Iot Unit 2
Iot Unit 2
M2M refers to technology where devices, machines, or systems share data and perform tasks without
humans needing to do anything. The devices communicate directly with each other.
Key Points:
• M2M uses AI (Artificial Intelligence) and ML (Machine Learning) to make devices smarter. These
systems can analyze data and make decisions automatically.
• Initially, M2M was popular in factories and industrial setups to manage machines remotely. Over
time, it has spread to areas like healthcare, business, insurance, and more.
• M2M is also the base technology for IoT (Internet of Things). While M2M connects devices, IoT
integrates these devices with the Internet for more advanced tasks.
How M2M Works
M2M systems use sensors to collect data and send it to a network for processing. Unlike older systems (like
SCADA), M2M uses public communication networks, like cellular or Wi-Fi, which are cheaper and more
flexible.
Key Components of an M2M System:
1. Sensors: Gather information like temperature, pressure, or location.
o Example: A temperature sensor in a freezer sends data about the internal temperature.
2. RFID (Radio Frequency Identification): Used to identify and track objects.
o Example: RFID tags in a warehouse track goods during shipping.
3. Communication Links: Use cellular, Wi-Fi, or Ethernet to transmit data.
4. Software: Processes the data and makes decisions.
o Example: If a machine detects a problem, it can automatically send an alert or shut down to
prevent damage.
Example of M2M in Action:
Telemetry, a well-known type of M2M communication, has been used for decades.
• Early telemetry systems transmitted data through telephone lines or radio waves.
• Now, with the Internet, telemetry is used for everyday devices like smart meters (to monitor
electricity usage) or smart appliances (like refrigerators).
Benefits of M2M
1. Saves money: Reduces equipment maintenance costs.
2. Increases revenue: Creates new opportunities, like better service for customers.
3. Better customer support: Fixes issues proactively before they occur
Applications and Examples of M2M
M2M is widely used in industries for remote monitoring, control, and data exchange. Here are some
examples:
1. Vending Machines:
o Notify suppliers when stocks are low and need refilling.
o Saves time and ensures products are always available.
2. Warehouse Management (WMS):
o Tracks items in real-time to ensure inventory is accurate.
o Prevents overstocking or running out of supplies.
3. Utility Companies:
o Smart meters monitor energy usage, send bills, and detect faults.
o Helps in detecting issues like gas leaks or power outages.
4. Telemedicine:
o Monitors patients’ health data (like heart rate or blood pressure) and alerts doctors if
something goes wrong.
o Can even deliver medicine at the right time.
5. Smart Homes:
o Appliances like lights, fans, or thermostats communicate to adjust settings automatically.
o Example: A thermostat adjusts the temperature based on weather updates.
6. Logistics and Fleet Management:
o Tracks vehicle locations and ensures goods reach their destination on time.
7. Traffic Control:
o M2M systems help manage traffic signals based on real-time traffic flow.
Key Features of M2M
• Low Power Consumption: Uses less energy.
• Network Operator: Uses cellular or packet-based services.
• Event Detection: Monitors events like equipment failures.
• Time Tolerance: Can delay sending data if needed.
• Time Control: Sends/receives data only at specific times.
• Location-Based Alerts: Wakes devices when they enter certain areas.
• Small Data Transfers: Sends small chunks of data regularly.
Requirements for M2M (as per ETSI)
1. Scalability:
o The system should support many devices as the network grows.
o Example: Adding more smart meters in a city without affecting the system's performance.
2. Anonymity:
o Should hide device identity if required (for privacy or regulatory reasons).
3. Logging:
o Must record events like failures or installation issues. Logs should be accessible when
needed.
4. Communication Principles:
o Devices should communicate using simple methods like SMS, internet, or peer-to-peer.
o Example: Two devices exchanging data directly without involving a central server.
5. Delivery Methods:
o Supports sending data in various ways:
▪ Unicast (1-to-1)
▪ Multicast (1-to-group)
▪ Anycast (1-to-nearest device)
▪ Tries to avoid Broadcast (sends to everyone) to reduce network load.
