0% found this document useful (0 votes)
33 views19 pages

IOT Unit-2

The document discusses machine-to-machine (M2M) technology, which allows machines and devices to communicate with each other without human involvement. M2M enables remote monitoring and control through technologies like sensors, RFID, WiFi, and cellular networks. Common applications of M2M include asset tracking, supply chain management, smart meters, telemedicine, and smart homes.

Uploaded by

Balaji Kannan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views19 pages

IOT Unit-2

The document discusses machine-to-machine (M2M) technology, which allows machines and devices to communicate with each other without human involvement. M2M enables remote monitoring and control through technologies like sensors, RFID, WiFi, and cellular networks. Common applications of M2M include asset tracking, supply chain management, smart meters, telemedicine, and smart homes.

Uploaded by

Balaji Kannan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 19

M2M:

Machine-to-Machine (M2M)
refers to networking of
machines(or devices) for the
purpose
of remote monitoring and
control and dataexchange.
 Term which is often
synonymous with IoT is
Machine-to-Machine (M2M).
 IoT and M2M are often
usedinterchangeably.
Fig. Shows the end-to-end
architecture of M2M systems
comprises of M2M area
networks,
communication networks and
application fomain.
M2M:
Machine-to-Machine (M2M)
refers to networking of
machines(or devices) for the
purpose
of remote monitoring and
control and dataexchange.
 Term which is often
synonymous with IoT is
Machine-to-Machine (M2M).
 IoT and M2M are often
usedinterchangeably.
Fig. Shows the end-to-end
architecture of M2M systems
comprises of M2M area
networks,
communication networks and
application fomain.
M2M:
Machine-to-Machine (M2M)
refers to networking of
machines(or devices) for the
purpose
of remote monitoring and
control and dataexchange.
 Term which is often
synonymous with IoT is
Machine-to-Machine (M2M).
 IoT and M2M are often
usedinterchangeably.
Fig. Shows the end-to-end
architecture of M2M systems
comprises of M2M area
networks,
communication networks and
application fomain.
M2M
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology
that enables networked devices to exchange information and perform actions without the
manual assistance of humans. Artificial intelligence (AI) and machine learning (ML)
facilitate the communication between systems, allowing them to make their own autonomous
choices. M2M technology was first adopted in manufacturing and industrial settings, where
other technologies, such as SCADA and remote monitoring, helped remotely manage and
control data from equipment. M2M has since found applications in other sectors, such as
healthcare, business and insurance. M2M is also the foundation for the internet of things
(IoT).

M2M works

The main purpose of machine-to-machine technology is to tap into sensor data and transmit it
to a network. Unlike SCADA or other remote monitoring tools, M2M systems often use
public networks and access methods -- for example, cellular or Ethernet -- to make it more
cost-effective.

The main components of an M2M system include sensors, RFID, a Wi-Fi or cellular
communications link, and autonomic computing software programmed to help a network
device interpret data and make decisions. These M2M applications translate the data, which
can trigger pre-programmed, automated actions.

One of the most well-known types of machine-to-machine communication is telemetry,


which has been used since the early part of the last century to transmit operational data.
Pioneers in telemetrics first used telephone lines, and later, radio waves, to transmit
performance measurements gathered from monitoring instruments in remote locations.

The Internet and improved standards for wireless technology have expanded the role of
telemetry from pure science, engineering and manufacturing to everyday use in products such
as heating units, electric meters and internet-connected devices, such as appliances.

Beyond being able to remotely monitor equipment and systems, the top benefits of M2M
include:

 reduced costs by minimizing equipment maintenance and downtime;

 boosted revenue by revealing new business opportunities for servicing products in the
field; and

 improved customer service by proactively monitoring and servicing equipment before it


fails or only when it is needed.

M2M applications and examples

Machine-to-machine communication is often used for remote monitoring. In product


restocking, for example, a vending machine can message the distributor's network,
or machine, when a particular item is running low to send a refill. An enabler of asset
tracking and monitoring, M2M is vital in warehouse management systems (WMS) and
supply chain management (SCM).

Utilities companies often rely on M2M devices and applications to not only harvest energy,
such as oil and gas, but also to bill customers -- through the use of Smart meters -- and to
detect worksite factors, such as pressure, temperature and equipment status.
In telemedicine, M2M devices can enable the real time monitoring of patients' vital statistics,
dispensing medicine when required or tracking healthcare assets.

