Assignment 2
Assignment 2
1. Devices and Sensors: These are the endpoints that collect data and perform
specific tasks. They can range from simple sensors to complex industrial
machines.
2. Connectivity: M2M systems rely on various communication technologies
such as cellular networks, Wi-Fi, satellite, or dedicated M2M networks like
LoRaWAN or NB-IoT. The choice of connectivity depends on factors like
data volume, range, and power consumption requirements.
3. Network Infrastructure: This includes the hardware and software
components that manage data transmission and ensure connectivity
between devices and backend systems. Gateways and routers play a crucial
role in routing data to the appropriate destinations.
4. Data Processing and Storage: M2M systems generate large volumes of
data, which need to be processed, analyzed, and stored. Cloud platforms,
edge computing devices, and data centers are commonly used for these
purposes.
5. Application Layer: This layer encompasses the software applications and
services that utilize M2M data. It could involve real-time monitoring and
control, predictive analytics, remote diagnostics, and more.
6. Security: Due to the nature of M2M communications, security is
paramount. Encryption, authentication mechanisms, access control, and
secure protocols (like MQTT, CoAP) are employed to protect data and
devices from unauthorized access and cyber threats.
7. Management and Monitoring: To ensure smooth operation, M2M
architectures include tools for managing device fleets, monitoring
performance, and troubleshooting issues remotely.
m2m protocol
M2M (Machine-to-Machine) protocols are essential for enabling communication
between devices, sensors, and machines within IoT (Internet of Things)
networks. Here's a brief overview of commonly used M2M protocols: