Internet of Things Unit - 2
Internet of Things Unit - 2
loTand M2M
[ ___
2._1_:_Io_T_an_d_M_2_M_ _ --J] It is communication and
;
It is information and
device centric service centric
Q. i What It M2M communication ?
-...........·-·· ··--·---------·
AflJ· : • M2M communication .is a form of data It support closed business It support open market
coaununication that involves one or more entities that operations place ·
do not necessarily require human interaction or M2M uses vertical system loT uses Horizontal
interVention in the process of communication. solution approach enabler approach
Q.2 What are the key featura of M2M It requires specialized It requires generic
coaununlcatlon ? device solutions commodity devices
AftS. : • Some of the key features of M2M 1----------+-·~-------
Used in B28 Used in B2B and B2C
communication system ate given below :
1. Low mobility : M2M dfflces do not move and
if moves only within a certain .area. Q.5 What 1, lncill8trlal Internet of 1binp ?
2. Time controlled : Data can be send or receive Ans. : The Industrial Internet of Things (Industrial
only at certain pre-defined ~e periods. .· loT) is made up of a multitude of devices connected ·
3. Time tolerant : Sometimes data transfer can be by communications software. The resulting systems
delayed. and even the individual devices that comprise it, can
monitor, collect, exchange, analyze and instantly act
4. Packet switched : Network operator to provide on information to intelligently change their behavior
packet switched service. ,/ . or their environment-all without human intervention.
Q.3 What It M2M device ?
Q.6 Define M2M. Explain reasons of shifting &om
Ans.: • A device that runs application(s) using M2M M2M to loT.
capabilities and network domain functions. An M2M
Ans. : • M2M communication is the communication
device is either. connected straight to an access among the physical things which do not need human
network or interfaced to M2M gateways via an M2M interventi6n.
area network. ·
• M2M communication is a form of data
communication that involves one or more entities
Q.4Difference between M2M and loT.
Ans.:
that do not necessarily require human interaction or
intervention in·the process .of communication. M2M
is also named as Machine Type Communication
Machine-to-Machine Internet of Things (MTC) in 3GPP.
It support single It support multiple • M2M communication could be carried over mobile
application with single application with multiple networks (e.g. GSM-GPRS, CDMA EVDO
device · device networks). In the M2M communication, the role of
mobile network is largely confined to serve .as '.~.2t\
transport network. ''i•~(r.~~
(2 - l)
.......
--~
i_or11114A,,,,_
-
,,,,._, o[11rlngl_
-----..2-2
-----·-·-----·----·--·---···-·-"- lldl"'!!..ofl'l,ln19 ·
:;:;--
2•3
I
IDT-'MlM
• M2M 15 only a subset of IoT. IoT Is a more M2M GattwllY 6. Low power consumption : To improve the
ability of the system to efficiently service M2M
--
enoompassing phenomenon because it also includes SabJUt!I ,·;, ~cloud)
applications.
Human-to-Machine communication (H2M).
7. Loation specific trigger : I n ~ to trigger
• Radio Frequency Identification ~),
M2M device ·in a particular area e.g. wake up the
_
Location-Based Services (LBS), Lab-on-a-Chip
device.
(LOC), sensors, Augmented Reality (AR), robotics
and vehicle telematics, which are some · of the _,_ Q.10 Eliplala lr.ep appllcatlon - of M2M.
technology innovations that employ both M2M and Ana. : 1. Security : Surveillances, Alarm systems,
M2MDoma~ -Domlln ...._.Donwo
H2M communications. Access control, Car/driver security.
--
•Reasons : Fig. Q.8.1 MZM an:hlt.cture t 2. Tracking and tracing : Fleet Management, Order
1. It support multiple application with multiple Management, Pay as you drive, Asset Tracking,
• The system components of an M2M solµ:tion Ille "as Navigation, Traffic lnformation, Road tolling, ·
device. follows: · .. .. Traffic optimization/steering.
2. It is information and service centric.
1. M2M device : A device that runs applicatlon(a) 3. Payment : Point of sales, Vending machines,
3. It support open market place.
using M2M capabilities and network donialn Gaming machines.
4. loT uses horizontal enabler approach.
functions. An M2M device is either COruiectea • Fig. Q.8.2 shows generic M2M solution. 4. Health : Monitoring vital signs, Supporting the
5. It requires generic commodity devices. straight to an access network or inteifaci?d to aged or handicapped, Web Access Telemedidne
6. Used in B2B and B2C. M2M gateways via an M2M area network. points,· Remote diagnostics.
v~v
Q.1 Un the key featuree of M2M. 2. M2M area network : A M2M . area netJoi:k 5.
provi<ies connectivity between M2M devi~ ,and Pumps, Valves, Elevator contrbl, Vending
Ans. : Key features of M2M :
M2M gateways. Examples of M2M area betw.orks machine control, Vehicle diagnostics!
1. Low mobility : M2M devices do not move and if
include: Personal area network' technologiefsuch 6. Metering : Power, Gas, Water, Heating, Gdd
moves only .within certain area. Manufacturer A Bluetooth, Z-wave, Zlgbee Manufac:llnr 8
control, Industrial metering.
0
2. T'1me controlled : Data can be send or receive as IEEE 802.15; SRO, UWB, Zigbee, BluefuoU.: etc
only at certain pre-defined time periods. or local networks such as PLC, M-BUS;- Wire!!!&' 7. Manulacturlng : Production chain monitoritig and fri
Fig Q.8.Z Generic MZM aolullon
M-BUS. automation. . , , . .
3. Time tolerant : Sometimes data transfer can be
3. M2M · gateways :· Equipments using :/'iM2M • A number of sl1IHiets of users of M2M •·services can 8. Facility management : Home I building / campus
delayed.
4. Packet switched : Network operator to provide
capabilities to ensure ,M2M devices ·interworking be tdentified : eonsumers
in the home; ' business . automation.
and interamnection to the users and facility mllnagers,' I city ' governments,
packet switched service. l
lndustryNertical
!
application domain. The M2M gateway may ·@so · logistics businesses, energy•providers and more. Sr. No. M2M applic:atlons
5. Online small data transmissions Devices
run M2M applications. · Q;9 Uat the key featurea of M2M. . 1 Automotive Passenger vehicle anti
frequently send or receive small amounts of data.
4. M2M applications server : Applications that; ro,n Ans. : Key features of M2M : theft/remvery,
6. Low power consumption : To improve the . monitoring/
the service logic and use service capabilities 1. Low mobility : M2M devices do not move and if maintenance,
ability of the system to efficiently service M2M
accessible· via open interfaces. moves only within a certain area. safety/control,
applications.
2. Time ·controlled : Data can be ·send or receive entertainmmt.
7. Location specific trigger : Intending _ trigger 5. M2M application : The application compo~f of
the solution is a realization of the highly ·specific · . ~y at ce~ pre-defined time periods. , 2 Transportation Fleet management, asset
M2M device in a particular area e.g. w& up the
1
monitor and control process. The application. is 3. Time tolerant : Sometimes data transfer can be tracking telematics
.• device.
further integrated into the overall busineSS delayed. manufacturing and
logistics.
Q.8 Draw and uchitecture
explain and . process system
of the enterprise. 4. Packet switched : Network operator to provide
component. of M2M. · packet switched service. 3 Utilities/ Bnergy Smart metetjng, smart
Ans. : Architecture and Components of M2M 5. Online small data transmissions Devices grid, electric line ·
monitoring,
Fig. Q.8.1 shows M2M architecture. frequently send or receive small amounts of data.
gas/oil/water pipeline
monitoring.
