Full Transcript

IoT (Internet of Things) IoT tutorial provides basic and advanced concepts of IoT. Our Internet of Things tutorial is designed for beginners and professionals. IoT stands for Internet of Things, which means accessing and controlling daily usable equipments and devices using Internet. Our IoT tutor...

IoT (Internet of Things) IoT tutorial provides basic and advanced concepts of IoT. Our Internet of Things tutorial is designed for beginners and professionals. IoT stands for Internet of Things, which means accessing and controlling daily usable equipments and devices using Internet. Our IoT tutorial includes all topics of IoT such as introduction, features, advantage and disadvantage, ecosystem, decision framework, architecture and domains, biometric, security camera and door unlock system, devices, etc. What is an Internet of Things (IoT) Let's us look closely at our mobile device which contains GPS Tracking, Mobile Gyroscope, Adaptive brightness, Voice detection, Face detection etc. These components have their own individual features, but what about if these all communicate with each other to provide a better environment? For example, the phone brightness is adjusted based on my GPS location or my direction. Connecting everyday things embedded with electronics, software, and sensors to internet enabling to collect and exchange data without human interaction called as the Internet of Things (IoT). The term "Things" in the Internet of Things refers to anything and everything in day to day life which is accessed or connected through the internet. IoT is an advanced automation and analytics system which deals with artificial intelligence, sensor, networking, electronic, cloud messaging etc. to deliver complete systems for the product or services. The system created by IoT has greater transparency, control, and performance. As we have a platform such as a cloud that contains all the data through which we connect all the things around us. For example, a house, where we can connect our home appliances such as air conditioner, light, etc. through each other and all these things are managed at the same platform. Since we have a platform, we can connect our car, track its fuel meter, speed level, and also track the location of the car. If there is a common platform where all these things can connect to each other would be great because based on my preference, I can set the room temperature. For example, if I love the room temperature to to be set at 25 or 26-degree Celsius when I reach back home from my office, then according to my car location, my AC would start before 10 minutes I arrive at home. This can be done through the Internet of Things (IoT). How does Internet of Thing (IoT) Work? The working of IoT is different for different IoT echo system (architecture). However, the key concept of there working are similar. The entire working process of IoT starts with the device themselves, such as smartphones, digital watches, electronic appliances, which securely communicate with the IoT platform. The platforms collect and analyze the data from all multiple devices and platforms and transfer the most valuable data with applications to devices. Features of IOT The most important features of IoT on which it works are connectivity, analyzing, integrating, active engagement, and many more. Some of them are listed below: Connectivity: Connectivity refers to establish a proper connection between all the things of IoT to IoT platform it may be server or cloud. After connecting the IoT devices, it needs a high speed messaging between the devices and cloud to enable reliable, secure and bi-directional communication. Analyzing: After connecting all the relevant things, it comes to real-time analyzing the data collected and use them to build effective business intelligence. If we have a good insight into data gathered from all these things, then we call our system has a smart system. Integrating: IoT integrating the various models to improve the user experience as well. Artificial Intelligence: IoT makes things smart and enhances life through the use of data. For example, if we have a coffee machine whose beans have going to end, then the coffee machine itself order the coffee beans of your choice from the retailer. Sensing: The sensor devices used in IoT technologies detect and measure any change in the environment and report on their status. IoT technology brings passive networks to active networks. Without sensors, there could not hold an effective or true IoT environment. Active Engagement: IoT makes the connected technology, product, or services to active engagement between each other. Endpoint Management: It is important to be the endpoint management of all the IoT system otherwise, it makes the complete failure of the system. For example, if a coffee machine itself order the coffee beans when it goes to end but what happens when it orders the beans from a retailer and we are not present at home for a few days, it leads to the failure of the IoT system. So, there must be a need for endpoint management. Advantages and Disadvantages of (IoT) Any technology available today has not reached to its 100 % capability. It always has a gap to go. So, we can say that Internet of Things has a significant technology in a world that can help other technologies to reach its accurate and complete 100 % capability as well. Let's take a look over the major, advantages, and disadvantages of the Internet of Things. Advantages of IoT Internet of things facilitates the several advantages in day-to-day life in the business sector. Some of its benefits are given below: o Efficient resource utilization: If we know the functionality and the way that how each device work we definitely increase the efficient resource utilization as well as monitor natural resources. o Minimize human effort: As the devices of IoT interact and communicate with each other and do lot of task for us, then they minimize the human effort. o Save time: As it reduces the human effort then it definitely saves out time. Time is the primary factor which can save through IoT platform. o Enhance Data Collection: o Improve security: Now, if we have a system that all these things are interconnected then we can make the system more secure and efficient. Disadvantages of IoT As the Internet of things facilitates a set of benefits, it also creates a significant set of challenges. Some of the IoT challenges are given below: o Security: As the IoT systems are interconnected and communicate over networks. The system offers little control despite any security measures, and it can be lead the various kinds of network attacks. o Privacy: Even without the active participation on the user, the IoT system provides substantial personal data in maximum detail. o Complexity: The designing, developing, and maintaining and enabling the large technology to IoT system is quite complicated. Embedded Devices (System) in (IoT) o It is essential to know about the embedded devices while learning the IoT or building the projects on IoT. The embedded devices are the objects that build the unique computing system. These systems may or may not connect to the Internet. o An embedded device system generally runs as a single application. However, these devices can connect through the internet connection, and able communicate through other network devices. o Embedded System Hardware o The embedded system can be of type microcontroller or type microprocessor. Both of these types contain an integrated circuit (IC). o The essential component of the embedded system is a RISC family microcontroller like Motorola 68HC11, PIC 16F84, Atmel 8051 and many more. The most important factor that differentiates these microcontrollers with the microprocessor like 8085 is their internal read and writable memory. The essential embedded device components and system architecture are specified below. Fig: Basic Embedded System Embedded System Software The embedded system that uses the devices for the operating system is based on the language platform, mainly where the real-time operation would be performed. Manufacturers build embedded software in electronics, e.g., cars, telephones, modems, appliances, etc. The embedded system software can be as simple as lighting controls running using an 8-bit microcontroller. It can also be complicated software for missiles, process control systems, airplanes etc. IoT Ecosystem The IoT ecosystem is not easy to define. It is also difficult to capture its proper image due to the vastness and emerging possibility and the rapidity with which it is expanding in the entire sector. However, the IoT ecosystem is a connection of various kind of devices that sense and analyze the data and communicates with each other over the networks. In the IoT ecosystem, the user uses smart devices such as smartphones, tablet, sensors, etc. to send the command or request to devices for information over the networks. The device response and performs the command to send information back to the user through networks after analyzed. The typical IoT ecosystem is shown in below image, where the smarter devices send and receive data from the devices themselves in the environment that are integrate over network and Cloud Computing. The IoT is itself an ecosystem of network devices that transfer the data. It is also well interconnected with Big Data and Cloud Computing. o Sensing, Embedded processing, Connectivity: The IoT ecosystem senses its surrounding like temperature, gyroscope, pressure, etc. and make the embedded processing using devices. These devices are connected through any type of devices such as GPS, WiFi, RFID, etc. over the networks. o Smart devices and environment, Cloud Computing, Big Data: The data transfer or receive through smart devices and environments are communicated through Cloud Computing or others Servers and stored as Big Data. o Technology, Software, Application: The IoT ecosystem uses any of different technologies, software and application to communicate and connect with smart devices and environment. o Users or groups of community: The product or services generated by the IoT ecosystem are consumed by the users or the group of communities to serve the smart life. History of IoT The internet, itself a significant component of the IoT, started out as part of DARPA (Defense Advanced Research Projects Agency) in 1962, and evolved