6. Message Scheduling:
o Controls when messages are sent, considering delays and priority.
o Example: A vending machine sends a refill request only during low network traffic.
7. Optimized Communication Paths:
o Picks the best route for sending data to avoid delays or failures.
o Example: If a path is congested, it chooses another route to ensure timely delivery.
M2M vs IoT:
M2M (Machine-to-Machine):
• Focus: Devices talk directly to each other.
• Example: A washing machine sends a message to a repair system saying it’s broken.
IoT (Internet of Things):
• Focus: Devices are connected to the internet for smarter functions.
• Example: The washing machine connects to an app, lets you start it from your phone, and
recommends the best wash cycle based on your clothes.
System Architecture of M2M (Machine-to-Machine)
M2M system architecture is a structured design that describes how various components interact and
communicate to enable devices to exchange data and perform actions. The architecture consists of four
main layers and key components to manage the entire system.
1. Device Layer
This layer consists of physical devices, sensors, and actuators that gather data or perform actions.
• Role: Collects data from the environment or machines and sends it for processing.
• Components:
o Sensors: Measure physical parameters (temperature, pressure, humidity, etc.).
o Actuators: Perform specific actions based on commands (e.g., turning on a motor).
o RFID: Tracks and identifies objects using tags.
o Embedded Devices: Smart devices with built-in sensors and communication capabilities.
• Example:
o A GPS device collects location data from a vehicle.
2. Network Layer
This layer ensures data transmission between devices and the central processing system. It connects the
devices to gateways and eventually to the cloud or central server.
• Role: Facilitates communication using wired or wireless networks.
• Components:
o Gateways: Serve as intermediaries between devices and the network by aggregating and
forwarding data.
o Communication Protocols: Ensure smooth data transfer (e.g., MQTT, CoAP, HTTP).
o Networks:
▪ Wireless Technologies: Wi-Fi, cellular (4G/5G), Zigbee, LoRa, Bluetooth.
▪ Wired Technologies: Ethernet, fiber optics.
• Example:
o A smart electricity meter sends power usage data to a cloud server via a 4G network.
3. Application Enablement Layer
This is the middleware layer that acts as a bridge between the network and the applications. It processes,
analyzes, and stores data received from devices.
• Role: Provides a platform for interpreting raw data and converting it into actionable information.
• Components:
o Data Processing: Software analyzes and organizes data.
o Middleware Services: Provide APIs, messaging systems, and device management tools.
o Security Services: Handle encryption, authentication, and data integrity.
• Example:
o A server detects an abnormal reading (e.g., high pressure) and triggers an alert for
maintenance.
4. Application Layer
This is the topmost layer where end-users interact with the system. It provides a user interface and
manages specific applications for monitoring, control, or decision-making.
• Role: Delivers processed data to users or triggers automated actions.
• Components:
o User Interfaces: Dashboards, mobile apps, or web portals.
o Automation Systems: Execute predefined actions based on conditions.
o Analytics Tools: Generate reports, insights, and predictions.
• Example:
o A mobile app shows real-time electricity usage and allows users to adjust settings remotely.
Key Components of M2M System Architecture
1. Sensors and Actuators:
o Sensors collect data, and actuators perform actions based on commands.
2. Gateways:
o Aggregate data from devices and transmit it to the cloud/server. They also handle protocol
translation.
3. Communication Technologies:
o Enable data transfer between devices, gateways, and servers using cellular, Wi-Fi, or other
methods.
4. Data Processing Platform:
o Servers or cloud systems process and analyze data.
5. User Applications:
o Mobile apps or web interfaces allow users to interact with the system.
M2M System Architecture Workflow
1. Data Collection:
Sensors or embedded devices collect raw data (e.g., temperature, pressure, location).
2. Data Transmission:
Devices send the collected data to a gateway or directly to a cloud/server using communication
networks.
3. Data Processing and Storage:
Data is processed, stored, and analyzed on a central platform (e.g., cloud or data center).
4. Automated Actions:
Based on the processed data, the system can trigger actions such as sending alerts, adjusting
settings, or controlling devices.
