Tondo Smart Lighting also creates an open standards-based Smart City network for connecting sensors and other wireless and wired devices to Tondo's Cloud-IQ management platform.
This can reduce sensor and device deployment costs by 80% or more versus proprietary networks or individual cellular connections, with a 2.7x or greater benefit versus your LED retrofit project, and 3.5x over Smart Lighting alone.
Read more about the Business Case for Smart Lighting on this link.
Normally open(NO) and Normally closed (NC) are terms used to define the states that switches, sensors or relay contacts are under when they are not activated.
A NO contact or a normally open contact is the one that remains open until a certain condition is satisfied such as a button being pressed or some other manner of activation such as those based on temperature, pressure, etc.
A NC contact or normally closed contact is the exact opposite of NO contact by function. It remains closed until a certain condition is satisfied.
Lighting control cabinets typically control a group of street lights or advertising signage from a "control cabinet". These controls have historically provided on-off functionality based on the time of day using an "astronomical clock"-based switch or daylight photosensor. Lights are controlled in groups with no individual control over a specific light.
Although new controllers such as Tondo's Edge-IQ controller have replaced the cabinet-based approach with new technologies that include advanced dimming, remote cloud-control, and support for functionality including sensors and switches, there are many outdoor lights and signs that do not support on-lamp control. Tondo's Cabinet-IQ controller provides new advanced IoT technology support for existing cabinet-controlled lighting.
CAT-M/LTE-M and NB-IoT are similar but have differences that may make one suitable over another, or simply selected based on the support for one or the other that is available in your area.
NB-IoT uses a narrow bandwidth of 200 kHz, where CAT-M uses 1.4 MHz. The maximum data rate for NB-IoT is ~ 250 kb per second, with CAT-M1 reaching ~ 1 Mbps. CAT-M is marginally less energy efficient than NB-IoT. Although NB-IoT has a lower speed, both NB-IoT and CAT-M are suitable for sensor communications since sensors typically do not require much bandwidth.
Both NB-IoT and CAT-M1 are supported under the 5G technology specifications and therefore are ideal for selecting as a standard for sensor communications.
CAT-M wireless (aka LTE-M) is a low-power wide area network (LPWAN) cellular data transmission standard that operates over the data and physical layer. CAT-M was designed for IoT projects, with an average upload speed between 200 kbps and 400 kbps.
Eddystone is an open-source Bluetooth advertising protocol originally designed by Google. It can be used by mobile device applications to deliver improved proximity-based experiences that include applications such as Google Maps.
These packets can be discovered with any Bluetooth LE APIs such as Core Bluetooth on iOS, or android.bluetooth.le on Android. You can also use them with Google’s Nearby Messages API, which can be integrated into an iOS or Android app, and receive “messages” in those apps when a person enters or exits a range of beacons.
Tondo's 2022 estimate was calculated for each lighting category by applying market growth factors for each lighting category between 2015 and 2021 based on U.S. Census data to the DOE dataset.
A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to access and use data.
The API spells out the proper way for a developer to write a program requesting services from an operating system or other application.
You can read more from the source of this definition at TechTarget here.
A DIN rail is a metal rail of a standard type widely used for mounting circuit breakers and industrial control equipment inside equipment racks.
IP stands for "ingress protection". For IP67, this means:
"6" describes protection of solid particles: No ingress of dust; complete protection against contact (dust-tight). A vacuum must be applied. Test duration of up to 8 hours based on airflow.
"7" describes the protection from water: Ingress of water in harmful quantity shall not be possible when the enclosure is immersed in water under defined conditions of pressure and time (up to 1 meter (3 ft 3 in) of submersion). Test duration: 30 minutes.
Modbus is a data communications protocol originally published in 1979. Modbus has become a de facto standard communication protocol and is now a commonly available means of connecting and communicating with industrial electronic devices.
RS-485, also known as TIA-485(-A) or EIA-485, is a serial communications standard.
Electrical signalling is balanced, and multipoint systems are supported. Digital communications networks implementing the standard can be used effectively over long distances and in electrically noisy environments.
4G devices will work on 4G LTE networks and the earlier cellular technologies, including 3G, EGPRS, and 2G.
Smart city sensors require very little bandwidth, and 3G EGPRS and 4G LTE can easily support the required data rates.
5G networks are relatively new, and most 5G deployments use a combination of 4G and 5G networks.
