Beruflich Dokumente
Kultur Dokumente
Markets Research
Industry Date
6 May 2014
The Internet of
Things North America
United States
TMT
Brian Modoff
Research Analyst
(+1) 415 617-4237
brian.modoff@db.com
________________________________________________________________________________________________________________
Deutsche Bank Securities Inc.
Deutsche Bank does and seeks to do business with companies covered in its research reports. Thus, investors should
be aware that the firm may have a conflict of interest that could affect the objectivity of this report. Investors should
consider this report as only a single factor in making their investment decision. DISCLOSURES AND ANALYST
CERTIFICATIONS ARE LOCATED IN APPENDIX 1. MCI (P) 148/04/2014.
Deutsche Bank
Markets Research
Brian Modoff
to look brian.modoff@db.com
Internet of Things (IOT) is a big idea but promise and reality are a distance apart Vijay Bhagavath, Ph.D
IOT is a set of multi-year secular growth themes in our view impacting every Research Analyst
player in our universe. IOT has the potential for unlocking Trillions of dollars of (+1) 415 617-3324
value – through structural improvements in operational efficiencies in every vijay.bhagavath@db.com
industry sector. Early stage IOT initiatives in Smart Energy, Smart Retail, Cyber
Security are the basis for our conviction on a long-tail positive impact to select Kip Clifton, CFA
players in our universe. But significant work lies ahead to make the promise a
Research Associate
reality. It is our view that the ultimate goal of IOT is a ways off and may not
(+1) 415 617-4247
have a significant impact on unit volumes of connected things until 2016. Still,
kip.clifton@db.com
we believe IOT is the biggest shift to hit our industry since the internet itself.
Near-term opportunities include Top picks
We highlight three themes – Network Intelligence and Security, Edge Clouds
Qualcomm (QCOM.OQ),USD78.99 Buy
and Datacenter Clouds, which form the basis for building a new generation of
Commscope (COMM.OQ),USD27.84 Buy
infrastructure for implementing “Internet of Things” use cases. IOT
infrastructure rollouts are an incremental +$2B a year capex opportunity in our Cisco Systems (CSCO.OQ),USD22.94 Hold
view (above and beyond the +$47B a year networking IT spend) and could be F5 Networks (FFIV.OQ),USD103.72 Buy
basis for upside to the CY16+ consensus view for select IT vendors. Source: Deutsche Bank
________________________________________________________________________________________________________________
Deutsche Bank Securities Inc.
Deutsche Bank does and seeks to do business with companies covered in its research reports. Thus, investors should
be aware that the firm may have a conflict of interest that could affect the objectivity of this report. Investors should
consider this report as only a single factor in making their investment decision. DISCLOSURES AND ANALYST
CERTIFICATIONS ARE LOCATED IN APPENDIX 1. MCI (P) 148/04/2014.
6 May 2014
TMT
The Internet of Things
Table Of Contents
Executive Summary............................................................. 4
Companies: ........................................................................................................... 7
Security ............................................................................. 37
APIs ................................................................................... 40
Middleware ......................................................................................................... 45
Table of Exhibits
Figure 1: Hype versus Reality ............................................................................................. 5
Figure 2: IOT unit forecasts ................................................................................................ 5
Figure 3: Current IOT use cases ......................................................................................... 5
Figure 4: Places to invest ................................................................................................... 5
Figure 5: Internet of Things – A Big Picture View ............................................................. 12
Figure 6: Potential operational efficiency savings from representative Internet of Things
industrial use cases (based on GE IOT Study Data) .......................................................... 13
Figure 7: Contrasting Legacy Datacenter and IOT Edge Cloud / Datacenter Cloud
architectural approaches .................................................................................................. 15
Figure 8: Key Edge Cloud feature-functions (e.g. Cisco ISR 819 series, OEM enterprise
edge routers, etc.) ............................................................................................................ 16
Figure 9: Key Datacenter Cloud infrastructure layers ....................................................... 19
Figure 10: Conceptual view of an IOT Datacenter Cloud – illustrating the Information
Technology (IT) and Operational Technology (OT) infrastructure elements...................... 21
Figure 11: Layers of a generic oneM2M architecture....................................................... 23
Figure 12: Architecture proposed by IOT-A ...................................................................... 24
Figure 13: WSNs market traction as sensor costs decrease ............................................ 25
Figure 14: Tracy and Sreenan architecture....................................................................... 27
Figure 15: Managing disparate devices/services and transport layers ............................. 28
Figure 16: Members of AllSeen Alliance .......................................................................... 30
Figure 17: MQTT machine-to-machine communication ................................................... 32
Figure 18: Abstract layering of CoAP ............................................................................... 33
Figure 19: Architecture of a CoAP-based wireless sensor network.................................. 33
Figure 20: 6LowPAN enables IPv6 over low power WSNs .............................................. 35
Figure 21: Google maps via Verizon’s website ................................................................. 41
Figure 22: Directions to store via Google maps ............................................................... 41
Figure 23: Mashups make it relatively easy to combine applications .............................. 42
Figure 24: Sensor middleware, gateway and API management....................................... 44
Figure 25: Enabling interoperability via APIs .................................................................... 44
Figure 26: Gartner Magic Quadrant .................................................................................. 45
Figure 27: ThingWorx Application development platform................................................ 49
Figure 28: Qualcomm’s IOT development platform ......................................................... 51
Figure 29: Broadcom WICED module .............................................................................. 52
Figure 30: Arduino microcontroller board ........................................................................ 53
Figure 31: Galileo board ................................................................................................... 53
Figure 32: IOT brings value to businesses, consumers and assets .................................. 54
Figure 33: Ericsson Device Connection Platform – general deployment .......................... 55
Figure 34: Gateways in the context of IOT ....................................................................... 56
Figure 35: DRX cycle effect on battery life ....................................................................... 57
Figure 36: A partial list of sensor use cases ..................................................................... 59
Figure 37: Radio technology range and bit-rate ............................................................... 62
Figure 38: 2013 Worldwide Big Data Revenue by Vendor ($ mlns).................................. 64
Figure 39: How IOT will effect the Big Data landscape .................................................... 65
Figure 40: Stream processing enables real-time response ............................................... 66
Figure 41: iTRACS DCIM to optimize data center for stream processing ......................... 67
Figure 42: The path to increased investment in DCIM ..................................................... 68
Figure 43: Industry data summary on CY15 network equipment capex spending
[Infonetics] and DB view of incremental network infrastructure spending on IOT use
cases ................................................................................................................................ 69
Figure 44: Illustration of IOT Cyber Security network architecture .................................. 71
Figure 45: Illustration of key IT stacks involved in implementing an IOT Cyber Security
architecture ...................................................................................................................... 74
Figure 46: Conceptual view of an IOT architecture to support a Smart Energy use case. 75
Figure 47: Conceptual view of relevant IT stacks involved in the Smart Energy use case 76
Figure 48: Conceptual view of an IOT architecture to support a Smart Retail use case ... 79
Figure 49: Conceptual view of relevant IT stacks involved in Smart Retail use case ....... 80
Figure 50: Qualcomm’s IOT initiatives.............................................................................. 81
Figure 51: GSMA unit estimates for the connected car ................................................... 81
Figure 52: Unit cellular estimates for the connected home .............................................. 82
Executive Summary
"A global network infrastructure, linking physical and virtual objects through the
exploitation of data capture and communication capabilities. This infrastructure
includes existing and involving Internet and network developments. It will offer
specific object-identification, sensor and connection capability as the basis for
the development of independent cooperative services and applications. These
will be characterized by a high degree of autonomous data capture, event
transfer, network connectivity and interoperability." – The CASAGRAS report
2011
The above quotation is one for the more succinct descriptions of what the
Internet of Things (IOT) is proposed to be. As to how this translates into units Our thesis differs from most:
and dollars, ideas begin to differ among third-party data providers, industry We believe the IOT, as it is
bodies, companies and people. While almost everyone agrees that the benefits described in the ideal sense
will be significant, the target beneficiaries and when they are affected is a above, is a ways off, likely not
constant debate among pundits. The most noise is made by companies having a significant impact on
themselves, proclaiming that IOT will have a huge impact to their bottom lines unit volumes until 2016 at the
and that this impact is right around the corner. Our thesis differs from most. earliest
We believe that IOT, as it is described in the ideal sense above, is a ways off,
and may not have a significant impact on unit volumes until 2016 at the
earliest. There are a number of challenges around architecture, protocols and
security, all of which need to be addressed before IOT reaches the tipping
point of critical mass adoption. However, despite this time lag, we believe
there are areas of incremental growth which can be exploited now as
companies are winning in these “smart silos,” places like the connected car,
smart home and the smart grid. We walk through the impact of these There are a number of
investments, but only as it relates to the companies in wireless and data challenges around
networking universe. architecture, protocols and
security, all of which need to
This research note doubles as a primer on IOT. We walk through all elements
be addressed before IOT
of IOT from the architectures and protocols being considered to security and
reaches the tipping point of
big data challenges. All of this is discussed with the beginner in mind, so that
critical mass adoption
investors come away with a holistic view of the challenges that remain but
also a sense of the possibilities both in the near term and in the future. It is
within this framework that we conclude the note with a company exposure list
and highlight those names which we believe have the best exposure, and
those with a foothold into the likely winning platforms of the future.
If we place ourselves at the dotted line, unit volumes are still a ways off and
we are in the midst of a considerable hype cycle. Still, we believe there are Still, we believe there are
places to invest, as there are companies seeing meaningful sales within the places to invest…
realm of IOT. These are often areas where the environment is contained,
disparate protocols need not be leveraged, the overall architecture has been …these are often areas where
decided upon and security is less of an issue; targeted industries like the ones the environment is contained,
mentioned to the right, with some having a greater traction than others (e.g. disparate protocols need not
fitness having greater traction than medical given privacy issues), are the value
be leveraged, the overall
creators within the current IOT. Eventually every industry will leverage IOT to
architecture has been decided
realize efficiencies, and this will have a profound effect not just on unit sales,
upon and security is less of an
but services as well. Our goal with this paper is not to focus on the dreams of
issue
what could be but rather on what can be done with the current tool sets and
provide a framework to help investors find companies within the circle below.
Areas such as asset tracking, shipping, home automation and smart cars
leverage the current wireless infrastructure and will increase their reliance on
such connections in the future. Even though most of the “things” we think
about are connecting to the IOT using close connections over unlicensed –
such as Bluetooth, WLAN, NFC – the data from these “things” will eventually
flow back to the network, where they will be analyzed and managed. This
means that the connections themselves, whether wireless or wired, need to be
ready for this data deluge and we believe that most networks around the world
are not to ready to support this sort of traffic in a reliable fashion.
However, challenges still remain. We walk through the challenges associated In a sense, IOT is different
with every element of IOT from the architecture down to Big Data and from every other, emerging
analytics. In a sense, IOT is different from every other emerging technology. technology. With the Internet,
With the Internet, there was one protocol and developers were able to build to
there was one protocol and
that. With cellular technology, a standard body now helps to oversee where
many were able to build to
the standard goes and everyone builds to that. IOT does not yet have such a
that.
body and every smart silo is building in a different direction, often with little
thought to how integration efforts might go. Given this difference, we discuss
where the standards might go, which platforms have the early foothold and
what architecture seems most appealing.
Our investment thesis centers on names that are being impacted now and will Our investment thesis centers
see this impact accelerate along with the adoption of IOT. On the Wireless on names that are being
side: Qualcomm, CommScope, Audience, Aruba, Ruckus and Ubiquiti. On the impacted now and will see
Data Networking side: Cisco, F5 Networks, Ciena, Cavium, Juniper, Infoblox,
this impact accelerate with
Ixia and Riverbed.
the adoption of IOT.
Companies:
Qualcomm
Qualcomm has been positioning IOT as the growth driver for the company
since cellular wireless technology first gained traction. The company started
with Omnitracs, a platform for truck fleet management, and then branched out
into a number of IOT initiatives. It developed the AllJoyn protocol, which is
now overseen by the Linux foundation and has more partners and contributors
than any other protocol platform being considered.
Cisco
The basis for our constructive view on Cisco in the IOT infrastructure
opportunity in the out quarters (2H15+) is: 1. Cisco is viewed as a thought
leader in IOT (we note CEO keynotes on IOT at major trade shows) in IT circles
and has an IOT focused cross business unit product team. 2. Cisco has the
broadest set of touch points in enterprise and service provider infrastructure
and a broad portfolio of IT services from campus to the core. 3. Cisco’s IOT
opportunity in 2H15+, given our view that the company has the set up, from a
product portfolio, customer base, market share and sales execution POV, for
offering a packaged bundle of IOT solutions involving millions of smart objects
(i.e. Internet connected wireless sensors) connecting to an Edge Cloud. 4. The
stock could be a potential margin improvement and earnings growth story in
CY15+, if the company gradually exits from several slower growth and focuses
on higher margin “software” and “advanced services” opportunities in Private
Clouds, Telco Clouds and Internet of Things (refer to our recent CSCO Growth
Strategy note.
Our Hold rating on Cisco reflects our near-term caution on the company’s core
business (switching and routing in product transition mode), while remaining
constructive on CY16+ opportunities in IOT and product refresh cycles in
datacenter switching, security, carrier routing, among others.
CommScope
The Wireless business segment has been a key driver for CommScope’s
overall top-line. While there is nothing specific in Wireless that falls within IOT
per se, its DAS solution will be a key enabler of IOT, as it puts the cellular
network closer to the user. The company has made some interesting
acquisitions in the Enterprise segment, mainly within the vein of IOT –
Redwood Systems, an intelligent lighting company and iTRACs, a data center
infrastructure management platform. The two companies were acquired when
CommScope was held privately. We discuss both of these, as well as other
segments in our report. In short, the trends in IOT will impact Wireless and
Enterprise segments. While Wireless has the general trend of densification
working in its favor, it is likely the Enterprise segment will be impacted
relatively more by IOT.
F5 Networks
Buy-rated F5 is our top midcap idea to play the near-term [CY15/16+] spending
on IOT – given our research noting that Network Intelligence and Security are a
Phase 1 priority in the multi-year rollout of IOT use cases in enterprise and
service provider verticals.
A third of the +$2B in incremental networking capex a year (DB view) on IOT
use cases could be utilized for Network Intelligence and Security solutions (we
note: Layer 4/7 capex is typically a third of datacenter networking capex). This
is basis for our view that the Layer 4/7 category leaders (FFIV; BLOX, etc) could
see modest TAM expansion in the $100s of Millions a year range from
enterprise IOT use cases such as Industrial Cyber Security, Smart Energy,
Smart Retail, etc and also service provider IOT use cases such as e-Healthcare,
home automation, etc in the out quarters.
Ciena
Buy-rated Ciena could benefit from sales of higher margin optical Ethernet
access products and optical network automation software tools to support IOT
Edge Cloud buildouts. We also note opportunities for Ciena’s Carrier Ethernet
solution and optical network management software tools in the Smart Energy
use case. Undersea cable – carrying optical Ethernet data traffic – is a relevant
use case for sales of Ciena’s carrier Ethernet switches at either ends of the
offshore and onshore optical WAN links. Ciena’s optical network management
SW could be used to dynamically provision optical network transport
equipment at either ends of an optical fiber link.
