1st week - current landscape - slidesonly
TRANSCRIPT
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
1/25
Department of Computer ScienceNational Chiao Tung University
Current Landscape of the Internet of
Things/M2M Communications
Outline
Introduction to IoT/M2M
The Business of IoT/M2M
Early IoT/M2M Deployment
2
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
2/25
2012/11/2 3
INTRODUCTION TO IOT/M2M
3
A Concise History of IoT
4
Bill Gates mentioned the concept of Internet of Thingsin The Road Ahead in 1995.
The term Internet of Things (IoT) is coined by KevinAshton in 1999:
"I could be wrong, but I'm fairly sure the phrase "Internet of Things" started life as the title of apresentation I made at Procter & Gamble (P&G) in 1999. Linking the new idea of RFID in P&G's supplychain to the then-red-hot topic of the Internet was more than just a good way to get executive attention.It summed up an important insight which is still often misunderstood.
The IoT hits another level when the InternationalTelecommunication Union (ITU) of the UN published itsfirst report on the topic in 2005.
Reference: http://postscapes.com/internet-of-things-history
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
3/25
What is IoT/M2M?
The Internet of Things (IoT) refers to uniquelyidentifiable objects (things) and their virtual
representations in an Internet-like structure.E.g., Radio-Frequency IDentification (RFID) tags, etc.
The Machine-to-Machine (M2M) is aimed toestablish the conditions that allow a device to(bidirectionally) exchange information with abusiness application via a communicationnetwork.
E.g., smart grid, home automation, etc.
5
Reference: http://en.wikipedia.org/wiki/Internet_of_Things
IoT vs. M2M
M2M devices need to connect to the communicationnetwork, while IoT dont. For example,
One of M2M relationships can be seen as human-machine interface extensions of a person, while IoT canbe purely Things. For example,
The eBook reader is reading for a real person, whichbelongs to M2M.RFID tagged objects are in IoT, but not in M2M. The
readers are in both.
In reality, these two terms are often usedinterchangeably. There is no need to distinguish onefrom the other.
6
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
4/25
Structure of M2M
Application
serverApplication
server
Internet
device
Gateway
Business
Applications
Communication
networks
Scenario 3M2M area networks
Scenario 2
M2M relationship
Scenario 1
M2M agent
Agents/
End Users
7
M2M Area Networks
M2M area network isintroduced by ETSI
Provide PHY and MAC layerconnectivity between M2M
devices connected to thesame M2M area network
Allow M2M devices to gainaccess to a public networkvia a gateway
Gateway
M2M area network
devices + gateway
8
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
5/25
Characteristics of M2M
Information exchange overcommunication networks
Via mobile networks orpublic internets
A group of similar devicesDevices with limited
capacities
Hierarchical architecture
Autonomous
Application
server
Internet(Communication
Network)
Gateway
9
Characteristics of M2M Applications
A large amount of devices Scalability issues Non-classical usage patterns in mobile networks
E.g., not always active - only be triggered for specific reason and only dothings in some fixed time.
A large variety of devices Heterogeneous systems
Diverse requirements, e.g., data exchange rate Build common-enabling capabilities
Transparency: no need of the interference of humans
Intrusiveness: privacy issues
Criticality: life-savers, life-critical
10
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
6/25
M2M Devices
Battery poweredE.g., water meters are located outdoors and cannot be
easily connected to a power supply.
EmbeddedMany devices are deployed in systems with specific
operating condition and with limited computation power.
E.g., the OBD in car
Here to stay
Many devices are static or with very low mobility.
11
Applications (1)
Smart Home Allow you to control your home via Web or a mobile app
including cameras, doors, windows, locks, lights,
appliances, thermostats and various sensors for security,
comfort and energy management.
E-HealthcareE-Healthcare is committed to providing quality
products for the healthcare industry that improves the
business process and overall patient care.
12
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
7/25
Smart Home
13
Smart Home is built upon home area network (HAN).An HAN is a residential local area network (LAN) forcommunication between digital devices typicallydeployed in the home.
A smart home connectsall devices/appliancesat home for sharing andalso allows access fromglobal Internet formonitoring and control
to improve security, comfort and energy efficiency.Reference: http://www.conference.cn/Conference.asp?ArticleID=5709
E-Healthcare Remote patient monitoring
Remotely obtain heart rate, blood glucose levels, and other parameterof body through WAN.
Homecare living Actively provide
information of taking
medication, healthknowledge.
Asset tracking Track high-value asset
such as intravenouspumps, wheel chairs etc.
14
Reference: http://axiomtek.com/solutions/healthcare.asp
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
8/25
Applications (2)
Smart Grid
The smart grid is envisioned as a complex framework to
intelligently manage the energy generation, distributionand consumption.
Smart Metering
The smart metering can monitor power consumption andsend over warning for energy saving.
15
Smart Grid A smart grid is an electrical grid that uses information and
communications technology to gather and act on information,
such as information about the behaviors of suppliers and
consumers.