5. User Access:
Users access the data or control devices using applications via mobile phones, computers, or other
interfaces.
Real-Life Example of M2M System Architecture
Smart Agriculture System:
• Device Layer: Soil moisture sensors measure water levels in the soil.
• Network Layer: Data is transmitted to the gateway via Zigbee.
• Application Enablement Layer: The data is processed in a cloud platform, where algorithms
determine if the soil needs water.
• Application Layer:
o An irrigation system is automatically activated.
o Farmers receive real-time updates via a mobile app.
In diagram(book fig 3.1):
M2M Area Networks:
• Represents the Device Layer in my explanation.
• Includes devices, sensors, and actuators connected locally to collect data.
M2M Gateway:
• Matches the Gateway in the Network Layer I mentioned.
• Aggregates data from the M2M area network and sends it to the core network.
M2M Core Network:
• Part of the Network Layer that ensures connectivity.
• Utilizes wired or wireless networks for communication.
M2M Applications:
• Corresponds to the Application Layer in my content.
• Includes servers or platforms where the data is processed, stored, and accessed by users.
M2M gateway:
An M2M (Machine-to-Machine) gateway in IoT is a device that helps different machines or devices
communicate with each other and with a central system. It acts as a bridge between these devices and the
internet or other networks.
For example, if a sensor in a factory collects data, the M2M gateway sends this data to a cloud platform for
analysis. The gateway can handle different types of communication (like Wi-Fi, cellular, or Bluetooth) and
can also translate between different protocols used by the machines, making it easier for all devices to
work together.
Advantages:
• Data transfer: Allows smooth data exchange between machines and remote systems.
• Protocol translation: Converts different communication protocols for compatibility.
• Security: Often includes security features to protect data.
Disadvantages:
• Complexity: Can add another layer of complexity to the network.
• Cost: Adds to the overall cost of the IoT system.
Advantages of M2M :
• Automation of tasks without human intervention.
• Increased efficiency in data exchange and decision-making.
• Remote monitoring and control of devices.
• Cost savings by reducing manual labor and errors.
• Real-time data for informed decision-making.
Disadvantages of M2M :
• Increased security risks due to more connected devices.
• Complex setup and management of the system.
• Data overload that may be difficult to handle.
• High initial setup and maintenance costs.
• Dependence on a stable network for proper functioning.
Difference between M2M and IOT:
Features Iot M2M
Hybrid SDN
Hybrid Networking is a combination of Traditional Networking with software-defined networking in one
network to support different types of functions on a network.
Difference Between SDN and Traditional Networking
Software Defined Networking Traditional Networking
Software Defined Network is a virtual networking A traditional network is the old conventional
approach. networking approach.
Software Defined Network is the open interface. A traditional network is a closed interface.
In Software Defined Network data plane and In a traditional network data plane and control
control, the plane is decoupled by software. plane are mounted on the same plane.
For more details you can refer to the article differences between SDN and Traditional Networking.
SDN Architecture
In a traditional network, each switch has its own data plane as well as the control plane. The control plane
of various switches exchange topology information and hence construct a forwarding table that decides
where an incoming data packet has to be forwarded via the data plane. Software-defined networking (SDN)
is an approach via which we take the control plane away from the switch and assign it to a centralized unit
called the SDN controller. Hence, a network administrator can shape traffic via a centralized console without
having to touch the individual switches.
The data plane still resides in the switch and when a packet enters a switch, its forwarding activity is decided
based on the entries of flow tables, which are pre-assigned by the controller. A flow table consists of match
fields (like input port number and packet header) and instructions. The packet is first matched against the
match fields of the flow table entries. Then the instructions of the corresponding flow entry are executed.
The instructions can be forwarding the packet via one or multiple ports, dropping the packet, or adding
headers to the packet.
If a packet doesn’t find a corresponding match in the flow table, the switch queries the controller which
sends a new flow entry to the switch. The switch forwards or drops the packet
based on this flow entry. A typical SDN architecture consists of three layers.
• Application Layer: It contains the typical network applications
like intrusion detection, firewall, and load balancing.