-
~ '
,,.-,o/DlfW'
2-4
. .......,·-a.. ' (e-health), remote Q.12 What II eoftware defined DI ,rk? SON controller
individual switches. (Network operating system)
diagnostics, medication Ans. : Software defined netwo· is a netwofk
reminders,
tele-medidne.
architecture that separates the co1 plane from ihe • SDN is also useful for maintaining service level in a
cloud environment, by providing an APl-enabled
l! ea:trol
, ! !Management!J ·( Proprietary
· ,, Interfaces
data plane and centralizes the net controller. ·l ' '
Highway, bridge traffic approach to . manage the network and move
7 \ Public saftey
management, homeland Q.13 What la Network Function Vlrtuallzatlon ? workloads in a consistent way.
security, police, fire and Ans. : Network Function Virtual ,n (NFV) Is an Management
• The physical separation of the network control
emergency 'services.
effort to decouple the network fui ,n logic fro~ the plane from the data plane (forwarding plane), and
underlying hardware, such that the network devices, where a control plane controls several devices. Control
. lnclla Market Scenario are consolidated onto regular servers, switches, md • The centralized management facilitates
• As per projections by Bricssion, lndi;m M2M market storage. FOIWllrdlng
may rise &om 30 Million in 2013 to more than 250 optimization and configuration of a network in an
I
million in 2020. Automotive (connected vehicles) is Q.14 &plain the Umltatlon of Conventional efficient and. automated manner and provides
having a market share of 45 % and Energy (smart interoperability among heterogeneous IoT network. Fig. Q.14.1 (b) A awttch with Hparatad planN
Network an:bltectme. H- It la Hived by aoftwan
meters) 23 %. cleftnecl networking ? • SON is a frame work to allow network • SON Is basically layer architecture consists of three
• Other applications are Point of sale (POS), health Ans. : Umitation of Conventional Network administrators to automatically and dynamically layers 1) Device layer or data plane 2) Control
care, security and surveillance, intelligent architecture manage and control a large number of network plane and 3) Application layer.
- buildings, smart homes etc. · M2M applications •· In the traditional approach to networking, most devices, services, ·topology, traffic paths, and packet • The SDN architecture is commonly defined by four
will make the living smart and improve the quality network functionality is implemented in a dedicated handling policies using high-level languages and principles:
of life. APis.
appliance; i.e., switch, router, application delivery
(i) The separation of the control and data planes.
Q, 11 What are the abl plllan of M2M ? controller. • Router can be partitioned into control and data
(ii) Flow-based forwarding in the data plane.
Ans. : The six Ji!illars of M2M are as follows : • .In addition, within the dedicated appliance, mo~ of plane. Network intelligence and state are logically
(iii) Logically centralu.ed SDN controller that instructs
1. Remote monitoring is a generic term most often the · functionality is implemented in dedi~ted centralized. The underlying network in&astructure
multiple forwarding planes.
representing supervisory control, data acquisition, hardware such as an ASIC (Application specific is abstracted from the applications.
and automation ofindustrial assets. Integrated Circuit). (iv) Network programmability via the SON controller.
• Execute or run Control plane software on general
2. RFID is a data-collection technology that uses • Some of the key characteristics of this approac!i to purpose hardware. Architecture to control not just a • In the SDN architecture the control plane is
electronic tags for storing data. developing network appliances are : networking devi~ but an entire network. physically decoupled &om the data forwarding
3. A sensor network · monitors physical or plane. The data plane's forwarding behavior is
1. The ASICs that provide the network functionality • Fig. Q.14.l(a) and (b) show an abstract model of a
environmental· conditions, with sensor nodes evolve slowly. determined by a set of flow tables, and the
traditional switch and a switch with separated
acting ~peratively to . form/maintain the forwarding decisions are flow-based.
2. The evolution of ASIC functionality is undef the planes.
network. • A logically centralized SDN controller implements
control of the provider of the ,appliance.