DALI-2 refers to the latest version of the DALI protocol. While DALI version 1 only included control gear, DALI-2 includes control devices such as application controllers and input devices (e.g. sensors), as well as bus power supplies.
Zhaga Book 18 describes a smart interface between outdoor luminaires and sensing/ communication nodes.
Zhaga Book 18 allows any certified node to operate with any certified luminaire. Certified luminaires and sensing / communication modules are available from multiple suppliers, establishing an ecosystem of compatible products.
The NEMA ANSI C137.4-2021 builds on the NEMA C137.41 7-pin connector standard and the DALI communication protocol. It has additional characteristics and features that align very closely with the D4i family of specifications from the DALI Alliance.
D4i and ANSI C137.4-2021 specify the digital communication between luminaires and devices including sensors and network lighting controllers. The expanded ANSI C137.4-2021 now includes energy reporting data and diagnostics and maintenance data.
The NEMA ANSI C137.10 standard specifies roadway and area lighting equipment connector compatibility. The 3-pin standard does not provide for dimming control, but provides for on/off operation. The later standard C137.41 adds dimming control (5- and 7-pin connectors) and sensor control (7-pin connectors). The newer C137.4-2021 standard provides enhanced functionality and compatibility with the DALI D4i lighting and sensor control standard.
The NEMA ANSI C137.41 standard specifies covers roadway and area lighting equipment connection interoperability. The 7-pin receptacle provides for dimming control and sensor communications.
The NEMA ANSI C137.41 5-pin connector variant adds support for dimming control, but does not include sensor communications support which is supported by the 7-pin connector.
DALI, or Digital Addressable Lighting Interface, is a dedicated protocol for digital lighting control that enables the easy installation of robust, scalable and flexible lighting networks.
Wiring is relatively simple; DALI power and data is carried by the same pair of wires, without the need for a separate bus cable.
The TALQ Consortium has established a globally accepted standard for management software interfaces to configure, command, control and monitor heterogeneous outdoor device networks (ODN) including smart street lighting.
This way interoperability between Central Management Software (CMS) and Outdoor Device Networks (ODN, so called ‘gateways’) for smart city applications from different vendors is enabled, such that a single CMS can control different ODNs in different parts of a city or region.
D4i is the DALI standard for intelligent, IoT-ready luminaires.
By taking care of control and power requirements, D4i makes it much easier to mount sensors and communication devices on luminaires. In addition, intelligent D4i LED drivers inside the luminaire have the capability to store and report a wide range of luminaire, energy and diagnostics data in a standardized format.
Highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. Roots of trust provide a firm foundation from which to build security and trust.
Read more at the National Institute of Standards and Technology: Roots of Trust
The 0.1, 0.2, and 0.5 accuracy class electricity meters established within ANSI C12.20-2015 are accurate to within +/-0.1%, +/-0.2%, and +/-0.5% of true value at a full load.
Tondo's controllers utilize a chipset containing the ARM Cryptocell 300 cryptographic accelerator chip with hardware-protected vault and Root of Trust security. Read more about the ARM 300 family here: ARM Cryptocell 300 Family Overview
The world would collectively achieve 10,546 TWh of energy savings by 2030 [with energy efficient lighting], a sum comparable to over 40% of the world electricity generation in 2011. Saving this amount of energy would prevent the emissions of 5,400 Mt CO2, a figure equivalent to over 15% of the global emissions in 2011.
Wire theft, particularly involving copper from electrical infrastructure, is a costly and dangerous issue worldwide. This illegal activity not only leads to power outages and economic losses but also poses severe electrocution risks.
Utility companies suffer billions in annual losses due to cable theft, which impacts essential services and raises consumer costs. Despite various security measures, tracking stolen metals and apprehending thieves remains challenging. To address this issue, Tondo Smart Ltd. developed an AI-powered wire theft detection system, now deployed across Israel’s national transport infrastructure.
Challenges
Copper wire theft is driven by the high resale value of the metal, leading to frequent and costly thefts from electrical infrastructures. The consequences are severe, including power outages, service disruptions, and significant financial losses. For utility companies and infrastructure operators, traditional security measures often fall short in preventing or quickly detecting theft, making it a complex issue that requires innovative solutions.
Unfortunately, it is difficult for lighting operations teams to know the difference between a theft incident versus a fixture failure or a wiring fault.