Infoblox
Infoblox – a market leader in DNS and IP Address Management [IPAM]
solutions – could secularly benefit from the IT spending on IP Address
Automation and DNS Security – needed for implementing “Cloud-scale”
Internet architectures in the Edge Cloud and Datacenter Cloud – two key
themes of our FITT. We have a long view on Infoblox – noting that the
company’s IP Address Automation (DNS, DHCP, IP Address Management;
collectively IPAM) opportunity could meaningfully scale from – the current
+25M enterprise application server IPAM opportunity [refer to our BLOX
coverage initiation note for further color] to potentially offering IPAM
capabilities for 100s of Millions of Internet Connected Objects in key enterprise
and service provider IOT use cases.
Juniper
We are cautious on Hold-rated Juniper in IOT networking buildouts. Juniper, in
our view, lacks a competitive best-in-class Enterprise Edge Cloud and
Datacenter Leaf and Spine Cloud switching portfolio.
We see a limited role for Juniper in the access segments of IOT use cases, i.e.
in WiFi, campus switching or in campus and branch security. Our cautious
view is based on Juniper’s low single-digit market share in enterprise
networking and lack of meaningful competitive advantage versus market
leader Cisco across a wide range of IOT enterprise networking segments.
Riverbed
Hold-rated Riverbed could modestly benefit from enterprise IOT use cases in
CY15/16+, primarily in network performance monitoring by leveraging
Riverbed’s Cascade product portfolio. That said, we remain cautious on
Cavium
While current levels suggest a neutral risk/reward equation – basis for our Hold
rating – given, stock trading at ~25x P/E for ~20% consensus CY15 rev growth
expectation, we have a constructive longer-term view on Cavium’s new multi-
core processors: specifically, Octeon3, Liquid IO and Neuron TCAM chips –
which are relevant for IOT enterprise and service provider use cases.
Ubiquiti
Ubiquiti is able to proliferate a number of markets quickly, given its low-cost While we believe the devices
and global network of distributors. Most investors know the company for its to have meaningful utility,
airMax and Unifi product lines; however, it has three other platforms – their channel and end-
airVision, mFi and EdgeMax. mFi is Ubqiuiti’s foray into machine-to-machine
customer (as it stands today)
communication. The mFi platform includes everything from smart power strips
may not create the necessary
to sensors (motion, light, temperature and doors). While we believe the devices
demand to make this platform
to have meaningful utility, their channel and end-customer (as it stands today)
may not create the necessary demand to make this platform a significant a significant contributor to the
contributor to the top line. However, if consumers could install these devices top line.
easily and that they were available in known retail locations, we believe that
the traction would be much more significant. As it stands, we see it more as a
hobby of a WISP operator or other tech savvy people.
Audience
Audience is known for its audio and voice processors. But it could make an
inroad into IOT with its Voice Q and Motion Q technologies that are based on
voice and motion recognition, helping devices to wake up and sleep, and
thereby efficiently managing battery life. The company recently released the
demo versions of the processor at the Consumer Electronics Show and the
Mobile World Congress. The processor will be integrated into the company’s
eS700 series, which will be shipped in the second half of this year. While the
processor may gain initial traction in smartphones, it could also be used in
remote controls, wearables, fitness and health devices, mobile computers and
other battery powered devices. Going back to our original thesis, while we
believe that it will be some time before this type of processing capability sees
significant growth, we believe that it will be eventually included in adjacent
markets and Audience could see meaningful upside.
Ixia
Hold-rated Ixia will modestly benefit in enterprise and carrier IOT use cases in
the out quarters, in the areas of network visibility and Layer 2/7 network
equipment port monitoring, leveraging its Anue acquisition.
IOT Vision
We view the Internet of Things as much more than a 2.0 remake of the
Internet.
In our view, the accurate definition of Internet of Things is a “networked” Internet of Things is a
interconnection of people, business processes, data and things. In contrast, “networked” interconnection
the Internet is mainly an interconnection of computing devices and of people, business
applications.
processes, data and things
Internet of Things use cases span a broad range of industry sectors from
enterprise opportunities in smart manufacturing, energy, transportation and
retail to public sector programs in smart traffic and city services and mass-
market initiatives in e-health and home automation. We note +$19 Trillion of IOT
economic value creation
In Figure 5, we note +$19 Trillion of economic value creation potential and +25 potential and +25 Billion
Billion Internet connected devices, according to a recent Cisco IOT study. Internet connected devices
Private Sector
Public Sector
+$14.4T Value at Stake
+$4.6T Value at Stake
Smart Manufacturing (27% of value)
Smart Retail (11%) Smart Connected Cities
Information Services (9%) Opex Efficiencies in Govt Agencies
Financial Services (9%) Connected Defense
Healthcare, Prof. Services, Business Citizen Experiences
Management, Education, Wholesale, etc Employee Productivity Improvement
(~44%)
Source: Deutsche Bank and Cisco IOT Study Data [bottom-up analysis of 21 private sector and 40 public sector use cases; www.cisco.com
Our vision of IOT is not an abstract futuristic vision. Instead, our thematic view Our view of IOT is grounded
of IOT is grounded in the economic value creation potential of Internet of in the economic value
Things which in our view drives the capex and people investment in Fortune creation potential of Internet
500 enterprises for implementing mainstream IOT use cases in healthcare,
of Things – which in our view
connected transportation, oil and gas, smart manufacturing, smart retail, etc.
drives the capex and people
investment for implementing
A case in point is a recent GE IOT research study which notes that a modest
1% improvement in operational efficiency metrics in key industries such as mainstream IOT use cases
aviation, energy, transportation and logistics and healthcare could drive a
potential $276B in opex savings over the next 15 years (see Figure 6).
Figure 6: Potential operational efficiency savings from representative Internet of Things industrial use cases (based on
GE IOT Study Data)
1% improvement in +$63B
Smart Healthcare operational efficiency
At a bigger picture level, a recent Cisco IOT study notes +$19 Trillion in value
at stake that could be created from public and private sector enterprises
leveraging Internet based interconnections among people, processes, data,
and physical objects – i.e. the “Internet of Things” – to generate structural
improvements in productivity, cost savings and user experience.
Figure 7: Contrasting Legacy Datacenter and IOT Edge Cloud / Datacenter Cloud architectural approaches
Assumes Variable-Latency;
Variable BW Network Link
The Edge Cloud node also aggregates sensor data from multiple Internet The Edge Cloud node
connected physical objects for post processing in a Datacenter Cloud. aggregates data from multiple
Internet connected physical
Figure 8: Key Edge Cloud feature-functions (e.g. Cisco ISR 819 series, OEM objects for post processing in
enterprise edge routers, etc.) a Datacenter Cloud
While Cisco is the market leader in enterprise routing with +75% market share
Infonetics), our research suggests that the primary competition for Cisco’s ISR
819 router in IOT Edge Cloud deployments is likely to be from HP (MSR series),
especially for the enterprise IOT use cases.
Cisco’s ISR 819 router (and the branded enterprise routers, in general) is also
likely to see growing competition from unbranded ODM enterprise routers
which are customized Edge Cloud Nodes, optimized for a specific IOT use case
and built using merchant silicon to implement lower-end (1G or lower) layer
2/3 switching, routing and network management features, in addition to the
best in class wireline + wireless access.
Note that the Cisco ISR Edge Cloud Node (and other branded vendor products
such as HP’s MSR node) can support IOT objects that are in motion or
nomadic within a local area with telemetry data from the sensors aggregated
and processed via 4G/LTE or WiFi access. Cisco’s ISR node also supports
Mobile IP protocols to dynamically build and manage IP routed networks
among wireless sensor objects.
As we head into CY15+, when the early set of IOT use cases in enterprise and
service provider verticals would start scaling to 1000s of IOT objects, we see
the role for an interconnection of Edge Cloud Nodes which we term as the
Edge Cloud Layer.
The Edge Cloud Layer has a meaningful value proposition in scale-out IOT use
cases involving tens of 1000s of Internet connected objects connected to
1000s of Edge Cloud Nodes.
For example: we see the Edge Cloud Layer ensuring security and IT policy
coordination across multiple Edge Cloud Nodes (i.e. enterprise edge routers).
The Edge Cloud Layer is ideal for ensuring that security patches and IT rules
are applied consistently across Edge Cloud Nodes in order to avoid
configuration mismatches among Edge Cloud Nodes (which are often the root
cause of network outages, security breaches and performance issues).
In the IOT Themes chapter, we discuss a key set of IOT use cases that leverage
the Edge Cloud Node and a networked interconnection of Edge Cloud Nodes
to implement low-latency and localized compute, networking and storage
capabilities.
A Smart Retail use case would involve inventory levels collected from
1000s of product SKUs from retail point of sale locations being
aggregated and processed in centralized servers and database
engines for subsequent notifications to global supply chain partners,
warehouses, etc.
The IOT Themes section discusses a set of use cases which require a
coordinated combination of Edge Cloud and Datacenter Cloud capabilities to
implement large-scale IOT use cases in enterprise and service provider
environments.
X-raying into a typical IOT Datacenter Cloud infrastructure, we note a key set
of networking layers (see Figure 9):
Networking SW Tools
A Leaf and Spine based Datacenter Cloud can scale to support 10s of
1000s of application servers which is adequate to support a majority
of IOT use cases in large enterprise and service provider networks.
For example: using Cisco’s ACI Fabric, an IOT application running Big
Data Analytics in a Datacenter Cloud – based on raw data generated
from 10s of 1000s of wireless sensor end-points – could leverage the
ACI Fabric to ensure that raw data from the sensor end-points reach
the Analytics application servers in a time-sensitive manner.
3. Datacenter Clouds are ideal for running Layer 4/7 network intelligence
and security features that can be consumed by IOT end-points as
Cloud services. Examples of Layer 4/7 feature-functions that can be
delivered to IOT end-points as Cloud services are: Application and
Network Firewalling; Web Traffic Steering; Per-Session IT Policy and
Bandwidth Enforcement, Billing Metrics, etc.
While use cases such as security processing (SSL Offload) are likely to
require HW optimized vendor platforms, an increasing number of
Layer 4/7 feature functions are likely to be implemented as virtualized
SW modules running on industry standard servers in our view.
Fortune 500 enterprise IOT use cases are more likely to use
performance-optimized HW platforms for running Layer 4/7 features,
given their ruggedized form-factors (e.g. flame, temperature range and
electrostatic hazards tolerance, etc) and their relevance in industrial IT
environments.
Figure 10: Conceptual view of an IOT Datacenter Cloud – illustrating the Information Technology (IT) and Operational
Technology (OT) infrastructure elements
Leaf/Spine
Cloud Scale
Network
Server Racks
with Virtualized
Workloads
(e.g. Cisco,
HP, Dell…)
SCADA, etc
Architecture
The current IOT landscape is characterized by the presence of purpose-built
applications operating on a network architecture designed (almost exclusively)
for the application. As IOT systems progress, they will need to integrate with
other systems and this is where the key challenges remain. Currently, these
applications operate in silos; they have a distinct architecture that does not
lend itself to inter-system communication and operation.
A major issue is the presence of numerous protocols, developed to run specific A major issue is the presence
applications, which makes application integration and their respective of numerous protocols,
architectures inadequate and complex. developed to run specific
applications, which makes
To achieve the scale and level of integration that IOT requires, it will first need
application integration and
a common foundation from which to build sub-architectures – a common set
their respective architectures
of building blocks for developing system architecture will ensure a high level of
interoperability at various levels. Given what is at stake, and every vendor’s inadequate and complex.
partial view to one platform or another, the acceptance of a common
architecture is crucial and likely only possible if done from an objective, third-
party perspective.
oneM2M
Seven global SDOs which publish telecom standards came together to form
oneM2M in July 2012. The participants were: Association of Radio Industries
and Businesses (ARIB); Telecommunication Technology Committee (TTC) of
Japan; Alliance for Telecommunications Industry Solutions (ATIS);
Telecommunications Industry Association (TIA) of the USA; the China
Communications Standards Association (CCSA); the European
Telecommunications Standards Institute (ETSI); and the Telecommunications
Technology Association (TTA) of Korea.
Their overarching objective is to develop specifications to ensure global The specifications developed
functionality of systems and minimize fragmentation of M2M and IOT by oneM2M will serve as a
architectures. Recently, oneM2M announced that it will publish its first release common structural design for
of standards in August. The specifications developed by oneM2M will serve as
networks and systems to run
a common structural design for networks and systems to run a broad set of
a broad set of applications
applications. The oneM2M architecture intends to develop a common service
layer that facilitates interoperability between sensor/device networks and
cloud‐based applications.
Unfortunately, a single network system for IOT cannot be established using the
above views, given the wide range of use cases, differences in physical end-
devices and various ways these elements will be connected (Wi-Fi, cellular
radio, Bluetooth). There will also be a number of communication channels –
machine-to-machine, machine-to-human, machine-to-application-server –
making it almost impracticable to have one, universal solution for all scenarios
in which IOT applications are likely to be deployed.
…Therefore, the architecture
Therefore, the architecture reference model proposed by the IOT-A provides a reference model proposed by
set of abstractions to develop concrete architecture for a large variety of IOT the IOT-A provides a set of
use cases. IOT-A has suggested the above mentioned architectural views to be
abstractions to develop
implemented in contextual manner. They will serve as the building blocks
concrete architecture for a
needed to arrange and configure specific applications. All of this to say that
large variety of IOT use cases.
despite the existence of a large number of sub-architectures within the broad
IOT framework there will be a common set of architectural layers (building
blocks) underlying each framework. Thereby, establishing a common
foundation.
The physical entity view of this is perhaps the most complex of all the layers of
IOT architecture. It consists of broad range of physical objects from license
plates to orchids, jet engines, thermostats and anything that could be relevant
from user or application perspective. Therefore, different IOT systems will need
to have specific provisions for physical objects they will address.
It is also important to give adequate consideration to physical objects Different physical objects and
connected to IOT when planning system architecture, as different physical the applications designed for
objects and the applications designed for them can greatly influence the them can greatly influence
system architecture. Physical objects differ from each other in terms of their
the system architecture
properties, dimensions, functionality and purpose (see the license plate and
orchid mentioned above). Consequently, different physical objects require
different types of sensors, actuators and other monitoring tools that influence
the system architecture in a different manner.
The way physical objects interact with sensors and actuators and what type of
information is gathered by them is also an important consideration by
standardization bodies. Whether sensors are attached to the physical objects,
remotely monitoring them, in close proximity, or inside the physical entity?
This further influences the approach to system architecture.
Following this research, the government and other institutions started using
WSNs for civilian use. Some of the early civilian applications of WSNs were for
the prevention of natural disasters, air quality monitoring, building structure
monitoring and forest fire detection. Commercial deployments were focused
on industrial uses like factory automation and efficient power distribution.