4. The term smart seruice refers to the process • of the control plane logic and remotely controls
3. The appliances are proprietary.
networking equipment and · monitoring it at a several data planes. The SON controller builds a
------
4. Each appliance is configured individually.
T" TECHNICAL PUBUCAnONS, ._ An up thrust for knowledge
----
oKODI '
·T' TECHNICAL PUBLICAnoNs~- An up thlUot for 1rno~ DICGOI '
.....-
,,,,_.,o/'lfmlll 2 • ~- -·· - - --------- -- - - - - -.... ·-·------
lor - ...
,._.
~tofTldnp 2-7' loTIIIUIM2M
global view of the network. and offers a control • Southbound Interfaces provide a conun
logic that programs an abstract model of this view. protocol between CP and forwarding devt~callon Q.18 Draw ud explain SDN la,-..
AJIS, : • Fig. Q.16.1 shows SDN layers.
Q.15 Draw ud aplaln SDN an:bltac:tun. the SI Instruction set. oUgb
Ana. : • Fig. Q.15.1 shows SON Architecture. • Forwarding devices (routers,. switches, te .
etc.) are Interconnected through a ~ ,'.o/,aYs
medium such as wireless radio chann~-1,>~}'alca!
I 0 Appllcalfon ,
cables. !, \Viied layer
1. Directly programmable . : Network control ;i.is • Inlrastrudure layer ads as the foundation for an SON architecture. The infrastructure consists of both physical
directly programmable because it . is · liecoupled and virtual network devices such as switches and· routers. These devices implement the OpenFlow protocol as a
Network
· Infrastructure standards-based method of implementing traffic forwarding rules.
from forwarding functions. .,
Fig. Q.15.1 SDN archn.c:ture 2. Agile : Abstracting control from forwarding•-~ • Control layer COllSists of a centralized control plane for the entire network. The control plane is decoupled from
administrators dynamically adjust netw6rl<; ~de
the underlying infrastructure to provide a.
single centralized view of the)- entire network The control layer
• SON is. a layered architecture, consisting of three utilizes OpenFlow to communicate with the infrastructure layer. ·
traffic flow to meet changing needs. ....
basic layers; application/services layer, a controller - .\JO ..
• #\ppllcation layer consists of network services. and business applications that interact with the control layer.
3. Centrally managed : Network intellige!1,_ce· is
layer, and data plane layer called forwarding layer These applications leverage open Interfaces to communicate with the control layer and the network state.
(logically) centralized In software-based','SD~
consisting of forwarding' devices.
• These SON layers communicate with each other
controllers that maintain ag1oba1 vrew,-~, the Q.17 Write •ehort DON on OpenFJow. .
Ans. : • OpenFl~W is a Layer 2 communications· protocol that gives access to the forwarding
."',. nd
'
a
network, which appears to ., applicatioili. plane of a network
via open APls called Northbound Interface (NI) API .
policy engines as a single, logical switch. '·' , switch.or router over the network. Fig. Q.17.1 shows components of an OpenFlow ~witch.
and Southbound Interface (SI) 'API. · ·
4. Progranurui.tically configured · : SDN lets . ~~_bvo/k
• Application layer (AP) : the application plane also managers configure, manage, secure;\,."and
called management plane consist of' applications optimize network resources very quicldy."via·
that leverage the functions offered· by 'the M to
dynamic, automated SDN programs, whid!.' ihey
implement network control :and operation logic.
can write themselves because · the programs do
• The Network Operating System (NOS) , facilitate not depend oil proprietary software. . ' -~
application developers · to <X>Ordinate · through these
5. Open standards-based and vendor-neutral": When
NI APis. Typically, an . M APis. abstracts the implemented · through open standards/ '~SI>N
low~level instruction sets and implementation of __ r,;;;;;:-i
simplifies network design and operatiort -~
forwarding devices.
