Digital Note On Iot Module-II
Digital Note On Iot Module-II
INTERNET OF THINGS
# LECTURE-12
INTRODUCTION TO M2M SYSTEM, DIFFERENCE BETWEEN IOT
AND M2M
Module-ll
IoT and M2M
M2M-Introduction
Machine-to-Machine (M2M) refers to networking of machines (or devices) for the
purpose of remote monitoring and control and data exchange.
The communication between the M2M nodes and the M2M gateway is
based on the communication protocols which are native to the M2M area
network.
M2M gateway performs protocol translations to enable IP-connectivity for
M2M area networks.
M2M gateway acts as a proxy performing translations from/to native
protocols to/from Internet Protocol (IP). With an M2M gateway, each node
in an M2M area network appears as a virtualized node for external M2M
area networks.
The M2M data is gathered into point solutions such as enterprise
applications, service management applications, or remote monitoring
applications. M2M has various application domains such as smart metering,
home automation, industrial automation, smart grids, etc. M2M solution
designs (such as data collection and storage architectures and applications
are specific to the M2M application domain.
# LECTURE-13
SDN AND NFV FOR IOT; SOFTWARE DEFINED NETWORKING,
NETWORK FUNCTION VIRTUALIZATION.
Management Overhead:
Conventional networks involve significant management overhead. Network
managers find it increasingly difficult to manage multiple network devices
and interfaces from multiple vendors. Upgradation of network requires
configuration changes in multiple devices (switches, routers, firewalls, etc.)
Limited Scalability:
The virtualization technologies used in cloud computing environments has
increased the number of virtual hosts requiring network access.
IoT applications hosted in the cloud are distributed across multiple virtual
machines that require exchange of traffic.
The analytics components of IoT applications run distributed algorithms on
a large number of virtual machines that require huge amounts of data
exchange between virtual machines.
Such computing environments require highly scalable and easy to manage
network architectures with minimal manual configurations, which is
becoming increasingly difficult with conventional networks.
Figure-7