100% found this document useful (2 votes)
1K views18 pages

M2M and Iot Technology Fundamentals - by Yash and Deepti

M2M and IoT technologies enable the connection and exchange of data between devices. [1] M2M refers to direct communication between machines using networks, focusing on accessing sensor data and transmitting it economically. [2] IoT represents all internet-connected devices, including everyday objects that can collect and share data without human intervention. [3] Key benefits of these technologies include improved customer engagement, optimization of technologies, and reduced waste through enhanced data collection.

Uploaded by

Denifer Deep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views18 pages

M2M and Iot Technology Fundamentals - by Yash and Deepti

M2M and IoT technologies enable the connection and exchange of data between devices. [1] M2M refers to direct communication between machines using networks, focusing on accessing sensor data and transmitting it economically. [2] IoT represents all internet-connected devices, including everyday objects that can collect and share data without human intervention. [3] Key benefits of these technologies include improved customer engagement, optimization of technologies, and reduced waste through enhanced data collection.

Uploaded by

Denifer Deep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

M2M AND IOT TECHNOLOGIES

FUNDAMENTALS
M2M

VS

IOT
The Internet of Things (IoT) describes the network of
physical objects—“things”—that are embedded with
sensors, software, and other technologies for the
purpose of connecting and exchanging data with other
devices and systems over the internet.

the Internet of Things (IoT) represents all computing devices


that are connected to the internet. It can be described as a
network of responsive devices and everyday objects that
wouldn’t necessarily be thought of as communicating with the
internet like wearables, industrial machinery, motion sensors,
and more. These devices are embedded with environmental
sensors and other technologies that enable them to collect
and exchange data without human intervention.

What is Machine to Machine Communication ?


Machine-to-machine (M2M) communications is
used for automated data transmission and
measurement between mechanical or electronic
devices.

The main objective of M2M technology is to access


sensor data and transmit it to a network. M2M
systems typically use public access networks and
methods – for example, cellular or Ethernet – for
the sake of economy
Difference between
M2M and IOT
Machine-to-Machine Communication
(M2M)

Introduction

Applications of M2M

Key features of M2M

Architecture and components of


M2M
conclusion
Introduction :
Machine-to-Machine (M2M) communication is a form of data
communication that involves one or more entities that do not
necessarily require human interaction or intervention in the
process of communication. M2M is also named as Machine Type
Communication (MTC) in 3GPP. It is different from the current
communication models in the ways that it involves: - new or
different market scenarios - lower costs and effort - a potentially
very large number of communicating terminals - little traffic per
terminal, in general M2M communication could be carried over
mobile networks (e.g. GSM-GPRS, CDMA EVDO networks). In the
M2M communication, the role of mobile network is largely
confined to serve as a transport network. With a potential market
of probably 50 million connected devices, M2M offers
tremendous opportunities as well as unique challenges. These
devices vary from highly-mobile vehicles communicating in real-
time, to immobile meter-reading appliances that send small
amounts of data sporadically.
Applications of M2M :
The applications of M2M cover many areas and the areas in which M2M is currently used are given below:
a. Security : Surveillances, Alarm systems, Access control, Car/driver security
b. Tracking & Tracing
: Fleet Management, Order Management, Pay as you drive, Asset
Tracking, Navigation, Traffic information, Road tolling, Traffic optimization/steering
c. Payment : Point of sales, Vending machines, Gaming machines
d. Health : Monitoring vital signs, Supporting the aged or handicapped, Web Access
Telemedicine points, Remote diagnostics
e. Remote Maintenance/Control : Sensors, Lighting, Pumps, Valves, Elevator control,
Vending machine control, Vehicle diagnostics
f. Metering : Power, Gas, Water, Heating, Grid control, Industrial metering
g. Manufacturing : Production chain monitoring and automation
h. Facility Management : Home / building / campus automation
Key features of M2M :
Some of the key features of M2M communication system are given below:
a. Low Mobility : M2M Devices do not move, move infrequently, or move only within a certain region
b. Time Controlled : Send or receive data only at certain pre-defined periods
c. Time Tolerant : Data transfer can be delayed

d. Packet Switched : Network operator to provide packet switched service with or without an MSISD
e. Online small Data Transmissions: MTC Devices frequently send or receive small amounts of data.