The cost of repairing a single wire theft incident can range from $800 – $2,500 per pole, with a single theft event often involving multiple poles. Existing solutions can include welding access plates to poles, which is not only a costly process, but also inhibits future field service work that may require access to the pole.
Other solutions include replacing pole foundations with tamper-resistant plates, using tamper-proof screws, or replacing wiring infrastructure with copper-clad steel wiring. Some cities have begun replacing light poles that are at end-of-life with access plates placed higher on the pole. However, thieves have either found work-arounds for these solutions, or the implementation costs to cover all of the infrastructure become impractical. Replacing copper wire with copper-clad steel wire has found that thieves will steal the wire regardless, as the wire does not appear noticeably different.
“A report has been received regarding the theft of electrical infrastructure at a railway station in the southern part of the country. Two trenches were discovered from which communication cables buried in the ground were removed, totaling approximately 300 meters. This caused significant damage and has disrupted the signaling and traffic management systems of the railway in the southern region.”
Israel Railways Spokesperson
Damaged utility transformer pulled off pole
Solution Overview: Tondo Cloud IQ and Cabinet IQ Energy Analytics
Smart Hardware Integration: Tondo’s Cabinet IQ is installed at the utility service point. Tondo’s Cloud IQ AI provides immediate indications when a circuit is compromised.
AI-Based Detection: Cloud IQ collects data from Cabinet IQ, analyzing it through sophisticated AI algorithms to detect electricity and wire theft patterns based on the unique combination of .
Proactive Alerts and Deterrence: Upon detecting a potential theft, the system sends instant alerts to relevant managers and can control other devices such as triggering the flashing of lights to deter thieves. This allows lighting operations teams to quickly alert law enforcement to a theft-in-progress to provide deterrence for future re-occurrence.
A 2021 study of the Dallas police departmentshowed that a 10% change in police presence has a 3% effect on deterrence. Where city operations teams and law enforcement are able to create a rapid-response protocol to respond to thefts-in-progress. With a consistent application of rapid-response to wire theft incidents, Tondo’s wire theft detection capabilities offer a new and inexpensive solution when compared to the high cost of replacing all of the wiring with low-copper wire ($200+ per pole), replacing foundation plates, or replacing entire poles.
The combined cost of Tondo’s smart lighting controls and energy analytics solution with wire theft detection capability can cost as little as $3.50 USD per pole while also providing long term energy savings, maintenance, and operational efficiency benefits.
Comprehensive Implementation: Deployed across Netivei Israel, this solution manages approximately 100,000 streetlights and 1,650 cabinet controllers along 5,000 miles of roadway.
Tondo Cloud IQ AI-based energy analysis
Results
Significant Savings: The implementation of Tondo’s Cloud IQ and AI-powered theft detection system has saved hundreds of thousands of dollars in the past year by preventing electricity theft, notwithstanding the 50%+ reduction in energy, maintenance, and operational expenses from Smart Lighting control.
Immediate Response: Cloud IQ’s real-time alerts allow lighting operations teams to work with local law enforcement to respond quickly to theft incidents, deterring future theft events and minimizing damage and service disruptions.
Enhanced Security: A flashing light deterrent solution Tondo created for their customers has proven effective in preventing theft attempts, contributing to overall infrastructure security.
For municipalities looking to modernize their streetlighting and build a foundation for smart city initiatives, Tondo's Edge IQ smart roadway lighting controls, managed through Tondo's Cloud IQ platform, offers a compelling solution. This isn't just an upgrade: Smart...
In today's rapidly evolving urban landscape, the need for intelligent, sustainable, and resilient infrastructure is paramount. Tondo's Cabinet IQ emerges as a comprehensive energy management and infrastructure monitoring solution, designed to enhance the...
Webster Marsh of the Lighting Controls Podcast speaks with Marissa Wright, Chief Revenue Officer for Tondo Smart USA about Tondo, roadway lighting controls, and the implications of AI on managing complex lighting and smart city connected infrastructure....
If you don't consent, everything still works. No personally identifying information is collected from our site unless you fill out a form on the site and send it to us. However, if you fill out a form on the site, it will not send to us unless you Accept Cookies first, because we use Google reCaptcha to limit spam.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.We use anonymous statistics so we know whether our website is serving you well. That's it!
Marketing
We only get your personally identifying information if you fill out a form on the site and send it to us.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.We use anonymous statistics so we know whether our website is serving you well. That's it!
Marketing
We only get your personally identifying information if you fill out a form on the site and send it to us.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.