A vast number IOT applications will rely on wireless sensor networks for their
functionality. Many deployments will likely be in remote areas with no readily
available power source, requiring sensor nodes to go without a charge for
days, weeks or even months. Some deployments will have the added
challenge whereby they are in areas with limited network connectivity. As IOT
pulls WSNs into the consumer domain, cost constraints will be an additional
hurdle, requiring the new generation of sensors to not only be resource
efficient but cost effective.
Wireless sensor networks will make up a majority of the elements used in IOT, Wireless sensor networks will
enabling physical objects to be connected to applications and cloud services. make up a majority of the
Data gathered through these sensors will be analyzed in various ways using elements used in IOT,
cloud computing and Big Data approaches. Like many other components of
enabling physical objects to
IOT, wireless sensor networks are evolving at a rapid rate. Though
be connected to applications
contemporary WSNs capable of being deployed in a wide range of scenarios,
and cloud services
their present-day implementations are limited and characterized by proprietary
development environments and interfaces.
There are and will continue to be challenges with sensor nodes, especially There are and will continue to
given the number. For one, they are typically resource-constrained in wireless be challenges with sensor
networks. Moreover, they have low processing capabilities, less memory nodes, especially given the
availability and need to operate with a low energy footprint. This makes it
number. For one, they are
difficult to deploy WSNs and integrate them with IP based services.
typically resource-constrained
in wireless networks.
The majority of WSN deployments are currently proprietary. Designed for
specific applications and services, they cannot be replicated when other
applications and services are considered. As a result many wireless sensor
networks are isolated deployments. Eventually though, this will lead to
redundant WSN deployments. For example, if a wireless sensor network was
deployed to measure temperature and water level in a field and is later
required to monitor sunlight and humidity, the existing WSN cannot be
adapted to measure additional information, leading to the development and
deployment of an additional WSN.
According to Tracey and Sreenan, the reference architecture of the wireless According to Tracey and
sensor networks is likely to have multiple layers for different nodes that Cormac, reference
perform different functions. For example, a node might be engaged in architecture of wireless
measuring humidity in the environment, while the other one would be engaged
sensor networks is likely to
only in forwarding the date collected by other nodes and not measuring any
have multiple layers for
physical phenomena. In this case, the forwarder will not have a local
different nodes that perform
instrumentation layer.
different functions
The prerequisites of this proposed architecture to develop and deploy highly
integrated WSNs is to have an architecture that is agnostic to sensor node
functionality and does not require high power consumption. The architecture
should also be able to manage small, static networks and allow the system to
adapt as the network grows and changes, while at the same time providing a
reasonably consistent means to retrieve the information given by the
independent and changing sensors. In addition to being agnostic to sensor
node functionality and allowing the consistent exchange of sensor information,
the architecture should to be able to provide support for integration with other
systems for analysis and modeling of sensor data.
This architecture uses a simple protocol based on Peer to Peer (P2P) concepts It is holistic approach which
able to run on nodes with limited resources. It is a holistic approach which considers the entirety of the
considers the entirety of the data flow between the actual sensor and the data flow between the actual
service(s) it is delivering, supported by lower layers, rather than each layer
sensor and the service(s) it is
specifying its own behavior in isolation. As a result, it is an orchestrated effort
delivering, supported by
rather than a coalition of random elements.
lower layers, rather than each
layer specifying its own
behavior in isolation
IOT Protocols
Protocols are another place where the shifting tides of OEMs opinions will Historically, the
likely play a key role. Currently, there are a number of protocols developed and standardization process for
in development, with a few getting more traction than others. Historically, the protocols in other industries
standardization process for protocols in other industries has been long and
has been long and riddled
riddled with dead-ends. The closest proxy to the Internet of Things, and likely
with dead-ends.
one that would incorporate many elements, would be the wireless industry
itself. When wireless emerged as something that could fork into separate
technologies, largely one standard body won over another because the
technology simply worked better (WCDMA) or was significantly cheaper
(GSM); in some cases, however, even the best technology may not win out, as
negative marketing campaigns can undermine a good idea. And given there
were a few standards bodies competing for their own protocol standard to win
out, this did happen.
God
Dag!
Hello Son!
God Hello Son!
Kurt Dag! Paul
Dag!
HelloGod
Son!
Hyvää päivää! God dag!
Hello Son!
Jorma Sten
Hyvää päivää
!
Hello Son! Hyvää päivää!
Hello Son!
Hyvää päivää!
Irwin Pekka
Devices/Services
Driven by the industry effort, there are a number of acronyms of protocols We measure the chance of
being touted to become the standard for IOT. We list most of the existing success based on being light
protocols and place what we believe to be their chance of success. We weight (in terms of code
measure this chance of success based on being light weight (in terms of code
footprint), low power
footprint), low power consumption, open and suitable to a multi-platform
consumption, open and
environment.
suitable to a multi-platform
AllJoyn environment.
CoAP
BACnet
802.15.4e
6LoWPAN
AMQP
XMPP
DDS
RPL
RESTful HTTP
Dash7
DTLS
UDP
ZigBee Pro
RFID
Bluetooth
AllJoyn
Originally developed by Qualcomm, Alljoyn is, as the name suggests, an open
Figure 16: Members of AllSeen
source project intended to provide an eventual universal framework to enable
interoperability among devices and software applications. Qualcomm has Alliance
Haier Gowe
handed the reins to Linux, and the open source project is now overseen by the
LG Harman
AllSeen Alliance, which is a non-profit consortium. The move to a consortium
Panasonic HTC
oversight has encouraged participation by others, and the list of both partners
Qualcomm Control
and developers has increased significantly since it made this move outside of
Networks
Qualcomm’s umbrella. As shown in Figure 16, the list is lengthy but noticeably
Sharp Imagination
does not include prominent semiconductor names like Intel and ARM. Intel is
Silicon Image Kii
currently building a protocol around Quark and their Atom 3800, parallel to the
Technicolor LIFX
way it handled the wireless standards with its promotion of WiMAX. However,
TP-Link Liteon
the AllSeen list includes Cisco, an encouraging addition given Cisco’s own IOT
2lemetry Moxtreme
initiative and backing of MQTT (see below).
Affinegy Musaic
ATT Muzzley
Ultimately, the goal of the Allseen Alliance is to push participants to devote
Cambridge Audie Patavina
engineering resources to develop code for the open source framework and Technologies
eventually enable disparate devices and services to discover, connect and
Beechwoods Sears
interact, regardless of transport layer. A key directive for AllJoyn services and
Winner Micro Sproutling
applications is that they are created with a source code which is transport-
CA Engineering The Sprosty
layer agnostic, be it powerline, wireless or Ethernet, and leverage this in a Network
manner indifferent to manufacturer or internet connection. Canary Tuxera
Cisco Twobulls
AllJoyn was developed as a mesh networking service which offers automatic D-Link Vestel
discovery and communication for a number of different devices, agnostic of Double Twist Weaved
operating system. Even though the Allseen Alliance is part of the Linux Fon Wilocity
Foundation, the goal of AllJoyn is to be cross-platform with support for Source: AllJoyn
Android, OS/X, Windows variants, gaming engines and other thin clients.1
While it does not support Real-time operating systems – those that process
data without buffering delays – some of those operating systems mentioned
above are likely to eventually be more controller-like, with low-end embedded
duty as enhancements are made with Internet connectivity and overall
intelligence. Eventually, the protocol will eliminate the need for a hub, or an
Internet connection.
1
http://linuxgizmos.com/open-source-iot-inititiative-taps-qualcomm-alljoyn-framework/
MQTT has a small code footprint, thus making it appropriate for use in remote MQTT has a small code
sensors with limited processing capability and memory availability. Being footprint, thus making it
lightweight also helps in situations where bandwidth is scarce and latency is appropriate for use in remote
not imperative. Put together, these factors make it possible for a large number sensors with limited
of clients (or things in Internet of Things) to be connected to a single server. processing capability and
memory availability
MQTT also has something called the Extended Reach component, which
facilitates connections between the messaging backbone and devices at the
edge of the network. It allows a wide variety of devices from mobile handsets
to trains, refrigerators, health care devices, smart meters, door locks and cars
to transmit data using sensors for processing and analysis. Embedded sensor
instrumentation facilitates real-time analysis of data generated by remote
sensors.
Having processed data, the central processing unit then communicates back
by sending instructions to devices to act in the optimal manner based on
certain situations.
Source: IBM
CoAP has two sub-layers: i) a message layer that works with UDP to ensure
duplication detection and reliable delivery of messages; and ii) a
request/response layer which enables interaction through GET, PUT, POST and
DELETE functions.
Application
Sub-Layer
Requests/Responses
CoAP
Messages
Sub-Layer
UDP
Source: IETF
Source: mdpi.com
CoAP is currently being used as the enabling technology for electric utility AMI
(Advanced Metering Infrastructure) and DI (Distributed Intelligence)
applications within Cisco’s Field Area Network.
Features of CoAP:
6LowPAN
Low power network and low power devices – 6LowPAN addresses the need of 6LoWPAN optimizes
low power devices in low power network to enable IPv6 communication over communication by
short range wireless personal area network. 6LowPAN is an acronym for IPV6 compressing message size
over Low Power Personal Area Networks. It enables sensors that have
over low-power radio
constrained processing capability and restricted energy resources to
technologies such as IEEE
communicate over IPv6 networks. Published in 2007 by the IETF, 6LoWPAN
802.15.4.
optimizes communication by compressing message size over low-power radio
technologies such as IEEE 802.15.4. For instance, 6LowPAN compresses 60
bytes of headers to 7 bytes, thereby facilitating sensor and device
communication over highly constrained networks.
Along with MQTT, COAP and Alljoyn, 6LowPAN is also receiving industry
support as a relevant protocol for IOT based communication. In October last
year, IBM and Libelium launched 6LowPAN development platform for Internet
of Things to provide Internet connectivity to sensors and devices via IPv6
protocol. The goal of 6LoWPAN is to include low power devices in Internet of
Things, and the implementation of IPv6 over IEEE 802.15.4 standard helps in
achieve that goal.
IPv6, the latest version of Internet protocol, is a successor to IPv4. In the realm
of IOT, IP addresses have gained importance as they make it easier for these
devices to communicate with the Internet and each other. In early 2011, the
last blocks of IPv4 internet addresses were allocated, marking the shift in the
uptake of IPv6 which not only offers additional addresses but also brings more
comprehensive security features.
6LowPAN allows sensors to be easily established by plugging into standard IP 6LowPAN networks are
sockets. Furthermore, 6LowPAN networks are suitable for mesh networking, suitable for mesh networking,
facilitating the deployment of a large number of sensors with relatively fewer facilitating the deployment of
gateways, thereby simplifying the architecture and reducing capital
a large number of sensors
expenditures.
with relatively fewer
gateways, thereby simplifying
Devices built on IEEE 802.15.4 are designed to have small form factor, low
energy footprint, low cost and flexible installation (think wearable devices). the architecture and reducing
While IEEE 802.15.4 standards focus on code-size optimization, IPv6 aims at capital expenditures.
achieving high transmission speeds; 6LowPAN helps bridge the difference in
focus of two important standards.
Source: www.eis.ernet.in
IEEE 802.15.4: A standard maintained by the IEEE 802.15 working group for
low-rate wireless personal area networks to specify physical layer and media
access control.
AMQP: An open source protocol used to enable devices for message oriented
communication between them.
RPL: It is a routing protocol specially developed for low power devices and
helps in best-path communication, with an idea towards resource constrained
devices.
RESTful HTTP: Representational state transfer (REST), which runs over HTTP, is
a simple architecture which is used to read XML file of a web page. A XML file
of a particular page includes the desired content and describes it.
DASH7: Developed by DASH7 Alliance, DASH7 is a long range and low power
open source standard for wireless sensor networking.
ZigBee Pro: ZigBee is a specialized protocol for low power devices. It enables
low power devices to achieve high level of communication to form personal
area networks and local area networks, typically with low-cost devices like
remote controls, for applications such as home automation. Silicon Labs has
an extensive history of creating low-power processors for IOT elements, many
of which use the Zigbee Pro protocol. The Zigbee Pro protocol is a feature set
which offers connectivity to Zigbee enabled devices but is also easier to use
and able to support a larger number of devices in one area, than its
predecessor, Zigbee.
Security
Security is a key hurdle for IOT to gain widespread adoption. Without a Without a coherent, holistic
coherent, holistic and integrated security mechanism in place, the risks of and integrated security
deploying IOT, given the potential for malicious attacks, could easily outweigh mechanism in place, the risks
the benefits. Given the lack of a common protocol, the task to secure disparate
of deploying IOT, given the
entities remains daunting. To understand, think about the number of times the
potential for malicious
press discusses some weakness or a large attack on Internet security –
attacks, could easily outweigh
Heartbleed, Target credit card breech, daily DDOS attacks – and this is limited
to a framework which has a common protocol. Now, imagine dealing with a the benefits.
network of resource-constrained devices, all of which will always remain on,
connected, distant and likely autonomous. Given the business models
concocted just to undermine the Internet, it is not difficult to extrapolate the
risks inherent to IOT and the undertaking to secure such a platform. Given the
risks, security must be implemented into the foundation with a holistic view for
all elements and process.
Network security
Given the variety of protocols in play and the resulting heterogeneity of the
overall network, the resulting diversity will severely affect any security
mechanism’s ability to protect the overall platform. Securing any
communication channel, from remote devices to controlling devices for
example, is difficult considering how resource constrained these remote
devices will be. For example, the addition of a simple key management
systems may bog down the system, a system which needs to be light and
flexible.
Nevertheless, some still argue that cryptography, if built into the network
infrastructure at the foundation level, could be a resolution2. Cryptography is
the transformation of data into an indeterminable format and requires a key to
unlock the message. The argument is that cryptography is like mortar,
associating unrelated items in a resource-constrained and dynamic
environment, and therefore the keys need to be changed in order to protect the
network over the long term. It is likely that regular Internet security protocols
can be used further up the communication stack, the risk being that the
differences between Internet protocols and IOT protocols could lead to
vulnerabilities in a system meant to be comprehensive.
Data protection
It is a challenge to conceptualize the amount of data generated by one person We believe that even the
in an idealized IOT world, from payments and in-store beacons to home most trusted sources for
automation and personal health monitoring, but taking into account the security will not likely be fully
current use cases it is easy to see how a Big Brother-type environment can be
trusted by the majority of
developed, as it already has in some geographies. We will leave the
users and will likely depend
philosophical discussion on what should and should not be accessed by the
on the respective
government for others to address. However, the overriding concern relating to
the Internet of Things and security is that given the knowledge that someone application’s personal reach
can and likely will access this data, to what degree are consumers willing to as to what degree it has the
leverage the conveniences of IOT? We believe that even the most trusted potential to become
sources for security will not likely be fully trusted by the majority of users and ubiquitous.