g. Low Power Consumption : To improve the ability of the system to efficiently service M2M
applications
h. Location Specific Trigger : Intending to trigger M2M device in a particular area e.g. wake
up the device
f. Monitoring: Not intend to prevent theft or vandalism but provide functionality to detect the events
Architecture and components of M2M :

a. M2M Device: Device capable of replying to request for data contained within those devices or
capable of transmitting data autonomously. Sensors and communication devices are the endpoints of
M2M applications. Generally, devices can connect directly to an operator’s network, or they will
probably interconnect using WPAN technologies such as ZigBee or Bluetooth. Backhaul to an
operator’s network is than achieved via gateways that encapsulate and manage all devices.
Consequently, addressing and identifying, e.g., routing, of the devices relies heavily on the gateways.
Devices that connect via gateways are normally outside the operator’s responsibility but belong to
M2M applications that are provided by service or application providers.

b. M2M Area Network (Device Domain): Provide connectivity between M2M Devices and
M2M Gateways, e.g. personal area network.
c. M2M Communication Networks (Network Domain): It covers the communications
between the M2M Gateway(s) and M2M application(s), e.g. xDSL, LTE, WiMAX, and WLAN.

d. M2M Gateway: Equipment that uses M2M capabilities to ensure M2M Devices inter-
working and interconnection to the communication network.
Conclusion :
M2M as an application holds the promise of bringing benefit to both
telecom operators and vendors. For service providers it is an
opportunity as low-bandwidth M2M services can be readily overlaid
onto the current user services network. Vendors are expected to
profit from selling both M2M-capable devices, and from the network
expansion brought about by increased throughput. However, it
comes with change in business model and value chain. There are
questions regarding the role of operators in the value chain. Also,
M2M services may have their own specific characteristics which
might be different from services in which humans directly influence
communication flow. The standardization in the direction of special
handling or optimization of the network for M2M specific service will
lead for better support of M2M communications.
IOT : Internet of things

Key Features

Advantages

disadvantages
IOT - Key Features
The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use. A brief review of these features is given below:
 AI – IoT essentially makes virtually anything “smart”, meaning it enhances every aspect of life
with the power of data collection, artificial intelligence algorithms, and networks. This can
mean something as simple as enhancing your refrigerator and cabinets to detect when milk
and your favorite cereal run low, and to then place an order with your preferred grocer.

 Connectivity – New enabling technologies for networking, and specifically IoT networking,
mean networks are no longer exclusively tied to major providers. Networks can exist on a
much smaller and cheaper scale while still being practical. IoT creates these small networks
between its system devices.
 Sensors – IoT loses its distinction without sensors. They act as defining instruments
which transform IoT from a standard passive network of devices into an active system
capable of real-world integration.
 Active Engagement – Much of today's interaction with connected technology happens
through passive engagement. IoT introduces a new paradigm for active content, product, or
service engagement.
 Small Devices – Devices, as predicted, have become smaller, cheaper, and more powerful

over time. IoT exploits purpose-built small devices to deliver its precision, scalability, and
versatility.
IoT − Advantages
The advantages of IoT span across every area of lifestyle and business.
Here is a list of some of the advantages that IoT has to offer:

 Improved Customer Engagement – Current analytics suffer from blind-spots and significant
flaws in accuracy; and as noted, engagement remains passive. IoT completely transforms this
to achieve richer and more effective

engagement with audiences.

 Technology Optimization – The same technologies and


data which improve the customer experience also
improve device use, and aid in more potent
improvements to technology. IoT unlocks a world of
critical functional and field data.
 Reduced Waste – IoT makes areas of improvement clear. Current analytics
give us superficial insight, but IoT provides real-world information leading to
more effective management of resources.

 Enhanced Data Collection – Modern

data collection suffers from its


limitations and its design for passive
use. IoT breaks it out of those spaces,
and places it exactly where humans
really want to go to analyze our world.
It allows an accurate picture of
everything.
IoT − Disadvantages
Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges.
Here is a list of some its major issues:

 Security – IoT creates an ecosystem of


constantly connected devices communicating

over networks. The system offers little control


despite any security measures. This leaves

users exposed to various kinds of attackers.

 Privacy – The sophistication of IoT


provides substantial personal data in
extreme detail without the user's
active participation.
 Complexity – Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.

 Flexibility – Many are concerned


about the flexibility of an IoT system to
integrate easily with another. They


worry about finding themselves with
several conflicting or locked systems.
 Compliance – IoT, like any other
technology in the realm of business, must
comply with regulations. Its complexity
makes the issue of compliance seem
incredibly challenging when many consider
standard software compliance a battle.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy