M2M vs. IoT, SDN, NFV
M2M vs. IoT, SDN, NFV
76
3.1 Introduction
of Internet of Thing
definition and characteristics
In Chapter-1. you learned about the
with loT'is Machine-to-Machine
is often used synonymously
(M2M).
(dot). Another loTwhich
Thoughterm and M2M are often used interchangeably, these terms have evolved
ties
some of the difterences and similarities
describes
Trom different backgrounds. This chapter
between loT and M2M.
3.2 M2M
machines (or devices) for the purpose
(M2M) refers tonetworking of
Machine-to-Machine
3.1 shows the end-to-end
control and data exchange. Figure
of remote monitoring and networks, communication network
architecture for M2M systemscomprising of M2M area
of machines (or M2M nodes
domain. An M2M area network comprises
and application actuation and communication. Various
modules for sensing,
which have embedded hardware networks such as ZigBee.
communication protocols be used for M2M local area
can
Communication (PLC), 6LoWPAN,
ModBus, M-Bus, Wirless M-Bus, Power Line
Bluetooh. between M2M
communication protocols provide connectivity
IEEE 802.15.4, etc. These to
The communication network provides connectivity
nodes within an M2M area network.
communication network can use either wired or
wireless
remote M2M area networks. The
use either proprietary or non-IP based
networks (IP-based). While the M2M area networks
IP-based networks. Since non-IP
communication protocols, the communication network uses
based protocols are used within M2M area networks, the
M2M nodes within one network
cannot communicate with nodes in an external
network. To enable the communication
between remote M2M area networks, M2M gateways are used.
the M2M nodes and the M2M gateway is based on the communication protocols which
to
are native to the M2M area network. M2M gateway performs protocol translations
enable IP-connectivity for M2M area networks. M2M gateway acts as a proxy pertorming
translations from/to native protocols to/from Internet Protocol (IP). With an M2M gateway.
each node in an M2M area network appears as a virtualized node for external M2M are
networks.
The M2M data is gathered into point solutions such as enterprise applications, servie
management applications, or remote monitoring applications. M2M has various application
domains such as smart metering, home automation, industrial automation, smart grids, etc.
MMsolution designs (such as data collection and storage architectures and applications)
are specific to the M2M
application domain.
Bahga&Madisetti, 2015
3.3 Ditference between loT and M2M 77
Wired Network
M2M Applications
M2M Gateway
Wireless Network
M2M Gateway
AA
Figure 3.1: M2M system architecture
Virtual Node
Native Protocol
M2M Node Translation
Proxy
Protocol
described as follows:
Ihe differences between M2M and lo'T are
between or devices
the machines protocols
based communication for communication within the M2M area netwarrless
ModBus, M-Bus,
orks
Wirle.
include ZigBce, Bluetooh, IEEE
Commonly uses M2M protocols 6LoWPAN, 802.15.4, Z-Wa we
Communication (PLC),
M-Bus. Power Line on the protocols below the
communication in
M2M is usually
etc. The focus of the protocols above
in is usually on
loT'
The focus of communication
network layer. MQTT, XMPP, DDS, AMOD
P
CoAP, WebSockets,
the network layer such as HTTP,
etc.. shown in Figure 3.3. physical obiects
"Things" in loT refers
as to
The
Machines in M2M vs Things in IoT: communicate with their external
can sense and
identifiers and
that have unique physical states. The unique
or their internal
environment (and user applications)
the IP addresses (or MAC addresses). Things have
things in IoT are
identifiers for the sensor information, or
for accessing, processing, and storing
software components
actuators connected. loT systems can
have heterogeneous things (e.g., a
controlling devices of various types, such as fire
can include IoT
home automation lolT system in contrast to loT,
lighting control devices, etc.) M2M systems,
alarms, door alarms,
within an M2M areanetwork.
typically have homogeneous machinetypes
While the emphasis of M2M is moreonhardware
Hardware vs Software Emphasis:
on software. IoT
devices run
with embedded modules, the emphasis of IoTis more
and interfacing with the
specializedsoftware for sensor data collection, data analysis
IP-based communication. Figure 3.4 shows the various components of
cloud through the
communication infrastructure and
loT systems including the things, the Internet,
applications. in
and often
Data Collection & Analysis: M2M data is collected in point solutions
on-premises storage infrastructure. In contrast to M2M, the data in IoT is collected
shows the various
in the cloud (can bepublic, private or hybrid cloud). Figure 3.5
component
loT-levels, and the loT components deployed in the cloud. The analytics
The IoT data and analysis
analyzes the data and stores the results in the cloud database.
controiuet
results are visualized with the cloud-based applications. The centralized
is aware of the status of all the end nodes and sends control commands to the noucs
Observer nodes can process information and use it for various applications, howevc
observer nodes do not perform any control functions.
