SlideShare uma empresa Scribd logo
1 de 140
Syllabus Day one : Business and Architectures
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
Syllabus Day Two : Deployment
M2M Optimizations in Public Mobile Networks
M2M Over a Telecommunications Network
Network Optimizations for M2M
The Role of IP in M2M
IPv6 for M2M
6LoWPAN
Routing Protocol for Low-Power and Lossy Networks (RPL) CoRE
M2M Security
Trust Relationships in the M2M Ecosystem
Security Requirements
Which Types of Solutions are Suitable?
Standardization Efforts on Securing M2M and MTC Communications
M2M Terminals and Modules
M2M Module Categorization
Hardware Interfaces
Temperature and Durability ServicesSmart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Temperature and Durability Services
Software Interface
Cellular Certification
6 April 20136 April 2013
Day one : Business and ArchitecturesDay one : Business and Architectures
Syllabus Day one : Business and Architectures
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural PrinciplesM2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Arief Hamdani GunawanArief Hamdani Gunawan
The Essence of M2M (1/2)
• The role of M2M is to establish the
conditions that allow
– a device to (bidirectionally) exchange
informationinformation
– with a business application
– via a communication network,
– so that the device and/or application
can act as the basis for this information
exchange.
The Essence of M2M (2/2)
• The basic way to describe M2M is
shown in the “essence” of M2M.
– The role of M2M is to establish the
conditions that allow a device to
(bidirectionally) exchange information
with a business application via awith a business application via a
communication network, so that the
device and/or application can act as the
basis for this information exchange.
– In this definition, the communication
network has a key role:
a collocated application and device can hardly
be considered as having an M2M relationship.
Group of Devices in an M2M Relationship (1/2)
• In many cases,
–M2M involves a group of similar
devices interacting with a single
application.
Group of Devices in an M2M Relationship (2/2)
• In many cases, M2M involves a group
of similar devices interacting with a
single application.
• Fleet management is an example of
such an application, where devices are,
for example, trucks, and the
communication network is a mobile
network.
The Mediated M2M Relationship (1/2)
• In some cases,
– the devices in the group may not
directly interact with the
application owing to having onlyapplication owing to having only
limited capacities.
• The relationship is mediated by
another device (e.g., a gateway)
– that enables some form of
consolidation of the
communication.
The Mediated M2M Relationship (2/2)
• In some cases, the devices in the
group may not directly interact with
the application owing to having only
limited capacities.
• In this scenario, the relationship is
mediated by another device (e.g., amediated by another device (e.g., a
gateway) that enables some form of
consolidation of the communication.
• “Smart metering” is an example of
such an application where the devices
are smart meters and the
communication network can be a
mobile network or the public Internet
M2M area network
• The term “M2M area network” has been introduced
by the European Telecommunication Standards
Institute (ETSI).
• An M2M area network provides
– physical and
– MAC layer connectivity
between different M2M devices connected
to the same M2M area network,
thus allowing M2M devices to gain access
to a public network via a router or a gateway.
Characteristic
• M2M's unique characteristic is largely
due to the key role of the end-device.
• Devices are not new in the world of information and
communication technologies (ICT), butcommunication technologies (ICT), but
with M2M that market is seeing a new family of
devices with very specific characteristics.
• These characteristics are further discussed below,
particularly their impact on the requirements
for applications and networks
that have not until now been fully taken into
account.
Characteristic : Multitude
• This is the most advocated change brought about by
M2M.
• It is generally agreed that the number of “devices”
connected in M2M relationships will soon largely
exceed the sum of all those that directly interact withexceed the sum of all those that directly interact with
humans (e.g., mobile phones, PCs, tablets, etc.).
• An increased order of magnitude in the number of
devices results in significantly more pressure on
applications architectures, as well as on network load,
creating in particular scalability problems on systems
that have been designed to accommodate fewer
“actors” and far greater levels and types of traffic.
Characteristic : Variety
• There are already a particularly large number of
documented possible use cases for M2M that apply
to a variety of contexts and business domains.
• The initial implementations of M2M applications
have already led to the emergence of a large variety
of devices with extremely diverse requirements in
terms of data exchange rate, form factor, computing,
or communication capabilities.
• One result of the wide variety is heterogeneity, which
is in itself a major challenge to interoperability.
Characteristic : Invisibility
• This is a strong requirement in many M2M
applications: the devices have to routinely deliver
their service with very little or no human control.
• In particular, this is preventing humans from
correcting mistakes (and also from creating new
ones).
• As a result, device management more than ever
becomes a key part of service and network
management and needs to be integrated seamlessly.
Characteristic : Critically
• Some devices are life-savers, such as in the field of
eHealth (blood captors, fall detectors, etc.).
• Some are key elements of life-critical infrastructures,
such as voltage or phase detectors, breakers, etc, in
the Smart Grid.
• Their usage places stringent requirements upon
latency or reliability, which may challenge or exceed
the capabilities of today's networks
Characteristic : Intrusiveness
• Many new M2M devices are designed with the
explicit intention to “better manage” some of the
systems that deal with the end-users' well-being,
health, etc.
• Examples are the eHealth devices already
mentioned, smart meters for measuring and/or
controlling electrical consumption in the home, etc.
• This in turn leads to issues of privacy.
Specificities of M2M devices
• In addition to the above-listed characteristics and their
impact on the architecture of M2M systems, it is
important to consider the other specificities of M2M
devices that put additional constraints on the way they
communicate through the network, it is important tocommunicate through the network, it is important to
consider the other specificities of M2M devices that
put additional constraints on the way they
communicate through the network.
• This may require new ways to group the devices
together.
• Among other things, devices can be:
Limited in functionality
• Most M2M devices have computational capabilities
several orders of magnitude below what is currently
present in a modern portable computer or a smart
phone.
• In particular, devices may be lack remote software• In particular, devices may be lack remote software
update capabilities.
• One of the main reasons for this design choice is
cost, often because the business model requires very
competitively priced devices (e.g., smart meters in
many cases).
Low-powered
• Although many M2M devices are connected to a
power network, many of them have to be powered
differently (often on batteries) for a variety of
reasons.
• For instance, a large number of them are, or will be,• For instance, a large number of them are, or will be,
located outdoors and cannot be easily connected to
a power supply (e.g., industrial process sensors,
water meters, roadside captors).
• This will reduce the amount of interaction between
such devices and the M2M applications (e.g., in the
frequency and quantity of information exchanged).
Embedded
• Many devices are, and will be, deployed in systems
with specific (hostile, secure) operating conditions
that will make them difficult to change without a
significant impact on the system itself.
• Examples are systems embedded in buildings or in
cars that are hard to replace (e.g., when they are
soldered to the car engine, as is the case with some
M2M devices).
Here to stay
• Last but not least, many of the new M2M devices are and
will be deployed in non-ICT applications with very
different lifetime expectancy.
• The rate of equipment change in many potential M2M
business domains may be lower than in the ICT industry.
• This may be linked to cost issues due to different• This may be linked to cost issues due to different
business models (e.g., no subsidization of devices by the
operators), to the fact that they are embedded, but also
to the complexity of evolution of the industrial process in
which the device is operating (e.g., criticality of the
service makes changing equipment in a electricity
network very difficult, which leads to long life cycle of
equipment in the field).
M2M World of Connected Services
Stages of M2M Industry Maturity
Challenges
Despite progress in M2M technologies,
there remain many challenges,
the most pressing ones being:
Challenges: Fragmentation
1. Fragmentation of solutions
In the vast majority of cases,
the solutions developed and implemented
to date have been addressingto date have been addressing
specific vertical applications requirements
in isolation from all others.
Challenges: Network Misalignment
2. Network misalignment
As already stated,
communication networks
have been designedhave been designed
with many requirements
that differ substantially
from those of M2M.
Challenges: Security
3. Security
As already outlined,
some of the most promising M2 applications
(eHealth, Smart Grids)(eHealth, Smart Grids)
are safety-critical and must be made robust
against a large variety
of security threats.
Challenges: Privacy
4. Privacy
To develop and resolve
the sensitive issue of privacy,
both regulationboth regulation
(an essential precondition)
and standardization
are required.
Challenges: Service Capabilities
5. Service capabilities
In order to deal with the fragmented market,
it is necessary to outline capabilities
that can be reusedthat can be reused
across several applications.
Challenges: Testing, certification
6. Testing, certification
A large number of M2M solutions
will have to be developed
outside of the traditional service silos,outside of the traditional service silos,
integrated with other M2M
or traditional applications.
Accelerators
Taking into account the above challenges, “Stages of M2M industry maturity”
also outlines three major maturity accelerators for M2M, namely:
1. high-level frameworks – This refers to an emerging set of standards-
based architectures, platforms, and technologies integrated in a way that
allows for the development of “non-silo,” future-proof applications.
2. policy and government incentives – Based on the realization that some
M2M challenges may not be addressed by the industry alone, public
authorities and governments have started to play an active role both in
M2M challenges may not be addressed by the industry alone, public
authorities and governments have started to play an active role both in
stimulating the investment by setting up ambitious incentive programs
and in policy-making.
3. standards – A large number of credible industrial partners, large and
small, from various industries (including but not only ICT) have started to
work together in order to create the new standards required to address
M2M at the global system level.
Accelerating M2M Maturity:
High-Level M2M Frameworks
• The largest part of the challenge facing the
M2M actors is to transform vertical silos into a
set of easily developable and incrementally
deployable applications.deployable applications.
• “Stages of M2M Industry Maturity” shows
that the transition to the phase two of M2M
maturity will be marked by the advent and
deployment of horizontal platforms.
Accelerating M2M Maturity:
High-Level M2M Frameworks
• What is meant by “horizontal” is a coherent
framework valid across a large variety of
business domains, networks, and devices, that
is, a set of technologies, architectures, andis, a set of technologies, architectures, and
processes that will enable functional
separations, in particular application and
network layers, as depicted in “An M2M
challenge: emergence of the M2M service
layer”
Inverting The Pipes
existing proprietary
vertical applications…
applications share common infrastructure,
environments and network elements
An M2M challenge:
emergence of the M2M service layer
Accelerating M2M Maturity:
Policy and Government Incentives
• After initial slow progress, public authorities and
governments have now realized that they have a key
role to play in the take-off of M2M communications,
especially because M2M is an integral element in many
of the new systems that are deemed to be essential for
the future of their countries or regions.the future of their countries or regions.
• Several lessons have been learnt and measures applied
in the definition of incentives regarding, in particular,
the role of standards to allow for infrastructure
optimization, or the positive effect of economies of
scale and reusability of service capabilities as a major
enabler for mainstream deployments.
M2M Standards
• Unlike in several other ICT segments where it may be
possible to deploy operational systems despite a lack of
standards, several M2M market segments demand strong
standards to ensure long-term investment protection.
• For several M2M applications, including smart metering or
Smart Grids, there is an expectation that the installedSmart Grids, there is an expectation that the installed
equipment will be deployed for more than 20 years.
• While such a lifetime may appear unrealistic (or at least
unusual) for traditional Telco deployments, the
infrastructures deployed by utilities have very long
deployment cycles that could dramatically influence their
design and henceforth the related standards.
M2M Standards Landscape
ZigBee alliance
• A set of specifications of communication
protocols (but also data models) using small
low-power radio devices based on the IEEE
802.15.4.802.15.4.
• Target applications include switches with
lamps, electricity meters with in-home
displays, consumer electronics equipment,
etc.
KNX
• A purpose-built radio frequency standard
developed for home and building control.
• It is approved as an International Standard
(ISO/IEC 14543-3) as well as a European(ISO/IEC 14543-3) as well as a European
Standard (CENELEC EN 50090 and CEN EN
13321-1) and Chinese Standard (GB/Z 20965).
Home grid
• Based on the ITU-T specification suite known
as G.hn that is designed to provide
communications within the home
environment, making use of existing wiresenvironment, making use of existing wires
such as powerline, coax cable or copper pairs.
IETF protocol suite
• Based on 802.15.4 providing a specification
for L1 and L2 WPAN, the IETF has developed a
set of protocols aimed at bringing native IP
support to constrained devicesupport to constrained device
Syllabus Day one : Business and Architectures
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Muhammad Ary MurtiMuhammad Ary Murti
The Business of M2M
M2M: Architecture and Applications
BTP, Bandung, 6-7 April 2013.
Muhammad Ary Murti
m_ary_murti@ieee.org
The Business of M2M
• The M2M Market
• Market Size Projections
• Market Evolution
• The M2M Market Adoption: Drivers and Barriers• The M2M Market Adoption: Drivers and Barriers
• The M2M Value Chain
• M2M Business Metrics
• Business Models
• Early M2M Deployments
m_ARy_murti@ieee.org, 6-7 April 2013
The M2M MarketThe M2M Market
m_ARy_murti@ieee.org, 6-7 April 2013
ICT arena is changing very quickly
• about a decade ago, headlines were
dominated by companies like Vodafone,
Orange, Telefonica, Nokia, Ericsson, Siemens,
etcetc
• today, headlines are only dominated by
companies like Google, Apple, Facebook
• ICT infrastructures and technologies have
been sidelined to facilitators/enablers!
m_ARy_murti@ieee.org, 6-7 April 2013
A few additional observations from
these latest trends
• whoever provides only hardware & infrastructure is
loosing out on the long run being close to the user (or
to the problem) is paramount (see Apple’s iPhone)
• allowing for true scalability via ability for 3rd parties to
capitalize on entire system, i.e. hardware and softwarecapitalize on entire system, i.e. hardware and software
and services, is key (see App Store concept which Steve
Jobs by the way was against)
• having a hand on the data is absolute key (see Google
who search, but also IBM who store, Cisco who route,
etc)
m_ARy_murti@ieee.org, 6-7 April 2013
Popular M2M Markets
m_ARy_murti@ieee.org, 6-7 April 2013
M2M solutions deliver many compelling benefits
Measures that drive investments in M2M vary greatly across
different industries and applications
Source: Harbor Research, Inc., September 2010
m_ARy_murti@ieee.org, 6-7 April 2013
Identifying the Potential of the e-Health Vertical
User types:
–Personal fitness/health
–Worried wells
–Telemedicine
–First responders
–Connected medical environments–Connected medical environments
–Remote monitoring
–Assisted living
–Trials
These user types are projected to
have roughly 774 million connected
devices by 2020
Source: Machina Research
m_ARy_murti@ieee.org, 6-7 April 2013
Growing Cellular M2M Market
Predictions on M2M LTE:
• minor market until 2014
• 2.5% (1.7M) of total M2M
market
• LTE module = twice 3G
costcost
Predictions on Automotive:
• primary market on M2M
cellular
• unique (short-term)
market for M2M LTE
m_ARy_murti@ieee.org, 6-7 April 2013
• The M2M Value Chain
• M2M Business Metrics
• Business Models• Business Models
m_ARy_murti@ieee.org, 6-7 April 2013
ETSI: TC M2M Architecture
m_ARy_murti@ieee.org, 6-7 April 2013
ETSI: TC M2M Architecture
m_ARy_murti@ieee.org, 6-7 April 2013
M2M Supply Chain
• Telecom operator
• MNVO (mobile virtual network operator)
• MVNE (Mobile Virtual Network Enabler)
• Satellite operator
• Telecom software vendor / ISV• Telecom software vendor / ISV
• Cloud services provider
• Telecom equipment vendor
• Device. module, chipset maker
• Integrator / consultancy
m_ARy_murti@ieee.org, 6-7 April 2013
Value shift
• Today, CSPs are doing what they do easily and
very well– selling connectivity. This represents
almost 90% of M2M revenue in the current
market
• Tomorrow, certainly within three years – revenue• Tomorrow, certainly within three years – revenue
distribution will make an inexorable shift to what
end users want to do with M2M:
— Support business decisions with M2M data
intelligence.
— Secure and manage M2M data.
— Identify and create new applications for M2M.
m_ARy_murti@ieee.org, 6-7 April 2013
Value shift
m_ARy_murti@ieee.org, 6-7 April 2013
Revenue models
• “To avoid being a bit pipe, operators must find a
way to play a greater role. The only way forward
is to develop partnerships with M2M developers
based on revenue sharing.” – Operator, Eastern
EuropeEurope
— Most CSPs function as M2M data wholesalers.
— Only one in every 10 CSPs actively runs revenue-
sharing models with partners.
— Fewer than one in 10 routinely offers service-
level or application-based pricing for M2M.