• Control Layer: It consists of the SDN controller which acts as the
brain of the network. It also allows hardware abstraction to the
applications written on top of it.
• Infrastructure Layer: This consists of physical switches which form
the data plane and carries out the actual movement of data
packets.
The layers communicate via a set of interfaces called the north-bound
APIs(between the application and control layer) and southbound
APIs(between the control and infrastructure layer).
Advantages of SDN
• The network is programmable and hence can easily be modified via the controller rather than
individual switches.
• Switch hardware becomes cheaper since each switch only needs a data plane.
• Hardware is abstracted, hence applications can be written on top of the controller independent
of the switch vendor.
• Provides better security since the controller can monitor traffic and deploy security policies. For
example, if the controller detects suspicious activity in network traffic, it can reroute or drop
the packets.
Disadvantages of SDN
• The central dependency of the network means a single point of failure, i.e. if the controller gets
corrupted, the entire network will be affected.
• The use of SDN on large scale is not properly defined and explored.
Conventional Network Architecture in IoT
In a conventional network architecture for the Internet of Things (IoT), communication and data
processing are structured hierarchically, following traditional networking paradigms. This architecture is
less flexible than modern approaches like Software-Defined Networking (SDN), but it is still widely used in
various IoT applications.
Key Components of Conventional IoT Network Architecture:
1. Perception Layer (Edge Devices):
o This layer includes IoT devices like sensors, actuators, and embedded systems that interact
directly with the physical environment.
o Devices gather data (e.g., temperature, motion) and transmit it to the network.
2. Network Layer:
o Responsible for data transmission between IoT devices and centralized servers or data
centers.
o Uses traditional communication protocols like Wi-Fi, Bluetooth, ZigBee, or cellular (e.g.,
4G/5G).
o Employs routers, gateways, and switches for routing and forwarding.
3. Application Layer:
o The end-user interface where data is processed, analyzed, and visualized.
o Applications might include smart home controls, industrial monitoring systems, or
healthcare dashboards.
Workflow in Conventional Architecture:
1. Data Generation:
o IoT devices in the perception layer collect data from the environment.
2. Data Transmission:
o Data is sent via the network layer to a central server or cloud data center for processing.
3. Data Processing and Storage:
o Centralized servers or cloud platforms handle data analysis and storage.
4. Action/Visualization:
o Processed data is sent to the application layer for user interaction, visualization, or
triggering actions (e.g., turning on a light or adjusting a thermostat).
Characteristics of Conventional IoT Architecture:
1. Centralized Data Processing:
o Most of the data processing occurs in centralized servers or the cloud, creating potential
bottlenecks.
2. Fixed Network Hierarchy:
o The architecture follows a rigid hierarchy, making it less adaptable to changing network
demands.
3. Device Dependency:
o Each device often relies on predefined protocols and configurations, limiting
interoperability.
4. Low Programmability:
o The control plane and data plane are tightly coupled, reducing the ability to dynamically
manage or reconfigure the network.
Advantages of Conventional IoT Architecture:
1. Simplicity: Easy to implement with well-established protocols and infrastructure.
2. Wide Adoption: Supported by a variety of legacy devices and systems.
3. Predictability: Follows well-understood networking paradigms, making troubleshooting
straightforward.
Limitations:
1. Scalability Issues:
o As the number of IoT devices increases, centralized processing can lead to bottlenecks.
2. Latency:
o Sending data to a central server for processing introduces delays, especially in time-sensitive
applications.
3. Limited Flexibility:
o Adapting the network to new devices, protocols, or applications can be difficult.
4. Security Risks:
o Centralized servers are vulnerable to attacks, which can compromise the entire system.
Example:
Consider a smart home using conventional architecture:
• Sensors (perception layer) detect motion or temperature changes.
• A central hub (network layer) collects this data and sends it to a cloud platform.
• The cloud processes the data and sends commands (e.g., turn on a light or adjust a thermostat)
back to the home system.
While effective, this setup may suffer from delays, high bandwidth usage, and limited scalability.
