括所述支架组件。这些传感器是比例测量的。

TMP Pro Distribution C012EN RF 音频麦克风

C012E射频从上到下由实心黄铜制成,非常适合于要求音质的极端环境,具有非常坚固的外壳。内置的幻像电源模块具有完全的射频保护,以防止在800 Mhz-1.2 Ghz频段工作的GSM设备的干扰。极性模式:心形频率响应:50赫兹-18千赫灵敏度:-47dB+\/-3dB@1千赫

ValueTronics DLRO200-EN 毫欧表

"The DLRO200-EN ducter ohmmeter is a dlro from Megger."

评论

您需要登录才可以回复|注册

提交评论

提取码
复制提取码
点击跳转至百度网盘