0% found this document useful (0 votes)
56 views

7CS4 IOT Unit-4

This document discusses machine-to-machine (M2M) communications and its architecture. M2M refers to communication between devices without human intervention using commonly technologies like wireless sensors, mobile networks and the internet. The basic stages of most M2M applications are data collection, transmission, assessment and response. M2M devices can form area networks and gateways forward data to communication networks. Examples of M2M applications discussed include security, transportation, manufacturing and e-health. Vehicle-to-vehicle communication is described as a way to help avoid road accidents. The differences between M2M and the internet of things are also summarized.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views

7CS4 IOT Unit-4

This document discusses machine-to-machine (M2M) communications and its architecture. M2M refers to communication between devices without human intervention using commonly technologies like wireless sensors, mobile networks and the internet. The basic stages of most M2M applications are data collection, transmission, assessment and response. M2M devices can form area networks and gateways forward data to communication networks. Examples of M2M applications discussed include security, transportation, manufacturing and e-health. Vehicle-to-vehicle communication is described as a way to help avoid road accidents. The differences between M2M and the internet of things are also summarized.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Internet Of Things

(7CS4-01)
Unit-4. IoT & M2M

Department of Computer Science & Engineering

(Rajasthan Technical University, KOTA)


M2M
What is M2M?
• Machine-to-Machine (M2M) communications refers to communication between
computers, embedded processors, smart sensors, actuators and mobile devices
without, or with only human intervention.

• M2M is a new business concept originating from the telemetry technology.

• M2M is based on very commonly used technologies – wireless sensors, mobile


networks and the Internet.
M2MArchitecture
Architecture

4
Contd…
Contd…
Explanation
Explanation

4 basic stages that are common to most M2M based applications:

o Collection of data;
o Transmission of data through a communication network;
o Assessment of data;
o Response to the available information;
Architecture
Architecture
• M2M devices reply to requests for data contained within them or transmit
the data automatically.

• M2M devices may constitute an M2M area network, which can be realized as,
e.g. a Bluetooth based personal area network of body sensors. M2M gateway
provides interconnection of M2M devices and forwards data collected from
them to communications network.

• The communication network serves as infrastructure for realizing


communication between M2M gateway and M2M end-user application or
server.
Contd…
Contd…

• For this purpose cellular network, telephone lines and


• communication satellites can be used.
• There are several means of sending data over the cellular network, such as CDMA
and GPRS. (Advantage of cellular data services is the ability to send large
amounts of data frequently).

• Finally, when data reach an M2M application, they can be analyzed.


M2MAccessNetworks
M2M Access Network

• Wired Solution – dedicated cabling between sensor gateway


Pros: very, very reliable; very high rates, little delay, secure
Cons: very expensive to roll out.

• Wireless Capillary Solution – shared short-range link/network.


Pros: cheap to roll out, generally scalable, low power
Cons: short range, multi-hop not a solution, low rates, weaker security, lack of
universal coverage

• Wireless Cellular Solution – dedicated cellular link


Pros: excellent coverage, mobility, roaming, generally secure
Cons: expensive operate, not cheap to maintain, not power efficient
How does
How does it Work ?
it work?

▪ When machines “talk” they do so in a language known as “Telemetry”. The concept


of telemetry – remote machines and sensors collecting and sending data to a
central point for analysis, either by humans or computers.

▪ Making a machine-to-machine communications system work is a step-by- step


process. The main elements involved are sensors (usually the kind that can
send telemetry wirelessly), a wireless network and a computer connected to
the Internet.
Contd…
Contd…

Lets take the case of Water Treatment Facility

City engineers are charged with supplying the


community with fresh drinking water. They need to
monitor the raw water supply, the treatment process
and the end product, which is drinkable water.
WaterTreatmentFacility
Water Treatment Facility

• the engineers would place sensors in strategic locations. This


includes placing sensors that can detect contaminants near or
Firstly around the raw water supply, such as a lake or river

• These sensors will send real-time data to a wireless network,


which connects to the Internet. Engineers then monitor this
incoming streaming data using computers loaded with
Secondly specialized software.

• engineers can monitor the outflow water to ensure their


treatment process is indeed resulting in high quality drinking
Finally water for the community.
Applications
Applications

Security
Transportation
- surveillance
- Toll payment,
applications,
road safety, etc.
Alarms, etc.

Manufacturing
E-Health
-production
-remote patent
chain monitoing
monitoring
and automation.
Applications -eHealth-eHealth
Applications

Disease Remote
Management Monitoring

Ageing Health
independently Check

On-line
Personal health
Fitness records
Applications -Automotive
Use Cases for
Automative
applications

Automative
applications
integration in
M2M
platform
Applications –Avoid Road Accidents

• The possibilities for M2M communications seem virtually limitless. But one
of the areas where M2M holds potential for the most transformative change
is the automotive industry. The ability to share realtime information with a
vehicle opens the door for a broad range of new and exciting applications
that will make driving safer, more convenient, and more efficient.