·: instructions are provided by .SDN controllers ~Pl~ne~
• Control plane is the decoupled entity from the inste1td of multiple, vendor-specific devices and \_ Open flow IWftch
distnbuted forwarding devices and logically protocols.
centralized on a server. Fig. Q.17.1 Componenta of an OpenFlow Switch
• The number of flows a switch can handle is limited by the size of its flow table. Secure Channel (SC) is the
interface that ·connects each OpenFiow switch to controller. controller configures and manages the switch via
this Interface.
T' TECHNICAL PUBUCAnONS, ._ An up thru61 for knowledge
T I
TECHNICAL PUBLICAnONS, ._ An up thro&t for knowledge
.,_.
-~
- - - - - - -'!!.~
,,,,_.,o/111""9 _ _ ! : . ! - --
·--- I "",., ways to
implement resilience, ~Ce
Becuiity
•Jntemlf
--M o/1'11illp 2• 9 IoT iUUl M2M
• SC establishes and terminates the connection assuram:e, test and diagnostics and • Instead of installing expensive proprietary 1
• System Wide Configurations.
between Open Flow Switch and the controller using survemance- hardware, service providers can purchase
the procedures. Bach Open Flow switch has a chain 1nexpensive switches, storage and servers to run • Multiple System Configurations.
of Bow tables, and each table stores a collection of
• Facilitates innovation towards new netw- .
functions and services that are only practical
pure software network environment .a
:,k virtUal machines that perform network functions.
.This collapses multiple functions into a single
• Retrieving &t Reusing Configurations.
Bow entries. Q.20 What 19 NETCONF 'I
physical server, reducing costs and minimizing
• A Bow is defined as the set of packets that match • It is applicable to any data plane and control Plane Ans. : NETCONF is a session based network
the given properties, e.g., a particular pair of source truck rolls.
functions. Automation of management and management protocoL The NETCONF protocol is
and destination MAC addresses- configuration of functions important for NJIV ~. • If a customer wants to add a new network function, based upon remote procedure c:all, a client/server
• A Bow entry defines the forwarding/routing rules, the service provider can simply spin up a new protocol that allows one program to request a service
scale.
It consists of a bit pattem that indicates the' Bow virtual machine to perform that function. from another program without having to understand
• NFV aims to ultimately tranaform the way network
properties, a list of actions, and a set of counters. • For example, instead of _deploying a new hardware network details.
operators _architect and operate their networks •
appliance across the network to enable network
Q.11 What 19 Network Function \11rtUUzatlon? though change will be incremental Q.21 u.t the Limitations of SNMP.
encryption, encryption software can be deployed ,on
Esplain It. IMndta. • Fig. Q.18.1 shows NFV architecture. ·Ans. : • SNMP is stateless in nature and each SNMP
a standardized server or switch already in the
Ana. : • Network Function Virtualization (NFV) is an request amtains all the information to process the
• Elements of NFV archi,tecture are as follows : network.
effort to decouple the network function logic from the request.
underlying hardware, such that the network devices 1. Virtualized Network Function : It implements- • This virtualization of network functions reduces
dependency on dedicated hardware appliances for · • SNMP is a connectionless protocol which uses UDP
are consolidated onto regular servers, switches; and network function in software and it runs over
network ·operators, · and allows for improved as the transport protocoL
storage, NFV infrastructure. scalability and customization . across the entire • MIBs often lack writable objects without which
• NFV decreases costs by consolidating network 2. NFV Infrastructure : It contains network,. storagew_ network. Different from a virtualized network, ·NFV device configuration is not possible using SNMP.
services onto commodity hardware, taking and compute resources that are virtualized. It'is' seeks to offload network functions only, rather than
advantage of the economies of scale. the combination of both hardware Ja, • It is difficult to differentiate between configuration
the entire network.
• NFV is way to reduce cost and accelerate service software resourc:es which build up' ." 'the. and state data in MIBs.
