0% found this document useful (0 votes)
22 views17 pages

IOT Unit 2

The document discusses the transition from Machine-to-Machine (M2M) communication to the Internet of Things (IoT), highlighting their definitions, value chains, and architectural frameworks. It outlines the differences between M2M and IoT, emphasizing their communication protocols, data management, and application environments. Additionally, it introduces concepts like Software-Defined Networking (SDN) and Network Function Virtualization (NFV) as essential technologies supporting IoT infrastructure.

Uploaded by

Vanita Bhavnani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views17 pages

IOT Unit 2

The document discusses the transition from Machine-to-Machine (M2M) communication to the Internet of Things (IoT), highlighting their definitions, value chains, and architectural frameworks. It outlines the differences between M2M and IoT, emphasizing their communication protocols, data management, and application environments. Additionally, it introduces concepts like Software-Defined Networking (SDN) and Network Function Virtualization (NFV) as essential technologies supporting IoT infrastructure.

Uploaded by

Vanita Bhavnani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

MCA-35 Internet Of Things Page: 1/17

Unit-2
IoT to M2M : A Basic Perspective.
Introduction, Some Definitions, M2M Value Chains, IoT Value Chains, An emerging
industrial structure for IoT, The international driven global value chain and global
information monopolies.
IoT to M2M : An Architectural Overview.
Building an architecture, Main design principles and needed capabilities, An IoT
architecture outline, standards considerations.
===================================================================
About M2M (Machine to Machine):
● Machine-to-Machine (M2M) refers to networking of machines (or devices)
for the purpose of remote monitoring and control and data exchange.
● An M2M area network comprises machines (or M2M nodes) which have
embedded hardware modules for sensing, actuation and communication.
● Various communication protocols can be used for M2M local area networks
such as ZigBee, Bluetooth, ModBus, M-Bus, Wireless M-Bus, Power Line
Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.
● The communication network provides connectivity to remote M2M area
networks.
● The communication network can use either wired or wireless networks
(IP-based).
● While the M2M area networks use either proprietary or non-IP based
communication protocols, the communication network uses IP-based
networks.
MCA-35 Internet Of Things Page: 2/17

IoT to M2M : A Basic Perspective.


Introduction:
● M2M, or machine-to-machine, is a direct communication between devices
using wired or wireless communication channels.
● M2M refers to the interaction of two or more devices/machines that are
connected to each other.
● These devices capture data and share with other connected devices,
creating an intelligent network of things or systems. Devices could be
sensors, actuators, embedded systems or other connected elements.
● M2M technology could be present in our homes, offices, shopping
malls and other places. Controlling electrical appliances like bulbs and fans
using RF or Bluetooth from your smartphone is a simple example of M2M
applications at home. Here, the electrical appliance and your smartphone
are the two machines interacting with each other.
● The Internet of Things (IoT) is the network of physical devices embedded
with sensors, software and electronics, enabling these devices to
communicate with each other and exchange data over a computer
network. The things in the IoT refer to hardware devices uniquely
identifiable through a network platform within the Internet infrastructure.
● M2M and the IoT are two of the technologies that form the basis of the
new world.

Difference between IoT and M2M:


MCA-35 Internet Of Things Page: 3/17

Communication Protocols:
● M2M and IoT can differ in how the communication between the machines
or devices happens.
● M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
Machines in M2M and Things in IoT:
● The "Things" in IoT refers to physical objects that have unique identifiers
and can sense and communicate with their external environment (and user
applications) or their internal physical states.
● M2M systems, in contrast to IoT, typically have homogeneous machine
types within an M2M area network.
Hardware Vs Software Emphasis:
● While the emphasis of M2M is more on hardware with embedded modules,
the emphasis of IoT is more on software.
Data Collection and Analysis:
● M2M data is collected in point solutions and often in on-premises storage
infrastructure.
Applications:
● M2M data is collected in point solutions and can be accessed by
on-premises applications such as diagnosis applications, service
management applications, and on-premise enterprise applications.
● IoT data is collected in the cloud and can be accessed by cloud applications
such as analytics applications, enterprise applications, remote diagnosis and
management applications, etc.
Software Defined Networking (SDN):
● Software-Defined Networking (SDN) is a networking architecture that
separates the control plane from the data plane and centralizes the network
controller.
● In the conventional network architecture the control plane and data plane
are coupled. Following are the limitations of the conventional network
architecture.
MCA-35 Internet Of Things Page: 4/17

○ Complex Network devices: Due to the complexity of conventional


network devices, making changes in the networks to meet the
dynamic traffic patterns has become increasingly difficult.
○ Management Overhead: It is very difficult to manage multiple
network devices and interfaces from multiple vendors. Upgrading the
network requires configuration changes in multiple devices (switches,
routers, firewalls, etc.)
○ Limited Scalability: IoT applications hosted in the cloud are
distributed across multiple virtual machines. Such computing
environments require highly scalable and easy to manage network
architectures with minimal manual configurations, which is very
difficult in the conventional network.
● SDN attempts to create network architectures that are simpler, inexpensive,
scalable, agile and easy to manage. The following figure shows the SDN
architecture.
MCA-35 Internet Of Things Page: 5/17

Key Elements of SDN are as follows:


● Centralized Network Controller:
○ With decoupled control and data planes and centralized network
controller, the network administrators can rapidly configure the
network.
● Programmable Open APIs:
○ SDN architecture supports programmable open APIs for interface
between the SDN application and control layers (Northbound
interface). With these APIs various network services can be
implemented, such as routing, Quality of Service (QoS), access
control, etc.
○ A northbound interface is an application programming interface (API)
or protocol that allows a lower-level network component to
communicate with a higher-level or more central component
● Standard Communication Interface (OpenFlow):
○ OpenFlow, is defined by the ONF (Open Network Foundation), which
is a broadly accepted SDN protocol for the Southbound interface.
○ A southbound interface allows a higher-level component to send
commands to lower-level network components.
Network Function Virtualization:
● Network Function Virtualization (NFV) is a technology that leverages
virtualization to consolidate the heterogeneous network devices onto
industry standard high volume servers, switches and storage.
● NFV is complementary to SDN as NFV can provide the infrastructure on
which SDN can run.
MCA-35 Internet Of Things Page: 6/17

Key Elements of NFV (Network Function Virtualization)


● Virtualized Network Function (VNF):
○ VNF is a software implementation of a network function which is
capable of running over the NFV Infrastructure (NFVI)
● NFV Infrastructure (NFVI):
○ NFVI includes compute, network and storage resources that are
virtualized.
● NFV Management and Orchestration:
○ NFV Management and Orchestration focuses on all
virtualization-specific management tasks and covers the
orchestration and life-cycle management of physical and/or software
resources that support the infrastructure virtualization, and the
life-cycle management of VNFs.
NFV Use Case (For Home Network)
NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the
cloud hosts a virtualized Home Gateway. The virtualized gateway provides private
IP addresses to the devices in the home. The virtualized gateway also connects to
network services such as VoIP and IPTV.
MCA-35 Internet Of Things Page: 7/17

M2M Some Definitions:


Wikipedia: Machine to machine refers to technology that allowed both wireless
and wired systems to communicate with other devices of the same type.
Digi: Machine to Machine (M2M) technology allows organizations to gather data
from the edge of the enterprise and apply it in a way that positively impacts the
business.
Orange: exchange the information between machines that are established
between the central control system (server) and any type of equipment, through
one or several communication networks.

M2M Value Chains:


A value chain describes the full range of activities that firms and workers perform
to bring a product from its conception to end use and beyond, including design,
production, marketing, distribution, and support to the final consumer.

1. Inputs: Inputs are the base raw ingredients that are turned into a product.
Example: Cocoa beans for the manufacture of chocolate.
M2M Example: Data from an M2M device that will be turned into a piece of
information.
2. Production / Manufacture: Production / Manufacture refers to the process
that the raw inputs are put through to become part of a value chain.
Example: Cocoa beans may be dried and separated before being
transported to overseas markets.
M2M Example: Data from an M2M, needs to be verified and tagged for
provenance.
3. Processing: Processing refers to the process whereby a product is prepared
for sale.
Example: Cocoa beans may now be made into cocoa powder, ready for use
in chocolate bars.
MCA-35 Internet Of Things Page: 8/17

M2M Example: M2M refers to aggregation of multiple data sources to


create an information component something that is ready to be combined
with other data sets to make it useful for corporate decision making.
4. Packaging: Packaging refers to the process whereby a product can be
branded as would be recognizable to end-user consumers.
Example: A chocolate bar would now be ready to eat and have a red
wrapper with the words “KitKat” on it.
M2M Example: M2M data will have to be combined with other information
from internal corporate databases, for example, to see whether the data
received requires any action. This data would be recognizable to the end
users that need to use the information, either in the form of visualizations,
or an Excel spreadsheet.
5. Distribution / Marketing: This process refers to the channels to market for
products.
Example: A chocolate bar may be sold at a supermarket, a kiosk, or even
online.
M2M Example: Will have produced an Information Product that can be
used to create new knowledge within a corporate environment examples
include more detailed scheduling of maintenance based on real-world
information or improved product design due to feedback from the M2M
solution.
IoT Value Chains:
MCA-35 Internet Of Things Page: 9/17

1. Inputs: Significantly more inputs than for an M2M solution.


Devices/Sensors: Data from devices and sensors is used to provide a
different and much broader marketplace than M2M does.
Open Data: A piece of data is open if anyone is free to use, reuse and
redistribute.
For example, city maps, provided by organizations such as Ordnance Survey.
OSS / BSS: The operational support system / Business support system,
closed information marketplaces that allow operators to deliver services to
enterprises. For example, Phone usage data.
Corporate Databases: Companies of a certain size generally have multiple
corporate databases covering various functions, including supply chain
management, payroll, accounting. As the use of devices and sensors
increases, these databases will be connected to this data to create new
information sources and new knowledge.
2. Production / Manufacture: Process will need to include tagging and linking
of relevant data items in order to provide provenance and traceability
across the information value chain.
Asset Information: Asset information may include data such as temperature
over time of container during transit or air quality during a particular
month.
Open Data Sets: Maps, Rail Timetables, or demographics about a certain
area in a country or city.
Network Information: GPS Data, services accessed via the mobile network.
Corporate Information: The current state of demand for a particular product
in the supply chain at a particular moment in time.
3. Processing: The data from the various inputs from the production and
manufacture stage are combined together to create information.
4. Packaging: The packaging section of the information value chain creates
information components. These components could be produced as charts
or other traditional methods of communicating information to end users.
5. Distribution / Marketing: The final stage of the Information Value chain is
the creation of an Information Product.
Information products for improving internal decision making: These
information products are the results of either detailed information analysis
MCA-35 Internet Of Things Page: 10/17

that allows better decisions to be made during various internal corporate


processes, or they enable the creation of previously unavailable knowledge
about a company’s product, strategy, or internal processes.
Information products for resale to other economic actors: These
information products have high value for other economic actors and can be
sold to them.

The Information Driven Global Value Chain (I-GVC):

Inputs:
Sensors and RFID devices are working as inputs to the I-GVC through the
capture and transmission of data necessary for the development of
information products.
Smart phones have also been developed that allow mobile devices to
interact with sensors and RFID.
End-users:
End-users that choose to use and participate within the digital world are
now deeply embedded into the very process of production.
Production:
Data Factories: Data factories are those entities that produce data in digital
forms for use in other parts of the I-GVC.
MCA-35 Internet Of Things Page: 11/17

Service providers/data wholesaler: Service Providers and Data wholesalers


are those entities that collect data from various sources worldwide, and
through the creation of massive databases, use it to either improve their
own information products or sell information products in various forms.
Example: Twitter, Facebook, Google.
Intermediaries:
In the emerging industrial structure of the I-GVC, there is a need for
intermediaries that handle several aspects of the production of information
products.
The development of databases such as the ones created by Google,
Facebook, and Twitter may therefore require the creation of entities that
are able to protect individuals’ privacy rights in relevant regional settings.
Intermediary is to reduce transaction costs associated with the
establishment of a market for many different companies to participate in.
Resellers:
Resellers are those entities that combine inputs from several different
intermediaries, combine it together, analyze, and sell it to either end-users
or to corporate entities.

M2M to IoT: An Architectural Overview


Building an architecture:
Architecture refers to the description of the main conceptual elements, the
actual elements of a target system, how they relate to each other, and
principles for the design of the architecture. The applied architecture is
then the blueprint used to develop the actual system solution.
MCA-35 Internet Of Things Page: 12/17

Main design principles and needed capabilities:


A number of design principles and guidelines are identified, and so is a set
of requirements. Finally, the architecture itself contains a set of key
functional capabilities. IoT-A is referred to as the Architectural Reference
Model (ARM).
The vision of IoT-A is to establish a means to achieve a high degree of
interoperability between different IoT solutions at the different system
levels of communication, service, and information.

The following capabilities are expected by the IoT-A.


1. IoT architecture should be open, service-oriented, secure, and offer
trust.
2. Design for reuse of deployed IoT resources across application
domains.
3. Design for a set of support services that provide open service-oriented
capabilities and can be used for application development and
execution.
4. Design for different abstraction levels that hide underlying
complexities and heterogeneities.
5. Design for sensing and actors taking on different roles of providing and
using services across different business domains and value chains.
6. Design for ensuring trust, security, and privacy.
7. Design for scalability, performance, and effectiveness.
8. Design for simplicity of management.
9. Design for different service delivery models.
10. Design for lifecycle support.
MCA-35 Internet Of Things Page: 13/17

An IoT Architecture Outline:

Asset Layer
Real world objects and entities Vehicles, Home, Human, Buildings, etc.
that are subject to being
monitored and controlled.

Assets may be instrumented RFID (Radio Frequency Identification),


with embedded technologies. Barcodes, QR (Quick Response) codes.

Communication Layer
LAN Local Area Network

WAN Wide Area Network


- Wired
- Wireless
- Private / Public.

