Reliability through LTE backup

When the excavator cuts the internet line: In many cases, a lack of reliability in solutions and systems, especially in security technology, leads to considerable damage and lasting consequences. Guaranteeing reliability is not difficult. The key here is the connection. Mobile connectivity and LTE backup solutions make this possible even beyond the insecure use of cables!

90% of our customers and partners have asked themselves the following questions:

 

  1. How do our applications and security technology remain functional in an emergency?
  2. Is our company sufficiently protected?
  3. What measures are important to ensure “resilience”?
  4. Is the issue of “reliability” taken seriously? Or are we aware of its importance?
  5. How costly is a failure and can we afford the consequences?

This also gives rise to questions and dependencies for manufacturers of devices and applications in the field of security technology.

Their aim is to ensure the reliability of their own products and solutions and thus reliably relieve their end customers of worries and fears.

The decisive key to fault and operational reliability is the connection. Mobile connectivity also makes this possible beyond the conventional way of a cable!

What characterizes reliability and redundancy?

If a system or application failure leads to undesirable consequences, then reliability should be the most important criterion when designing/procuring new systems or optimizing/further developing these systems.

Fail-safety can be defined on the basis of various factors that critical applications in particular must fulfill:

  • Availability
  • Redundancy
  • Robustness
  • Recoverability
  • Scalability
  • Security
  • Monitoring and diagnosis

Availability describes how reliably a system functions and can provide the required services. In contrast, the redundancy of a system describes whether the system contains different components that can replace each other and thus minimize the risk of failure, e.g. through an LTE backup.

If an application can also deal with errors, repair and restore itself, this is referred to as robustness and recoverability. The scalability of a system is also important for ensuring protection against failure. This describes whether an application can adapt to changing requirements without losing reliability.

The security factor indicates whether a system is protected against access by unauthorized persons and attacks of various kinds. To ensure the reliability of an application, it is also important how well a system can be monitored and diagnosed. The decisive factor here is whether problems can be identified and rectified at an early stage.

If these seven factors are fulfilled, a device or system can be said to be fail-safe.

The challenges behind reliability

The secure use of devices and systems in small, medium-sized or even large companies, for example for the security of people, buildings and objects, depends on their connection to the data-transmitting solutions. These can be mobile or based on fixed data transmission paths, such as copper or fiber optic cables.

If a disruption occurs, e.g. if a necessary cable is cut during construction work, smooth operation without serious consequences is only possible under one condition: if at least two different solutions are used for data transmission, which can replace each other in an emergency. Redundant (security) technology is therefore required. A backup, so to speak, is required for the variant used in the normal state. Internet of Things (IoT) solutions are particularly suitable for this.

Let’s put it this way:

Today more than ever, companies are dependent on a reliable and secure Internet/data connection and the consistent functioning of their security systems. If this fails for any internal or external reason, the company may be unable to operate. Too much time usually passes before a technician arrives on site and can solve the problem.

The business inability to act is often due to the fact that not only business data is affected by the failure, but also many applications and processes are partially or completely connected to these systems. The follow-up costs should not be underestimated either.

How costly are failures and can I afford the consequences?

Accidental damage to pipes alone leads to considerable costs every year. Pipes for waste water, power lines, broadband cables and the like often run very close to each other. Identification is difficult as there is usually no complete site plan available. Around 100,000 damage reports with a value of approx. 500 million euros are received each year. Experts suspect that the actual sum is probably much higher. In addition to the unclear liability situation, the losses of the affected companies themselves are still missing. (Source: Meistertipp, 2020)

This alone gives a good impression of how expensive accidental damage alone can be, not including deliberate damage. However, the direct consequences for companies are usually much more serious. A standstill in availability has an enormous impact, even in the event of short-term downtime, this quickly has a negative effect on sales.

Another factor that should not be underestimated is the impact of such an outage on the perception of the company. As the GBB flash survey (2019) shows using the example of the banking and financial services sector, damage to image should not be underestimated. At 25%, loss of reputation is perceived as the greatest risk, ahead of data loss at 23.8%. The reason for this is that companies are dependent on their customers and employees. If credibility and trust in the company concerned fall, it is not uncommon for future sales to fall as well.

Protection against this is not necessarily expensive. If an outage lasting several hours is not relevant for you, there is no need to invest large sums in reliability and redundancy.

The path to a solution via LTE backup

The consequences that can arise from the failure of systems lead us to our clear recommendation: to use at least two independent, redundant solutions or technologies that can do the same thing and “stand in for” each other. In some cases, this is even defined as mandatory by law. Possible failure scenarios for devices and systems should therefore already be taken into account in the configuration of the security technology or the appropriate solutions for the respective processes should be found.

Companies often start taking precautions too late – frequently only after something serious has happened and damage has already occurred. Instead, depending on how high the risk is assessed in a company, appropriate fail-safe concepts and solutions should be developed and implemented. Based on our experience, it is better to start with the worst-case scenario in order to determine the safest way to prevent a failure.

Trust is good – control is better

There are several ways to ensure a fail-safe Internet connection:

1. the two-way solution or multiple protection:

This requires several connections. For example, different cable connections, e.g. fiber optic and coaxial cable, which are ideally not laid in the same place.

2. the solution via LTE backup / mobile backup

The combination of a two-way solution consisting of a wired and a mobile-based backup solution can also be implemented!

How solution providers can ensure fail-safe systems

As a provider of solutions that can be categorized in the area of security systems in particular, there are a number of things to consider in addition to the legal provisions. The security applications must be designed in such a way that users are optimally protected against system failures and that as little additional effort or additional applications as possible are required to ensure this.

