Tondo Smart Lighting also creates an open standards-based Smart City network for connecting sensors and other wireless and wired devices to Tondo's Cloud-IQ management platform.
This can reduce sensor and device deployment costs by 80% or more versus proprietary networks or individual cellular connections, with a 2.7x or greater benefit versus your LED retrofit project, and 3.5x over Smart Lighting alone.
Read more about the Business Case for Smart Lighting on this link.
Normally open(NO) and Normally closed (NC) are terms used to define the states that switches, sensors or relay contacts are under when they are not activated.
A NO contact or a normally open contact is the one that remains open until a certain condition is satisfied such as a button being pressed or some other manner of activation such as those based on temperature, pressure, etc.
A NC contact or normally closed contact is the exact opposite of NO contact by function. It remains closed until a certain condition is satisfied.
Lighting control cabinets typically control a group of street lights or advertising signage from a "control cabinet". These controls have historically provided on-off functionality based on the time of day using an "astronomical clock"-based switch or daylight photosensor. Lights are controlled in groups with no individual control over a specific light.
Although new controllers such as Tondo's Edge-IQ controller have replaced the cabinet-based approach with new technologies that include advanced dimming, remote cloud-control, and support for functionality including sensors and switches, there are many outdoor lights and signs that do not support on-lamp control. Tondo's Cabinet-IQ controller provides new advanced IoT technology support for existing cabinet-controlled lighting.
CAT-M/LTE-M and NB-IoT are similar but have differences that may make one suitable over another, or simply selected based on the support for one or the other that is available in your area.
NB-IoT uses a narrow bandwidth of 200 kHz, where CAT-M uses 1.4 MHz. The maximum data rate for NB-IoT is ~ 250 kb per second, with CAT-M1 reaching ~ 1 Mbps. CAT-M is marginally less energy efficient than NB-IoT. Although NB-IoT has a lower speed, both NB-IoT and CAT-M are suitable for sensor communications since sensors typically do not require much bandwidth.
Both NB-IoT and CAT-M1 are supported under the 5G technology specifications and therefore are ideal for selecting as a standard for sensor communications.
CAT-M wireless (aka LTE-M) is a low-power wide area network (LPWAN) cellular data transmission standard that operates over the data and physical layer. CAT-M was designed for IoT projects, with an average upload speed between 200 kbps and 400 kbps.
Eddystone is an open-source Bluetooth advertising protocol originally designed by Google. It can be used by mobile device applications to deliver improved proximity-based experiences that include applications such as Google Maps.
These packets can be discovered with any Bluetooth LE APIs such as Core Bluetooth on iOS, or android.bluetooth.le on Android. You can also use them with Google’s Nearby Messages API, which can be integrated into an iOS or Android app, and receive “messages” in those apps when a person enters or exits a range of beacons.
Tondo's 2022 estimate was calculated for each lighting category by applying market growth factors for each lighting category between 2015 and 2021 based on U.S. Census data to the DOE dataset.
A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to access and use data.
The API spells out the proper way for a developer to write a program requesting services from an operating system or other application.
You can read more from the source of this definition at TechTarget here.
A DIN rail is a metal rail of a standard type widely used for mounting circuit breakers and industrial control equipment inside equipment racks.
IP stands for "ingress protection". For IP67, this means:
"6" describes protection of solid particles: No ingress of dust; complete protection against contact (dust-tight). A vacuum must be applied. Test duration of up to 8 hours based on airflow.
"7" describes the protection from water: Ingress of water in harmful quantity shall not be possible when the enclosure is immersed in water under defined conditions of pressure and time (up to 1 meter (3 ft 3 in) of submersion). Test duration: 30 minutes.
Modbus is a data communications protocol originally published in 1979. Modbus has become a de facto standard communication protocol and is now a commonly available means of connecting and communicating with industrial electronic devices.
RS-485, also known as TIA-485(-A) or EIA-485, is a serial communications standard.