• An exciting area within M2M is the work going on within vehicular


networks, including new work on vehicle-to-vehicle (V2V) communications.
V2V Communication

Wireless technology allows connected vehicles to


communicate with one another, as well as the
infrastructure around them and alert motorists of road
conditions. Drivers can be alerted to dangerous road
conditions, possible collisions, and hazardous curves
using vehicle systems based on Dedicated Short Range
Communications (DSRC). DSRC is a technology
similar to Wi-Fi and connected vehicles could also
“talk” or provide the driver with information regarding
tolls, work zones, traffic signals, and school zones,
giving relief to delays and other surprises that motorists
face.
Benefits ofV2V
Benefits Of V2V

Benefits of V2V communication technologies could


be endless. A study by the NHTSA stated that
connected vehicle technology could handle roughly
80% of crash scenarios involving non-impaired
drivers.
Contd…
Contd…

Wireless Connectivity allows cars to be continuously aware of each other


so when one car brakes suddenly cars several yards behind the vehicle get
a safety warning before they get too close
Contd…
Contd…

Connected vehicles can help to mitigate crashes on busy urban streets.


Difference &
Similarities Between
IoT and M2M
Difference Between IoT and M2M
• Communication Protocols
• M2M and IoT can differ in how the communication between the machines or
devices happens.
• M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
• Machines in M2M vs Things in IoT
• The "Things" in IoT refers to physical objects that have unique identifiers and
can sense and communicate with their external environment (and user
applications) or their internal physical states.
• M2M systems, in contrast to IoT, typically have homogeneous machine types
within an M2M area network.
Difference Between IoT and M2M
• Hardware vs Software Emphasis
• While the emphasis of M2M is more on hardware with embedded
modules, the emphasis of IoT is more on software.
• Data Collection & Analysis
• M2M data is collected in point solutions and often in on-premises
storage infrastructure.
• In contrast to M2M, the data in IoT is collected in the cloud (can be public,
private or hybrid cloud).
• Applications
• M2M data is collected in point solutions and can be accessed by on-premises
applications such as diagnosis applications, service management applications,
and on- premises enterprise applications.
• IoT data is collected in the cloud and can be accessed by cloud applications
such as analytics applications, enterprise applications, remote diagnosis and
management applications, etc.
Software Defined
Network
SDN
• Software-Defined Networking (SDN)
is a networking architecture that
separates the control plane from the
data plane and centralizes the
network controller.
• Software-based SDN controllers
maintain a unified view of the network
and make configuration, management
and provisioning simpler.
• The underlying infrastructure in SDN
uses simple packet forwarding
hardware as opposed to specialized
hardware in conventional networks.
Key Elements Of SDN
• Centralized Network Controller
• With decoupled control and data planes and centralized network controller,
the network administrators can rapidly configure the network.
• Programmable Open APIs
• SDN architecture supports programmable open APIs for interface between
the SDN application and control layers (Northbound interface).
• Standard Communication Interface (OpenFlow)
• SDN architecture uses a standard communication interface between the
control and infrastructure layers (Southbound interface).
• OpenFlow, which is defined by the Open Networking Foundation (ONF)
is the broadly accepted SDN protocol for the Southbound interface.
Network Function
Virtualization
NFV
• Network Function Virtualization (NFV) is a technology that leverages virtualization to
consolidate the heterogeneous network devices onto industry standard high volume
servers, switches and storage.
• NFV is complementary to SDN as NFV can provide the infrastructure on which SDN
can run.
Key Elements Of NFV
• Virtualized Network Function (VNF):
• VNF is a software implementation of a network function which is capable of
running over the NFV Infrastructure (NFVI).
• NFV Infrastructure (NFVI):
• NFVI includes compute, network and storage resources that are virtualized.
• NFV Management and Orchestration:
• NFV Management and Orchestration focuses on all virtualization-specific
management tasks and covers the orchestration and life-cycle management of
physical and/or software resources that support the infrastructure
virtualization, and the life-cycle management of VNFs.
NFV Use Case
• NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the
cloud hosts a virtualized Home Gateway. The virtualized gateway provides private
IP addresses to the devices in the home. The virtualized gateway also connects to
network services such as VoIP and IPTV.
Difference Between
SDN and NFV For
IoT
Difference Between SDN and NFV
ASSIGNMENT

Q1. Differentiate between M2M and IOT Systems.

Q2. Explain software defined networks with suitable block diagram.

Q3. Explain the various levels of network function virtualization.

Q4. Explain the architecture of M2M communication system.


Thank
You

You might also like