M2M
COMMUNCIATION
Joannes Sam Mertens
OUTLINE
• Introduction to Machine-to-Machine
Communication
• Key Characteristics
• Applications
• M2M Architecture
• M2M Requirements
• M2M Security
Introduction to M2M
• M2M is considered to be the important building blocks for IoT
• M2M- Direct communication between devices using wired or wireless
communication channel
• M2M- enables networked devices to exchange information and perform
actions without the manual assistance of humans.
• M2M technology was first adopted in manufacturing and industrial
settings, where other technologies, such as SCADA and remote monitoring,
helped remotely manage and control data from equipment
• Supervisory Control and Data Acquisition (SCADA) systems are used for
controlling, monitoring, and analyzing industrial devices and processes. The
system consists of both software and hardware components and enables
remote and on-site gathering of data from the industrial equipment.
Components of M2M
• Data end point (DEP):The data endpoint is the system containing the data to be transmitted
or monitored.
• A DEP can be a vending machine that sends inventory information to a central office
• An instrument that records weather data, or a medical device that transmits patient
health data.
• Communication networks: There are different types of communication networks for
transferring data from one machine to another. These include the cellular networks and
wireless or wired Internet connections that we use every day.
• Data integration point (DIP): The machine that receives the information is called the data
integration point. While there can be many data endpoints, there is only one data
integration point in a network. The DIP can be a server, a control center that monitors meter
readings, or a web crawler that collects data on a large number of websites.
IoT and M2M
M2M
• M2M is similar to IoT, but there are
some differences
• The main components of an M2M
system include sensors, RFID, a Wi-Fi or
cellular communications link,
and autonomic computing software
programmed to help a network device
interpret data and make decisions.
• These M2M applications translate the
data, which can trigger
preprogrammed, automated actions.
Key Characteristics
• Automated Data Exchange: M2M communication enables devices to collect and share data with each other automatically. This
data can include information about device status, environmental conditions, sensor readings, and more.
• Real-Time or Periodic Communication: M2M devices can communicate with each other in real-time or on a scheduled basis. For
example, a sensor in a manufacturing plant might send data to a central server every minute, while a smart thermostat could
communicate with an HVAC system as needed to control temperature.
• Wireless Connectivity: Many M2M devices use wireless communication protocols, such as Wi-Fi, cellular networks, Bluetooth,
Zigbee, or LoRa, to exchange data over short or long distances.
• Wide Range of Applications: M2M communication is used in a wide range of applications and industries, including industrial
automation, agriculture, healthcare, transportation, smart cities, and more. For instance, it can be used in smart meters to
transmit electricity usage data to utility companies, or in connected vehicles to exchange information with traffic infrastructure
and other vehicles.
• Data Processing and Decision-Making: M2M communication often involves not just data exchange but also data processing and
decision-making. Devices can analyze incoming data and trigger actions or alerts based on predefined rules or algorithms.
• Security Considerations: Security is a critical aspect of M2M communication, as unauthorized access or data breaches can have
significant consequences. Encryption, authentication, and access control mechanisms are essential for securing M2M
communication.
History of M2M
• While the origins of the acronym are unverified, the first use of machine-to-machine communication is often
credited to Theodore Paraskevakos, who invented and patented technology related to the transmission of
data over telephone lines, the basis for modern-day caller ID.
• Nokia was one of the first companies to use the acronym in the late 1990s. In 2002, it partnered with Opto
22 to offer M2M wireless communication services to its customers.
• In 2003, M2M Magazine launched. The publication has since defined the six pillars of M2M as remote
monitoring, RFID, sensor networking, smart services, telematics and telemetry.
M2M applications
• Machine-to-machine communication is often used for remote monitoring. In product
restocking, for example, a vending machine can message the distributor’s network
• M2M is vital in warehouse management systems (WMS) and supply chain
management
• Utilities companies often rely on M2M devices and applications to not only harvest
energy, such as oil and gas, but also to bill customers -- through the use of Smart
meters -- and to detect worksite factors, such as pressure, temperature and equipment
status.
• In telemedicine, M2M devices can enable the real time monitoring of patients' vital
statistics, dispensing medicine when required or tracking healthcare assets.
• Smart home systems have also incorporated M2M technology. The use of M2M in
this embedded system enables home appliances and other technologies to have real
time control of operations as well as the ability to remotely communicate.
• M2M is also an important aspect of remote-control software, robotics, traffic control,
security, logistics and fleet management and automotive
M2M Applications
M2M Architecture
M2M Architecture
• M2M Service Capabilities: abstraction of the resources of the device
• Machine-to-machine (M2M) service capabilities refer to the functionalities and
features that enable seamless communication and interaction between machines
or devices. These capabilities are essential for M2M systems to perform tasks
efficiently and effectively.
• M2M Applications: define the logic of the applications
• Two options:
• The two layers are executed by the device (devices with enough processing
resources)
• The two layers are executed by a gateway acting as a proxy between the network
domain and a group of devices connected through some LAN/PAN technology
M2M Architecture
• Access Network: It provides M2M devices with access to the Core Network (examples of
M2M Access network solutions are: LTE, WiFi, WiMAX, Ethernet, ADSL)
• Core Network: It is the IP network connecting the Access Network to the servers where
the M2M services will run
• M2M Capabilities and M2M Applications (the same as in the Device & Gateway domain)
• Network Management Functions: independent of the M2M operations
• M2M Management Functions: responsible of the networking and orchestrating
functions specific for M2M
M2M Architecture
M2M vs IoT
• While many use the terms interchangeably, M2M and IoT are not the same. IoT needs M2M, but M2M does
not need IoT.
• Both terms relate to the communication of connected devices, but M2M systems are often isolated, stand-
alone networked equipment.
• IoT systems take M2M to the next level, bringing together disparate systems into one large, connected
ecosystem.
• M2M systems use point-to-point communications between machines, sensors and hardware over cellular or
wired networks, while IoT systems rely on IP-based networks to send data collected from IoT-connected
devices to gateways, the cloud or middleware platforms.
• Example:
• In case of product stocking, M2M involves the vending machine communicating to the distributor's
machines that a refill is needed.
• Incorporate IoT and an additional layer of analytics is performed; the vending machine can predict
when particular products will need refilling based on purchase behaviours, offering users a more
personalized experience.
M2M vs IoT
M2M IoT
Machines communicating with Machines Machines communicating with machines,
humans with machines, machines with
humans
Often one-way communication Back and forth communication
Main purpose is to monitor and control Multiple applications, multilevel
communications
Devices are not dependent on the Internet connection is required for
Internet. communication
It supports point-to-point communication It supports cloud communication
Mostly hardware-based technology Involves the usage of both Hardware and
Software
M2M Requirements
According to the European Telecommunications Standards Institute (ETSI), requirements of an M2M system include:
• Scalability - The M2M system should be able to continue to function efficiently as more connected objects are added.
• Anonymity - The M2M system must be able to hide the identity of an M2M device when requested, subject to regulatory
requirements
• Logging - M2M systems must support the recording of important events, such as failed installation attempts, service not operating
or the occurrence of faulty information. The logs should be available by request.
• M2M application communication principles - M2M systems should enable communication between M2M applications in the
network and the M2M device or gateway using communication techniques, such as short message service (SMS) and IP Connected
devices should also be able to communicate with each other in a peer-to-peer (P2P) manner.
• Delivery methods - The M2M system should support Unicast, anycast, multicast and broadcast communication modes.
• Message transmission scheduling - M2M systems must be able to control network access and messaging schedules and should be
conscious of M2M applications' scheduling delay tolerance.
• Message communication path selection - Optimization of the message communication paths within an M2M system must be
possible and based on policies like transmission failures, delays when other paths exist and network costs.
M2M security
• Machine-to-machine systems face a number of security issues, from
unauthorized access to wireless intrusion to device hacking. Physical
security, privacy, fraud and the exposure of mission-critical
applications must also be considered.
• Typical M2M security measures include making devices and
machines tamper-resistant, embedding security into the machines,
ensuring communication security through encryption and
securing back-end servers, among others.
• Segmenting M2M devices onto their own network and managing
device identity, data confidentiality and device availability can also
help combat M2M security risks.
Device-to-Device (D2D) communication
• D2D communication allows devices in close proximity to transfer data by creating a direct link and does not require that data
to go through the base station. As a result, latency can be reduced thanks to the shorter traversal path of data.
• To enable D2D communication, we can rely on some existing wireless technologies used for transferring data in the near areas
such as Bluetooth, WiFi direct, and LTE direct. The listed wireless technologies however offer different ranges and speeds:
• Bluetooth 5.0 offers a maximum data rate of 50Mbps and a range of 240m
• WiFi Direct offers a 250 Mbps data rate and a range of 200m
• LTE Direct offers up to 13.5 Mbps data rate and a range of 500m