2
IEEE Computer, vol.44, no.9, pp. 51-58, September of 2011
There are some possible solutions that could assuage fears: First, the amount
of data accessed, or exactly which data is accessed, could be curtailed or
refined by the user (think of it as an extension of the alerts one already receives
when specific applications want location-based information). Second, the
information could be stored by trusted sources. Admittedly, this would be
challenging, but could be helped if the process is transparent.
In short, data protection is the key to user adoption and could be helped by the The adoption rate of IOT will
steps mentioned above. However, the adoption rate of IOT will be a series of be a series of fits and starts,
fits and starts, bound by the number and degree of data breaches, which will bound by the number and
happen.
degree of data breaches,
which will happen.
Managing identification
Devices will continue to grow and each of them needs to have the ability to be
identified. Inanimate objects such as cars or warehouses have the same issue;
there are a number of sensors associated with each object – static or dynamic
(e.g. a sports arena which changes into a rescue shelter during a catastrophic
event, and hence the identification of this space needs to change dynamically).
In short, a number of IDs would be associated with each device or a group of
devices, and proving these IDs through authentication and authorization, and
within an architecture, which will in many cases be a distributed architecture,
would be a challenge. Hence, for any embedded security element, the number
of elements, their relationship and the potential to have them changed will
need to be considered.
Mechanisms in development
There are a number of standards being developed by industry bodies,
researchers and governments, and these are listed below. All are decent first
steps but without a true ramp up in devices and sensors it will be a process of
incremental change to address aspects which are currently unknown.
3
IEEE Computer, vol. 44, no. 9, pp 51- 58, September 2011
In total, security will need to combine the challenges associated with resource- In total, security will need to
constrained devices, varying transport layers and likely different protocols. combine the challenges
Cryptography mechanisms will help, but challenges around ID management, associated with resource-
user privacy, and the lack of a single, trusted architecture are formidable
constrained devices, varying
hurdles that would have to be cleared for IOT to work in a seamless manner.
transport layers and likely
Additionally, governments will need to provide a balance of oversight and
different protocols.
protection of its citizens in the most transparent manner before IOT is likely to
reach its potential.
APIs
Without Application Programming Interface (API), the development of APIs specify how software
applications may not reach a critical mass. API is a communication interface, and other components should
which specifies how software and other components should interact with each interact with each other using
other using a set of instructions and standards for a given platform. Almost
a set of instructions and
every software and web-based company releases a set of APIs to developers.
standards for a given
These APIs enable developers to create applications relatively easily,
platform.
benefitting the companies and developers. APIs are also helpful when
developers are programming the user interface component of applications.
APIs have become a critical element of web, enterprise, mobile, Big Data and
IOT ecosystems. The use of APIs extends to multiple environments and
enables a broad spectrum of functionality, from basic functions such as copy
and paste of text to more complex tasks such as online transfer of funds from
a bank account.
An example that illustrates the role of APIs is Google and its use of maps and
videos. Google provides APIs to developers in order to incorporate its web-
based services such as maps on a developer’s website. Using an API for
Google maps, developers can embed map functionality to their website and
seamlessly provide some of the mapping solutions without having to redirect
users to Google’s website. Likewise APIs for YouTube allow developers to
embed YouTube videos to their respective websites or applications.
APIs run in the background, not necessarily visible to end users. Users interact In addition to governing the
with the application, which in turn interacts with other applications using APIs. way applications interact with
In addition to governing the way applications interact with each other, APIs each other, APIs also govern
also govern the information which applications can exchange with each other.
the information which
A developer can extend the reach of his application and incorporate
applications can exchange
functionalities such as gathering or sharing feeds from social media platforms,
with each other.
carrying out analytics, building widgets such as Yahoo weather or including
messaging capability to their app. In doing so, APIs make it possible to create
application mashups which are simply analogous to musical mashups where
two or more unrelated songs are blended together in a creative mix. Likewise,
in a mashup of web-based applications, functionality of two or more
applications are brought together using APIs to create a new application. In
this fashion, APIs can be used to extend functionality of IOT applications (see
Figure 23).
Source: Trendsmap
However, simply gathering data and transmitting it to the backend is not Data needs to be contextually
necessarily the end goal. Data needs to be contextually filtered. Sensors should filtered
not simply be a data dump as it will only overwhelm the network, like
processing redundant data from billions of sensors, thousands of times per
day. To put this amount of data into perspective, it is estimated that sensors in
a jet engine can generate up to twenty terabytes of data in an hour. Multiply
this amount of data for a sixteen-hour transatlantic flight from Dubai to San it is estimated that sensors in
Francisco and we get a sea of data sent to applications and analysts for just a jet engine can generate up
one flight. Most of this data is redundant and can be filtered without
to twenty terabytes of data in
hampering the quality of analytics. Sensors, therefore, are expected to have
an hour
the intelligence to filter data in contextual manner and transmit only the
relevant instances of information.
In certain cases sensors may be required to process the gathered data locally,
while also sending it across in various formats for servers and other web
services to process. Additionally, there could be issues related to security and
resilience of wireless sensor networks (WSN).
REST is a simple, stateless architecture which draws from HTTP instead of REST is a simple, stateless
competing with the protocol. In present-day scenario, REST is being architecture which draws
extensively used by social networking websites, automated business from HTTP instead of
processes, mobile applications and mashup tools. REST APIs facilitate
competing with the protocol.
interoperability among disparate systems (a useful feature as IOT is
characterized with presence of disparate systems) and reuse a number of
software components. REST also makes it possible for a large number of IOT
components to interact with each other, as in the case of its application over
the internet.
In the context of IOT, APIs function as a thread that stitches various protocols
together to allow applications to connect to devices using different protocols.
In current deployment scenarios, a vast majority of applications are able to
connect to only those devices that are protocol compliant. APIs such as Smart
Source: Intel
Source: Gartner
Middleware
The current infrastructure environment does not fully support what is required
to leverage the Internet of Things, in an ideal sense. Middleware can play a
role here. It will likely be either specialized devices or software, both of which
can enable the Internet of Things by leveraging infrastructure and devices
following different protocols.
Data: Data will need to be offloaded to the cloud after validation and
structuring. Given the constraints with sensor nodes, middleware can help
with additional functionality.
IOT as a Platform
The Internet of Things will be a complex structure with various interconnected
parts, put together by a wide array of industry participants including system
integrators, telecommunications operators, gateway manufacturers,
semiconductor manufacturers, software vendors, network equipment
providers and sensor manufacturers. These players develop applications and
software, manufacture equipment and sensors to collect and send data,
analyze it, provide insights and send contextual instructions from remote
locations for efficient functioning of end devices and much more.
Ideally, any IOT device that labels itself as a platform should work as glue to Ideally, the IOT platform
bring together disparate pieces and fit them together in an efficient and should work as glue to bring
context-aware manner. The platform for the Internet of Things will be more together different pieces and
than just a development, management and support environment. In our view,
fit them in efficient and
there will be two primary approaches to IOT platform.
context-aware manner
First is the software level approach, wherein the platform will facilitate
application development, host connected devices, ensure secure connections
and transmission of data, and carry out analytics. The other approach is a
hardware-centric approach. This approach will provide a platform to facilitate
development of hardware for IOT and will quicken the process of bringing
connected devices to market.
The software based approach to IOT could make it easier for developers to
build applications and services for connected devices, monitor and manage
devices, simplify connectivity, collect and analyze data, provide APIs and
integrate IOT applications to business systems. Over the past several years, a
host of platforms have emerged for the development of M2M and Internet of
Things applications. The integrated approach adopted by some of the new
entrants could disrupt the traditional M2M platform types, as integrated
platforms lead to faster development of applications compared to traditional
platforms. In addition, integrated platforms host connected devices, enable
development of scalable and portable applications and manage devices on the
network.
IOT platforms will also need to minimize or eliminate the need for additional In an ideal scenario, security
expenses to integrate developer’s security infrastructure with that of the IOT features of IOT platform will
platform in order to support IOT applications and devices. In an ideal scenario, work in tandem with existing
security features of IOT platform will work in tandem with existing security
security infrastructure at the
infrastructure at the client’s end to ensure integrity of the security system and
client’s end to ensure integrity
data. This will increase the value proposition of IOT platforms than do-it-
of security system and data
yourself (DIY) approach taken by some developers.
Similar to how frameworks like Java, ASP.NET, Ajax and others helped spur
growth in web applications, dedicated application development platforms for
IOT will play a critical role in creation, hosting and management of applications
for Internet of Things. In general, application development platforms reduce
the time and complexity involved in creating new apps. By leveraging these
platforms, developers can not only minimize development efforts but also
avoid incurring high costs.
Source: ThingWorx
Some IOT platforms have become sophisticated enough to allow developers to Some IOT platforms have
create apps without writing a single line of code. Platforms like ThingWorx become sophisticated enough
have even created an app store to aid development of applications on its to allow developers to create
platform. ThingWorx app store categories range from analytics to cloud
apps without writing a single
services to enterprise systems. In the ThingWorx marketplace, vendors such as
line of code
Google, Oracle, SAP, SalesForce and Ericsson offer various tools in the form of
maps, database management, analytics and protocol adapters that a developer
can simply embed in the application and leverage its functionality. To further
accelerate application development, ThingWorx platform offers app templates
for pre-defined use cases. In short, helping developers create applications in a
relatively short period and manage them with minimum effort.
That said, application development platforms are simplifying the process and
making it more flexible at the same time. By doing so, the development time is
shortened and the number of use cases that can be addressed with IOT
technology is expanded.
Platforms will likely play an important role in determining how data generated Platforms will play an
by sensors and devices are collected, stored, processed and analyzed. Data important role in determining
received can be in an unstructured form, needing to be organized and loaded how data generated by
onto enterprise data warehouses. Depending on the agility of platform, it could
sensors and devices are
help developers gain real-time visibility into data using various analytics driven
collected, stored, processed
programs. New generation M2M/IOT platforms could also make it possible for
and analyzed. Data received
data to be shared with multiple applications. In short, the ability to analyze
data in a real-time manner in order to leverage it will be just as critical as the can be in unstructured form,
elements listed above. As such, we spend a considerable number of pages in needing to be organized and
this report discussing the possibilities of what can be done with an effective loaded onto enterprise data
data management platform. warehouses.
The Internet of Everything is not just about applications and analytics. IOT is as
much about the hardware and devices connected to the internet as it is about
the applications running on them. Some IOT platforms will embed the software
supporting their platform on the connectivity chips, thereby creating a tighter
integration between the platform and devices. Thingsquare, Electric ImpOne
and Ayla are some such platforms.
Qualcomm’s lead in SoC technology and its ability to incorporate multiple Qualcomm’s lead in SoC
connectivity modules on single chipset eliminates the need to have a discrete technology and its ability to
microcontroller/processor or memory while allowing for multiple options to incorporate multiple
incorporate connectivity in the device, thereby reducing the size and the total
connectivity modules on a
bill of materials.
single chipset eliminates the
need to have a discrete
To facilitate portability, Qualcomm allows the code to be ported to any
QSC6270T Module with Java for the commercial product. microcontroller/processor or
memory while allowing for
Source: Qualcomm
Source: Broadcom
Of all the building blocks of IOT, a platform approach will likely have the widest
and most extensive use given its ease of device integration and its ability to
offer a turn-key solution that will encompass more functions than any other
element of IOT alone. Currently, no single platform has gained widespread
adoption or reached a tipping point whereby other device makers need to
follow along simply because the consensus is building quickly.
We are still in a place where different applications have different development, We are still in a place where
management and support requirements. Put another way, there is no universal different applications have
solution that will work just as effectively for a home electricity meter as it does different development,
for a home video monitoring system. One of the alternatives to the adoption of
management and support
platforms is the do it yourself (DIY) inclination of certain organizations. Though
requirements. Put another
we have yet to find conclusive evidence on whether outsourcing IOT platform
way, there is no universal
is actually feasible, it could be a cost-effective approach for small and mid size
business, which need a custom solution for cheap. Large organizations will solution that will work just as
likely decide based on the importance of IOT applications to their core effectively for a home
operations. electricity meter as it does for
a home video monitoring
Arduino system
Arduino is a platform intended for products that interact with environment
sensors and respond by controlling lights and other appliances. The company
sells preassembled boards that can either be used as is or be adapted based
on user’s need. Given the flexibility and low cost, the solution has become
relatively popular. Arduino also provides software which is compatible with
Windows, Linux and Mac OS.
Source: Arduino
Intel Galileo
Intel has developed a platform called Galileo. Launched in October 2013; it is a
microcontroller board based on Intel’s 32-bit processor Quark SoC. Galileo
leverages the simplicity of Arduino’s software and hardware environment and
is the first board designed on Intel’s X86 architecture to be compatible with
Arduino. Galileo represents an alternative to more complex Atom and Intel
Core processor-based designs. Through PC based ports and features Galileo
extends beyond the Arduino ecosystem.
Source: Intel
Source: Cisco
Present-day networks, though capable of delivering different applications and Present-day networks, though
connectivity solutions, were not designed for wide ranging IOT solutions. IOT capable of delivering different
enabled networks ought to have provisions to carry a very large number of applications and connectivity
devices yet have the flexibility to offer customized solutions with respect to
solutions, were not designed
connectivity, cost and quality of service.
for wide ranging IOT solutions
This flexibility is important due to the fact that different IOT applications will
have significantly different requirements from the network; some applications
require low latency, always-on connectivity and frequent data transmission
while other applications can make do with intermittent connectivity and
infrequent data logging.
Source: Ericsson
Sensors and actuators are nothing new. They have been around for many
decades, are used for specific applications, are installed using proprietary
technology, have customized interface and run on specific protocols. Sensors
are enablers of IOT; however, their fragmented deployment inhibits true IOT.
To extract optimal value from IOT, organizations need to overcome the issue of
fragmented deployment. One possible path is to opt for new and standardized
implementation, but that is a costly affair. Imagine if energy distribution
companies were required to replace hundreds of million dollar transformers to
realize the benefits of IOT. The other option is to establish integration using
gateways that facilitate integration of legacy systems with new business
applications and analytics. We believe the latter is the path that most
businesses will take, optimizing the value of their existing business assets. Gateways have traditionally
been used to bridge dissimilar
Gateways have traditionally been used to bridge dissimilar technologies and technologies and integrate
integrate heterogeneous interfaces. They also enable integration of devices heterogeneous interfaces..
running on different protocols. Gateways can be used in a similar fashion with
the internet of things to institute intelligent connectivity to legacy device
networks. Gateways not only act as enablers of integration, but also as a
protective layer between application and sensor. A resource constrained
sensor may run out of battery if it is in direct contact with the application that …Gateways can be used in a
constantly queries the sensor. The presence of a gateway prevents direct similar fashion with IOT to
interaction between sensor and gateway, thereby extending the battery life of institute intelligent
the sensor. Gateways can also cache and aggregate sensor readings so that connectivity to legacy device
the data log can be sent in one packet to the application rather than networks.
establishing frequent contact with the network, thereby bringing down the
load on the network.