This means that (security) solutions should be developed in such a way that advanced hardware, software and service standards are met. It must also be ensured that the products can meet the requirements in terms of safety, robustness, reliability, redundancy and availability. Devices with new or additional performance characteristics or features may have to be developed in order to be able to process data, voice and SMS. In particular, higher bandwidths and volumes of hardware and software must be traded. In addition to these factors, it should also be checked whether certain certifications are required in order to meet the necessary standards.

The development and enhancement of existing solutions also provides the opportunity to tap into new customer target groups. The targeted testing of new usage and billing models through the use of IoT solutions as a backup also opens up new revenue potential for solution providers. This makes it possible to develop a customized business model based on FUSION IoT.

The way to achieve this is very simple: ensure greater security, avoid disruptions and automate processes.

Fail-safe IoT solutions and security technology in use

Want some use cases? Below you will find some examples of systems in the field of security technology that rely on reliable LTE backup solutions. This means that the applications can also guarantee safety in hazardous situations or in the event of damage to transmission systems.

Video surveillance

The classic: Video surveillance is already frequently used by private individuals and companies. In addition to monitoring buildings, it can also be used in (remote) locations.

There are a number of advantages to using video surveillance systems, especially when they are combined with other security systems. The advantages include:

  • Image and sound recordings can be stored digitally
  • Software can be used for the purpose of facial recognition or license plate recognition
  • Crimes can be solved through recordings (course of events, persons, etc.)
  • Avoidance of vandalism

She is interested in the field of IoT video surveillance. Here you can find more information on how smart video systems enable data analysis, are used in communities in combination with other IoT applications and reduce the existing risks in temporary locations.

Elevator emergency call

Never been stuck in an elevator before? Be happy! Such a situation often triggers anxiety and panic in the people affected. It’s good to get help quickly.

The elevator emergency call gives trapped persons the opportunity to call for external help via an integrated emergency call system so that they can leave the building as quickly as possible. Ideally, the emergency call system directs users to an emergency call center manned around the clock, which notifies the maintenance company in the event of a fault.

An elevator emergency call is now even mandatory for elevators. After all, these systems have to function reliably even in the event of a power failure and the like. TÜV SÜD’s “Operational Safety Ordinance – Elevator” provides further insight into the obligation for two-way communication systems for emergency call systems in elevators.

Fire alarm systems (BMA)

Safety when things get hot: A fire alarm system is a hazard detection system from the field of preventive fire protection. It contains a fire alarm control panel to receive and evaluate events from various fire detectors and to initiate reactions.

Even under the special conditions of a fire (high temperatures, destruction of data transmission systems, etc.), the fire alarm system must reliably forward the fire alarm to the permanently manned control center to alert the local fire department.

There are also various other requirements for the fire alarm system and the fail-safe data transmission path:

  • Triggering of an internal alarm to rule out false alarms
  • Opening smoke extraction systems
  • Control of elevators
  • Closing fire protection closures
  • Triggering of an object extinguishing system, e.g. CO₂ extinguishing system

A number of regulations must be observed when installing and operating fire alarm systems. However, fire alarm systems with smart IoT solutions have many advantages, for example they can reduce service and maintenance costs.

Monitoring of electronic cash register systems through backup via mobile radio

No data transfer, no money! This is solved by an electronic checkout system with LTE backup function. An electronic cash register system is an IT solution that adds additional functions to a conventional cash register.

The monitoring of electronic POS systems by means of a backup via mobile radio serves to maintain business operations and communication in the event of a failure of the Internet or primary connection. Such a system is preferably used in the catering and retail sectors and related industries.

There are several advantages to using them:

  • No downtime and proactive damage prevention
  • Maximum security through coverage of several or even all LTE networks per country
  • Individual and scalable solution, independent of location
  • Alternative transmission path for data transfer & communication

The coronavirus pandemic has had a significant impact on the development of digital standards, including the use of digital POS systems. You can find out more about developments in the hospitality industry here.

IoT solutions in use: how does success manifest itself?

If the system and the IoT solution are connected to each other and the regular system is only affected to a reasonable extent or not at all during the test, this is considered successful protection against failures.

Instead, are you still at the beginning or in the middle of the development process for systems and devices and want the right partner for fail-safe connections at your side? FUSION IoT is here for you!

Flexible IoT solutions with fail-safe connectivity

Flexible IoT solutions enable device and system manufacturers and their customers to ensure application reliability and redundancy through connectivity.

FUSION IoT is a brand of Epsilon Telecommunications GmbH, based in Oberkotzau in the district of Hof in Upper Franconia. Thanks to many years of experience and our huge partner network, with extensive expertise in a wide range of industries, we can knit the right solution for your needs and applications. It is not without reason that we are the most successful German service provider for telecommunications in the business customer segment.

We score with:

  • Flexibility – in the offer and beyond the conclusion of the contract
  • Independence – through objective advice and a broad portfolio with different network operators
  • Expanded market access – access to the large partner network of German SMEs of Epsilon Telecom and FUSION IoT

Are you looking for a solution to ensure the reliability of your products or do you want to make your company’s systems fail-safe?

We offer you the crucial connectivity and solutions together with our partners. One example: LTE Backup as a complete package to secure the primary Internet connection for security-relevant applications.

Do you offer solutions in the field of security systems and security technology and want to make them smarter with IoT solutions or optimize your existing portfolio? We listen and work with you to develop your ideas and products into market-ready IoT solutions. You can also benefit from extended market access through our broad network of partners in the German SME sector.

AUTHOR:IN

Florian Sunday

FUSION IoT
Head of Project Management FUSION IoT

Do you have questions about the article?

info@fusion-iot.de
+49 800-9900909

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.