IOT Unit-2
IOT Unit-2
Machine-to-Machine (M2M)
refers to networking of
machines(or devices) for the
purpose
of remote monitoring and
control and dataexchange.
Term which is often
synonymous with IoT is
Machine-to-Machine (M2M).
IoT and M2M are often
usedinterchangeably.
Fig. Shows the end-to-end
architecture of M2M systems
comprises of M2M area
networks,
communication networks and
application fomain.
M2M:
Machine-to-Machine (M2M)
refers to networking of
machines(or devices) for the
purpose
of remote monitoring and
control and dataexchange.
Term which is often
synonymous with IoT is
Machine-to-Machine (M2M).
IoT and M2M are often
usedinterchangeably.
Fig. Shows the end-to-end
architecture of M2M systems
comprises of M2M area
networks,
communication networks and
application fomain.
M2M:
Machine-to-Machine (M2M)
refers to networking of
machines(or devices) for the
purpose
of remote monitoring and
control and dataexchange.
Term which is often
synonymous with IoT is
Machine-to-Machine (M2M).
IoT and M2M are often
usedinterchangeably.
Fig. Shows the end-to-end
architecture of M2M systems
comprises of M2M area
networks,
communication networks and
application fomain.
M2M
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology
that enables networked devices to exchange information and perform actions without the
manual assistance of humans. Artificial intelligence (AI) and machine learning (ML)
facilitate the communication between systems, allowing them to make their own autonomous
choices. M2M technology was first adopted in manufacturing and industrial settings, where
other technologies, such as SCADA and remote monitoring, helped remotely manage and
control data from equipment. M2M has since found applications in other sectors, such as
healthcare, business and insurance. M2M is also the foundation for the internet of things
(IoT).
M2M works
The main purpose of machine-to-machine technology is to tap into sensor data and transmit it
to a network. Unlike SCADA or other remote monitoring tools, M2M systems often use
public networks and access methods -- for example, cellular or Ethernet -- to make it more
cost-effective.
The main components of an M2M system include sensors, RFID, a Wi-Fi or cellular
communications link, and autonomic computing software programmed to help a network
device interpret data and make decisions. These M2M applications translate the data, which
can trigger pre-programmed, automated actions.
The Internet and improved standards for wireless technology have expanded the role of
telemetry from pure science, engineering and manufacturing to everyday use in products such
as heating units, electric meters and internet-connected devices, such as appliances.
Beyond being able to remotely monitor equipment and systems, the top benefits of M2M
include:
boosted revenue by revealing new business opportunities for servicing products in the
field; and
Utilities companies often rely on M2M devices and applications to not only harvest energy,
such as oil and gas, but also to bill customers -- through the use of Smart meters -- and to
detect worksite factors, such as pressure, temperature and equipment status.
In telemedicine, M2M devices can enable the real time monitoring of patients' vital statistics,
dispensing medicine when required or tracking healthcare assets.
Smart home systems have also incorporated M2M technology. The use of M2M in
this embedded system enables home appliances and other technologies to have real time
control of operations as well as the ability to remotely communicate.
Time control, meaning data can only be sent or received at specific predetermined
periods.
Location specific triggers that alert or wake up devices when they enter particular areas.
M2M requirements
Scalability - The M2M system should be able to continue to function efficiently as more
connected objects are added.
Anonymity - The M2M system must be able to hide the identity of an M2M device when
requested, subject to regulatory requirements.
Logging - M2M systems must support the recording of important events, such as failed
installation attempts, service not operating or the occurrence of faulty information.
The logs should be available by request.
Message transmission scheduling - M2M systems must be able to control network access
and messaging schedules and should be conscious of M2M applications' scheduling delay
tolerance.
Message communication path selection - Optimization of the message communication
paths within an M2M system must be possible and based on policies like transmission
failures, delays when other paths exist and network costs.
Input Inputs are the base raw ingredients that are turned into a product.
Example Cocoa beans for the manufacture of chocolate.
M2M Example Data from an M2M device that will be turned into a piece of
information.
Production/ It refers to the process that the raw inputs are put through to become
Manufacture part of a value chain.
Example Cocoa beans may be dried and separated before being transported to
overseas markets.
M2M Example Data from an M2M, needs to be verified and tagged for provenance.
Processing It refers to the process whereby a product is prepared for sale.
Example Cocoa beans may now be made into cocoa powder, ready for use in
chocolate bars.