Electrical signalling is balanced, and multipoint systems are supported. Digital communications networks implementing the standard can be used effectively over long distances and in electrically noisy environments.
4G devices will work on 4G LTE networks and the earlier cellular technologies, including 3G, EGPRS, and 2G.
Smart city sensors require very little bandwidth, and 3G EGPRS and 4G LTE can easily support the required data rates.
5G networks are relatively new, and most 5G deployments use a combination of 4G and 5G networks.
DALI-2 refers to the latest version of the DALI protocol. While DALI version 1 only included control gear, DALI-2 includes control devices such as application controllers and input devices (e.g. sensors), as well as bus power supplies.
Zhaga Book 18 describes a smart interface between outdoor luminaires and sensing/ communication nodes.
Zhaga Book 18 allows any certified node to operate with any certified luminaire. Certified luminaires and sensing / communication modules are available from multiple suppliers, establishing an ecosystem of compatible products.
The NEMA ANSI C137.4-2021 builds on the NEMA C137.41 7-pin connector standard and the DALI communication protocol. It has additional characteristics and features that align very closely with the D4i family of specifications from the DALI Alliance.
D4i and ANSI C137.4-2021 specify the digital communication between luminaires and devices including sensors and network lighting controllers. The expanded ANSI C137.4-2021 now includes energy reporting data and diagnostics and maintenance data.
The NEMA ANSI C137.10 standard specifies roadway and area lighting equipment connector compatibility. The 3-pin standard does not provide for dimming control, but provides for on/off operation. The later standard C137.41 adds dimming control (5- and 7-pin connectors) and sensor control (7-pin connectors). The newer C137.4-2021 standard provides enhanced functionality and compatibility with the DALI D4i lighting and sensor control standard.
The NEMA ANSI C137.41 standard specifies covers roadway and area lighting equipment connection interoperability. The 7-pin receptacle provides for dimming control and sensor communications.
The NEMA ANSI C137.41 5-pin connector variant adds support for dimming control, but does not include sensor communications support which is supported by the 7-pin connector.
DALI, or Digital Addressable Lighting Interface, is a dedicated protocol for digital lighting control that enables the easy installation of robust, scalable and flexible lighting networks.
Wiring is relatively simple; DALI power and data is carried by the same pair of wires, without the need for a separate bus cable.
The TALQ Consortium has established a globally accepted standard for management software interfaces to configure, command, control and monitor heterogeneous outdoor device networks (ODN) including smart street lighting.
This way interoperability between Central Management Software (CMS) and Outdoor Device Networks (ODN, so called ‘gateways’) for smart city applications from different vendors is enabled, such that a single CMS can control different ODNs in different parts of a city or region.
D4i is the DALI standard for intelligent, IoT-ready luminaires.
By taking care of control and power requirements, D4i makes it much easier to mount sensors and communication devices on luminaires. In addition, intelligent D4i LED drivers inside the luminaire have the capability to store and report a wide range of luminaire, energy and diagnostics data in a standardized format.
Highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. Roots of trust provide a firm foundation from which to build security and trust.
Read more at the National Institute of Standards and Technology: Roots of Trust
The 0.1, 0.2, and 0.5 accuracy class electricity meters established within ANSI C12.20-2015 are accurate to within +/-0.1%, +/-0.2%, and +/-0.5% of true value at a full load.
Tondo's controllers utilize a chipset containing the ARM Cryptocell 300 cryptographic accelerator chip with hardware-protected vault and Root of Trust security. Read more about the ARM 300 family here: ARM Cryptocell 300 Family Overview
The world would collectively achieve 10,546 TWh of energy savings by 2030 [with energy efficient lighting], a sum comparable to over 40% of the world electricity generation in 2011. Saving this amount of energy would prevent the emissions of 5,400 Mt CO2, a figure equivalent to over 15% of the global emissions in 2011.
