IOT and M2M
IOT and M2M
IOT and M2M
M2M
• M2M:-Machine-to-machine communication, or M2M, is exactly : two
machines “communicating,” or exchanging data, without human
interfacing or interaction:
•
• Machine to Machine refers to the technologies that allows wired /
wireless system to communicate with the devices of same ability.
• Network Domain:
• M2M Communication Networks:
Communications between the M2M Gateway(s) and M2M application.
E.g. Access Networks ( LTE, WiMAX, and WLAN) and Internet
• Applications Domain:
• M2M Applications:
Contains the middleware layer where data goes through various application
services and is used by the specific business-processing engines
M2M Architecture
M2M Vs IoT
• M2M systems use point-to-point communications between machines, sensors and
hardware over cellular or wired networks, while IoT systems rely on IP-based
networks to send data collected from IoT-connected devices to gateways, the cloud
or middleware platforms.
• It is a useful model to explain how markets create value and how they evolve over
time.
• M2M value chains : A value chain is the full range of activities – including design,
production, marketing and distribution – businesses conduct to bring a product or
service from conception to delivery.
• M2M value chains solutions are generally internal to a company’s
business processes and do not included extensive interactions with other
parties, it includes :
•M2M value chains are internal to one company and cover one
solution.
• Reasons for using M2M vary from project to project and company to
company.
• Processing
• Processing refers to the process whereby a product is prepared for sale. For
example, cocoa beans may now be made into cocoa powder, ready for use
in chocolate bars. For an M2M solution, this refers to the aggregation of
multiple data sources to create an information component something that is
ready to be combined with other data sets to make it useful for corporate
decision-making.
• Packaging
• Packaging refers to the process whereby a product can be branded as would be
recognizable to end-user consumers. For M2M solutions, the data will have to be
combined with other information from internal corporate databases, for example,
to see whether the data received requires any action.
• This data would be recognizable to the end-users that need to use the information,
either in the form of visualizations or an Excel spreadsheet.
• Distribution/Marketing
• This process refers to the channels to market for products. An M2M solution will
have produced an Information Product that can be used to create new knowledge
within a corporate environment examples include more detailed scheduling of
maintenance based on real-world information or improved product design due to
feedback from the M2M solution.
• As mentioned previously, M2M value chains are internal to one company and
cover one solution. IoT Value Chains, meanwhile, are about the use and reuse of
data across value chains and across solutions.
• M2M value chains are internal to one company and cover one solution. IoT Value
Chains, meanwhile, are about the use and reuse of data across value chains and
IoT value chains
• An IoT solution is formed of several building blocks or components, and
each of these building blocks forms part of the IoT value chain.
• Sensor and actuators are connected to the device. Sensors are able to
capture data from the environment (for example, temperature). Actuators
respond to instructions and make changes in the device (for example,
adjusting the temperature on a thermostat).
• This area also includes services such as billing and customer support.
IoT value chain
SDN/NFV Architecture
• The development of IoT has resulted in large-scale IoT networks with vast numbers
of heterogeneous devices, which are facing the following problems
• . (i) Difficulties in control and management. IoT applications serve different
purposes and are deployed in isolated ways. Heterogeneous devices are
geographically distributed and used in various application domains.
• (ii) Difficult to program and configure the devices. On account of the huge
difference of devices’ capabilities, especially the constrains in memory, bandwidth
and energy, it is difficult to program or configure the devices with new functions in
a unified and efficient way.
• (iii) Long service provisioning time. The deployment of a new IoT service requires
the whole cycle of developing the new service, including installing new sensors,
setting up connections to the network infrastructure, and testing the functions.
• (iv) Resources have not been fully used. Data and devices have not yet been
considered to be network resources. Moreover, scalability, flexibility, complexity,
security as well as efficient data, traffic and device management are also challenges
for the IoT networks. An essential reason behind these problems is that the IoT
networks lack flexibility, intelligence, and application-specific controls
So, why we need/want NFV(/SDN)?
1. Virtualization: Use network resource without worrying about where it is
physically located, how much it is, how it is organized, etc.
2. Orchestration: Manage thousands of devices
3. Programmable: Should be able to change behavior on the fly.
4. Dynamic Scaling: Should be able to change size, quantity
5. Automation
6. Visibility: Monitor resources, connectivity
7. Performance: Optimize network device utilization
8. Multi-tenancy: a single instance of software runs on a server and
serves multiple tenants. A tenant is a group of users who share a common
access with specific privileges to the software instance
9. Service Integration
10. Openness: Full choice of modular plug-ins
Note: These are exactly the same reasons why we need/want SDN.
