Full Transcript

JTO Phase-II IT M2M and IoT 7 M2M AND IOT 7.1 LEARNING OBJECTIVE After completion of this chapter participants will able to understand:  IoT Frame work and models  IoT arch...

JTO Phase-II IT M2M and IoT 7 M2M AND IOT 7.1 LEARNING OBJECTIVE After completion of this chapter participants will able to understand:  IoT Frame work and models  IoT architecture  IoT Security  M2M  NB IoT 7.2 INTRODUCTION OF THE IOT Concept of the IoT The Internet of things (IoT) can be perceived as a far-reaching vision with technological and societal implications. From the perspective of technical standardization, the IoT can be viewed as a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ICT). Through the exploitation of identification, data capture, processing and communication capabilities, the IoT makes full use of "things" to offer services to all kinds of applications, whilst ensuring that security and privacy requirements are fulfilled. NOTE – The IoT is expected to greatly integrate leading technologies, such as technologies related to advanced machine-to-machine communication, autonomic networking, data mining and decision-making, security and privacy protection and cloud computing, with technologies for advanced sensing and actuation. As shown in Figure , the IoT adds the dimension "Any THING communication" to the information and communication technologies (ICTs) which already provide "any TIME" and "any PLACE" communication. Figure 40: The new dimension introduced in the Internet of things JTO Phase –II DNIT Version 1.0 Sep 2021 Page 78 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT Regarding the IoT, things are objects of the physical world (physical things) or of the information world (virtual world) which are capable of being identified and integrated into communication networks. Things have associated information, which can be static and dynamic. Physical things exist in the physical world and are capable of being sensed, actuated and connected. Examples of physical things include the surrounding environment, industrial robots, goods and electrical equipment. Virtual things exist in the information world and are capable of being stored, processed and accessed. Examples of virtual things include multimedia content and application software. 7.3 TECHNICAL OVERVIEW OF THE IOT Figure 41: Technical overview of the IoT A physical thing may be represented in the information world via one or more virtual things (mapping), but a virtual thing can also exist without any associated physical thing. A device is a piece of equipment with the mandatory capabilities of communication and optional capabilities of sensing, actuation, data capture, data storage and data processing. The devices collect various kinds of information and provide it to the information and communication networks for further processing. Some devices also execute operations based on information received from the information and communication networks. Devices communicate with other devices: they communicate through the communication network via a gateway (case a), through the communication network without a gateway (case b) or directly, that is without using the communication network (case c). Also, combinations of cases a and c, and cases b and c are possible; for example, devices can communicate with other devices using direct communication through a local network (i.e., a network providing local connectivity between devices and between devices and a gateway, such as an ad-hoc network) (case c) and then communication through the communication network via a local network gateway (case a). JTO Phase –II DNIT Version 1.0 Sep 2021 Page 79 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT NOTE 1 – Although Figure 2 shows only interactions taking place in the physical world (communications between devices), interactions also take place in the information world (exchanges between virtual things) and between the physical world and the information world (exchanges between physical things and virtual things). The IoT applications include various kinds of applications, e.g., "intelligent transportation systems", "smart grid", "e-health" or "smart home". The applications can be based on proprietary application platforms, but can also be built upon common service/application support platform(s) providing generic enabling capabilities, such as authentication, device management, charging and accounting. The communication networks transfer data captured by devices to applications and other devices, as well as instructions from applications to devices. The communication networks provide capabilities for reliable and efficient data transfer. The IoT network infrastructure may be realized via existing networks, such as conventional TCP/IP-based networks, and/or evolving networks, such as next generation networks (NGN). Figure shows the different types of devices and the relationship between devices and physical things. Figure 42: Types of devices and their relationship with physical things The minimum requirement of the devices in the IoT is their support of communication capabilities. Devices are categorized into data-carrying devices, data- capturing devices, sensing and actuating devices and general devices as described as follows:  Data-carrying device: A data-carrying device is attached to a physical thing to indirectly connect the physical thing with the communication networks.  Data-capturing device: A data-capturing device refers to a reader/writer device with the capability to interact with physical things. The interaction can happen indirectly via data-carrying devices, or directly via data carriers attached to the physical things. In the first case, the data-capturing device reads information on a data-carrying device and can optionally also write information given by the communication networks on the data- carrying device. Technologies used for interaction between data-capturing devices and data-carrying devices or data carriers include radio frequency, infrared, optical and galvanic driving.  