into ARPANET (Advanced Research Projects Agency Network) in 1969. In the 1980s, commercial service providers began supporting public use of ARPANET, allowing it to evolve into our modern Internet. Satellites and landlines provide basic communications for much of the IoT. Global Positioning Satellites (GPS) became a reality in early 1993, with the Department of Defense providing a stable, highly functional system of 24 satellites. This was quickly followed by privately owned, commercial satellites being placed in orbit, making the IIoT much more functional. Realizing the Concept The Internet of Things, as a concept, wasn’t officially named until 1999, but one of the first examples of an IoT is from the early 1980s, and was a Coca Cola machine, located at the Carnegie Mellon University. Local programmers would connect through the Internet to the refrigerated appliance, and check to see if there was a drink available, and if it was cold, before making the trip to purchase one. Kevin Ashton, MIT’s Executive Director of Auto-ID Labs, coined the phrase “Internet of Things” in 1999. He was the first to describe the IoT, while making a presentation for Procter & Gamble, but the definition of the IoT has evolved over time. Mr. Ashton stated: “Today computers, and, therefore, the Internet, are almost wholly dependent on human beings for information. Nearly all of the roughly 50 petabytes of data available on the Internet were first captured and created by human beings by typing, pressing a record button, taking a digital picture or scanning a barcode. The problem is, people have limited time, attention, and accuracy. All of which means they are not very good at capturing data about things in the real world. If we had computers that knew everything there was to know about things, using data they gathered without any help from us, we would be able to track and count everything and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing, or recalling and whether they were fresh, or past their best.” The Early 2000s Kevin Ashton (the guy who came up with the name “Internet of Things”) believed Radio Frequency Identification (RFID) was a prerequisite for the Internet of Things — primarily as an inventory tracking solution. In hindsight, Inventory tracking has become one of the more obvious advantages of the IoT. He concluded if all devices were “tagged,” computers could manage, track, and inventory them. To some extent, the tagging of things has been achieved through technologies such as digital watermarking, barcodes, and QR codes. In 2002-2003, Walmart and the US Department of Defense were the first large organizations to embrace Ashton’s model of tracking inventory using tagging, RFID, and the Internet of Things. Ring, a doorbell that links to your smartphone, provides an excellent example of the T00nternet of Things being used at home. Ring signals you when the doorbell is pressed, and lets you see who it is, and to speak with them. The Ring doorbell was developed in 2011 by Jamie Siminoff because he wanted to see who was at his door while he was in the garage, working. He couldn’t hear the doorbell from the garage and kept missing deliveries. An additional and important component in developing a functional IoT took place in June of 2012, when the major Internet service providers and web companies agreed to increase address space on the global Internet by enabling IPV6 for their services and products. Steve Leibson, of the Computer History Museum, stated, “The address space expansion means that we could assign an IPV6 address to every atom on the surface of the earth, and still have enough addresses left to do another 100+ earths.” Put another way, we are not going to run out of internet addresses anytime soon. IoT Getting Smarter “Smart cities” can use the IoT to reduce waste and maximize the efficient use of energy. The IoT can also be used to streamline traffic flows and locate available parking. In 2012, The Swiss Federal Office of Energy started a pilot program called “Smart City Switzerland.” They brought representatives from universities, business, and public administration together to discuss new ideas for the urban environment. Smart City Switzerland has over sixty projects underway and supports new scientific partnerships and innovation. (Smart City Switzerland has evolved into something quite impressive.) A well-designed smart city supports all kind of sensors that are connected to the internet and provides:  Traffic monitoring- Real-time tracking and reporting of traffic.  Air quality monitoring- Integrated IoT sensors can identify polluters.  Smart transportation- Smart traffic lights streamline traffic efficiency and public transport.  Smart parking- Sensors installed in pavement, etc. to determine occupancy of the parking lot, which is communicated to drivers.  Smart public lighting- Low energy lighting combined with timing and sensors.  Smart buildings- When connected to the smart city by way of the internet, it becomes a part of the city infrastructure. A smart building, by itself, uses sensors and automated processes to control the building’s operations, which includes air conditioning, heating, ventilation, security, lighting, and other systems. Smart buildings are integrated systems and share vital information. The Industrial Internet of Things (IIoT) The Industrial Internet of Things (IIoT) is an extension of the IoT, and uses actuators and smart sensors, which are networked together with a company’s industrial applications. The goal is to give industries greater efficiency and reliability. The IIoT includes robotics and software- defined production processes. The cloud’s massive storage capacity (2002) was necessary for the modern version of the IIot to become a reality. The IIoT came into being in roughly 2010, with several large companies developing their own systems. GE is given credit for creating the term “Industrial Internet of Things,” In 2012. The Internet of Things Becomes a Part of Life By the year 2013, the IoT had become a system using multiple technologies, ranging from the Internet to wireless communication and from micro-electromechanical systems (MEMS) to embedded systems. This includes almost anything you can think of, ranging from mobile phones to building maintenance to the jet engine of an airplane. Medical devices, such as a heart monitor implant or a biochip transponder in a farm animal, can transfer data over a network and are members of the IoT. The IoT Goes Mobile – 2015 Smartphones are part of the IoT, and have become an important communications tool for many individuals. In 2015, they joined the IoT with a high degree of enthusiasm from marketers. The sensors within these devices are monitored by marketing departments, who send out certain promotions based on the customer and the product’s location. The healthcare industry has also taken advantage of this trend. Devices, such as smartwatches, smartphones, and ingestible monitors can keep track of a patient’s data regarding blood pressure, heart rate, and other concerns in real time. Cars and trucks have become members of the IoT. A connected vehicle works with other devices over wireless networks. This technology allows various “connected networks” to access and communicate with the vehicles. Cars and trucks are already loaded with sensors and technology, including OBD (on-board diagnostics) and GPS. By maximizing their use of these technologies, businesses can extract information from their fleets about maintenance requirements, driving conditions, and routes in real-time. Self-driving cars use the cloud to respond to adjacent cars, traffic data, maps, weather, surface conditions, etcetera. Use of the cloud helps the vehicles to monitor their surroundings and make better decisions. Self-driving cars are new members of the IOT. The first truly self-driving vehicle appeared in the 1980s. In October of 2021, May Mobility launched a pilot program to test their self-driving software. Human neighborhoods are now becoming part of the interconnected community called the Internet of Things. IoT(internet of things) enabling technologies are 1. Wireless Sensor Network 2. Cloud Computing 3. Big Data Analytics 4. Communications Protocols 5. Embedded System 1. Wireless Sensor Network(WSN) : A WSN comprises distributed devices with sensors which are used to monitor the environmental and physical conditions. A wireless sensor network consists of end nodes, routers and coordinators. End nodes have several sensors attached to them where the data is passed to a coordinator with the help of routers. The coordinator also acts as the gateway that connects WSN to the internet. Example –  Weather monitoring system  Indoor air quality monitoring system  Soil moisture monitoring system  Surveillance system  Health monitoring system 2. Cloud Computing : It provides us the means by which we can access applications as utilities over the internet. Cloud means something which is present in remote locations. With Cloud computing, users can access any resources from anywhere like databases, webservers, storage, any device, and any software over the internet. Characteristics – 1. Broad network access 2. On demand self-services 3. Rapid scalability 4. Measured service 5. Pay-per-use Provides different services, such as –  IaaS (Infrastructure as a service) Infrastructure as a service provides online services such as physical machines, virtual machines, servers, networking, storage and data center space on a pay per use basis. Major IaaS providers are Google Compute Engine, Amazon Web Services and Microsoft Azure etc. Ex : Web Hosting, Virtual Machine etc.  PaaS (Platform as a service) Provides a cloud-based environment with a very thing required to support the complete life cycle of building and delivering West web based (cloud) applications – without the cost and complexity of buying and managing underlying hardware, software provisioning and hosting. Computing platforms such as hardware, operating systems and libraries etc. Basically, it provides a platform to develop applications. Ex : App Cloud, Google app engine  SaaS (Software as a service) It is a way of delivering applications over the internet as a service. Instead of installing and maintaining software, you simply access it via the internet, freeing yourself from complex software and hardware management. SaaS Applications are sometimes called web-based software on demand software or hosted software. SaaS applications run on a SaaS provider’s service and they manage security availability and performance. Ex : Google Docs, Gmail, office etc. 3. Big Data Analytics : It refers to the method of studying massive volumes of data or big data. Collection of data whose volume, velocity or variety is simply too massive and tough to store, control, process and examine the data using traditional databases. Big data is gathered from a variety of sources including social network videos, digital images, sensors and sales transaction records. Several steps involved in analyzing big data – 1. Data cleaning 2. Munging 3. Processing 4. Visualization Examples –  Bank transactions  Data generated by IoT systems for location and tracking of vehicles  E-commerce and in Big-Basket  Health and fitness data generated by IoT system such as a fitness bands 4. Communications Protocols : They are the backbone of IoT systems and enable network connectivity and linking to applications. Communication protocols allow devices to exchange data over the network. Multiple protocols often describe different aspects of a single communication. A group of protocols designed to work together is known as a protocol suite; when implemented in software they are a protocol stack. They are used in 1. Data encoding 2. Addressing schemes 5. Embedded Systems : It is a combination of hardware and software used to perform special tasks. It includes microcontroller and microprocessor memory, networking units (Ethernet Wi-Fi adapters), input output units (display keyword etc. ) and storage devices (flash memory). It collects the data and sends it to the internet. Embedded systems used in Examples – 1. Digital camera 2. DVD player, music player 3. Industrial robots 4. Wireless Routers etc. Machine to Machine Communications  Machine to Machine communications, often termed M2M/IoT is going to be the next generation of Internet revolution connecting more and more devices on Internet. M2M communications refer to automated applications which involve machines or devices communicating through a network without human intervention. Sensors and communication modules are embedded within M2M devices, enabling data to be transmitted from one device to another device through wired and wireless communications networks. M2M is expected to revolutionize the performance of various sectors, businesses and services, by providing automation and intelligence to the end devices, in a way that was never imagined before. It may be applied to robots and conveyor belts on the factory floor, to tractors and irrigation on the farm, from heavy equipment to hand drills, from jet engines to bus fleets; from home appliances to health monitoring; from Smart Grid to Smart Water; every piece of equipment, everywhere.It can bring substantial tangible social and economic benefits by giving more efficient and effective services to the citizens. NT cell deals with all policy and regulatory aspects related to M2M communications. A National Telecom M2M Roadmap in this regards is already released in May 2015. Post release of M2M roadmap, NT cell is engaged in formulation of KYC Norms for SIM embedded M2M Devices, Numbering scheme for M2M, Registration of MSP (M2M Service Provider) and M2M Pilots. DoT has sought from TRAI its recommendations on Roaming issues, Spectrum Requirement and Quality of Service (QoS) in M2M communications. Consequently, TRAI released its consultation paper titled ‘Spectrum, Roaming and QoS related requirements in Machine-to-Machine (M2M) Communications’ in October 2016. TRAI released its recommendations on ‘Spectrum, Roaming and QoS related requirements in Machine-to-Machine (M2M) Communications’ on 5th September, 2017 M2M Communication Technology Machine-to-machine (M2M) communications are enjoying a massive presence throughout countless industries. Although the roots of this technology can be traced as far back as the early 20th century, recent advancements have enabled the sheer number of targeted M2M applications to take on a life of their own. Let us examine this concept in greater detail to fully appreciate the advantages that it has to offer. KEY TAKEAWAYS  M2M technology allows two or more machines to communicate with one another.  Machine-to-machine systems have had a massive impact upon countless industries.  As M2M continues to advance, its presence will likely be felt even more throughout our daily lives. Schedule a tour What Is M2M Communication Technology? M2M technology involves the automatic and streamlined sharing of information between two or more separate devices. Common examples include smart home meters, vehicle telemetry services, asset tracking, wearable technologies, and automated supply chain management (SCM). While M2M is generally meant to exclude the manual assistance of humans, real- time interventions may still occur from time to time. Machine intelligence enables a variety of mechanisms, such as wired or wireless tools, sensors, devices, server computers, robots, spacecraft, and network systems, to communicate and exchange information efficiently. A Brief History of M2M Solutions Some will argue that M2M technology first emerged with the introduction of telemetry during the 1920s. This technology allowed data to be sent from a remote sensor to a processing centre via the use of telephone lines, and later radio waves. However, its true impact began to be felt within manufacturing and production industries. The SCADA (Supervisory Control and Data Acquisition) systems of the 1960s are perhaps the most well-known examples. Thanks to wireless technology, machine learning and artificial intelligence (AI), M2M services now enjoy a ubiquitous presence across countless different sectors. Why Is M2M Utilized? Efficiency and automation are the two primary intentions of M2M technology. It is used to streamline communications, to provide remote monitoring solutions and ultimately, to ensure that interconnected systems function as they should. This results in higher levels of productivity, streamlined decision-making processes, and a higher return on investment (ROI). There are many times when the cost-effective advantages of machine-to-machine technology can be passed on to the end user. Benefits Critical key benefits include:  Reduced costs by minimizing maintenance and downtime.  Increased revenue by opening up new business opportunities for on-site product maintenance.  Improved customer service by real-time monitoring and maintaining equipment before it fails or only when it is needed. or Pen & Paper are not the right toata centrally from one platform. Where Can M2M Connectivity be Employed? There are countless real-world examples of M2M communication technology. Here are a handful of the most prominent:  Supply chain and inventory management.  Automated billing solutions.  Remote healthcare monitoring.  Electronic payment methods such as Skrill and PayPal.  Algorithmic online marketing systems. It is therefore clear to appreciate the importance of M2M in these modern times. M2M Examples in Everyday Life There are a number of surprising everyday applications directly associated with M2M connectivity. Let us highlight some key takeaway points. Commuting In the event that a means of mass transit (such as a train) becomes delayed, a traveller will be made aware of the situation. He or she can change a reservation or choose a different route if required. Smart Homes Wireless thermostats can now automatically adjust the temperature of a room if it falls below a certain threshold. Likewise, M2M may be employed in the security sector; automatically notifying the homeowner of a fault or allowing a door to be remotely unlocked if a guest happens to arrive. Health and Fitness Wearable devices such as smartwatches can proactively monitor metrics such as heart rate, blood pressure and sleep patterns. Not only will these provide valuable information to the consumer, but the use of M2M communications can allow healthcare professionals to remotely observe the health of a patient (such as an individual who may be at risk of a heart attack). Shopping Location-based advertising and personalized marketing campaigns are both heavily influenced by the presence of M2M technology. Thus, consumers are presented with more relevant offers. These can help businesses target the right individuals at the appropriate times. Michael Ostendorf While the machine-to-machine communication examples mentioned above are impressive, we also need to remember that this technology is present throughout the business sector. What purposes does it serve, and what benefits can stakeholders leverage?  Smart Asset Tracking Software: M2M communication systems can be utilized to track product locations, to monitor shipping services and to predict when a customer is expected to receive a specific item.  Supply Chain Management: SCM is another sector which has been massively transformed by the presence of M2M. Managers can track inventory, schedule delivery times, appreciate which items need to be restocked, and obtain insight in regard to which production facilities are functioning at capacity. These are only a handful of examples.  Predictive Maintenance: Automated fault sensors can alert management in the event that maintenance is required. This will help to avoid costly downtime while guaranteeing higher levels of in-house productivity. High- level production facilities will therefore benefit from the presence of M2M. Important Components to Appreciate Any M2M communications system relies upon a host of components found within a flexible framework. Some of the most pertinent include:  Hardware components (including data endpoints, microprocessors, RFID and wireless sensors, any relevant machinery, and data integration point servers).  Mobile and fixed network services (such as wireless routers, Bluetooth- compatible devices and hardwired in-house systems).  System integration and consulting services (examples include computing wireless networks, digital pipeline management software, and third-party firms intended to provide higher levels of quality assurance).  M2M applications (such as asset management software solutions offered by ToolSense). Anonymity and Scalability Anonymity is another core trait of M2M connectivity; particularly when referring to industries involved with the transmission of private data. This is why current M2M news has focused upon sectors such as:  Telemedicine.  