• Software-Defined Networking:
• SDN makes the network programmable (which means network admins can
quickly make adjustments to the network based on changing requirements).
• SDN is made possible by separating the control plane (the brains of the
network) from the data plane (the muscle of the network)
Traditional network Router In
Summary
• Typical Networking Software
– Management plane
– Control Plane – The brain/decision maker
– Data Plane – Packet forwarder
Imagine IF The Network
is……..!!!
Control Plane SDN
Logically-centralized control Concept:
Smart Separate
API to the data plane
Control plane
Separated and Data
plane.
Dumb,
fast
Switches
Data Plane
Planes of Networking
• Data Plane:
• All activities involving as well as resulting from data packets sent by the end user,
e.g.,Forwarding
• Fragmentation and reassembly
• Replication for multicasting
• Control Plane:
• All activities that are necessary to perform data plane activities but do not involve end-user
data packets
• Making routing tables
• Setting packet handling policies (e.g., security)
• Base station beacons announcing availability of services
Planes of Networking
• Management Plane:
• All activities related to provisioning and monitoring of the networks Fault, Configuration,
Accounting, Performance and Security (FCAPS).
• Instantiate new devices and protocols (Turn devices on/off)
• Optional
• May be handled manually for small networks.
• Services Plane:
• Middlebox services to improve performance or security, e.g., Load Balancers, Proxy Service,
Intrusion Detection, Firewalls, SSL Off-loaders
• Optional :
• Not required for small networks
• . Software-defined networking (SDN) technology is characterized by separating
the control and data plane, providing programmability and standardized APIs. SDN
enables a global view of the network and provides capabilities to use network
resources efficiently. Therefore, SDN reduces the overhead of network management
and improves the flexibility of networks
• SDN, on the other hand, aims to have a holistic view of the network - you can
configure/monitor/troubleshoot network devices with ease from central point,
avoiding a lot of manual effort, hence saving time and money in the process.
• SDN enables networking elements (i.e., switches in Figure 1b) on the data plane to
be dynamically configured by the controllers on the control plane. New services can
be programmed and injected into the SDN controllers through a standard
northbound API, which correspondingly configures the routing tables of the
switches (i.e., flow tables), guiding the switches to forward the packets or flows of
the user applications through a standard southbound API. SDN benefits networks
with:
• A global view of the whole network, including its resources. Hence, network
resources can be used more efficiently.
• Reduced overhead of network management, due to software-configured devices
and network resources that expose uniform interfaces through standard abstractions.
• Improved network flexibility through programmability, i.e., new network services
can be provided on the fly through standard APIs and network function
abstractions.
• SDN Architecture : Network Devices (Data Plane)
• Data Plane is consist of various Network devices both physical and Virtual. The
main duty of data plane is Forwarding. In the previous traditional networks, both
control and data plane was in the same device. But with SDN, network devices has
only data plane. So, the main role of these network devices is only Forwarding the
data. This provide a very efficient Forwarding mechanism.
• SDN Architecture : SDN Controller (Control Plane)
• SDN Controller is the Center of the SDN Architecture and the most important one
of SDN Architecture Components. In other words, SDN Controller is the brain of
the system. The control of all the data plane devices are done via SDN Controller.
It also controls the Applications at Application Layer. SDN Controller
communicate and control these upper and lower layer with APIs through Interfaces.
• Open Flow is the protocol used in SDN, that is used to communicate forwarding
plane and control plane of the network. In other words, the communication between
Controller and the Network Devices are done with Open Flow.
Data Plane
• Northbound SDN
• Contradictory to southbound API, northbound interfaces allows communication
among the higher-level components. While the traditional networks use firewall or
load balancer to control data plane behavior , SDN installs applications that uses the
controller and these applications communicate with the controller through its
northbound interface.
• Northbound Interface allows the user (the Application Plane) to interact with
the SDN Controller (the Control Plane) through a web interface or a RESTful API
script.
Software-Defined Network with key
Abstractions
Network
Well-defined API Virtualization
Traffic Other
Routin
Application Security Enginee Applicati
g ring ons Network Map
Plane
Abstraction
Control Network Operating System
Plane Instructio
ns
Instructio Instructio Instructio
ns ns ns
Forwar
Separation of Data
ding
and Control Plane
Forwar
Forwar ding
Data Plane ding
Forwar
ding
Virtualization
• Virtualization is the ability to run multiple operating systems on a single physical
system and share the underlying hardware resources
• It is the process by which one computer hosts the appearance of many computers.