Sensing and actuating device: A sensing and actuating device may detect or measure information related to the surrounding environment and convert it into digital electronic signals. It may also convert digital JTO Phase –II DNIT Version 1.0 Sep 2021 Page 80 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT electronic signals from the information networks into operations. Generally, sensing and actuating devices form local networks communicate with each other using wired or wireless communication technologies and use gateways to connect to the communication networks.  General device: A general device has embedded processing and communication capabilities and may communicate with the communication networks via wired or wireless technologies. General devices include equipment and appliances for different IoT application domains, such as industrial machines, home electrical appliances and smart phones. 7.4 FUNDAMENTAL CHARACTERISTICS AND HIGH-LEVEL REQUIREMENTS OF THE IOT The fundamental characteristics of the IoT are as follows:  Interconnectivity: With regard to the IoT, anything can be interconnected with the global information and communication infrastructure.  Things-related services: The IoT is capable of providing thing-related services within the constraints of things, such as privacy protection and semantic consistency between physical things and their associated virtual things. In order to provide thing-related services within the constraints of things, both the technologies in physical world and information world will change.  Heterogeneity: The devices in the IoT are heterogeneous as based on different hardware platforms and networks. They can interact with other devices or service platforms through different networks.  Dynamic changes: The state of devices change dynamically, e.g., sleeping and waking up, connected and/or disconnected as well as the context of devices including location and speed. Moreover, the number of devices can change dynamically.  Enormous scale: The number of devices that need to be managed and that communicate with each other will be at least an order of magnitude larger than the devices connected to the current Internet. The ratio of communication triggered by devices as compared to communication triggered by humans will noticeably shift towards device-triggered communication. Even more critical will be the management of the data generated and their interpretation for application purposes. This relates to semantics of data, as well as efficient data handling. High-level requirements The following provide high-level requirements which are relevant for the IoT:  Identification-based connectivity: The IoT needs to support that the connectivity between a thing and the IoT is established based on the thing's identifier. Also, this includes that possibly heterogeneous identifiers of the different things are processed in a unified way.  Interoperability: Interoperability needs to be ensured among heterogeneous and distributed systems for provision and consumption of a variety of information and services. JTO Phase –II DNIT Version 1.0 Sep 2021 Page 81 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT  Autonomic networking: Autonomic networking (including self- management, self-configuring, self-healing, self-optimizing and self- protecting techniques and/or mechanisms) needs to be supported in the networking control functions of the IoT, in order to adapt to different application domains, different communication environments and large numbers and types of devices.  Autonomic services provisioning: The services need to be able to be provided by capturing, communicating and processing automatically the data of things based on the rules configured by operators or customized by subscribers. Autonomic services may depend on the techniques of automatic data fusion and data mining.  Location-based capabilities: Location-based capabilities need to be supported in the IoT. Something-related communications and services will depend on the location information of things and/or users. It is needed to sense and track the location information automatically. Location-based communications and services may be constrained by laws and regulations, and should comply with security requirements.  Security: In the IoT, every 'thing' is connected which results in significant security threats, such as threats towards confidentiality, authenticity and integrity of both data and services. A critical example of security requirements is the need to integrate different security policies and techniques related to the variety of devices and user networks in the IoT.  Privacy protection: Privacy protection needs to be supported in the IoT. Many things have their owners and users. Sensed data of things may contain private information concerning their owners or users. The IoT needs to support privacy protection during data transmission, aggregation, storage, mining and processing. Privacy protection should not set a barrier to data source authentication.  High quality and highly secure human body related services: High quality and highly secure human body related services needs to be supported in the IoT. Different countries have different laws and regulations on these services. NOTE – Human body related services refer to the services provided by capturing, communicating and processing the data related to human static features and dynamic behaviour with or without human intervention.  Plug and play: Plug and play capability needs to be supported in the IoT in order to enable on-the-fly generation, composition or the acquiring of semantic-based configurations for seamless integration and cooperation of interconnected things with applications, and responsiveness to application requirements.  