M2M Example M2M refers to the aggregation of multiple data sources to create an
information component something that is ready to be combined with
other data sets to make it useful for corporate decision-making.
Packaging Packaging refers to the process whereby a product can be branded as
would be recognizable to end-users consumers.
Example A chocolate bar would now be ready to eat and have a red wrapper with
the words “KitKatt” on it.
M2M Example M2M data will have to be combined with other information from
internal corporate databases, for example, to see whether the data
received requires any action. This data would be recognizable to the
end-users that need to use the information, either in t6he form of
visualizations or an Excel spreadsheet.
Distribution/ This process refers to the channels to market for products.
Marketing
Example A chocolate bar may be sold at s supermarket, a kiosk, or even online.
M2M Example Produced an information product that can be used to create new
knowledge within a corporate environment examples include more
detailed scheduling of maintenance based on real-world information or
improved product design due to feedback from the M2M solution.
IOT
IoT or the Internet of Things is a concept where network infrastructure such as
devices, applications, sensors, and actuators are connected via the internet. IoT is the
interconnection of distinctively identifiable embedded computing machines within the
existing internet infrastructure. This interconnection allows them to exchange data with each
other and with other devices. This enables them to be remotely monitored and controlled.
IoT is the successor of M2M technology. In other words, M2M serves as the foundation for
IoT. IoT takes the basic concepts of M2M and expands them by creating large cloud
networks of devices that communicate with one other on cloud networking platforms. The
cloud architecture provides infrastructure, software, and platform for all IoT devices. It
allows users to create fast, flexible, and high-performance networks that connect a wide range
of devices.
There are many examples of IoT devices around us these days. Smart home voice assistants
like Google Home and Alexa and the other devices that they are connected to are examples of
IoT. Any network of devices that are connected to the internet and use a cloud platform to
communicate with each other are considered to be part of the IoT.
Sensors and RFID devices are working as inputs to the I-GVC through the capture
and transmission of data necessary for the development of information products.
Smart phones have also been developed that allow mobile devices to interact with
sensors and RFID.
This allows for a two-way interaction between a mobile terminal and the sensor
technology.
The data is used as one part of the input to the commodity chain, which uses it to
create the information products that are eventually exchanged.
In this sense, the sensor networks, and NFC and RFID technologies may be viewed as
subcontractors Resellers Intermediaries Data Factories Service Providers/ Data
Wholesalers End User Information Domestic and overseas input from human and
sensor-based ‘subcontractors’ to the I-GVC, workers that constantly gather data for
further processing and sale.
End-users
End-users that choose to use and participate within the digital world are now deeply
embedded into the very process of production.
Every human that enters a search query into a search engine,
Every human that agrees to allow the mobile broadband platform to inform a service
of their location,
Every human that uses NFC to allow a bank to establish and confirm their identity are
also functioning as subcontractors to the global information systems that form the
basis of the I-GVC.
Data factories
Data factories are those entities that produce data in digital forms for use in other
parts of the I-GVC.
Service providers/data wholesaler:
Service Providers and Data wholesalers are those entities that collect data from
various sources worldwide, and through the creation of massive databases, use it to
either improve their own information products or sell information products in various
forms.
Example: Twitter, Facebook, Google
Intermediaries
In the emerging industrial structure of the I-GVC, there is a need for intermediaries
that handle several aspects of the production of information products.
The development of databases such as the ones created by Google, Facebook, and
Twitter may therefore require the creation of entities that are able to protect
individuals’ privacy rights in relevant regional settings.
Intermediary is to reduce transaction costs associated with the establishment of a
market for many different companies to participate in.
Resellers
Resellers are those entities that combine inputs from several different intermediaries,
combine it together, analyze, and sell it to either end-users or to corporate entities.
These resellers are currently rather limited in terms of the data that they are able to
easily access via the converged communications platform, but they are indicative of
the types of corporate entities that are forming within this space.
M2M and IoT are not the same. IoT requires M2M, but M2M does not need IoT. M2M
systems are often isolated, and IoT systems take M2M to an enhanced level. They bring
isolated systems together into a large connected ecosystem.
Simple device-to-device
Connection Type communication usually within an Devices use IP networks to
Used embedded software at the client communicate.
site.
Connects to a larger
Scope Deployed in a closed system.
network.