Benefits:
deployment for network operators by . decoupling environment in which VNFs are deployed, , • Retrieving the current configuration &om a device
functions like a firewall or encryption from managed and executed. · ·- 1. Reduced equipment costs and reduced power
can be difficult with SNMP. Earlier versions of
dedicated hardware and moving them to virtual consumption.
3. The Network Functions Virtualisatlon SNMP did not have strong security features.
servers. 2. NFV allows to abstract underlying hardware,
Management and Orchestration (NFV-MAI~:0)
and enables elasticity, scalability and automation. Q.22 Dllcme nqalnment of Network Operator.
• NFV and SDN are complementary. One does not architectural framework has the role to manage Ans. : Requirements are as follows :_
depend upon the other. You can do SDN only, the NFVI and orchestrate the allocation . of. · 3. Iricreased speed of deployment by minimizing
NFV only, or SDN and NFV. the typical network operator cycle of innovation.. • Ease of use.
resourc:es needed by the NSs and VNFs.
• NFV allows use of a single physical platform for 4. Services . can be rapidly scaled up/down as • Distinction between configuration and state data.
different applications, users and tenants. It enables required.
,, • Fetch configuration and state data separately.
5. Improved operational efficiency.
• Configuration of the network as a whole.
Virtual Network Functions (VNF-s)
2.3 : Basics ofloT System
88888 Management with NETCOZF, YANG·
NETCONF, YANG, SNMP NETOPEER
• Configuration transactions across devices.
• Configuration deltas.
Network Functions Vlrtuallzation lnfrasiructure (NFVI) NFV • Dump and restore configurations.
Management
and
Q,19 What 19 need for loT s,.tema Management? • Configuration database schemas.
orchestration Ans. : Need for IoT Systems Management are as
• Comparing configurations.
follows:
• Automating Configuration. Q.23 Dacrlbe the NETCONF protocol layen.
• Monitoring Operational & Statistical Data. Ans. : • NETCONF .provides a programmatic
B
OpertalonS
(Methods) • A YANG module can import definitions &om other . • Data .Model Manager : It keep the track of all the
Manager, Data Model Manager, Configuration
modules. Constraints ·can be defined on the data YANG data model and CQrtesponding managed
RPCor Validator, Configuration ·Database, · Configuration objects.
Notification nodes, e.g. allowed values.
------------ API and Data Provider API.
Transpofl NETCONF • YANG can model both configuration data ,and state • Configuration Validator : It checks for valid
Configuration • Management System : Operator sends NETCONF configuration.
I
datastore data using the 'config' statement.
messages for configuring loT device through
• YANG defines a number of built-in data types and • Configuration Database : This database contains
management system. It also receive notification and
YANG defined · . specifies a way to construct more complex data both the configuration and operational data.
state information.
types. • Configuration API : Used for reading configuration
Fig. Q.23.1 NETCONF protoco1 laye19
• YANG node types are as follows : data from the configuration data store.
-
• The NETCONF protocol is built on a four-layer
approach : 1. Leaf node : Has a value and no child nodes. It
1) Secure Transport Layer : Authentication and can have a default value. It can be mandatory:o~ (
! t
AN.:• YANG (Yet Another Next Generation) is a 3. Implemented using layered model._
data, modeling language used to model configuration
4. Support multiple configuration data stores ·on
and state data manipulated by the NETCONF
managed devices. loTdevlce Managed
protocol. Applications
objects
5.. Configuration validation before commit.
• YANG modules contain the definitions of the
---- ----====F~lg:.~Q~.2~1.:=1=======~--- ./
1
ronfiguration data, state data, RPC calls that can be 6. Transactions over multiple managed devices. '-,.
wued and the format of the notifications.
.,_·
T
l
TECHMCAI.. PUSUCA TIONS • An up thlUat for knowt«lge
--
,.,.- ,
DKODI
T~TECHNICAL PUBLICATIONS' ·. An up throst for know/ed~
-