Source: Ericsson
With the progression in IOT, networks will adapt to the changing connectivity
needs of devices and applications. Currently, smartphones, tablets and many
other connected devices are always on and always connected. They
communicate continuously with the network, often pinging the network in the
background without us noticing it.
In contrast, most IOT deployments should not require continuous network In contrast, most IOT
connection for data logging. In such a situation, one of the possible deployments should not
implementations of the network connection is to operate on discontinuous require continuous network
reception (DRX) mode. It not only brings down network load but also helps
connection for data logging.
save power in energy deprived, low cost sensors nodes. Sensors will benefit by
In such a situation, one of the
not having to remain connected at all times, thereby saving on energy
possible implementations of
requirements.
the network connection is to
Based on current LTE specifications, the lengthiest possible DRX cycle is operate on discontinuous
restricted to 2.56 seconds, which is very low compared to what many IOT reception (DRX) mode.
applications can easily accommodate. Think of a temperature sensor in an
orchid sending temperature data once every hour. Having DRX cycle of 2.56
seconds limits the energy saving quotient. Lengthening DRX cycles can help
bring down energy consumption. According to Tuomas Tirronen of Ericsson
Research, “using very long DRX cycles and optimized LTE procedures show
that it could be possible to reach lifetimes of even over 10 years using off-the-
shelf and relatively cheap batteries” (http://labs.ericsson.com/blog/4g-for-iot).
Source: Ericsson
Use cases
It is easier to broadly categorize sensors into three categories – environmental
monitoring, object monitoring and interaction monitoring. Environmental
monitoring is defined as sensors measuring specific activities of the
environment. Object monitoring measures the activity of both animate
(humans) and inanimate objects (car). Interaction monitoring is the play
between object and environments.
Currently, there are a number of use cases being developed and some are
already in use. The list below is certainly not comprehensive, but is meant to
give readers some sense of the possibilities.
Remaining challenges
Security, Quality of Service and Configuration remain the key challenges. Even
in remote environments, sensors should maintain confidentiality, availability,
integrity and authenticity. In our section on security we address the challenges
and some possible solutions.
Conclusion
Sensors are very much the heart of IOT. Currently there are challenges, but we
believe as the idea of what can be done with them expands and as people
increasingly rely on this data, pushing Metcalf’s law across the critical
threshold, developers will find a way to move that intelligence to the edge. We
believe this point will likely come in the near term, but that the possibilities of
what can be done with such sensors are still in their infancy.
Frequency challenges
Almost every device in the IOT concept will use some form of wireless The extensive use of wireless
communication. The extensive use of wireless communication by a growing communication by a growing
number of devices within the same area will pose challenges. Specifically, it number of devices within the
will challenge the quality of the network, the scalability of the elements and
same area will pose
the reliability of all included. There are a number of solutions that can address
challenges. Specifically, it will
the issue, including developing new radio and service architectures. Moreover,
challenge the quality of the
frequency spectrum allocation can be adjusted according to new channel
requirements. network, the scalability of the
elements and the reliability of
Radio Technology all included
Given the constraints a number of IOT devices will be placed under, either
because of energy efficiency or cost, a large number of devices will rely on a
single radio. The efficient use of multiple frequencies that many have become
accustomed to using a smartphone simply are not practical in an IOT
environment. Regardless, IOT will increase the demand of Radio-Frequency
spectrum.
Current spectrum allocation, usage modes and radio technologies are not
currently capable of handling the communication and data generated in IOT, or
at least what people think about as a seamless IOT world. In terms of open
frequency, there are not many open frequencies left. One is the vacated digital
television 800MHz frequencies and recently in Europe, these were changed to
mobile broadband. Television spectrum bands below 1GHz (TV white spaces)
have the potential to work efficiently with license-exempt technologies. In past
research we walked through a number of potential usage scenarios (please
refer to From Start to Mobile Clouds and Beyond).
The actual technology being used will vary, depending on how far and how
quickly the information will need to travel. For almost 90% of the IOT
applications that are currently being considered, most will use short range
wireless technology like Bluetooth, Zigbee and WLAN. To get a sense of the
range and throughput of various radio technology, we found the following
chart helpful.
Source: Innovate UK
To address spectrum scarcity in IOT, the physical layer should be equipped Sensing techniques such as
with spectrum sensing techniques and advance reconfiguration ability. matched filtering,
Sensing techniques such as matched filtering, cyclostationary feature cyclostationary feature
detection and energy detection have been brought up as possible ways to
detection and energy
improve efficiency.
detection have been brought
up as possible ways to
Matched Filtering is one of the most efficient spectrum sensing techniques. It
leverages identification to demodulate only approved signals and as a result, improve efficiency.
gives out a strong signal to noise ratio. However, it is complex, as there is a
high dependency on prior knowledge of target signals and the cost is also
high.
controlled by the MAC layer. There are two modes of sensing, reactive mode
and proactive mode. Reactive mode helps conserve power by sensing the
spectrum only when the data is to be transmitted. Proactive sensing is exactly
what you might think, the sensing of spectrum at regular intervals. There is
also something called cooperative sensing, which is created through the MAC
layer and leverages entities of the physical layer involved in spectrum sensing
activities. As these entities work in relatively different circumstances, by
collecting data from all of them, it improves the quality of decisions.
Network Layer
As it pertains to IOT, the network layer ensures data network connectivity and
efficient data transmission paths. The routing of data is done in a very
opportunistic way in wireless sensor nodes network as the reliability of links is
very low. At each node the forwarding conditions are analyzed and data hops
are done when they can be done, which is different than what we might
envision happens with typical internet traffic.
Techniques like spectrum awareness can increase the parameters on which M87 developed a technique
forwarding conditions are analyzed at each node for optimum hops. that enables a cluster of m2m
Specifically, spectrum aware mesh routing (SAMER) adds error rate and devices to talk to the network
bandwidth to parameters on which data links are analyzed. Network
through just one good radio
integration can help as well, but as we learned earlier with protocols and
amongst the cluster,
others, it poses a number of challenges.
essentially daisy chaining off
An Austin based start-up, M87, has developed a technique that enables a the good radio.
cluster of m2m devices to talk to the network through just one good radio
amongst the cluster, essentially daisy chaining off the good radio. We believe
this can both simplify and lower the cost of deploying wireless, IOT networks
while improving reliability.
Conclusion
The bottom line is that there are a number of constraints on almost every
element of the network currently, from frequency allocation to the MAC layer
management and the wireline network itself. There are techniques which can
help alleviate some of this strain, but it will take some time before these are
optimized.
Big data and analytics are at the heart of IOT. All the efforts around developing Big data and analytics are at
standards, adjusting networks to IOT and deploying applications are ultimately the heart of IOT. All the efforts
directed towards realizing economic and social benefits. These benefits come around developing standards,
in various forms such as efficient use of natural resources, minimal break-
adjusting networks to IOT,
down of machinery, increasing productivity of employees, better customer
deploying applications are
satisfaction, disaster management and on and on.
ultimately directed towards
To achieve these benefits, stakeholders rely on Big Data and analytics tools to realizing economic and social
harness data generated by billions of IOT devices. It is nearly impossible for benefits.
IOT to realize its potential and fulfill its promise if the hardware, software and
services elements of IOT analytics are not in place.
IDC breaks the Big Data industry into three broad segments: infrastructure,
software and services. Infrastructure is the largest segment with a 45% share
of Big Data revenue in 2013, while services and software accounted for 30%
and 25%, respectively.
Cisco
$295 $50,200 1% 72% 12% 16%
Systems
Source: IDC
For all its benefits, carrying out analytics on a vast set of data produced by IOT 90% of the global data today
devices is a challenge. The operational costs associated with storage of rapidly was created in past two years
growing, unstructured data is a key hurdle to most organizations. Data has alone (IBM).
been growing at an unprecedented rate, so much so that 90% of the global
data today was created in past two years alone (IBM).
Figure 39: How IOT will effect the Big Data landscape
Source: IBM
Along with an increase in the amount of data, IOT will bring about several Most of present day data
changes in the velocity and variety of data gathered. Outside of IOT, there are processing involves batch
not a great number of use cases where we see enormous amounts of processing of structured data.
unstructured data being generated, transmitted and processed in real time to
obtain actionable alerts. Most of present day data processing involves batch
processing of structured data.
However, that may soon change. IOT deployments will lead to large number of Collection and periodic batch
applications in which vast amounts of data would require real-time processing processing of data might lead
to derive timely business insights and obtain actionable information. Collection to a delay in obtaining
and periodic batch processing of data might lead to a delay in obtaining
relevant insights, providing
relevant insights, providing analysis that was good yesterday, but not
analysis that was good
necessarily today.
yesterday, but not necessarily
One solution to this issue is stream processing, which enables real-time today.
collection, visualization and analysis of large scale data arriving in high
velocity. Stream processing works alongside existing enterprise resources
without disrupting the systems and storage infrastructure already deployed. It
allows organizations to analyze structured and unstructured data arriving in
large quantities.
If implemented well, stream processing not only facilitates large volumes of If implemented well, stream
data to be aggregated and analyzed but also helps in maintaining data quality processing not only facilitates
while lending itself to data auditing. large volumes of data to be
aggregated and analyzed but
To give you a perspective on the rate at which certain web/mobile applications
also helps in maintaining data
generate data, Facebook generates more than one Tb of data every hour while
quality while lending itself to
Twitter generates one Tb of data every two hours4. Real-time analysis of this
data help businesses identify which topics are trending in a given geography at data auditing.
4
https://www.ibm.com/developerworks/library/bd-streamsintro/
a given time among a given age group of people. It offers them monetization
opportunities based on consumer interest and behavior. In the absence of
stream processing, data would be collected, stored and later analyzed. By the
time insights are obtained it might be too late to reach out to users as they
may have moved on to something else.
This is just the beginning; as IOT matures, application developers will come up
with hundreds and thousands of applications that generate vast amounts of
structured and unstructured data, requiring real-time analysis for efficient
functioning. Think of a transit application that provides real-time information
on busses and trains, real-time traffic updates or availability of parking in a
given business district or shopping mall, while connecting it to current and
forecasted weather data to help us decide whether to drive to our destination
or use public transportation systems. Such an application solves a major, real
world problem and requires real-time feeds that need real-time processing –
sort of an extension of HopStop. Multiply this by millions of users and
hundreds of cities for which such information is made available and you have a
massive challenge at hand. Such an application will depend on stream
processing and cannot be subject to batch processing.
Source: EMC
Existing data centers need to evolve, while new data centers should be
designed to support the increased expectations for performance. Currently,
building a new data center or upgrading an existing one in order to execute
stream processing is a cost prohibitive and daunting task.
One of the solutions proposed to make stream processing commercially viable Data center managers need
is to implement distributed data center management. To prevent individual to leverage DCIM (Data
data centers from being bogged down by a flood of IOT data, data center Center Infrastructure
managers can decide to distribute data aggregation, tasking it to multiple data
Management). DCIM is a
centers. These data centers can then perform the initial level of processing and
sophisticated data center
send relevant data to the central data center for further processing and
monitoring solution which
analytics. In addition to distributed data center management, data center
managers need to leverage DCIM (Data Center Infrastructure Management). helps manage and optimize
DCIM is a sophisticated data center monitoring solution which helps manage the performance of data
and optimize the performance of data centers. Today’s data centers are centers
designed to accommodate bandwidth requirements originating from human-
application interaction. A typical data center is not designed to handle massive
sensor data, creating a wide gap in available and required bandwidth. To
address this issue, data center managers will need capacity management
platforms like DCIM.
Figure 41: iTRACS DCIM to optimize data center for stream processing
Source: CommScope
In short, IOT aims to make institutions and society more efficient; since IOT
deployments generate vast amounts of structured and unstructured data that
require efficient collection, aggregation and detailed analysis, Big Data
solutions will gain traction. Challenges still remain, in the name of velocity,
volume and veracity of IOT data. It is likely that many IOT related Big Data
problems are best addressed using stream processing, which is a daunting
task and places strain on data center resources, requiring data centers to be
managed at high levels of efficiency. DCIM is an effective way to optimize
performance of data centers and to maximize their utilization levels. We would
note that CommScope is one of the leading companies in DCIM space.
We believe key catalysts for capex investments in IOT infrastructures are the
potential for structural multi-year improvements in productivity and opex
metrics. A recent GE IOT study notes potential for appx +$18B in annual opex
savings benefits from a modest 1% improvement in operational efficiency
metrics.
The GE IOT study is basis for our view that capex investments in IOT Figure 43: Industry data summary on
infrastructures is likely to be pegged at around 10% of the $18B in yearly opex CY15 network equipment capex
savings – i.e. we anticipate IOT related capex investments in the $2B range a
spending [Infonetics] and DB view of
year over the next few years on Layer 0/7 networking solutions. We note that
incremental network infrastructure
CxOs typically invest ahead of anticipated recurring opex savings.
spending on IOT use cases
The $2B a year in IOT related networking capex investments would be Appx CY15 IT
incremental to the current +$47B a year of capex spent on networking Capex Spend ($B;
Product Category
equipment – summarized in Figure 43 – and a fundamental basis for potential based on
Infonetics data)
upside to CY15/16+ consensus expectations.
Datacenter Switching $9.0
In the remainder of this chapter, we discuss 3 major IOT use cases and Enterprise Routing $4.0
highlight how each of the Layer 0/7 IT stacks are involved in implementing the
end to end IOT infrastructure. The networking vendor plays are in one or more Carrier Routing & Carrier
of the IT stacks’ – as we summarize in the IOT use cases discussion. Ethernet $15.0
1. The IOT CyberSecurity use case highlights how IOT enabled Security Equipment $7.0
infrastructure can offer a well-rounded defense against a broad range
of security attacks – from the Operational Technology elements – i.e. DWDM Optical
physical security access, etc – to the Information Technology elements Networking $9.0
– i.e. Layer 0/7 network equipment.
Total Network Eqp Capex
2. The Smart Energy scenario is representative of an IOT use case for View for CY15 $47.0
Remote Monitoring and for Big Data Analytics of Gigabytes of data
output from Internet connected sensors in offshore Oil and Gas rigs. DB view of incremental IOT
related networking capex
From a network impact POV, the Smart Energy use case is
spend $2.0
“bandwidth intensive” and “delay insensitive”.
Source: Deutsche Bank; Infonetics
In the discussion below, we discuss how the networking vendors can benefit
from selling their policy-based and dynamically managed Layer 0/7 equipment
in these 3 representative IOT use cases.
The OT aspects include industrial security systems and devices at the physical
security layers – i.e. Internet connected objects such as programmable video
cameras, audio recording devices, temperature sensors, fire alarm equipment,
access badges, etc.
The IT aspects are of interest in the context of our FITT – since they correspond
to investable opportunities for the Layer 0/7 networking vendors in our
coverage universe.
Referring to the cyber security architecture in Figure 44, we note that vendors
such as Cisco, Aruba, etc currently offer wireless air interface security and
wireless data layer encryption mechanisms in their industrial hardened
802.11ac access points.