The big difference between IoT and M2M is the connection. IoT is usually any device
connected to the internet for enhanced performance. On the other hand, M2M is generally
two or more devices connected with the internet for data sharing and analytics.
IoT is premeditated to be scalable so that devices can be added to a network and integrated
into existing systems. M2M networks can be more labour-intensive to set up and maintain
since new point-to-point connections must be created for each device.
Building an architecture
Architecture refers to the description of the main conceptual elements, the actual elements of
a target system, how they relate to each other, and principles for the design of the
architecture. The applied architecture is then the blueprint used to develop the actual system
solution.
From a reference architecture to a system solution.
The architecture relies on the separation of resources providing sensing and actuation
from the actual devices, a set of contextual and real world entity-centric services, and
the users of the services.
SENSEI further relies on an open-ended constellation of providers and users, and also
provides a reference model for different business roles.
A number of design principles and guidelines are identified, and so is a set of
requirements.
Finally, the architecture itself contains a set of key functional capabilities.
IoT-A refers to as the Architectural Reference Model (ARM).
The vision of IoT-A is, via the ARM, to establish a means to achieve a high degree of
interoperability between different IoT solutions at the different system levels of
communication, service, and information.
IoT-A provides a set of different architectural views, establishes a proposed
terminology and a set of Unified Requirements.
1. The overall design objective of IoT architecture shall be to target a horizontal system
of real-world services that are open, service-oriented, secure, and offer trust.
2. Design for reuse of deployed IoT resources across application domains.
3. Design for a set of support services that provide open service-oriented capabilities and
can be used for application development and execution.
4. Design for different abstraction levels that hide underlying complexities and
heterogeneities.
5. Design for sensing and actors taking on different roles of providing and using services
across different business domains and value chains.
6. Design for ensuring trust, security, and privacy.
7. Design for scalability, performance, and effectiveness.
8. Design for simplicity of management.
9. Design for different service delivery models.
10. Design for lifecycle support.
Asset Layer
Interest Example
Real- World objects and entities that are Vehicles
subject to being monitored and controlled, Home
as well as having digital representations and Human
identities. Buildings, etc
Assets can also be of a more virtual Latter
character, being subjective representations Routes
of parts of the real world. Trucks
Logistics
Information
Traffic Intensity
Road Work
Road Conditions
Weather Situation
Assets are instrumented with embedded Tags: RFID
technologies that bridge the digital realm Optical Codes: Bar Codes, QR Codes
with the physical world, and that provide
the capabilities to monitor and control the
assets as well as providing identifies to the
assets.
Communication Layer
Connectivity between the resources on one end and the different computing infrastructures
that host and execute service support logic and application logic on the other end.
Network Description
V2V Vehicle-to-vehicle
Collision Avoidance
Interest Example
Open-ended array of different applications Smart Metering in the Smart Grid,
Vehicle Tracking,
Building Automation.
Supporting the core business or operations Customer Relationship Management (CRM)
of any enterprise, or individual that is Enterprise Resource Planning (ERP)
interested in IOT applications Business Support Systems (BSS)
The business layer also provides exposure to City portal services for citizens in a smart
API’s for third parties to get access to data city context.
and information and can also contain Providing necessary data visualizations to
support for direct access to applications by the human workforce in a particular
human users. enterprise.
Management
Interest Example
Deals with management of various parts of Management of devices
the system solution related to its operation, Communications networks
maintenance, administration and General Information Technology (IT)
provisioning. infrastructure.
Security
Security is about protection of the system, its information and services, from external
threats or any other harm.
Security measures are usually required across all layers, for instances, providing
communication security and information security.
Key Capabilities:
1. Trust and Identify Management
2. Authentication and Authorization
Standards Considerations
There are a number of standardization organizations and bodies, both proper Standards
Development Organizations (SDO) as well as special interest groups and alliances that
develop standards specifications.
Consideration Interest Example
1) Different national and International
international bodies ratify Telecommunications Union
standards by SDOs, whereas (ITU)
standard specifications International Organization
developed developed by for Standardization (ISO)
special interest groups and European
alliances are normally Telecommunications
agreed upon and adopted by Standards Institute (ETSI)
market actors such as The European Committee
technology manufacturers. for Electrotechnical
Standardization
(CENELEC)
2) System standards can
address 3G mobile
communication network as
defined within the 3rd
Generation Partnership
Project (3GPP) or standards
towards the Smart Grid as
done by the National
Institute of Standards and
Technology (NIST)