The combination of the IoT, AI and ML is transforming and improving mobile


payment processes and creating new opportunities for different purchasing behaviors. Digital
wallets, such as Google Wallet and Apple Pay, will most likely contribute to the widespread
adoption of M2M financial activities.

Smart home systems have also incorporated M2M technology. The use of M2M in
this embedded system enables home appliances and other technologies to have real time
control of operations as well as the ability to remotely communicate.

M2M is also an important aspect of remote-control software, robotics, traffic control,


security, logistics and fleet management and automotive.

Key features of M2M

Key features of M2M technology include:

 Low power consumption, in an effort to improve the system's ability to effectively


service M2M applications.

 A Network operator that provides packet-switched service

 Monitoring abilities that provide functionality to detect events.


 Time tolerance, meaning data transfers can be delayed.

 Time control, meaning data can only be sent or received at specific predetermined
periods.

 Location specific triggers that alert or wake up devices when they enter particular areas.

 The ability to continually send and receive small amounts of data.

M2M requirements

According to the European Telecommunications Standards Institute (ETSI), requirements of


an M2M system include:

 Scalability - The M2M system should be able to continue to function efficiently as more
connected objects are added.

 Anonymity - The M2M system must be able to hide the identity of an M2M device when
requested, subject to regulatory requirements.

 Logging - M2M systems must support the recording of important events, such as failed
installation attempts, service not operating or the occurrence of faulty information.
The logs should be available by request.

 M2M application communication principles - M2M systems should enable


communication between M2M applications in the network and the M2M device
or gateway using communication techniques, such as short message service (SMS)
and IP Connected devices should also be able to communicate with each other in a peer-
to-peer (P2P) manner.

 Delivery methods - The M2M system should support Unicast,


anycast, multicast and broadcast communication modes, with broadcast being replaced by
multicast or anycast whenever possible to minimize the load on the communication
network.

 Message transmission scheduling - M2M systems must be able to control network access
and messaging schedules and should be conscious of M2M applications' scheduling delay
tolerance.
 Message communication path selection - Optimization of the message communication
paths within an M2M system must be possible and based on policies like transmission
failures, delays when other paths exist and network costs.

M2M value chain

Input Inputs are the base raw ingredients that are turned into a product.
Example Cocoa beans for the manufacture of chocolate.
M2M Example Data from an M2M device that will be turned into a piece of
information.
Production/ It refers to the process that the raw inputs are put through to become
Manufacture part of a value chain.
Example Cocoa beans may be dried and separated before being transported to
overseas markets.
M2M Example Data from an M2M, needs to be verified and tagged for provenance.
Processing It refers to the process whereby a product is prepared for sale.
Example Cocoa beans may now be made into cocoa powder, ready for use in
chocolate bars.
M2M Example M2M refers to the aggregation of multiple data sources to create an
information component something that is ready to be combined with
other data sets to make it useful for corporate decision-making.
Packaging Packaging refers to the process whereby a product can be branded as
would be recognizable to end-users consumers.
Example A chocolate bar would now be ready to eat and have a red wrapper with
the words “KitKatt” on it.
M2M Example M2M data will have to be combined with other information from
internal corporate databases, for example, to see whether the data
received requires any action. This data would be recognizable to the
end-users that need to use the information, either in t6he form of
visualizations or an Excel spreadsheet.
Distribution/ This process refers to the channels to market for products.
Marketing
Example A chocolate bar may be sold at s supermarket, a kiosk, or even online.
M2M Example Produced an information product that can be used to create new
knowledge within a corporate environment examples include more
detailed scheduling of maintenance based on real-world information or
improved product design due to feedback from the M2M solution.