Assumes Variable-Latency;
Variable BW Network Link
IOT End-Points
Cisco, with its +50% market share in enterprise WiFi equipment and broadest
set of networking solutions in enterprise IOT use cases, is likely to be a mid- to
long-term beneficiary of enterprise WiFi networking rollouts in IOT
architectures. Cisco’s point product competitors, we note, lack the IOT
solutions integration expertise that Cisco and its industrial IT ecosystem
partners (Rockwell, GE, Siemens, etc) would bring to industrial IOT use cases.
Moving up the IT stack, to Layer 2/3 switching and routing, we see Cisco likely
to benefit in the CY15/16+ timeframe from sales of virtualized network firewall
modules at the Edge Cloud Nodes (e.g. virtualized intrusion detection and
prevention SW modules running in the Cisco’s ISR 819 series enterprise router,
etc) and from sales of campus switches (e.g. Cisco’s 3850 series) running
802.11ac access points integrated into the switch.
Moving further up the IT stack, into the Datacenter Cloud Layer, we note
meaningful opportunities for Layer 4/7 specialists such as F5 and Infoblox to
benefit from the IOT Cyber Security use cases.
F5 – a market leader in Layer 4/7 has multiple security touch points in the IOT
Cyber Security architecture that we illustrate in Figure 44.
At the network access control layer, F5’s Access Policy SW Module – running
as either a virtual instance or in the company’s HW optimized BIG IP or Viprion
platforms – has an important role to play in controlling end-user access to a
wide range of datacenter application servers – at a fine level of granularity – i.e.
access control by user name, workgroup affiliation, geographic coordinates,
user context, etc.
IOT sensors imbedded in various industrial objects can relay security incidence
monitoring events to F5’s Access Policy Module – and F5’s TMOS SW is
designed to cross-correlate across 1000s of individual security incidence
response and access control events – to generate security trend analysis
patterns, feedback to IT security policy design, etc.
We note that F5’s Access Policy Module is currently the best selling SW
module in the company’s SW portfolio – a point of proof of the F5’s best–in-
class competency in network and application access policy management.
At the application and network firewalling layers, F5 has a core set of value
propositions to offer – as part of an overall industrial cyber security framework.
F5’s iRules scripting framework has a core value proposition in IOT use cases –
given the relative ease at which simple English language IT and business
security policies can be defined and implemented in a matter of minutes – to
defend the enterprise architecture against a dynamic set of security threat
vectors, which by definition need a dynamic policy creation and
implementation framework (offered by iRules).
From a security attach rate POV, it is our view that F5’s Layer 4/7 systems (BIG
IP and Viprion) could see the security SW modules attach rate scale from the
current +30% of HW platforms sold to around +50%, over the next few years.
We believe IOT use cases are a key catalyst for scaling the company’s security
solutions sales opportunities given the significantly higher number of security
IT end-points in IOT use cases, which could be the underlying basis for scaling
the quantity and types of security modules required to defend against a broad
set of attack vectors in IOT Cyber Security use cases.
Infoblox recently introduced DNS Security appliances that defend against DNS
security attacks that originate from the “outside-in” and the “inside-out” – and
these DNS security appliances leverage live DNS reputation feeds to cross-
check all incoming and outgoing DNS queries against a constantly updated
live IP address and Web URL feed so as to identify malicious URLs and
hacking attempts on a company’s DNS servers.
Figure 45: Illustration of key IT stacks involved in implementing an IOT Cyber Security architecture
Transport
Layer Transport Layer Security (SSL)
Security (e.g. F5, Citrix, A10, etc)
The Edge Cloud Nodes offer a core set of localized compute, networking,
storage and security functions for the offshore oil rig sensors and actuators.
The Edge Cloud functions include: 1) aggregation of IOT events from 100s or
(1000s) of Internet connected sensors, 2) real-time local SW processing of IOT
event data, 3) implementation of edge security access and intrusion detection
capabilities and 4) batch upload of Gigabytes of IOT offshore rig data, etc.
Figure 46: Conceptual view of an IOT architecture to support a Smart Energy use case
Assumes Variable-Latency;
Variable BW Network Link
IOT End-Points
The Edge Cloud nodes perform an important networking function; i.e. they
transmit Gigabytes of IOT event data, aggregated from multiple IOT sensors in
“batch” mode, to centralized databases and application servers.
The SDN controller, in turn, can provision relevant Quality of Service policies
on a box by box basis – i.e. in every switch or routers across the end to end
network connection – so as to ensure optimum delivery of delay sensitive and
bulk data traffic through the WAN links that interconnect the onshore and
offshore Oil rig facilities.
Figure 47: Conceptual view of relevant IT stacks involved in the Smart Energy use case
IOT Endpoints
IOT Endpoints (Drilling Site Sensors, Actuators, Analyzers, etc)
Source: Deutsche Bank
Referring to the IT stack diagram in Figure 47, we note that Cisco’s ACI
solution would play a meaningful role in Quality of Service management at
Layers 2/3, while F5’s policy management solutions could play a role for
managing Web traffic at Layers 4/7.
Cisco’s ACI Fabric (competitive with VMware’s NSX solution, etc) can also be
used to set up virtual network tunnels between WAN router end points and
datacenter servers – or between various server racks within the Datacenter
Cloud – for managing the data traffic in the Smart Energy infrastructure based
on policy descriptors such as virtual tunnels dedicated for routine backups,
disaster recovery, delay sensitive traffic, best effort bulk data transport, etc.
F5’s Web traffic steering feature – a core traffic management feature in the
BIG IP and Viprion ADCs – has a core value proposition to offer for managing
Web traffic requests originating from offshore oil rig installations.
Different sets of Web URL requests – based on the business sensitivity and
time-sensitivity of the application traffic – can be directed to different sets of
Web application servers by F5’s ADCs running the core traffic management
software (TMOS SW).
F5’s Network Access Control solution (based on the Access Policy SW module)
can be used to enforce selective tiers of access to energy management and
data analytics applications in the Datacenter Cloud.
We also note opportunities for Ciena’s Carrier Ethernet solution and optical
network management software tools in the Smart Energy use case. Undersea
cable – carrying optical Ethernet data traffic – is a relevant use case for sales of
Ciena’s carrier Ethernet switches at either ends of the offshore and onshore
optical WAN links. Ciena’s optical network management SW could be used to
dynamically provision optical network transport equipment at either ends of an
optical fiber link.
In summary, we note near-term opportunities for the Layer 4/7 specialists – F5,
Infoblox, etc – to sell into network intelligence and security use cases in the
Smart Energy use case, opportunities for Ciena in optical Ethernet and optical
network management tools and out-quarter opportunities for Cisco’s ACI
Fabric solution.
A Smart Retail IOT use case is the converse of the Smart Energy use case
from a networking POV. While the Smart Energy use case involves transport of
bulk data from the offshore rigs, the Smart Retail use case involves the
dynamic management of mostly time-sensitive transactional data (e.g.
inventory levels, hourly or daily product sales metrics, etc) from retail point of
sale IOT sensors to regional offices and HQ locations of the corporate
enterprise and its global supply chain partners.
Referring to the IT stack level diagram in Figure 49, we note a variety of data
traffic formats that need to be dynamically managed to and from the regional
and HQ offices and the retail point of sale locations.
At Layers 0/1, Operational Technology [OT] data such as parking space sensor
data, motion sensor data, environmental metrics, etc is carried over Internet
protocols (TCP/IP) to the Edge Cloud Node – where location-specific decisions
can be made (often in near real-time) by SW applications that process the OT
data in Enterprise Routers (e.g. Cisco’s ISR 819 series).
Figure 48: Conceptual view of an IOT architecture to support a Smart Retail use case
Assumes Variable-Latency;
Variable BW Network Link
IOT End-Points
We see a role for Cisco’s ACI Fabric solution (running on the enterprise routers
and also in datacenter switches, etc) to dynamically manage the end to end
network connections for reliable and express delivery of key performance
metrics such as product inventory levels, product sales metrics, marketing
promotions, etc between the retail locations and the extended supply chain.
F5’s Layer 4/7 ADC solutions have a key role to play in the Smart Retail use
case. F5’s iRules scripts can be set up to provide differentiated Quality of
Service for in-store customers or in-store staff making secure (e.g.
https://www.retail-store.com) purchases via the company’s e-commerce Web
servers.
F5’s core ADC software and specialized security SW modules can be utilized to
defend the extended retail supply chain against sophisticated Web application
layer attacks (malware in Web links, phishing attacks) and to handle
unexpected surges in retail store Web traffic volumes to Datacenter servers,
etc.
Similar to our discussion in the Smart Energy use case, Infoblox’s IP address
management solution and DNS security solution have a key role to play in
automating IP address assignment across wired and mobile devices and in
safeguarding the corporate DNS infrastructure against DNS layer threats.
Figure 49: Conceptual view of relevant IT stacks involved in Smart Retail use case
Companies
Qualcomm
Qualcomm has been positioning itself as a growth driver of IOT since cellular Figure 50: Qualcomm’s IOT
wireless technology first gained traction. The company started with Omnitracs, initiatives
a platform for truck fleet management and from there the company branched AllJoyn Protocol allowing
out into a number of IOT initiatives. It developed the AllJoyn protocol, which is elements to connect,
agnostic of brand or
now overseen by the Linux foundation and has more partners and contributors operating system
than any other protocol platform being considered. We discussed AllJoyn in IOT development Platform for cellular
our note, as well as its IOT platform. These have both been used to develop platform connectivity
revenue generating products in a number of industry verticals. Automation and Solutions that scale for
Enterprise solutions enterprises
Automotive: In terms of an overall platform, the company has only recently AllPlay media platform Plug and play wireless
audio build on AllJoyn
demoed a platform at Consumer Electronics Show and later at Mobile World
Smart Car Telematics and
Congress. The company retrofitted both a Jeep and a Mercedes, which both computing designed
had multimedia streaming, connected device sharing, rear seat entertainment for the car
systems, enhanced navigation, vehicle diagnostics and location services. The Smart home and
security management
platforms leveraged Snapdragon 602A processors, their connectivity solutions
(Vive) and 9x15 modems. Qualcomm took the modems a step further and Wearables Displays, efficient
computing
recently introduced the Gobi 9X30, with Cat 6 capabilities, Wifi hotspot and Source: Deutsche Bank; Qualcomm
35
Annual unit sales (million)
30
25
20
15
10
0
2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
Embedded Tethered Smartphone
Source: Deutsche Bank; GSMA
Smart home: At Mobile World Congress this year, Qualcomm demoed Overall, we believe the home
connected home solutions: everything ranging from a wine refrigerator, the will be one of the earlier silos
door of which would trigger an alarm if left open, to remote locks, appliance to become increasingly
alerts that pop up on the TV and even content monitoring for kids. Some
automated and adopted
believe that this market (connected home cellular devices) will quickly grow to
just shy of 140 million connected units, from 25 million where it stands today.
We are a bit more conservative than this; while many will quickly understand
the benefits of adding connected solutions in their home, unless it is a
seamless installation procedure or it is new home construction, it could take a
bit longer. Many devices in the home will be connected via WiFi or Bluetooth.
This will offer a cheaper way to leverage the internet, and will also offer
quicker adoption given it can easily sync with the home gateway. To be clear,
Qualcomm is a large player here as well, given its Atheros unit, but the ASP on
the chipsets are much lower. Overall, we believe the home will be one of the
earlier silos to become increasingly automated and adopted. It will likely be
done early with unlicensed connected solutions and we have already seen this,
but there are areas that will need to remain connected via cellular (e.g. smart
meters and security systems). All of this will take time, but we believe
Qualcomm is one of the best positioned companies to leverage the growing
smart home trends.
The company also has a number of gateways and router solutions, which can
be embedded into any device, from utility meters to card access solutions. The
cellular element of these solutions negates the need for wire line, the
installation of which can be a challenge. Given the security elements necessary
for the enterprise vertical, we believe propriety platforms will remain for some
time and thus limit overall unit growth here.
Wearables
Last year Qualcomm introduced the Toq, a smartwatch with its Mirasol display
technology. The move was an attempt to prime the pump for wearable
technology. While OEMs like Samsung and Sony have released their wares,
the unit volume has not been stellar. These are early days for wearable
technology. And the connectivity technology included in these devices likely
will be of the unlicensed kind (WiFi or Bluetooth). There are a number of other
ways Qualcomm can participate here, with the sale of their wireless charging
technology, and to a lesser degree their display technology (though Mirasol
has always struggled) and connectivity solutions. While we think wearables
will eventually be a meaningful market, we think the technology has some way
to go before it becomes a considerable number for component suppliers.
Parting thought
Qualcomm will be a key beneficiary of IOT; that is not an extraordinary
statement. But given our thesis that it will take time for the market to develop,
and with a company that is on the cusp of shipping 1 billion ASICs per year, it
will be some time before it is significant for it . Having said that, when IOT unit
volumes begin to ramp in earnest, Qualcomm will likely be one of the best
positioned companies in the space, as it will have generated significant “lock-
in” given it has developed much of the foundational elements that drive even
the most peripheral of areas of IOT.
Cisco
The basis for our constructive view on Cisco in the IOT infrastructure
opportunity in the out quarters (2H15+) is as follows.
Cisco’s IOT interest spans a wide range of use cases – from home
automation and digital healthcare to smart manufacturing, smart cities
and smart retail.
2. Cisco has the broadest set of touch points in enterprise and service
provider infrastructures – from campus switching, wireless access and
security to datacenter servers, switching, core routing and mobile
packet core – and a broad portfolio of IT services from campus to the
core.
3. We are constructive on Cisco’s IOT opportunity in 2H15+, given our
view that the company has the setup, from a product portfolio,
customer base, market share and sales execution POV, to offer a
packaged bundle of IOT solutions involving millions of smart objects
(i.e. Internet connected wireless sensors) connecting to an Edge Cloud
(based on Cisco’s ISR router, etc – for localized switching, routing,
security, voice, video and network optimization) and leverage
Datacenter Cloud Services for centralized computing, analytics and
storage [refer to Figure 1].
Our Hold rating on Cisco reflects our near-term caution on the company’s core
business (switching and routing in product transition mode) while remaining
constructive on CY15+ opportunities in IOT and product refresh cycles in
datacenter switching, security, carrier routing, etc.
CommScope
The Wireless business segment has been a key driver of CommScope’s overall
top line. And while there is nothing specific in Wireless that falls within IOT per
se, their DAS solution will be a key enabler of IOT, as it is puts the cellular
network closer to the user. We have discussed the possibilities of its DAS
solution, both its current one and its ION-e solution, in a recent S2N (S2N #497
– What the DAS market means for CommScope).
In short, the trends in IOT will impact both Wireless and Enterprise. While
Wireless has the general trend of densification working in its favor, it is likely
the Enterprise segment that will be impacted by IOT.
F5
Buy-rated F5 is our top midcap idea to play the near-term [CY15/16+] spending
on IOT – given our research noting that Network Intelligence and Security are a
Phase 1 priority in the multi-year rollout of IOT use cases in enterprise and
service provider verticals.