WPANs Wireless Personal Area Network


- Fitness
- Health Care

HAN and BAN Home and Building Area Network


- Automation and control applications.

NAN Neighborhood Area Network


- Distribution of a Smart Electricity Grid
MCA-35 Internet Of Things Page: 14/17

V2V Vehicle to Vehicle Network


- Collision avoidance

ZigBee Protocol Stack for Home Automation


- Exchanging service operations using
HTTP as the means for communication.

Service Support Layer


Support services can provide Location Based Service (LBS) and GIS
uniform handling of the (Geographic Information System)
underlying devices and
networks, thus hiding
complexities in the
communications and resource
layers.

Data and Information Layer


To capture knowledge and provide advanced control logic support.

Data from open ended array of - Smart metering in Smart Grid


various applications - Vehicle Tracking
- Building Automation

Business Operation data - CRM (Customer Relationship


Management)
- ERP (Enterprise Resource Planning)
- BSS (Business Support System)

Management
Deals with management of - Management of devices
various parts of the system - Communications Networks
solution related to its - General IT infrastructure
operation, maintenance,
administration and
provisioning.

Security
Security is about protection of - Trust and identity management
MCA-35 Internet Of Things Page: 15/17

the system, its information and - Authentication


services from external threats - Authorization
or any other harm.

Data and Services


Data and service processing can be done in a very distributed fashion and at
different levels of complexity.
Tasks may include, basic event filtering and simpler aggregation (such as
averaging), Contextual metadata (Location and temporal information added to
the sensor readings)
Standards Considerations:
3GPP: The 3rd Generation Partnership Project (3GPP) unites seven
telecommunications standard development organizations (ARIB, ATIS, CCSA, ETSI,
TSDSI, TTA, TTC), known as “Organizational Partners” and provides their members
with a stable environment to produce the Reports and Specifications that define
3GPP technologies.
oneM2M: oneM2M is a global community that develops IoT standards to enable
interoperable, secure, and simple-to-deploy services for the IoT ecosystem.
oneM2M standards are open, accessible and internationally recognized.
ZigBee: Zigbee is an IEEE 802.15.4-based specification for a suite of high-level
communication protocols used to create personal area networks with small,
low-power digital radios, such as for home automation, medical device data
collection, and other low-power low-bandwidth needs, designed for small scale
projects which need wireless connection. Hence, Zigbee is a low-power, low data
rate, and close proximity (i.e., personal area) wireless ad hoc network.
ITU: The International Telecommunication Union is a specialized agency of the
United Nations responsible for many matters related to information and
communication technologies.
ETSI (European Telecommunications Standards Institute): It provides members
with an open, inclusive and collaborative environment. This environment supports
the timely development, ratification and testing of globally applicable standards
for ICT-enabled systems, applications and services.
CENELEC (The European Committee for Electrotechnical Standardization): It is
responsible for European standardization in the area of electrical engineering.
MCA-35 Internet Of Things Page: 16/17

Question Bank (Unit-2)

Que 1: Answer the following (one Mark Questions)-

1. M2M stands for________________ (Ans: Machine to Machine)


2. What full form of PLC? Ans: Power Line Communication
3. Zigbee can be used for the M2M _________ network.
4. The M2M nodes within one network cannot communicate with nodes in an
external network. T/F
5. M2M nodes can communicate with _________ protocol in M2M gateway.
6. The analytics component analyzes the data and stores the results in the
________.
7. _____, Internet and computing infrastructure & applications are basic IoT
components.
8. What is the use of SDN?
9. Give full-form of NFV.
10.Give full-form of QoS.

Que 2: Answer the following (2 marks questions) – 10 marks

1. List two components of M2M system architecture.


2. List two protocols used in the M2M area network.
3. List any two IoT devices used in home automation.
4. List any two hardware used in conventional network architecture.
5. List any two vital elements of SDN.

Que 3: Answer the following (3 marks questions) -15 marks

1. Draw the block diagram of an M2M system architecture.


2. Draw the block diagram of an M2M gateway.
3. List three essential components of IoT.
4. List any three components of the home network.
5. List three services used for connecting virtualized gateway
MCA-35 Internet Of Things Page: 17/17

Que 4: Answer the following (5 marks questions).

1. Explain the difference between machines in M2M and things in IoT.


2. Describe the use of SDN for various levels of IoT?
3. Describe the use of NFV for virtualizing IoT devices.
4. Differentiate between SDN and NFV.
5. How do data collection and analysis approaches differ in M2M and IoT?

Que 5: Answer the following (5 marks questions)


1. Draw the block diagram of conventional home network architecture and
explain it.
2. Explain IoT architecture outline with block diagram.
3. Explain the IoT value chain with a diagram.
OR
Explain how data is driven in an IoT system for decision making as a value
chain?

You might also like