Manageability: Manageability needs to be supported in the IoT in order to ensure normal network operations. IoT applications usually work automatically without the participation of people, but their whole operation process should be manageable by the relevant parties. 7.5 IOT REFERENCE MODEL Figure shows the IoT reference model. It is composed of four layers as well as management capabilities and security capabilities which are associated with the four layers. JTO Phase –II DNIT Version 1.0 Sep 2021 Page 82 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT The four layers are as follows:  Application layer  Service support and application support layer  Network layer  Device layer. Figure 43: IoT reference model APPLICATION LAYER The application layer contains IoT applications. SERVICE SUPPORT AND APPLICATION SUPPORT LAYER The service support and application support layer consists of the following two capability groupings:  Generic support capabilities: The generic support capabilities are common capabilities which can be used by different IoT applications, such as data processing or data storage. These capabilities may be also invoked by specific support capabilities, e.g., to build other specific support capabilities.  Specific support capabilities: The specific support capabilities are particular capabilities which cater for the requirements of diversified applications. In fact, they may consist of various detailed capability groupings, in order to provide different support functions to different IoT applications. NETWORK LAYER This consists of the following two types of capabilities: JTO Phase –II DNIT Version 1.0 Sep 2021 Page 83 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT  Networking capabilities: provide relevant control functions of network connectivity, such as access and transport resource control functions, mobility management or authentication, authorization and accounting (AAA).  Transport capabilities: focus on providing connectivity for the transport of IoT service and application specific data information, as well as the transport of IoT-related control and management information. DEVICE LAYER Device layer capabilities can be logically categorized into two kinds of capabilities: Device capabilities: The device capabilities include but are not limited to:  Direct interaction with the communication network: Devices are able to gather and upload information directly (i.e., without using gateway capabilities) to the communication network and can directly receive information (e.g., commands) from the communication network.  Indirect interaction with the communication network: Devices are able to gather and upload information to the communication network indirectly, i.e., through gateway capabilities. On the other side, devices can indirectly receive information (e.g., commands) from the communication network.  Ad-hoc networking: Devices may be able to construct networks in an ad- hoc manner in some scenarios which need increased scalability and quick deployment.  Sleeping and waking-up: Device capabilities may support "sleeping" and "waking-up" mechanisms to save energy. NOTE – The support in a single device of both capabilities of direct interaction with the communication network and indirect interaction with the communication network is not mandatory. Gateway capabilities: The gateway capabilities include but are not limited to:  Multiple interfaces support: At the device layer, the gateway capabilities support devices connected through different kinds of wired or wireless technologies, such as a controller area network (CAN) bus, ZigBee, Bluetooth or Wi-Fi. At the network layer, the gateway capabilities may communicate through various technologies, such as the public switched telephone network (PSTN), second generation or third generation (2G or 3G) networks, long-term evolution networks (LTE), Ethernet or digital subscriber lines (DSL).  Protocol conversion: There are two situations where gateway capabilities are needed. One situation is when communications at the device layer use different device layer protocols, e.g., ZigBee technology protocols and Bluetooth technology protocols, the other one is when communications involving both the device layer and network layer use different protocols e.g., a ZigBee technology protocol at the device layer and a 3G technology protocol at the network layer. MANAGEMENT CAPABILITIES In a similar way to traditional communication networks, IoT management capabilities cover the traditional fault, configuration, accounting, performance and JTO Phase –II DNIT Version 1.0 Sep 2021 Page 84 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT security (FCAPS) classes, i.e., fault management, configuration management, accounting management, performance management and security management. The IoT management capabilities can be categorized into generic management capabilities and specific management capabilities. Essential generic management capabilities in the IoT include:  Device management, such as remote device activation and de-activation, diagnostics, firmware and/or software updating, device working status management;  Local network topology management;  Traffic and congestion management, such as the detection of network overflow conditions and the implementation of resource reservation for time-critical and/or life-critical data flows.  Specific management capabilities are closely coupled with application- specific requirements, e.g., smart grid power transmission line monitoring requirements. SECURITY CAPABILITIES There are two kinds of security capabilities: generic security capabilities and specific security capabilities. Generic security capabilities are independent of applications. They include:  at the application layer: authorization, authentication, application data confidentiality and integrity protection, privacy protection, security audit and anti-virus;  at the network layer: authorization, authentication, use data and signalling data confidentiality, and signalling integrity protection;  at the device layer: authentication, authorization, device integrity validation, access control, data confidentiality and integrity protection. Specific security capabilities are closely coupled with application-specific requirements, e.g., mobile payment, security requirements. 