APplications: M2M data is collected in point solutions and can be accesseu
2015
Bahga & Madisetti, C
3.3 Difference between loT and M2M 79
WebSockets
HTTP COAP WebSockets HTTP CoA
MQTT XMPP DDS AMQP MQTT XMPP DOS AMOP
ansp
CP UDP TCP UDP
M2M tinkLayer
802.3-Ethernet 802.16-WiMax 26/36/LTE- (primarily point-to polnt 802.3-Ethernet 802.16-WiMax 26/3G/LTE-
K Cellular Cellular
802.11-WiFi802.15.4-LR-WPAN 802.11-WiFi802.15.4-LR-WPAN
Figure 3.3: Communication in IoT is IP-based whereas M2M uses non-IP based networks.
Communication within M2M area networks is based on protocols below the network layer
whereas loT is based on protocols above the network layer.
Computing Infrastructure
Things Internet
& Applications
Backhaul Networks
1 Wired
Wireless
Thing
44-)
Sensors/Actuators Processing Communication
16T Level-6
Multple Monitoring
Nodes
Centralized
Controler
loT Level-5
Centrollted
Dadoase
outers/End Points
Coordinator
lOT Level-44
lOTLevels 2 &3
Hesourc
Resource
Device
Monitoring Nodes
perorm loal analysis
Monitoning Node
In this section you will learn about Software Defined Networking (SDN) and Nerwo
Function Virtualization (NFV) and their applications for loT.
Bahga &Madisetti, ©
2013
3.4 SDN and NFV for loT 81
******
Network Network
Applicatior Application
Network Operanngse
pecialized PacketForwarding
Hardware
Network Network
Network Network
Application| Application Application Application
Netwo
twork OperatingSystem
SpecializedPacket 5
Specialized Packet Forwarding ware
Hardware
www
Network Network
Application Application
Applications Layer
SimplePacket Forwarding
Hardware
SDN Architecture
Application
SDN Applications
Layer
Programmable Open APls
(Northbound Intertace)
Control
SDN Controler
Layer
Control & Data Plane Programmable
infrastructure Interface (Southbound Interface)
Network Network Network
Layer
Device Device Device
Interoperability is limited due to the lack of standard and open interfaces. Netwos
evices use proprietary hardware and software and have slow product life-cyct
niting innovation. The conventional
networks were well suited for statue u aftic
2015
Bahga & Madisetti, ©
3.4 SDN and NFV for loT 83
patterns and had a large number of protocols designed for specific applications. For
loT applications which are deployed in cloud computing environments, the traffic
patterns are more dynamic. Due to the complexity of conventional network devices,
making changes in the networks to meet the dynamic traffic patterns has become
increasingly difficult.
Management Overhead: Conventional networks involve significant management
overhead. Network managers find it increasingly difficult to manage multiple network
devices and interfaces from multiple vendors. Upgradation of network requires
configuration changes in multiple devices (switches, routers, firewalls, etc.)
Limited Scalability: The virtualization technologies used in cloud computing
environments has increased the number of virtual hosts requiring network access.
loT applications hosted in the cloud are distributed across multiple virtual machines
that require exchange of traffic. The analytics components of loT applications run
distributed algorithms on a large number of virtual machines that require huge amounts
of data exchange between virtual machines. Such computing environments require
highly scalable and easy to manage network architectures with minimal manual
configurations, which is becoming increasingly difficult with conventional networks.
SDN attempts to create network architectures that are simpler, inexpensive, scalable,
3.7 and 3.8 show the SDN architecture and the SDN
Figures
agile and easy to manage.
network controller is
layers in which the control and data planes are decoupled and the
centralized. Software-based SDN controllers maintain a unified view
of the network and
infrastructure
make configuration, management and provisioning simpler. The underlying
to specialized hardware in
in SDN uses simple packet forwarding hardware as opposed
conventional networks. The underlying network infrastructure
is abstracted from the
do not require implementations
applications. Network devices become simple with SDN as they
instructions from the SDN controller
of a large number of protocols. Network devices receive
and cost less as they can be
on how to forward the packets. These devices can be simpler
built from standard hardware and software components.