A third of the +$2B in incremental networking capex a year (DB view) on IOT
use cases could be utilized for Network Intelligence and Security solutions (we
note: Layer 4/7 capex is typically a third of datacenter networking capex). This
is basis for our view that the Layer 4/7 category leaders (FFIV; BLOX, etc) could
see modest TAM expansion in the $100s of Millions a year range from
enterprise IOT use cases such as Industrial Cyber Security, Smart Energy,
Smart Retail, etc and also service provider IOT use cases such as e-Healthcare,
home automation, etc in the out quarters.
Specific IOT touch points and sales opportunities for F5 could be in the areas
of:
Rollouts of virtual ADCs and HW optimized ADCs in the IOT Datacenter Cloud
– for Network Intelligence and Security functions such as: 1) Application and
Network Firewalling; 2) Web Traffic Steering; 3) Per-Session IT Policy and
Bandwidth Enforcement, 4) Application- and Usage-Specific Billing Metrics,
etc.
From a security attach rate POV, it is our view that F5’s Layer 4/7 systems (BIG
IP and Viprion) could see the security SW modules attach rate scale from the
current +30% of HW platforms sold to around +50%, over the next few years.
Internet of Things use cases are a key catalyst for scaling the company’s
security solutions sales opportunities, in our view. This is given the
significantly higher number of security IT end-points in IOT use cases – which
could be the underlying basis for scaling the quantity and types of security
modules required to defend against a broad set of attack vectors in IOT Cyber
Security use cases.
For example: IOT sensors imbedded in various industrial objects can relay
security incidence monitoring events to F5’s Access Policy Module – and F5’s
TMOS SW is designed to cross-correlate across 1000s of individual security
incidence response and access control events – to generate security trend
analysis patterns, feedback to IT security policy design, etc.
F5’s iRules scripting framework has a core value proposition in IOT use cases –
given the relative ease at which simple English language IT and business
security policies can be defined and implemented in a matter of minutes – to
defend the enterprise architecture against a dynamic set of security threat
vectors – which by definition need a dynamic policy creation and
implementation framework (offered by iRules).
In summary, we believe that the low double-digit FY15 consensus product rev
growth expectations factors in mostly high single-digit growth in F5’s core
ADC business and few points of incremental growth from the Security and
Telco use cases. IOT could be a secular upside driver to consensus product rev
growth expectations for F5 – especially as mainstream IOT use cases in Cyber
Security, Energy, Retail, Transportation, etc start to scale over the next few
years. Network Intelligence and Security are clearly high priority technology
spending areas in Internet of Things use cases, in our view.
Ciena
Buy-rated Ciena could benefit from sales of higher margin optical Ethernet
access products and optical network automation software tools to support IOT
Edge Cloud buildouts. We also note opportunities for Ciena’s Carrier Ethernet
solution and optical network management software tools in the Smart Energy
use case. Undersea cable – carrying optical Ethernet data traffic – is a relevant
use case for sales of Ciena’s carrier Ethernet switches at either ends of the
offshore and onshore optical WAN links. Ciena’s optical network management
SW could be used to dynamically provision optical network transport
equipment at either ends of an optical fiber link.
Infoblox
On the DNS Security side, we believe that DNS Security is a need to have
(versus a nice to have) in IOT use cases, to safeguard DNS servers situated at
the enterprise’s infrastructure borders – i.e. at the network perimeter that
connects the enterprise network to the public Internet and to the company’s’
supply chain partners.
We note that a vast majority of enterprise DNS servers currently lack adequate
security mechanisms to safeguard the DNS servers from security attacks that:
Originate from the public Internet (e.g. DDOS attacks targeted at corporate
DNS servers);
Infoblox recently introduced DNS Security appliances that defend against DNS
security attacks that originate from the “outside-in” and the “inside-out” – and
these DNS security appliances leverage live DNS reputation feeds to cross-
check all incoming and outgoing DNS queries against a constantly updated
live IP address and Web URL feed – so as to identify malicious URLs and
hacking attempts on a company’s DNS servers.
Juniper
Juniper is likely to play into a narrower set of opportunities in IOT, i.e. primarily
in out-year telco IOT use cases that require Juniper’s Contrail SW for service
creation on demand. For example: a telco could use the Contrail SW for
activating a series of Layer 2/7 virtual networking features within its datacenter
for automatically setting up a home automation service for an end-user who
signs up for the service via the carrier’s IOT web portal.
We see a limited role for Juniper in the access segments of IOT use cases, i.e.
in WiFi, campus switching or in campus and branch security. Our cautious
view is based on Juniper’s low single-digit market share in enterprise
networking and lack of meaningful competitive advantage versus market
leader Cisco across a wide range of IOT enterprise networking segments.
Riverbed
Hold-rated Riverbed could modestly benefit from enterprise IOT use cases in
CY15/16+, primarily in network performance monitoring by leveraging
Riverbed’s Cascade product portfolio. That said, we remain cautious on
Riverbed, noting +70% of Riverbed’s FY revs are exposed to a declining
growth WAN optimization (Steelhead) portfolio.
Cavium
While current levels suggest a neutral risk/reward equation – basis for our Hold
rating – given, stock trading at ~25x P/E for ~20% consensus CY15 rev growth
expectation, we have a constructive longer-term view on Cavium’s new multi-
core processors: specifically, Octeon3, Liquid IO and Neuron TCAM chips –
which are relevant for IOT enterprise and service provider use cases.
processing high volumes of aggregated and encrypted IOT sensor data (SSL
Offload, data compression, etc) – as HW acceleration add-ons in datacenter
servers, etc. Similarly, Cavium’s Nitrox processors fit into HW acceleration use
cases in Layer 4/7 ADC and Next-Gen Security appliances.
The Neuron TCAM chip could see potential design wins in high-end Terabit-
scale routers such as Cisco’s NCS, etc – which are likely to be used in service
provider IOT use cases such as for handling millions of IOT transactional
events in home automation, e-Healthcare, Smart Vehicles, etc.
For the present, we remain with our Hold rating on the stock – given the rich
trading multiple – and as we gain further field color on Cavium’s market
opportunity in mainstream IOT Datacenter Cloud use cases.
Ubiquiti
Uniquiti is able to proliferate a number of markets quickly, given its low cost
and network of distributors around the world. Most investors know the
company from its airMax and Unifi product lines; however, it has three other
platforms – airVision, mFi and EdgeMax. airVision was released a few years
ago and was riddled with issues that eventually tempered demand for the While we believe the devices
product. EdgeMax is new, but is purpose built for WISP use in its network
have meaningful utility, we
operating centers and access points and is not necessarily an IOT product.
believe their channel, and its
mFi, on the other hand, is Ubqiuiti’s foray into machine to machine
end-customer (as it stands
communication.
today) will likely not create
The mFi platform includes everything from smart power strips to sensors the demand necessary to
(motion, light, temperature and doors). While we believe the devices have make this platform a
meaningful utility, we believe their channel and its end-customer (as it stands meaningful contributor to the
today) will likely not create the demand necessary to make this platform a top line
meaningful contributor to the top line. If instead, these devices were easy
enough for a consumer to install, and available in known retail locations, our
sense is that the traction would be much more significant. As it stands, we see
it as more of a hobby of the WISP operator, or other tech savvy people.
We grouped Ruckus and Aruba together here as there is not necessarily any
one product or platform directed at IOT with either company; however, both
should see a general uplift from the broad trend of connectivity, as well as
other trends which go along with this such as: 802.11ac adoption, location
analytics, BYOD, Hotspot 2.0 and cloud managed WLAN services. All of this
will play a role in bringing in faster wireless connectivity closer to the user.
Additionally, some IOT modules will connect via WiFi and will require a sort of
dynamic usage of the spectrum – it will be up to the AP to understand this.
This is where Aruba and Ruckus could differentiate their wares, as both have
distanced themselves so far by incrementally adding intelligence into their
AP’s and going further to integrate IOT elements would not be a reach for
either company. In short, we believe that these two will eventually be
beneficiaries of IOT, but it will likely not happen in the near term.
Audience
Audience is known for its audio and voice processors. The company has
Samsung as a significant customer, as well as Chinese vendors like Lenovo,
ZTE and Xiaomi. The audio and voice processing unit will likely continue to
move alongside the trajectory of its OEM handset customers. But where
Audience could make an inroad into IOT is with its Voice Q and Motion Q
technologies, which wakes and sleeps a device based on voice and motion
recognition, thereby efficiently managing battery life. The company recently
demoed versions of the processor at the Consumer Electronics Show and at
Mobile World Congress. It will be integrated into some of its eS700 series of
processors, which will ship in the second half of this year. While it will likely
gain initial traction in the smartphone realm, we could see this being used in
remote controls, wearables, fitness and health devices, mobile computers and
other battery powered devices. Going back to our original thesis, while we
believe that it will be some time before this type of processing capability sees
significant growth, we do think that it will be eventually included in adjacent
markets and Audience could see meaningful upside as a result of this – from
our viewpoint, though, this would be a number years away.
Ixia
AT&T: Most recognize ATT as one of the leading carriers in North America. As
it relates to IOT though, the company provides IP-based communication
services to enterprises, an expanding business line for the company.
Additionally, it owns the largest Wi-Fi network in United States.
Belkin: Belkin has an entire division called WeMo devoted to IOT, with
connected lighting and switches. While mostly known for its wireless routers
and computing peripherals, Belkin likely sees home automation as a key
growth area.
Controlled Network Solutions (CNS): CNS has been providing hosting and IT
support to its customers that are operating in various industries such as
finance, healthcare and manufacturing.
Fon: Fon is WiFi product manufacturer and global WiFi network. The company
leverages the extra capacity of subscribers’ home wireless routers in order to
provide service for other Fon members, in the area. To date, Fon has wireless
capacity in 100 countries and over 7 million hotspots.
Haier: Founded in 1984 in China, Haier is one of the largest producers of white
goods in the world. It has 80,000 employees, five R&D centers and operates in
more than 100 countries. The company has a number of efforts to embed its
products with IOT capabilities; it was one of the first to sign up for
Qualcomm’s AllJoyn network.
HTC: HTC is a handset manufacturer which, given its reliance on Android OS,
has made strides in terms of IOT connectivity. The company has joined and is
an active member of the IOT AllSeen alliance.
iControl Networks: a software based home control platform for managing the
connected home. Applications include music, energy monitoring, lighting
control, traffic, weather and news alerts.
Impinj: Impinj is a major provider of ultra high frequency RFiD solutions, which
are used to locate, identify and authenticate items for applications such as
retail inventory management, warehousing and logistics. The company was
founded in 2000 and has raised over $110 million in venture funding.
Jawbone: Jawbone has developed wearables and audio devices for over 10
years. The company has done well by designing products that appear sleek but
are also technologically innovative. The company’s products include fitness
wearables, wireless speakers and headsets. Most of its products operate via
Bluetooth technology. The company has built a record of being first to market
but with products that are best in class.
Kii Corporation: Kii was formed by the merger of Synclore Corporation and
Servo Software in July 2010. The company created the Kii Platform, which
helps app developers by providing cloud technology solutions and other
development solutions.
LIFX: LIFX was Kickstarter project that raised $1.3 million in three days. It
produced an LED light bulb, equipped with Wi-Fi, which can be controlled by
use of its application.
LG: LG is one of the largest electronic goods producers in the world. Based in
Seoul, South Korea, its main product verticals are home appliances,
entertainment, energy solutions, air conditioning and semiconductors. The
company supported AllJoyn protocols in its most recent iteration of smart TV
releases and released a smart light bulb within the past two weeks.
M87: M87 developed Routing at the Edge (RATE), which is a software solution
designed to move the intelligence to the device rather than the network,
thereby allowing the device to leverage the best connection, be it the macro
cell or another handset. The company is located in Austin Texas and has raised
$3 million in funding.
Panasonic: Panasonic has over 634 companies under its corporate umbrella,
and with that, designs and manufactures a broad range of electronic goods
under the Panasonic brand. The company has developed M2M and IOT
devices and chipsets, most recently releasing a multi-mode M2M chipset that
would allow devices to communicate autonomously over various wireless
protocols.
Quirky: A different company, Quirky crowd sources ideas and then designs and
manufactures the best ones. It designs products across a number of verticals
(not necessarily all related to IOT) and has developed sensors and power strips
that have connectivity and leverage the IOT idea.
Sears: Sears is one of the largest retailers in Canada and United States with
more than 3,900 stores, including specialty and full line retail stores. In some
product areas, the company manufactures its own products and in doing so,
has made inroads into IOT.
Skyworks: Skyworks is one company that is seeing early exposure to the IOT,
resulting in their Broad Mix business segment (infrastructure; connected home;
m2m; medical; auto) to become a main driver for overall growth despite it only
being 30% of the total business. The company had its solutions incorporated
into a number of products including TV’s, wireless lighting, auto navigation
assistance, intelligent thermostats and wearable medical solutions. The
company has front-end modules for WiFi 802.11ac, switches for remote car
entry, converters, touch screen drivers, amplifiers and other, unlicensed front
end modules (e.g. Zigbee for remotes and 900 Mhz for metering). All told, the
company’s analogue processors are seeing meaningful traction with IOT given
their price relative to performance.
TP Link: TP Link is best known for its inexpensive WLAN networking products,
which include switches, routers, ADSL, powerline adapters, networking
adapters and media converters. The company will likely integrate the
consensus protocol within its devices, and given its cost competiveness, will
be one of the main volume producers of IOT connected gateways.
Trimble: Trimble has long created devices that leverage wireless technology,
be it cellular, GPS, or WLAN, which are more effective and easier to use than
their older, analogue counterparts. The company makes connected devices for
industries such as agriculture, construction, transportation and geospatial.
Tuxera: Tuxera’s NTFS and exFAT solutions are designed for the file systems
space. Tuxera provides low power, high performance mobile and embedded
solutions. In 2012, BMW and Audi became the first cars to have Tuxera file
systems installed in them.
Two Bulls: Two Bulls develops mobile & web apps, augmented reality and
enterprise solutions. It is one of the preferred developers of Qualcomm for
augmented reality and is also a member of Apple Consultants Network.
Wilocity – Founded in 2007, Wilocity is based in Israel. It is famous for its low
power 60 GHZ wireless chipset with data rates up to 7 Gbps. It provides
wireless connectivity and networking solutions with technological partners,
including Marvell Semiconductors and Qualcomm.
Winner Micro: Based in China, Winner Micro develops IOT centric wireless
communication chips and solutions, and does so for a variety of verticals
including home, medical and industrial fields
Appendix 1
Important Disclosures
Additional information available upon request
Disclosure checklist
Company Ticker Recent price* Disclosure
Commscope COMM.OQ 27.84 (USD) 2 May 14 1,2,6,7,8
Cisco Systems CSCO.OQ 22.94 (USD) 2 May 14 1,2,6,7,8,14,15
F5 Networks FFIV.OQ 103.72 (USD) 2 May 14 2
Qualcomm QCOM.OQ 78.99 (USD) 2 May 14 2,6,7,8,14,15
*Prices are sourced from local exchanges via Reuters, Bloomberg and other vendors. Data is sourced from Deutsche Bank and subject companies
1. Within the past year, Deutsche Bank and/or its affiliate(s) has managed or co-managed a public or private offering
for this company, for which it received fees.