Municipalities and utilities across the United States are increasingly confronted with the expensive and disruptive problem of copper wire theft from streetlighting and public infrastructure. Wire theft isn’t merely an economic issue—it undermines public safety, community confidence, and operational reliability. Streetlights left disabled due to wire theft pose safety risks and negatively affect the quality of life in affected communities.
Wire theft from pole in St. Paul, Minnesota
The Persistent Problem of Wire Theft
Driven by high scrap metal prices and relatively low risks of apprehension, wire theft incidents continue to rise, placing significant operational and financial burdens on public works and utility departments. Each incident typically incurs costs for repairs, traffic control, emergency response, and associated liabilities. Typical repair costs range from $2,000 to nearly $5,000 per incident, not including indirect public-safety and service-interruption impacts (Miami-Dade Office of Inspector General, 2013; Inside Lighting, 2024).
Current Solutions and Their Limitations
Municipalities traditionally rely on several methods to curb wire theft:
Physical Security Measures: Locking junction boxes, installing polymer lids, and deploying wire retention clamps. While simple and direct, these methods have proven limited in effectiveness—thieves often bypass physical barriers quickly, creating ongoing maintenance and replacement costs (CALTrans, 2013; Miami-Dade Office of Inspector General, 2013).
Alternative Wiring Materials: Switching to copper-clad aluminum or steel wiring reduces theft attractiveness, but these retrofits can be prohibitively expensive and disruptive in existing infrastructure scenarios (CBC, 2014).
Marking Technologies: Marking copper wiring with microdots or identifiable chemical signatures can aid in prosecution, but they rarely deter theft outright due to low immediate risk for the thieves (Bureau of Transportation Statistics, 2009).
Legislative and Regulatory Solutions: Stricter laws around scrap metal sales and increased penalties for theft provide long-term support but lack the immediate deterrent effect necessary for stopping opportunistic theft (TET Coalition, 2024).
Solar Retrofits: Converting to solar fixtures removes the copper theft issue entirely, but at a very high capital cost and ongoing battery maintenance and lifecycle limitations.
Research and real-world outcomes indicate that while these solutions can offer partial deterrence, they rarely provide comprehensive or sustainable protection, especially in areas experiencing frequent theft (Miami-Dade Office of Inspector General, 2013; TET Coalition, 2024).
Key Gaps in Current Approaches
Existing methods predominantly suffer from two primary weaknesses:
Reactive rather than proactive detection: Most municipalities detect wire theft only after the lights fail, giving thieves ample time to remove wires and leave the scene undetected.
Limited real-time enforcement and deterrent capability: Without immediate detection and law enforcement notification, thieves perceive low risk, limiting the deterrent effect.
Effective theft deterrence, as underscored by criminology research, depends far more on the certainty of apprehension than on severity of punishment (Nagin, 2013). A 2021 study of the Dallas police departmentshowed that a 10% change in police presence has a 3% effect on deterrence.
With reliable detection, on-pole messaging, real-time notifications, and integrated response by law enforcement, Tondo expects a minimum 40% decrease in wire theft incidents from its solutions.
A Best-Practices Layered Strategy for Wire Theft Mitigation
To effectively manage and significantly reduce wire theft, municipalities and utilities must adopt a layered, proactive approach:
Real-time detection and alerting: Immediate, accurate detection of wire-theft incidents provides rapid notification to authorities, greatly enhancing law enforcement response.
Active engagement and coordination with law enforcement: Ensuring theft alerts are integrated into police dispatch systems significantly boosts response certainty and deters future attempts.
Visible deterrent measures: Clear signage indicating real-time surveillance and rapid response capability heightens perceived risks for potential thieves.
Targeted physical retrofits: Strategically deployed physical barriers (e.g., clamps, protective conduits) can offer additional layers of protection in high-risk areas.