7.6 IOT ECOSYSTEM AND BUSINESS MODELS BUSINESS ROLES The IoT ecosystem is composed of a variety of business players. Each business player plays at least one business role, but more roles are possible. The identified IoT business roles are shown in Figure JTO Phase –II DNIT Version 1.0 Sep 2021 Page 85 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT Figure 44: IoT ecosystem Device provider The device provider is responsible for devices providing raw data and/or content to the network provider and application provider according to the service logic. Network provider The network provider plays a central role in the IoT ecosystem. In particular, the network provider performs the following main functions:  access and integration of resources provided by other providers;  support and control of the IoT capabilities infrastructure;  offering of IoT capabilities, including network capabilities and resource exposure to other providers. Platform provider The platform provider provides integration capabilities and open interfaces. Different platforms can provide different capabilities to application providers. Platform capabilities include typical integration capabilities, as well as data storage, data processing or device management. Support for different types of IoT applications is also possible. Application provider The application provider utilizes capabilities or resources provided by the network provider, device provider and platform provider, in order to provide IoT applications to application customers. Application customer The application customer is the user of IoT application(s) provided by the application provider. NOTE – An application customer may represent multiple applications users. BUSINESS MODELS The IoT ecosystem players may have a variety of relationships in real deployments. The motivations for this variety of relationships are based on different possible business models. This chapter examines only some IoT business models from the JTO Phase –II DNIT Version 1.0 Sep 2021 Page 86 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT perspective of telecom service and network operators. From this perspective, five business models are described below. Model 1 In model 1, player A operates the device, network, platform and applications and serves the application customer directly, as shown in Figure. In general, telecom operators and some vertically integrated businesses (such as smart grid and intelligent transport systems (ITS) businesses) act as player A in model 1. Figure 45: Model 1 Model 2 In model 2, player A operates the device, network, and platform, and player B operates the application and serves the application customers, as shown in Figure I.3. In general, telecom operators act as player A, other service providers as player B in model 2. Figure 46: Model 2 Model 3 In model 3, player A operates the network and platform, player B operates the device and applications and serves the application customers, as shown in Figure I.4. In general, telecom operators act as player A and other service providers act as player B. Figure 47: Model 3 Model 4 In model 4, player A only operates the network and player B operates the device and platform, providing applications to the application customers, as shown in Figure I.5. In general, telecom operators act as player A, other service providers and vertically integrated businesses act as player B in model 4. JTO Phase –II DNIT Version 1.0 Sep 2021 Page 87 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT NOTE – A variation of this model does not include a platform provider and associated platform functionalities (player B only provides applications). Figure 48: Model 4 Model 5 In model 5, player A only operates the network, player B operates the platform, and player C operates devices and provides applications to the application customers, as shown in Figure I.6. In general, telecom operators act as player A, other service providers act as player B, and vertically integrated businesses act as player C in model 5. NOTE – A variation of this model does not include a platform provider and associated platform functionalities (player B only provides applications). Figure 49: Model 5 7.7 M2MCONCEPT The M2M ecosystem is considered to be organized in a 3-Layer conceptual model as shown in the Figure 1 below. It consists of:  Network Services Layer: Provided by the Network Service Provider.  M2M Services Layer: Based on Internet Protocol (IP) and provided by the M2M Service Provider. (The development of this layer is the key focus area towards standardization of M2M communications) Application Layer: Provided by the Application Service Provider catering to End User Applications. JTO Phase –II DNIT Version 1.0 Sep 2021 Page 88 of 167 For Restricted Circulation JTO Phase-II IT M2M and IoT Figure 50: M2M Conceptual Model GENERIC M2M NETWORK ARCHITECTURE MODEL In line with the conceptual model indicated above, a typical M2M network architecture model is as shown in the Figure which currently prevails in the M2M Figure 51: General M2M Network Architecture 7.8 NB IOT Narrow Band Internet of Things is a low power wide area technology which significantly improves bandwidth efficiency as well as power consumption. This technology is the answer for application where only small amount of data is to be transmitted such as garbage management system, intelligent parking system, smart meters. That‟s why NB IoT is also known as LPWA ( Low power wide area network) 7.9 CONCLUSION IoT is not a new technology but is a combination of old technologies to deliver new services. JTO Phase –II DNIT Version 1.0 Sep 2021 Page 89 of 167 For Restricted Circulation

Use Quizgecko on...
Browser
Browser