2. Deutsche Bank and/or its affiliate(s) makes a market in securities issued by this company.
6. Deutsche Bank and/or its affiliate(s) owns one percent or more of any class of common equity securities of this
company calculated under computational methods required by US law.
7. Deutsche Bank and/or its affiliate(s) has received compensation from this company for the provision of investment
banking or financial advisory services within the past year.
8. Deutsche Bank and/or its affiliate(s) expects to receive, or intends to seek, compensation for investment banking
services from this company in the next three months.
14. Deutsche Bank and/or its affiliate(s) has received non-investment banking related compensation from this company
within the past year.
15. This company has been a client of Deutsche Bank Securities Inc. within the past year, during which time it received
non-investment banking securities-related services.
1. Within the past year, Deutsche Bank and/or its affiliate(s) has managed or co-managed a public or private offering
for this company, for which it received fees.
2. Deutsche Bank and/or its affiliate(s) makes a market in securities issued by this company.
6. Deutsche Bank and/or its affiliate(s) owns one percent or more of any class of common equity securities of this
company calculated under computational methods required by US law.
7. Deutsche Bank and/or its affiliate(s) has received compensation from this company for the provision of investment
banking or financial advisory services within the past year.
For disclosures pertaining to recommendations or estimates made on securities other than the primary subject of this
research, please see the most recently published company report or visit our global disclosure look-up page on our
website at http://gm.db.com/ger/disclosure/DisclosureDirectory.eqsr
Analyst Certification
The views expressed in this report accurately reflect the personal views of the undersigned lead analyst about the
subject issuers and the securities of those issuers. In addition, the undersigned lead analyst has not and will not receive
any compensation for providing a specific recommendation or view in this report. Brian Modoff
Current Recommendations
15.00
Buy
Hold
10.00 Sell
Not Rated
Suspended Rating
5.00 *New Recommendation Structure
as of September 9,2002
0.00
Oct 13 Jan 14 Apr 14
Date
1. 12/04/2013: Upgrade to Buy, Target Price Change USD22.00 3. 04/17/2014: Buy, Target Price Change USD28.00
2. 02/21/2014: Buy, Target Price Change USD24.00 4. 04/30/2014: Buy, Target Price Change USD30.00
2 3
Current Recommendations
15.00
Buy
Hold
10.00 Sell
Not Rated
Suspended Rating
5.00 *New Recommendation Structure
as of September 9,2002
0.00
May 11 Aug 11 Nov 11 Feb 12 May 12 Aug 12 Nov 12 Feb 13 May 13 Aug 13 Nov 13 Feb 14
Date
1. 05/12/2011: Hold, Target Price Change USD19.00 8. 11/14/2012: Buy, Target Price Change USD22.00
2. 07/11/2011: Hold, Target Price Change USD18.00 9. 02/04/2013: Buy, Target Price Change USD24.00
3. 08/11/2011: Hold, Target Price Change USD17.00 10. 05/16/2013: Buy, Target Price Change USD25.00
4. 11/10/2011: Upgrade to Buy, Target Price Change USD22.00 11. 07/01/2013: Buy, Target Price Change USD26.00
5. 02/09/2012: Buy, Target Price Change USD24.00 12. 08/02/2013: Buy, Target Price Change USD28.00
6. 05/10/2012: Buy, Target Price Change USD22.00 13. 11/14/2013: Downgrade to Hold, Target Price Change USD25.00
7. 11/04/2012: Buy, Target Price Change USD21.00 14. 02/13/2014: Hold, Target Price Change USD24.00
3 14
13
12 Current Recommendations
80.00 12
Buy
Hold
60.00
Sell
Not Rated
40.00 Suspended Rating
*New Recommendation Structure
20.00 as of September 9,2002
0.00
May 11 Aug 11 Nov 11 Feb 12 May 12 Aug 12 Nov 12 Feb 13 May 13 Aug 13 Nov 13 Feb 14
Date
1. 08/12/2011: Buy, Target Price Change USD110.00 10. 10/25/2012: Buy, Target Price Change USD116.00
2. 09/04/2011: Buy, Target Price Change USD95.00 11. 04/05/2013: Buy, Target Price Change USD95.00
3. 10/26/2011: Buy, Target Price Change USD110.00 12. 04/25/2013: Buy, Target Price Change USD93.00
4. 11/13/2011: Buy, Target Price Change USD125.00 13. 07/25/2013: Buy, Target Price Change USD100.00
5. 01/19/2012: Buy, Target Price Change USD130.00 14. 10/24/2013: Buy, Target Price Change USD107.00
6. 04/02/2012: Buy, Target Price Change USD135.00 15. 01/23/2014: Buy, Target Price Change USD120.00
7. 04/19/2012: Buy, Target Price Change USD150.00 16. 03/03/2014: Buy, Target Price Change USD130.00
8. 05/24/2012: Buy, Target Price Change USD140.00 17. 04/24/2014: Buy, Target Price Change USD135.00
9. 07/19/2012: Buy, Target Price Change USD136.00
40.00 Buy
Hold
30.00 Sell
Not Rated
Suspended Rating
20.00
*New Recommendation Structure
10.00 as of September 9,2002
0.00
May 11 Aug 11 Nov 11 Feb 12 May 12 Aug 12 Nov 12 Feb 13 May 13 Aug 13 Nov 13 Feb 14
Date
1. 07/21/2011: Buy, Target Price Change USD67.00 7. 11/08/2012: Buy, Target Price Change USD74.00
2. 09/04/2011: Buy, Target Price Change USD65.00 8. 01/31/2013: Buy, Target Price Change USD78.00
3. 11/03/2011: Buy, Target Price Change USD70.00 9. 08/17/2013: Buy, Target Price Change USD80.00
4. 02/02/2012: Buy, Target Price Change USD72.00 10. 11/07/2013: Buy, Target Price Change USD78.00
5. 03/28/2012: Buy, Target Price Change USD75.00 11. 03/21/2014: Buy, Target Price Change USD86.00
6. 07/19/2012: Buy, Target Price Change USD70.00
Regulatory Disclosures
1. Important Additional Conflict Disclosures
Aside from within this report, important conflict disclosures can also be found at https://gm.db.com/equities under the
"Disclosures Lookup" and "Legal" tabs. Investors are strongly encouraged to review this information before investing.
3. Country-Specific Disclosures
Australia and New Zealand: This research, and any access to it, is intended only for "wholesale clients" within the
meaning of the Australian Corporations Act and New Zealand Financial Advisors Act respectively.
Brazil: The views expressed above accurately reflect personal views of the authors about the subject company(ies) and
its(their) securities, including in relation to Deutsche Bank. The compensation of the equity research analyst(s) is
indirectly affected by revenues deriving from the business and financial transactions of Deutsche Bank. In cases where
at least one Brazil based analyst (identified by a phone number starting with +55 country code) has taken part in the
preparation of this research report, the Brazil based analyst whose name appears first assumes primary responsibility for
its content from a Brazilian regulatory perspective and for its compliance with CVM Instruction # 483.
EU countries: Disclosures relating to our obligations under MiFiD can be found at
http://www.globalmarkets.db.com/riskdisclosures.
Japan: Disclosures under the Financial Instruments and Exchange Law: Company name - Deutsche Securities Inc.
Registration number - Registered as a financial instruments dealer by the Head of the Kanto Local Finance Bureau
(Kinsho) No. 117. Member of associations: JSDA, Type II Financial Instruments Firms Association, The Financial Futures
Association of Japan, Japan Investment Advisers Association. Commissions and risks involved in stock transactions - for
stock transactions, we charge stock commissions and consumption tax by multiplying the transaction amount by the
commission rate agreed with each customer. Stock transactions can lead to losses as a result of share price fluctuations
and other factors. Transactions in foreign stocks can lead to additional losses stemming from foreign exchange
fluctuations. "Moody's", "Standard & Poor's", and "Fitch" mentioned in this report are not registered credit rating
agencies in Japan unless Japan or "Nippon" is specifically designated in the name of the entity. Reports on Japanese
listed companies not written by analysts of Deutsche Securities Inc. (DSI) are written by Deutsche Bank Group's analysts
with the coverage companies specified by DSI.
Qatar: Deutsche Bank AG in the Qatar Financial Centre (registered no. 00032) is regulated by the Qatar Financial Centre
Regulatory Authority. Deutsche Bank AG - QFC Branch may only undertake the financial services activities that fall
within the scope of its existing QFCRA license. Principal place of business in the QFC: Qatar Financial Centre, Tower,
West Bay, Level 5, PO Box 14928, Doha, Qatar. This information has been distributed by Deutsche Bank AG. Related
financial products or services are only available to Business Customers, as defined by the Qatar Financial Centre
Regulatory Authority.
Russia: This information, interpretation and opinions submitted herein are not in the context of, and do not constitute,
any appraisal or evaluation activity requiring a license in the Russian Federation.
Kingdom of Saudi Arabia: Deutsche Securities Saudi Arabia LLC Company, (registered no. 07073-37) is regulated by the
Capital Market Authority. Deutsche Securities Saudi Arabia may only undertake the financial services activities that fall
within the scope of its existing CMA license. Principal place of business in Saudi Arabia: King Fahad Road, Al Olaya
District, P.O. Box 301809, Faisaliah Tower - 17th Floor, 11372 Riyadh, Saudi Arabia.
United Arab Emirates: Deutsche Bank AG in the Dubai International Financial Centre (registered no. 00045) is regulated
by the Dubai Financial Services Authority. Deutsche Bank AG - DIFC Branch may only undertake the financial services
activities that fall within the scope of its existing DFSA license. Principal place of business in the DIFC: Dubai
International Financial Centre, The Gate Village, Building 5, PO Box 504902, Dubai, U.A.E. This information has been
distributed by Deutsche Bank AG. Related financial products or services are only available to Professional Clients, as
defined by the Dubai Financial Services Authority.
International locations
Deutsche Bank AG Deutsche Bank AG Deutsche Bank AG Deutsche Securities Inc.
Deutsche Bank Place Große Gallusstraße 10-14 Filiale Hongkong 2-11-1 Nagatacho
Level 16 60272 Frankfurt am Main International Commerce Centre, Sanno Park Tower
Corner of Hunter & Phillip Streets Germany 1 Austin Road West,Kowloon, Chiyoda-ku, Tokyo 100-6171
Sydney, NSW 2000 Tel: (49) 69 910 00 Hong Kong Japan
Australia Tel: (852) 2203 8888 Tel: (81) 3 5156 6770
Tel: (61) 2 8258 1234
Deutsche Bank AG London Deutsche Bank Securities Inc.
1 Great Winchester Street 60 Wall Street
London EC2N 2EQ New York, NY 10005
United Kingdom United States of America
Tel: (44) 20 7545 8000 Tel: (1) 212 250 2500
Global Disclaimer
The information and opinions in this report were prepared by Deutsche Bank AG or one of its affiliates (collectively "Deutsche Bank"). The information herein is believed to be reliable and has been obtained from public
sources believed to be reliable. Deutsche Bank makes no representation as to the accuracy or completeness of such information.
Deutsche Bank may engage in securities transactions, on a proprietary basis or otherwise, in a manner inconsistent with the view taken in this research report. In addition, others within Deutsche Bank, including
strategists and sales staff, may take a view that is inconsistent with that taken in this research report.
Opinions, estimates and projections in this report constitute the current judgement of the author as of the date of this report. They do not necessarily reflect the opinions of Deutsche Bank and are subject to change
without notice. Deutsche Bank has no obligation to update, modify or amend this report or to otherwise notify a recipient thereof in the event that any opinion, forecast or estimate set forth herein, changes or
subsequently becomes inaccurate. Prices and availability of financial instruments are subject to change without notice. This report is provided for informational purposes only. It is not an offer or a solicitation of an
offer to buy or sell any financial instruments or to participate in any particular trading strategy. Target prices are inherently imprecise and a product of the analyst judgement.
In August 2009, Deutsche Bank instituted a new policy whereby analysts may choose not to set or maintain a target price of certain issuers under coverage with a Hold rating. In particular, this will typically occur for
"Hold" rated stocks having a market cap smaller than most other companies in its sector or region. We believe that such policy will allow us to make best use of our resources. Please visit our website at
http://gm.db.com to determine the target price of any stock.
The financial instruments discussed in this report may not be suitable for all investors and investors must make their own informed investment decisions. Stock transactions can lead to losses as a result of price
fluctuations and other factors. If a financial instrument is denominated in a currency other than an investor's currency, a change in exchange rates may adversely affect the investment. Past performance is not
necessarily indicative of future results. Deutsche Bank may with respect to securities covered by this report, sell to or buy from customers on a principal basis, and consider this report in deciding to trade on a
proprietary basis.
Unless governing law provides otherwise, all transactions should be executed through the Deutsche Bank entity in the investor's home jurisdiction. In the U.S. this report is approved and/or distributed by Deutsche
Bank Securities Inc., a member of the NYSE, the NASD, NFA and SIPC. In Germany this report is approved and/or communicated by Deutsche Bank AG Frankfurt authorized by the BaFin. In the United Kingdom this
report is approved and/or communicated by Deutsche Bank AG London, a member of the London Stock Exchange and regulated by the Financial Conduct Authority for the conduct of investment business in the UK
and authorized by the BaFin. This report is distributed in Hong Kong by Deutsche Bank AG, Hong Kong Branch, in Korea by Deutsche Securities Korea Co. This report is distributed in Singapore by Deutsche Bank AG,
Singapore Branch or Deutsche Securities Asia Limited, Singapore Branch (One Raffles Quay #18-00 South Tower Singapore 048583, +65 6423 8001), and recipients in Singapore of this report are to contact Deutsche
Bank AG, Singapore Branch or Deutsche Securities Asia Limited, Singapore Branch in respect of any matters arising from, or in connection with, this report. Where this report is issued or promulgated in Singapore to a
person who is not an accredited investor, expert investor or institutional investor (as defined in the applicable Singapore laws and regulations), Deutsche Bank AG, Singapore Branch or Deutsche Securities Asia
Limited, Singapore Branch accepts legal responsibility to such person for the contents of this report. In Japan this report is approved and/or distributed by Deutsche Securities Inc. The information contained in this
report does not constitute the provision of investment advice. In Australia, retail clients should obtain a copy of a Product Disclosure Statement (PDS) relating to any financial product referred to in this report and
consider the PDS before making any decision about whether to acquire the product. Deutsche Bank AG Johannesburg is incorporated in the Federal Republic of Germany (Branch Register Number in South Africa:
1998/003298/10). Additional information relative to securities, other financial products or issuers discussed in this report is available upon request. This report may not be reproduced, distributed or published by any
person for any purpose without Deutsche Bank's prior written consent. Please cite source when quoting.
Copyright © 2014 Deutsche Bank AG
GRCM2014PROD031966