m_ARy_murti@ieee.org, 6-7 April 2013
Operational focus areas for M2M service providers
m_ARy_murti@ieee.org, 6-7 April 2013
WAN Dominates the Wireless Connection Space
Mobile networks are
expected to host
roughly 86 million
connections
• Fixed installations• Fixed installations
are usually short
range to a home hub
• Greater demand for
mobility, faster data
speeds and remote
monitoring
Source: Machina Research
m_ARy_murti@ieee.org, 6-7 April 2013
M2M Module Price Comparison
Source: Harbor Research, Inc., September 2010
m_ARy_murti@ieee.org, 6-7 April 2013
M2M mobile traffic revenues by service type
MNOs to Realize Revenues in the Billions
Source: Machina Research
m_ARy_murti@ieee.org, 6-7 April 2013
M2M mobile traffic revenues by M2M player
e-Health is a Good Opportunity for Many Players
Source: Machina Research
m_ARy_murti@ieee.org, 6-7 April 2013
New Dynamics for M2M (1 of 3)
m_ARy_murti@ieee.org, 6-7 April 2013
New Dynamics for M2M (2 of 3)
m_ARy_murti@ieee.org, 6-7 April 2013
New Dynamics for M2M (3 of 3)
m_ARy_murti@ieee.org, 6-7 April 2013
Top 10 things you need to know
1. The total opportunity will be huge
2. Addressing the opportunity requires tailored
solutions
3. Impossible for one company to serve all3. Impossible for one company to serve all
verticals: partnerships will abound
4. Traffic: M2M (generally) does not need new,
high capacity networks
5. QoS guarantees may be pre-requisite for
some industrial applications
m_ARy_murti@ieee.org, 6-7 April 2013
Top 10 things you need to know
6. Energy and e-Health are the targets for
investment
7. Distribution channels, billing, brand, etc. are
all significant assets for MNOsall significant assets for MNOs
8. MNOs can increase margins with network
capabilities
9. Revenues for a wide range of industry players
10. The industry is in a period of disruption
m_ARy_murti@ieee.org, 6-7 April 2013
Key Question:
“How to make money with IoT?”
m_ARy_murti@ieee.org, 6-7 April 2013
Starting with a Customer Centric View
to Develop the Value Proposition
m_ARy_murti@ieee.org, 6-7 April 2013
What is it others want?
- The Value Proposition
Needs – How do you get access to the
customer?
• listen to your customer carefully before and
during the design
• pick him up and accompany him to Needs
growing with him
Product - What is „this“ at all?
• Physical, tangible Object
• Service
• Feelings ( Peace of Mind, Safety, Comfort,
Belonging )
-> Customer Experience (Customer Journey)
The whole is more than the sum of its parts.
m_ARy_murti@ieee.org, 6-7 April 2013
What the Customers Expect from Us
The results of the customer insights (interviews) strongly influence product
design (customer experience design) and thus the business model.
m_ARy_murti@ieee.org, 6-7 April 2013
One technical solution – two very different products
Allianz: Crash Recorder versus Help Box
The whole is more than the sum of its parts.
m_ARy_murti@ieee.org, 6-7 April 2013
Fleshing out the Business Model looking at the
interactions between the blocks
m_ARy_murti@ieee.org, 6-7 April 2013
Many individuals need to be reached
Many individual needs need to be reached
m_ARy_murti@ieee.org, 6-7 April 2013
Key success factors
m_ARy_murti@ieee.org, 6-7 April 2013
The five critical M2M success factors for CS P success
[Source: Analysys Mason, 2012]
m_ARy_murti@ieee.org, 6-7 April 2013
Recommendations for
communication service providers (CSPs)
• Combine partnership, resale, and acquisition
models to bring M2M solutions to market. The go-to-market approach for each CS
P will vary according to specific competencies, but sales of a more end-to-end
solution require a fairly strong presence across the supply chain. Partnerships,
particularly at the applications layer, will be critical for most CS Ps.
• Prioritize M2M solutions based on revenue
and profitability metrics. There are more M2M applications in the enterprise and
consumer worlds than may be addressed profitably. Pick the top solutions andconsumer worlds than may be addressed profitably. Pick the top solutions and
focus your resources.
• Dedicate human resources to an M2M business unit
Treat M2M like a start-up business unit and dedicate staff and budget to the
group. Reconsider the placement of human resources – whether in corporate
functions or in the field. Allocate profit and loss responsibility accordingly.
• Create an M2M identity based on existing,
enterprise perceptions and brand awareness. M2M is a solution in which
communications – with growing emphasis on mobility – and IT overlap. It will be
important in creating an M2M identity for a CS P to understand the enterprise IT
buyer’s impressions of its overall enterprise capabilities.
m_ARy_murti@ieee.org, 6-7 April 2013
Early M2M Deployments
m_ARy_murti@ieee.org, 6-7 April 2013
Vehicle Tracking System
m_ARy_murti@ieee.org, 6-7 April 2013
M2M at Sea
• Most of the world’s cargo transportation needs are• Most of the world’s cargo transportation needs are
served by ocean transport, yet these vast areas
have been cut off from communication, as no
network has been able to supply connectivity
• With Ericsson’s technology, vessel fleets in the
middle of the ocean are essentially running their own
wireless networks via satellite uplink.
m_ARy_murti@ieee.org, 6-7 April 2013
M2M at Sea
• Achieving
Benefits Across
the Sea
• Making• Making
Containers Smart
• Creating
Industry-Wide
Efficiencies
m_ARy_murti@ieee.org, 6-7 April 2013
M2M at Sea
Achieving
Benefits Across
the Sea
•This kind of communication also paves the way for immediate access to remote•This kind of communication also paves the way for immediate access to remote
expertise, resulting in extended access to information and, in turn, improved
efficiency in vessels’ daily operations.