Fundamentalre-engineering
of the
electricity
services
industry
16
Reference: http://www.geekwithlaptop.com/so-called-utility-%E2%80%9Csmart%E2%80%9D-meters-open-to-attack
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
9/25
Smart Metering
A new smart meter, which has been introduced in order to deliverpower more efficiently, could allow potential hackers to interfere withyour supply andthe entire grid itself. The security issue
should be takencare of.
Consumer-managedapplications Estimate the power
expense.
Shut down unusedelectric equipment.
Wash clothing during
the period of powerdiscount.
17
Reference: http://www.geekwithlaptop.com/so-called-utility-%E2%80%9Csmart%E2%80%9D-meters-open-to-attack
Applications (3)
Connected Vehicle
Connected vehicle use OBDs (On Board Devices) to provide in-vehiclesolutions such as hand-free call management, content delivery,
location services, presence, emergency road services, identity and
security via network connectivity and innovative in-vehicle software
and hardware.
18
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
10/25
Connected Vehicle Fleet management
Obtain information of a groupof vehicles such as vessels or
cars, and send dispatch notificationto them
Vehicle maintenance Obtain operating parameters from vehicle to diagnosing mechanical
issues.
Bilaterally communicate with car dealers: get software update andreminders.
Compute insurance premium by the risks of vehicles
Entertainment, theft prevention, emergency call, toll, and so on.
19
Source: orci.research.umich.edu
Development Stages
Phase 1: Cellular network-centric e.g. cell phones
Phase 2: Transition Horizontal solutions in
select markets.
B2C and B2B2C services
emerge. Policy and Government
Incentives, e.g.,Economic incentives,Regulation, etc.
Phase 3:Advancement
20
Source: M2M Communications: A Systems Approach, Wiley, 2012
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
11/25
Challenges
Fragmentation of solutionsIt is important to have service platforms that can be
reused for multiple applications. Network misalignment
large numbers of devices generating very smallamounts of data transport and potentially a verysignificant overload of the control and connectivityplanes.
Security issuesE.g., eHealth, Smart Grid, etc.
Privacy
21
Business Model
Significant business modelRevenue generatedEcosystem
Business domains can be categorized according toData rate
Mobility The benefits using cellular network
Mobility of M2M devicesBuilt-in authentication and securityEasy deployment
22
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
12/25
M2M Standards
device device device device
Gateway
M2M Platform
M2M
Application
M2M Area
Network
CommunicationNetwork
.......
23
Standards Organizations Ecosystem
OrganizationEuropean Telecommunication Standards Institute (ETSI)European Standard Organization (ESO) Institute of Electrical and Electronics Engineers (IEEE)Etc.
European Commission mandatesSmart metering [M/441]RFID and system [M/436]
US National Institute of Standards and Technology(NIST)Smart Grid framework (SG-FW)
24
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
13/25
2012/11/2 25
THE BUSINESS OF IOT/M2M
25
E-Healthcare as an Example
Health plan management applicationsolutions using a Software-as-a-Service (SaaS)
business model.
Services cover a range of needs from
administrative resources to technicalassistance and are designed to assist
healthcare enterprise to focus on running
their business.
26
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
14/25
Chang Gung Health and Culture VillageExample
Use ICT system to take care of senior citizens
Personal health information system
Record vital signs and diets of elders
Tracked by position system at emergency
27
Source: - > >, http://www1.cgmh.org.tw/cgv/plan_04_01.htm
M2M Drivers M2M is based on communication networks
Costs diminishing: $0.2 for 140 byte (SMS) $20 for 5GB/month IPv6 for insufficient network addresses.
Ubiquitous coverage: Commercial networks are available anywhere.
Clear regulatory requirements and green technologyinvestments Remote monitoring and control are key applications.
NetworkTechnology
NFC Short-range Wide-area
wirelinePower line,Ethernet
ADSL
wireless RFIDBluetooth, ZigBee,
Zwave
CDMA, GPRS, UMTS, LTE,and satellite
communication networks
28
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
15/25
M2M Barriers
Numerous incomplete standardsZigBee, Zwave and Wireless HART are for short-range
communications Security and privacy
Reveal information obtained from M2M may endanger life
Network operator and company mismatchThe life cycle of many M2M services can be up to 15 years.
Upgrade according to latest technology is difficult.
Other challenges
Device management, network scalability, charging rules,
29
Value Chain
The value chain of the IoT/M2M can divideinto four major industries.
They have different business model and marketsize.