IOT
IoT or the Internet of Things is a concept where network infrastructure such as
devices, applications, sensors, and actuators are connected via the internet. IoT is the
interconnection of distinctively identifiable embedded computing machines within the
existing internet infrastructure. This interconnection allows them to exchange data with each
other and with other devices. This enables them to be remotely monitored and controlled.
IoT is the successor of M2M technology. In other words, M2M serves as the foundation for
IoT. IoT takes the basic concepts of M2M and expands them by creating large cloud
networks of devices that communicate with one other on cloud networking platforms. The
cloud architecture provides infrastructure, software, and platform for all IoT devices. It
allows users to create fast, flexible, and high-performance networks that connect a wide range
of devices.
There are many examples of IoT devices around us these days. Smart home voice assistants
like Google Home and Alexa and the other devices that they are connected to are examples of
IoT. Any network of devices that are connected to the internet and use a cloud platform to
communicate with each other are considered to be part of the IoT.

IoT value chains

Inputs Significantly more inputs than for an M2M solution.


Devices/ Sensors Data from devices and sensors is used to provide a different and
much broader marketplace than M2M does.
Open Data A piece of data is open if anyone is free to use, reuse, and
redistribute it subject only, at most, to the requirement to
attribute and/ or share-alike.
OSS/BSS The operational support systems and business support systems.
Closed information marketplace that allow operators to closed
deliver services to enterprises.
Example: Where phone usage data is already owned by the
company.
Corporate Databases Companies of a certain size generally have multiple corporate
databases covering various functions, including supply chain
management, payroll, accounting. As the use of devices and
sensors increases, these databases will be connected to this data
to create new information sources and new knowledge.
Production/ Process will need to include tagging and linking of relevant data
Manufacture items in order to provide provenance and traceability across the
information value chain.
Asset Information Asset information may include data such as temperature over
time of container during transit or air quality during a particular
month.
Open Data Sets Maps, rail timetables or demographics about a certain area in a
country or city.
Network Information GPS data, services accessed via the mobile network.
Corporate The current state of demand for a particular product in the
Information supply chain at a particular moment in time.
Processing The data from the various inputs from the production and
manufacture stage are combined together to create information.
Packaging The packaging section of the information value chain creates
information components.
These components could be produced as charts or other
traditional methods of communicating information to end- users.
Distribution/ The final stage of the information values chain is the creation of
Marketing an Information Product.
Information products These information products are the result of either detailed
for improving internal information analysis that allows better decisions to be made
decision-making during various internal corporate processers, or they enable the
creation of previously unavailable knowledge about a
company’s products, strategy, or internal processes.
Information products These information products have high value for other economic
for resale to other actors and can be sold to them.
economic actors

The Information-Driven Global Value Chain (I-GVC)

 Fundamental roles within the I-GVC


 Inputs: Sensors, RFID, and other devices; End-Users.
 Data Factories.
 Service Providers/Data Wholesalers.
 Intermediaries.
 Resellers.
Inputs to the information-driven global commodity chain

 Sensors and other devices (e.g. RFID and NFC).


 End-users
->Both of these information sources input tiny amounts of data into the I-GVC chain,
which are then aggregated, analyzed, repackaged, and exchanged from value chain.
-> As a result, sensor devices and networks, RFIDs, mobile and consumer devices,
Wi-Fi hotspots, and end-users all form part of a network of “subcontractors” in the
value chain, all contributing to the increased value of the information products

Sensors and radio frequency identification

 Sensors and RFID devices are working as inputs to the I-GVC through the capture
and transmission of data necessary for the development of information products.
 Smart phones have also been developed that allow mobile devices to interact with
sensors and RFID.
 This allows for a two-way interaction between a mobile terminal and the sensor
technology.
 The data is used as one part of the input to the commodity chain, which uses it to
create the information products that are eventually exchanged.
 In this sense, the sensor networks, and NFC and RFID technologies may be viewed as
subcontractors Resellers Intermediaries Data Factories Service Providers/ Data
Wholesalers End User Information Domestic and overseas input from human and
sensor-based ‘subcontractors’ to the I-GVC, workers that constantly gather data for
further processing and sale.

End-users

 End-users that choose to use and participate within the digital world are now deeply
embedded into the very process of production.
 Every human that enters a search query into a search engine,
 Every human that agrees to allow the mobile broadband platform to inform a service
of their location,
 Every human that uses NFC to allow a bank to establish and confirm their identity are
also functioning as subcontractors to the global information systems that form the
basis of the I-GVC.

Production processes of the information – driven global value chain

 Data factories
 Data factories are those entities that produce data in digital forms for use in other
parts of the I-GVC.
 Service providers/data wholesaler:
 Service Providers and Data wholesalers are those entities that collect data from
various sources worldwide, and through the creation of massive databases, use it to
either improve their own information products or sell information products in various
forms.
 Example: Twitter, Facebook, Google
Intermediaries

 In the emerging industrial structure of the I-GVC, there is a need for intermediaries
that handle several aspects of the production of information products.
 The development of databases such as the ones created by Google, Facebook, and
Twitter may therefore require the creation of entities that are able to protect
individuals’ privacy rights in relevant regional settings.
 Intermediary is to reduce transaction costs associated with the establishment of a
market for many different companies to participate in.

Resellers

 Resellers are those entities that combine inputs from several different intermediaries,
combine it together, analyze, and sell it to either end-users or to corporate entities.
 These resellers are currently rather limited in terms of the data that they are able to
easily access via the converged communications platform, but they are indicative of
the types of corporate entities that are forming within this space.

Key Differences between M2M and IoT

M2M and IoT are not the same. IoT requires M2M, but M2M does not need IoT. M2M
systems are often isolated, and IoT systems take M2M to an enhanced level. They bring
isolated systems together into a large connected ecosystem.

Basis M2M IOT

Simple device-to-device
Connection Type communication usually within an Devices use IP networks to
Used embedded software at the client communicate.
site.

Communication directly between


Communication IoT sensors automation.
machines.

Communication Communication technology Internet protocols like


Protocol Used techniques and traditional HTTP, FTP and Telnet.
protocols.

Observation of some degree of Objects are responsible for


Intelligence
intelligence. decision-making.

Hardware and Software-


Technology Hardware-based.
based.

Data sharing between other


Data sharing among
Data Sharing applications to improve the
communicating parties only.
end-user experience.

Connects to a larger
Scope Deployed in a closed system.
network.

Supports open API


Open API Support No open API support.
integration.

Devices do not rely on internet An active internet


Internet
connection. connection is required.

Big Differences between IoT and M2M

The big difference between IoT and M2M is the connection. IoT is usually any device
connected to the internet for enhanced performance. On the other hand, M2M is generally
two or more devices connected with the internet for data sharing and analytics.
IoT is premeditated to be scalable so that devices can be added to a network and integrated
into existing systems. M2M networks can be more labour-intensive to set up and maintain
since new point-to-point connections must be created for each device.

Building an architecture

Architecture refers to the description of the main conceptual elements, the actual elements of
a target system, how they relate to each other, and principles for the design of the
architecture. The applied architecture is then the blueprint used to develop the actual system
solution.
From a reference architecture to a system solution.

Problem and Solution domain partitioning.


Main design principles and needed capabilities

 The architecture relies on the separation of resources providing sensing and actuation
from the actual devices, a set of contextual and real world entity-centric services, and
the users of the services.
 SENSEI further relies on an open-ended constellation of providers and users, and also
provides a reference model for different business roles.
 A number of design principles and guidelines are identified, and so is a set of
requirements.
 Finally, the architecture itself contains a set of key functional capabilities.
 IoT-A refers to as the Architectural Reference Model (ARM).
 The vision of IoT-A is, via the ARM, to establish a means to achieve a high degree of
interoperability between different IoT solutions at the different system levels of
communication, service, and information.
 IoT-A provides a set of different architectural views, establishes a proposed
terminology and a set of Unified Requirements.
1. The overall design objective of IoT architecture shall be to target a horizontal system
of real-world services that are open, service-oriented, secure, and offer trust.
2. Design for reuse of deployed IoT resources across application domains.
3. Design for a set of support services that provide open service-oriented capabilities and
can be used for application development and execution.
4. Design for different abstraction levels that hide underlying complexities and
heterogeneities.
5. Design for sensing and actors taking on different roles of providing and using services
across different business domains and value chains.
6. Design for ensuring trust, security, and privacy.
7. Design for scalability, performance, and effectiveness.
8. Design for simplicity of management.
9. Design for different service delivery models.
10. Design for lifecycle support.

An IoT Architecture Outline

Functional layers and capabilities of an IoT solution

Asset Layer
Interest Example
Real- World objects and entities that are  Vehicles
subject to being monitored and controlled,  Home
as well as having digital representations and  Human
identities.  Buildings, etc
Assets can also be of a more virtual Latter
character, being subjective representations Routes
of parts of the real world. Trucks
Logistics
Information
Traffic Intensity
Road Work
Road Conditions
Weather Situation
Assets are instrumented with embedded Tags: RFID
technologies that bridge the digital realm Optical Codes: Bar Codes, QR Codes
with the physical world, and that provide
the capabilities to monitor and control the
assets as well as providing identifies to the
assets.

Communication Layer

Connectivity between the resources on one end and the different computing infrastructures
that host and execute service support logic and application logic on the other end.

Network Description

LAN Local Area Network

WAN Wide Area Network

Wired, Wireless technologies, Public,


Private

WPAN’s Wireless Personal Area Networks

Fitness, Health Care

HAN and BAN Home and Buildings Area Network

Automation and Control Applications

NAN Neighbourhood Area Networks

Distribution Grid of a Smart Electricity Grid

V2V Vehicle-to-vehicle

Collision Avoidance

ZigBee Protocol Stack for Home Automation

Exchanging service operations using HTTP


as the means for communication.

Service Support Layer


Interest Example
Support services can provide uniform Support services can provide uniform
handling of the underlying devices and handling of the underlying devices and
networks, thus hiding complexities in the networks, thus hiding complexities in the
communications and resources layers. communications and resource layers.
Communication-related functions include Reliability Purposes,
selection of communication channels if Publish Subscribe and
different networks can be used in parallel Message Queue Mechanisms
Location Based Services (LBS) and
Geographic Information System (GIS)
Services

Data and Information Layer


Purpose: To Capture Knowledge and provide advanced control logic support
Concept: Knowledge Management Framework (KMF) as a collective term to include data,
information, domain- specific knowledge, actionable services descriptions as service
descriptors, rules, process or workflow descriptions etc.
Key Concepts: Data and Information models and Knowledge representation in general and
the focus is on the organization of information.

Interest Example
Open-ended array of different applications Smart Metering in the Smart Grid,
Vehicle Tracking,
Building Automation.
Supporting the core business or operations Customer Relationship Management (CRM)
of any enterprise, or individual that is Enterprise Resource Planning (ERP)
interested in IOT applications Business Support Systems (BSS)
The business layer also provides exposure to City portal services for citizens in a smart
API’s for third parties to get access to data city context.
and information and can also contain Providing necessary data visualizations to
support for direct access to applications by the human workforce in a particular
human users. enterprise.
Management
Interest Example
Deals with management of various parts of Management of devices
the system solution related to its operation, Communications networks
maintenance, administration and General Information Technology (IT)
provisioning. infrastructure.

Security
Security is about protection of the system, its information and services, from external
threats or any other harm.
Security measures are usually required across all layers, for instances, providing
communication security and information security.
Key Capabilities:
1. Trust and Identify Management
2. Authentication and Authorization

Data and Services


Data and Services processing can, from a topological perspective, be done in a very
distributed fashion and at different levels of complexity.
Basic event filtering and simpler aggregation, such as data averaging, can take place in
individual sensor nodes in WSANs, contextual metadata such as location and temporal
information can be added to sensor readings, and further aggregation can take place higher
up in the network topology.

Standards Considerations

There are a number of standardization organizations and bodies, both proper Standards
Development Organizations (SDO) as well as special interest groups and alliances that
develop standards specifications.
Consideration Interest Example
1) Different national and International
international bodies ratify Telecommunications Union
standards by SDOs, whereas (ITU)
standard specifications International Organization
developed developed by for Standardization (ISO)
special interest groups and European
alliances are normally Telecommunications
agreed upon and adopted by Standards Institute (ETSI)
market actors such as The European Committee
technology manufacturers. for Electrotechnical
Standardization
(CENELEC)
2) System standards can
address 3G mobile
communication network as
defined within the 3rd
Generation Partnership
Project (3GPP) or standards
towards the Smart Grid as
done by the National
Institute of Standards and
Technology (NIST)

System Standards rely on


the enabling technology
components as the
foundation, but as there
generally are many
competing technology
components (e.g protocol
stacks), the adoption into a
system standard is not a
straightforward route.
3) Standards are emerging as a
result of collaborative
research involving both
academia and industry.
Technology selection for
standardization can happen
as part of regulatory or
legislative processes.

You might also like