SDN Controller
OpenFlow
iProtocol
Pipeline
Flow Table Flow Table
OpenFlow Switch
Acton Stats
Rule
NFV
NFV Infrastructure Management
eoe
Virtualization Layer
Figure 3.11 shows the NFV architecture, as being standardized by the European
Telecommunications Standards Institute (ETSI) [82]. Key clements of the NEV archito.
ecture
are as follows:
Virtualized Network Function (VNF): VNF is a software implementation
of a
network function which is capable of running overthe NFV Infrastructure (NFV
NFV Infrastructure (NFV): NFVI includes compute, network andstorageresource rces
that are virtualized.
NFV Management and Orchestration: NFV Management and Orchestration focuse
onall virtualization-specific managementtasks_and covers the orchestration and
life-cycle management of physical and/or software resources thatsupporttheinfrastruct
virtualization,and the life-cycle management of VNFs.
ictue
NFV comprises of network functions implemented in software that run on virtualized
resources in the cloud. NFV enables separation of network functions which are implemented
in software from the underlying hardware. Thus network functions can be easily tested and
upgraded by installing new software while the hardware remains the same. Virtualizing
network functions reduces the equipment costs and also reduces power consumption. The
multi-tenanted nature of the cloud allows virtualized network functions to be shared for
multiple network services. NFV is applicable only to data plane and control plane functions
in fixed and mobile networks.
Let us look at an example of how NFV can be used for virtualization of the home
networks. Figure 3.12 shows a home network with a Home Gateway that provides Wide
Area Network (WAN) connectivity to enable services such as Internet, IPTV, VolP, etc.
The Home Gateway performs various functions
including Dynamic
Host Configuration
Protocol (DHCP) server, Network Address Translation
(NAT), application specific gateway
and Firewall. The Home Gateway provides private IP addresses to each connected device
in the home. The Home
Gateway provides routing capabilities and translates the privae
IP addresses to one public address
(NAT function). The gateway also provides applicauou
specific routing for applications
such as VolP and IPTV.
Figure 3.13 shows how NFV can be used to virtualize the Home Gateway. The NFv
infrastructure in the cloud hosts a virtualized Home
Gateway. The virtualized gatew
provides private IP addresses to the devices in the home. The also
connects to network services such as
virtualized gateway
VolP and IPTV.
3.4 SDN and NFV for loT
87
Summary
In this chapter you learned about the differences and similarities between loT and M2M.
Machine-to-Machine (M2M) typically refers to networking of machines (or devices) for
the purpose of remote monitoring and control and data exchange. An M2M area network
comprises of machines (or M2M nodes) which have embedded hardware modules for sensing.
actuation and communication. M2M and loT differ in how the communication between
or non-IP based
the machines or devices happens. While M2M uses either proprietary
communication protocols for communica-
communication. While
tion within the M2M area networks, IoT uses IP-based protocols for
have the same machine
loT systems can have heterogeneous things M2M systems usually
of M2M is more on hardware with
types within an M2M area network. The emphasis
on software. M2M data is
embedded modules, whereas, the emphasis of loT is more
loT is collected
collected in point solutions and can be accessed by on-premisis applications.
and Network
in the cloud. You also learned about Software Defined Networking (SDN)
Function Virtualization (NFV) and their applications for
loT. Software-Defined Networking
the control plane from the data plane
(SDN) is a networking architecture that separates
elements of SDN include centralized network
and centralizes the network controller. Key
standard communication interface. NFV is
controller, programmable open APIs and a
virtualization to consolidate the heterogeneous network
complementary to SDN and leverages
switches and storage.
devices onto industry standard high volume servers,
Review Questions
networks?
protocols are used for M2M local
area
1. Which communication
M2M and Things in loT?
2. What the differences between Machines in
are
differ in M2M and loT?
3. How do data collection and analysis approaches
NFV?
4. What the differences between SDN and
are
various levels of loT?
5. Describe how SDN can be used for
SDN?
centralized network controller in
6. What is the function of a
loT devices?
7. Describe how NFV can be used for virtualizing