• Software called a hypervisor connects directly to that hardware and allows you
to split 1 system into separate, distinct, and secure environments known as virtual
machines (VMs).
• These VMs rely on the hypervisor’s ability to separate the machine’s resources
from the hardware and distribute them appropriately.
• The physical hardware, equipped with a hypervisor, is called the host,
while the many VMs that use its resources are guests.
• Operators can control virtual instances of CPU, memory, storage, and other
resources, so guests receive the resources they need when they need them.
• Virtualization can be applied broadly to just about everything that you
could imagine:
• Memory
• Networks
• Storage
• Hardware
• Operating systems
• Applications
NFV
Network functions virtualization (NFV) is the replacement of network
appliance hardware with virtual machines. The virtual machines use
a hypervisor to run networking software and processes such as routing and load
balancing.
➢Scalability: Scaling the network architecture with virtual machines is faster and
easier, and it does not require purchasing additional hardware.
NFV architecture consists of:
• It includes:
• Reduce network functions of hardware
• Reduce space needed for network hardware
• Reduce network power consumption
• Reduce network maintenance costs
• Easier network upgrades
• Longer life cycles for network hardware
• Reduce maintenance and hardware costs
As a result, virtualization of currently used hardwares (routers, firewalls, load balancers
etc) has achieved. By using a standard IT virtualization and Cloud technologies, a newly
define NFV Architecture introduced. With this new NFV Arhitecture network functions
are implemented as software.
Relation between Software-defined networking (SDN) and NFV
➢NFV and SDN are not dependent on each other, but they do have similarities. Both
rely on virtualization and use network abstraction, but how they separate functions and
abstract resources is different.
➢SDN separates network forwarding functions from network control functions with the
goal of creating a network that is centrally manageable and programmable. NFV
abstracts network functions from hardware. NFV supports SDN by providing the
infrastructure on which SDN software can run.
➢NFV and SDN can be used together, depending on what you want to accomplish, and
both use commodity hardware. With NFV and SDN, you can create a network
architecture that is more flexible, programmable, and uses resources efficiently.
Storage in IoT
• The IoT technology infrastructure:
• Four major building blocks of IoT:
• Hardware: This is where data is produced. The hardware layer includes the
physical devices with their in-built microprocessors, sensors, actuators and
communication hardware.
• Communication: This is where data gets transported. This part of the technology
infrastructure ensures the hardware is connected to the network, via proprietary
or open-source communication protocols.
• Software backend: This is where data is managed. The software backend manages
all connected devices and networks and provides the necessary data integration as
well as the interface to other systems (e.g., ERP-system).
• Applications: This is where data is turned into value. In the application layer, IoT
use cases get presented to the user (B2C or B2B). Most of the applications run on
smart phones, tablets, PCs or other devices/things and “do something valuable”
with the data.
IoT Cloud Based Services
• Service models: This consists of the particular types of services that you can
access on a cloud computing platform.
• Cloud Providers offer services that can be grouped into three categories.
• 1. Software as a Service (SaaS): In this model, a complete application is offered to
the customer, as a service on demand. A single instance of the service runs on the
cloud & multiple end users are serviced. On the customers‟ side, there is no need
for upfront investment in servers or software licenses, while for the provider, the
costs are lowered, since only a single application needs to be hosted & maintained.
Today SaaS is offered by companies such as Google, Salesforce, Microsoft, Zoho,
etc.
• 2. Platform as a Service (Paas): Here, a layer of software, or development
environment is encapsulated & offered as a service, upon which other higher levels
of service can be built. The customer has the freedom to build his own applications,
which run on the provider‟s infrastructure. To meet manageability and scalability
requirements of the applications, PaaS providers offer a predefined combination of
OS and application servers, such as LAMP platform (Linux, Apache, MySql and
PHP), restricted J2EE, Ruby etc. Google‟s App Engine, Force.com, etc are some of
the popular PaaS examples.
• 3. Infrastructure as a Service (Iaas): IaaS provides basic storage and computing
capabilities as standardized services over the network. Servers, storage systems,
networking equipment, data centre space etc. are pooled and made available to
handle workloads. The customer would typically deploy his own software on the
infrastructure. Some common examples are Amazon, GoGrid, 3 Tera, etc.
• 4. Storage as a service: The capability provided to the consumer is use the storage
from the remote servers as from the local storage. Some of this model provide the
database storage others provide the storage used to store and retrieve any files. This
model is used in almost every cloud service.
• 10. Testing as a service: The capability provided to the consumer is delivery the
service can be used to test their remote application or local application.
END