Machine to Machine communications

Slides:



Advertisements
Similar presentations
Machine 2 Machine When the machines start talking May 2010.
Advertisements

M2M and Semantic Sensor Web
Distributed Data Processing
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Understanding the IEC Standard 李嘉凱 指導教授:柯開維.
By Adam Balla & Wachiu Siu
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
Fixed Mobile Convergence T Research Seminar on Telecommunications Business Johanna Heinonen.
Distributed Databases Logical next step in geographically dispersed organisations goal is to provide location transparency starting point = a set of decentralised.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Page 1 WWRF - Vision Committee - 15 September 2008 Sudhir Dixit, Chair, Vision Committee WWRF 2020 Vision – Draft V 1.4.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6.
Client/Server Architecture
SaaS, PaaS & TaaS By: Raza Usmani
Broadband Forum Machine-to-Machine (M2M) Solutions Robin Mersh, CEO The information in this presentation is public.
The Platforms enabling Wireless Sensor Networks Hill, Horton, Kling, Krishnamurthy CACM, June 2004.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
BA_EM 02 ELECTRONIC MARKETING Pavel Kotyza, VŠFS,
Machine-to-Machine (M2M) Communication
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
Copyright ARC Group 2000 September 2000Regina Wong- GSM Congress Asia Pacific Wireless Internet: Market Trends and Strategies Regina Wong Consultant.
Olivier Amiot Director, Enterprise Marketing Sierra Wireless mHealth.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
“Approaches to Interoperability Standardization” by Timothy Schoechle, PhD CyberLYNX Technology Corporation Boulder, Colorado, USA for National Conference.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
The generation, storage, and movement of information are central to managing an enterprise’s business processes As a result, businesses must ensure.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
February 25, Infrastructure-ENUM Secure, Private, Next Generation Addressing Infrastructure Douglas J. Ranalli Founder, Chief Strategy Officer NetNumber,
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
Windows 2000 Active Directory Service COSC 513 Yongquan Cai 03/10/2001.
Ch 11. Integrated Architecture for Wireless Myungchul Kim
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Introduction – Part II.
Chapter 1 Lecture 2 By :Jigar M Pandya WCMP 1. Architecture of Mobile Computing The three tier architecture contains the user interface or the presentation.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Fast Handoff for Seamless wireless mesh Networks Yair Amir, Clauiu Danilov, Michael Hilsdale Mobisys’ Jeon, Seung-woo.
Chapter 1 Communication Networks and Services Network Architecture and Services.
Managing Telecommunications Chapter 6 Emily Gehm Jessica Paul Melanie Wall.
DOCUMENT #:GSC15-PLEN-58 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.1 CONTACT(S): Marylin Arndt, TC M2M chair M2M and Internet of Services "When the.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Smart Grid Energy Generation Renewable Energy Distributed Generation Transmission & Distribution Load Management Demand Response Electrical Vehicles Charging.
William Stallings Data and Computer Communications
Internet Architecture and Governance
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
1. Nortel Confidential Information BUSINESS MADE SIMPLE 2 The Future of Telecommunications John A. Phillips Nortel, ETSI General Assembly Chairman 2007.
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Client – Server Architecture A Basic Introduction 1.
Electronic Commerce Semester 1 Term 1 Lecture 7. Introduction to the Web The Internet supports a variety of important tools, such as file transfer, electronic.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Introduction to Networking. What is a Network? Discuss in groups.
Network Function Virtualisation Network Functionality Within The Cloud Presenter : Kenny Marlow JNCIE #210 SP Architecture Team Lead.
Source : 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) Auther : Nacer Khalil, Mohamed.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
HP Network and Service Provider Business Unit Sebastiano Tevarotto February 2003.
MUHAMAD SHAZNI BIN MOHAMMAD SHAH. Gateway Using different protocols for interfacing network by network nodes Contain device such as protocol translator,
Wireless M2M System Architecture for Data Acquisition and Control Elmira Dichkova Bachvarova Central Laboratory of Mechatronics and Instrumentation Bulgarian.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Chapter 1 Communication Networks and Services
Lecture 1 Overview of Communication Networks and Services
Near field communication (NFC)
Instructor: Mort Anvari
Presentation transcript:

Machine to Machine communications CS 441 SIUC Seonguk Heo Presentation

Introduction In M2M communication, objects can talk to each other without human intervention Today there is insufficient integration of real physical world with virtual world (computers, servers, etc) Today Human translates physical world information in to digital world information to use computers

What is M2M? M2M refers to technologies that allow both wireless and wired systems to communicate with other devices of the same type. 4 basic stages that are common to just about every M2M application 1) Collection of data 2) Transmission of selected data through a communication network 3) Assessment of the data 4) Response to the available information

Potential M2M services

Works?

One can buy soft drinks, flowers, etc from vending machine in self service manner Once the vending machine detects the item in out-of-stock, it sends message to order management server through 3G/4G communication link which further send information to vendor The vendor re-stocks the vending machine Vending machine stores daily sales data in internal database and sends information to vendor Vendor will know which product has been sold and the total daily revenue

Glossary of M2M Capabilities -Generic M2M Device Application Enablement (GMDAE) -Generic M2M Network Application Enablement (GMNAE) -Reachability, Addressing and Device Application Repository (RADAR) -Network and Communication Service Selection (NCSS) -M2M Device and M2M Gateway Management (MDGM) -Security Capability (SC) -History and Data Retention (HDR) -Transaction Management (TM) Capability -Compensation and Billing (CB) Capability

M2M Architecture (ETSI) 8 M2M Architecture (ETSI) M2M Application M2M Area Network M2M Core Service Capabilities M2M Gateway Client Application Application Domain Network Domain M2M Device Domain

M2M Network/App Domain Network Service Capabilities -Provide functions that are shared by different applications -Expose functionalities through a set of open interfaces -Use Core Network functionalities and simplify and optimize applications development and deployment whilst hiding network specificities to applications -Examples include: data storage and aggregation, uni-cast and multi-cast message delivery, etc. M2M Applications (Server) Applications that run the service logic and use service capabilities accessible via open interfaces.

M2M Device Domain * M2M Device A device that runs application(s) using M2M capabilities and network domain functions. An M2M Device is either connected straight to an Access Network or interfaced to M2M Gateways via an M2M Area Network.

M2M Device Domain *M2M Area Network *M2M Gateways -A M2M Area Network provides connectivity between M2M Devices and M2M Gateways. Examples of M2M Area Networks include: Personal Area Network technologies such as IEEE 802.15, SRD, UWB, Zigbee, Bluetooth, etc or local networks such as PLC, M-BUS, Wireless M-BUS. *M2M Gateways -Equipments using M2M Capabilities to ensure M2M Devices interworking and interconnection to the Network and Application Domain. The M2M Gateway may also run M2M applications.

M2M Market Characteristics Initial investment is difficult (e.g., license fees) Complex supply chain: from chipset to network to mobile operators Long-tail business Low ARPU (<$10) compared to voice (<$30) Lagging standards

Conclusion - M2M related technologies are in place and the market has massive potential for growth - Standardization is essential for long term development of the technology and for interoperability of networks and services - Operators, integrators and vendors have expressed the need to standardize end to end M2M - Regulation in Europe, USA and Asia is pushing for a standards based solution - It is essential to have globally compatible standards