How Tondo Addresses a Critical Gap
Recognizing these critical shortcomings, Tondo is in the testing phase with advanced solutions specifically designed to deliver robust, immediate detection and significantly enhanced deterrent capabilities. These innovative solutions are scheduled for market release in Q3 2025:
Wire Theft IQ: A software-based solution utilizing Tondo’s Cloud IQ AI-based real-time analytics of power anomalies, Tondo’s Edge IQ fixture-based controls, and Tondo’s Cabinet IQ cabinet-based energy analytics system to detect theft attempts immediately. Integrated seamlessly with existing smart lighting infrastructure, this solution empowers municipalities to leverage existing investments for enhanced wire theft detection.
Wire Theft IQ Pro: A new Tondo hardware device on each circuit and Tondo’s Cabinet IQ energy analytics system, paired with Tondo’s Cloud IQ AI analytics utilizing circuit integrity monitoring technologies to deliver 100% accurate theft detection, including battery backup capabilities for uninterrupted monitoring even during power outages.
Both solutions provide rapid, pinpoint-accurate real-time alerts, enabling rapid law enforcement response times. With the addition of on-pole labeling alerting potential thieves to the presence of Tondo’s anti-theft protection, municipalities can substantially amplify the deterrent effect, aligning with proven deterrence strategies (Nagin, 2013).
Wire Solutions Cost/Efficacy
When assessing the cost of wire theft solutions versus their expected efficacy, we can see how Tondo’s new solutions stack up:
When combined with Tondo’s Smart Lighting controls, the cost per pole of a combined Smart Lighting + Wire Theft solution can be as little as $11 USD per pole with benefits as high as $8 – $14 per pole annually.
Tondo provides a cost-effective new tool in the toolkit of cities and municipalities to put a stop to the growing costs of wire theft from streetlighting infrastructure.
Conclusion: Integrated Solutions for Long-Term Success
Tondo’s goal is to make successful wire theft unprofitable, and to effectively protect public assets from wire theft, municipal and utility leaders can adopt a layered solution that proactively detects, deters, and enables immediate response to theft-in-progress.
When part of a comprehensive, layered approach integrating proactive technology, real-time alerts, targeted physical measures, changes to metals recycling requiring sellers’ identification and record-keeping by recyclers, and coordinated law enforcement responses represents a layered best practice for wire theft.
Tondo’s a software-based solution for Tondo’s Smart Lighting controls customers and a hardware device-based solution that does not require Tondo’s smart lighting controls solutions, currently in testing and set for Q3 2025 release, are designed precisely to address these needs—empowering public infrastructure managers to secure their assets, ensure community safety, and achieve sustainable operational efficiency.
If you are interested in learning more about Tondo’s new wire theft solutions, contact us at [email protected].
For municipalities looking to modernize their streetlighting and build a foundation for smart city initiatives, Tondo's Edge IQ smart roadway lighting controls, managed through Tondo's Cloud IQ platform, offers a compelling solution. This isn't just an upgrade: Smart...
In today's rapidly evolving urban landscape, the need for intelligent, sustainable, and resilient infrastructure is paramount. Tondo's Cabinet IQ emerges as a comprehensive energy management and infrastructure monitoring solution, designed to enhance the...
Webster Marsh of the Lighting Controls Podcast speaks with Marissa Wright, Chief Revenue Officer for Tondo Smart USA about Tondo, roadway lighting controls, and the implications of AI on managing complex lighting and smart city connected infrastructure....
If you don't consent, everything still works. No personally identifying information is collected from our site unless you fill out a form on the site and send it to us. However, if you fill out a form on the site, it will not send to us unless you Accept Cookies first, because we use Google reCaptcha to limit spam.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.We use anonymous statistics so we know whether our website is serving you well. That's it!
Marketing
We only get your personally identifying information if you fill out a form on the site and send it to us.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.We use anonymous statistics so we know whether our website is serving you well. That's it!
Marketing
We only get your personally identifying information if you fill out a form on the site and send it to us.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.