Architecture of Conventional IoT Networks
The architecture of conventional IoT networks follows a layered hierarchical model, typically comprising
three primary layers: the Perception Layer, Network Layer, and Application Layer. Each layer has distinct
responsibilities, forming a structured pipeline for data flow from IoT devices to end-user applications.
1. Perception Layer (Sensing and Interaction Layer)
The perception layer is the foundation of the IoT network, consisting of all the physical devices that
interact directly with the environment.
Key Functions:
• Collect data from the physical world (e.g., temperature, pressure, location, motion).
• Convert physical signals into digital data for transmission.
Components:
1. Sensors:
o Devices that measure environmental conditions (e.g., temperature, humidity, motion
sensors).
o Examples: Thermometers, accelerometers, cameras, RFID tags.
2. Actuators:
o Devices that perform actions based on received commands.
o Examples: Motors, robotic arms, and valves.
3. Embedded Systems:
o Small computing units (e.g., microcontrollers) that control sensors and actuators.
o Examples: Arduino, Raspberry Pi.
Data Flow:
Data from sensors is processed locally by the embedded systems and sent to the network layer.
2. Network Layer (Communication Layer)
The network layer connects the perception layer to centralized data processing systems, such as servers or
the cloud. It handles data transmission and routing using communication protocols.
Key Functions:
• Transmit data from edge devices to central servers or cloud platforms.
• Manage communication protocols and ensure data routing.
Components:
1. Gateways:
o Devices that aggregate and preprocess data from sensors.
o Handle protocol conversions (e.g., ZigBee to IP).
2. Routers and Switches:
o Network devices responsible for forwarding data packets.
3. Communication Protocols:
o Short-Range Protocols:
▪ Wi-Fi, Bluetooth, ZigBee, Z-Wave.
o Long-Range Protocols:
▪ Cellular (4G/5G), LoRaWAN, Sigfox.
o Wired Protocols:
▪ Ethernet, Modbus.
4. Data Transmission Technologies:
o WAN (Wide Area Networks) for long-distance data transfer.
o LPWAN (Low Power Wide Area Networks) for low-energy devices.
Data Flow:
Data from the perception layer is transmitted via gateways and routed through the network to centralized
servers.
3. Application Layer (Data Processing and User Interaction Layer)
The application layer is where data is processed, analyzed, and made available to end-users through
applications and interfaces.
Key Functions:
• Analyze, store, and process data collected from IoT devices.
• Visualize data for users or trigger automated actions based on analytics.
Components:
1. Data Centers/Cloud Platforms:
o Handle large-scale data processing and storage.
o Provide tools for analytics and machine learning.
2. Applications and Dashboards:
o User-facing software for monitoring and controlling IoT devices.
o Examples: Smart home apps, industrial control systems, healthcare monitoring apps.
3. Middleware:
o Software frameworks that manage device interactions, data integration, and security
policies.
Data Flow:
Processed data is sent to user applications for visualization or used to send commands back to actuators in
the perception layer.
Hierarchical Workflow
1. Data Collection:
o Sensors in the perception layer gather data from the environment.
2. Data Aggregation:
o Gateways in the network layer preprocess and aggregate data.
3. Data Transmission:
o Network components transmit data to centralized servers or cloud platforms.
4. Data Processing and Analysis:
o Centralized systems analyze the data to generate actionable insights.
5. Feedback and Control:
o Processed data is visualized in user interfaces or used to send control signals to actuators.
Architecture Diagram
+------------------------------------------------------+
| Application Layer |
| - Cloud Platforms |
| - User Applications (Dashboards, Mobile Apps) |
| - Data Analytics and Visualization Tools |
+------------------------------------------------------+
↑
Data Transmission
↑
+------------------------------------------------------+
| Network Layer |
| - Gateways |
| - Communication Protocols (Wi-Fi, 5G, ZigBee) |
| - Routers, Switches |
+------------------------------------------------------+
↑
Data Collection
↑
+------------------------------------------------------+
| Perception Layer |
| - Sensors (Temperature, Motion, Cameras, etc.) |
| - Actuators (Motors, Valves, etc.) |
| - Embedded Systems (Arduino, Raspberry Pi) |
+------------------------------------------------------+