Financial payments and billing services.  Remote monitoring.  Domestic and commercial security networks. End-to-end encryption, the use of SSL protocols and proactive resource management will all help to ensure that proprietary and potentially sensitive data will not inadvertently fall into the wrong hands. Furthermore, modern machine-to-machine communication examples must possess an innate sense of scalability. Agile architecture can therefore be moulded around the needs of the organization in question. This is another massive benefit of contemporary M2M solutions, as end users can enjoy higher levels of efficiency and a robust ROI. Logging Quality control is yet another facet of M2M technology. In fact, it is one of the most important core tenets. Logging data and real-time information will enable users to better understand how a system is performing. Let us also remember that this is an excellent way to identify minor issues (such as a production bottleneck) before they develop into much more serious problems. M2M systems must support the recording of important events, such as failed installation attempts, services not working, or the occurrence of erroneous information. The logs should be available on request. Transmission Methods and Scheduling Scheduling optimization is an additional concern in relation to M2M services. This is even more relevant in situations dealing with a considerable number of devices (such as within a large manufacturing facility). The main issue here is that pairing such devices together can cause delays in terms of data transmission. One of the ways in which this can be overcome is to allocate different resource blocks to specific monitoring channels. This can help to reduce bandwidth usage and to mitigate any communications delays. Let’s also remember that larger facilities could require a bit of human oversight so that the entire system continues to run smoothly. Comparison of M2M & IoT Internet of Things : IOT is known as the Internet of Things where things are said to be the communicating devices that can interact with each other using a communication media. Usually every day some new devices are being integrated which uses IoT devices for its function. These devices use various sensors and actuators for sending and receiving data over the internet. It is an ecosystem where the devices share data through a communication media known as the internet or Iot is an ecosystem of connected physical object that are accessible through internet. Iot means anything which can be connected to internet and can be controlled or monitored using internet from smart devices or PC. 2. Machine to Machine : This is commonly known as Machine to machine communication. It is a concept where two or more than two machines communicate with each other without human interaction using a wired or wireless mechanism. M2M is an technology that helps the devices to connect between devices without using internet. M2M communications offer several applications such as security, tracking and tracing, manufacturing and facility management. M2M is also named as Machine Type Communication (MTC) in 3GPP ( 3rd Generation Partnership Project). M2M is communication could carried over mobile networks, for ex- GSM-GPRS, CDMA EVDO Networks. In M2M communication, the role of mobile networks is largely confined to server as a transport networks. M2M is only subset of IoT. Difference between IoT and M2M: Basis of IoT M2M Abbreviation Internet of Things Machine to Machine Devices have objects that are Some degree of intelligence Intelligence responsible for decision making is observed in this. The connection is via Network Connection type The connection is a point to and using various used point communication types. Traditional protocols and Communication Internet protocols are used such communication technology protocol used as HTTP, FTP, and Telnet. techniques are used Data is shared between other Data is shared with only the Data Sharing applications that are used to communicating parties. improve the end-user experience. Basis of IoT M2M Internet connection is required Devices are not dependent Internet for communication on the Internet. Type of It supports point-to-point It supports cloud communication Communication communication. Involves the usage of both Mostly hardware-based Computer System Hardware and Software. technology A large number of devices yet Scope Limited Scope for devices. scope is large. Business Type Business 2 Business(B2B) and Business 2 Business (B2B) used Business 2 Consumer(B2C) There is no support for Open Open API support Supports Open API integrations. APIs It requires Generic commodity devices. Specialized device solutions. Communication and device Centric Information and service centric centric. Vertical system solution Approach used Horizontal enabler approach approach. Devices/sensors, connectivity, Device, area networks, Components data processing, user interface gateway, Application server. Smart wearables, Big Data and Sensors, Data and Examples Cloud, etc. Information, etc.

Use Quizgecko on...
Browser
Browser