Category Hardware Network Middleware Software
Detail Machine, IC,
Network module,
Gateway
Network
transport
Middleware,
System
integrations
Services,
Applications
Company Mediatek,
Realtek, Motorola,
Qualcomm
Hinet, FETnet,
AT&T
IBM Hospital
30
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
16/25
Market Size Projections
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
31
Network Operator-led Model
32
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
17/25
Corporate Customer-led Model
33
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
2012/11/2 34
EARLY IOT/M2M DEPLOYMENT
34
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
18/25
Early M2M Operational Deployment (1/2)
M2M Used communication technologiesShort-range RF, wireline, cellular 2/3/4G
Cellular technologyDevice connects to mobile network operator (MNO)Availability, geographical coverage, low latency, high levels
of security
Challenges facing on MNO deploying M2MOperate a large number of devices without impacting
services
Mandate a clear understanding of the service requirement
35
Early M2M Operational Deployment (2/2)
Data collection and exchange
Circuit-Switch (CS) domain services
Packet-Switch (PS) domain services
Device triggering by M2M server
Sending a specific SMS to the device
An unanswered voice call
36
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
19/25
Example 1 : Smart Telemetry
Collection of various data from meter, e.g.,temperature, energy consumption, pollution levels
Periodic reporting can be done in two ways: SMS solution GPRS solution
37
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
Example 2 : Healthcare Monitoring (1/2)
38
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
20/25
Example 2 : Healthcare Monitoring (2/2)
eHealth applications including remote patient monitoring,aging independently, personal fitness, disease management,etc.
Two priority traffic (used two MSISDN): High priority traffic
Urgent need to establish a communication
Low priority traffic CSD communication (software/firmware upgrade)
Disadvantage : consumption of MSISDN that is already in
shortage.
39
Example 3 : Surveillance and Security(1/2)
low delay and occasionally high bandwidth
Always-on connection with a permanent IP toavoid latency on establishment of PDP context
Authentication of the M2M device
Using IP security(IPSec) tunnel
40
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
21/25
Example 3 : Surveillance and Security
(2/2)
41
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
Mapping of M2M Solutions and UseCase Examples
42
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
Use case
need
CS/PS
domain
Connectivity
mode
Description Pros Cons
Real-time
/interactive data
PS domain Always-on The Device has a
Permanently active
PDP context
allowing for always-
on connectivity
No latency
pertaining to
data bearer
establishment
Context
maintained in
the devices for
each bearer
Low volume of
data and lowperiodicity
CS domain Voice or SMS Voice call/SMS
generated for shortinformation to be
transmitted
No costly use of
PS domainsignaling ; just
for a small
volume of data
transmission
Additional
overload on CSdomain
resources
High availability
data service
CS domain Data CSD with
multiple MSISDNs
CSD call raised on a
dedicated MSISDN
High priority
calls are routed
with high
priority
Two MSISDNs
are needed
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
22/25
Common Questions in Early M2M
Deployment
Congestion and overload
Shortage of identification and addressingresources
Use of CS domain context for data-onlyservices
43
Congestion and Overload
44
Source: M2M COMMUNICATIONS - A SYTEMS APPROACH, 2012, Wiley.
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
23/25
Congestion and Overload (Cont.)
Network administrator stop malfunctioningcommunications
Characteristic of M2M traffic :
Synchronized
Unpredictable
Bursty
Uncontrollable
45
Shortage of Networking Resources
MSISDN: identifying mobile terminal
MSISDN may reach its limit once M2M has beenmassively deployed
IP addressing: establish data bearers
Limitation of Private IP addressing
Additional cost of NAT deployment
M2M server may not be able to reach device
46
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
24/25
CS Domain Context for Data-Only
Services
M2M devices are configured to use PSdomain-only services and may not need to
have MSISDN
However, still need MSISDN as identifier to dosome procedures
E.g., charging , SMS, etc.
Sending SMS to an international mobile
subscriber identity (IMSI) without usingMSISDN
47
Possible Optimization of M2MDeployments Traffic identification
Providing operational administration and maintenance, e.g.,disabling devices causing congestion
Dedicated Core Network Central Equipment Two core network devices
Dedicated HLR: avoid congestion and overload from massive numberof devices wanting to register on network at same time
Dedicated GGSN: customized for M2M
Specific Set-Up of Core Network Elements GGSN access point name (APN): handling of M2M traffic APN
Connection mode IP addressing APNs timer session timeout
48
-
7/29/2019 1st Week - Current Landscape - SlidesOnly
25/25
Conclusion
Optimizing current network for M2M
Dedicate M2M chain
Traffic identification
Network equipment optimization
Software upgrade and deployment of newequipment
PS only subscription/MSISDN-less
Online device triggering
49
Acronym
M2M: Machine-to-Machine IoT: Internet of Things
M2M area network (devices + gateway) Communication networks: Mobile network
or public Internet
European Telecommunication StandardsInstitute (ETSI)
Information and CommunicationTechnologies (ICT)
Radio-Frequency Identification (RFID)
American Recovery and Reinvestment Act(ARRA)
Energy Independence and Security Act (EISA)
National Institute of Standards andTechnology (NIST)
Third-Generation Partnership Project (3GPP)
In-Vehicle System (IVS) Public Safety Answering Point (PSAP)
European Standard Organization (ESO) Priority action plan (PAP)
Wireless Personal Area Network (WPAN) Power-Line Communication (PLC)
Meter-Bus (M-BUS)
Internet Engineering Task Force (IEFT) Average Revenue Per User(ARPU)
Representation State Transfer (REST) Federal Communication Commission (FCC)
Device Language Message Specification(DLMS)
Machine Type Communication (MTC)
Open Mobile Alliance (OMA)