•Shipping companies will have real-time access to information about vessel
operation, bunker fuel consumption, and electric conditions. They will also be
able to monitor and prevent any difficulties in systems on board before they
happen.
•One of the primary benefits for shipping companies will come from their ability
to proactively manage bunker consumption through real-time data, which will
create significant operational savings.
m_ARy_murti@ieee.org, 6-7 April 2013
M2M at Sea
• Making
Containers Smart
•A full view of every container will be available,•A full view of every container will be available,
whether a vessel is in the middle of the ocean or at a
dock in a port.
•Once docked, the device connectivity of containers
will switch to a local operator network so that the
tracking can continue when the next leg of trucking
transportation begins.
m_ARy_murti@ieee.org, 6-7 April 2013
M2M at Sea
• Creating
Industry-Wide
Efficiencies
• Machine-to-machine (M2M) solutions, such as the one• Machine-to-machine (M2M) solutions, such as the one
described here, will help shipping companies employ new
and efficient ways of addressing fleet management.
• This technology will help manage delivery times, improve
interaction with vessels, and increase the efficiency of the
global supply chain. Shipping companies will be able to
proactively resolve issues, promptly share information with
customers, and even improve energy efficiency
m_ARy_murti@ieee.org, 6-7 April 2013
Speed Up Traffic with M2M
Improving logistics in the Port of Hamburg
• second largest port in Europe, the size of 7,000
soccer fields and welcomes up to 40,000 trucks a
day, each carrying six or twelve containers.
• Physical expansion was not an option, since the
city of Hamburg surrounds the port.city of Hamburg surrounds the port.
• The port’s road infrastructure – over 80 miles
(130 kilometers) – is restricted, and offers very
limited ability to expand.
• What was needed was an efficient traffic
management system.
m_ARy_murti@ieee.org, 6-7 April 2013
• partnered with SAP and Deutsche Telekom in its Smart
Port Logistics pilot project. During an initial three-
month trial, 30 trucks were fitted with
tabletsconnected to the prototype Smart Port Logistics
System.
• The system receives and integrates three sources of
Speed Up Traffic with M2M
Improving logistics in the Port of Hamburg
• The system receives and integrates three sources of
information in real time:
1. traffic information;
2. infrastructure information, including parking and the
status of tunnels and moving bridges;
3. location of participating trucks approaching or within
the Port of Hamburg.
m_ARy_murti@ieee.org, 6-7 April 2013
Smart Port Logistics
Drivers receive automated, personalized text-based messages with relevant traffic information
and details about available parking, allowing them to take optimal routes and avoid long waits.
As an added benefit, participating freight forwarding companies are also able to track their
transport orders in real time.
waiting times for trucks will decrease, and there will be fewer traffic jams within the port area
and on the approach roads.
m_ARy_murti@ieee.org, 6-7 April 2013
Terima Kasih
m_ARy_murti@ieee.org, 6-7 April 2013
Syllabus Day one : Business and Architectures
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M RequirementsUse-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Arief Hamdani GunawanArief Hamdani Gunawan
M2M Requirements and High-Level Architectural Principles
• Most standards organizations, including 3GPP, 3GPP2, and
ETSI, have adopted a use-case-driven approach as a means
with which to derive the set of requirements that further
define the service architecture. ETSI, however, has adopted
a more formal way of describing the use cases.
• In addition to the use-case-driven approach, it became very• In addition to the use-case-driven approach, it became very
clear that all network optimization matters, both
equipment features and the design or operational
networks, also have to take into account fundamental
characteristics of M2M-generated traffic and growth
patterns.
• Both issues put forward new and particularly challenging
requirements on the access and core network
What is a Use Case?
• The term use case is very commonly used.
However, a commonly agreed definition is more
difficult to find. The Object Management Group
(OMG) provides an excellent definition and(OMG) provides an excellent definition and
approach regarding the description of use cases.
• According to the OMG, a use case describes the
interactions between one or more actors on the
one hand and the system under consideration on
the other.
ETSI M2M Work on Use Cases
• The ETSI Technical Committee (TC) M2M was
created in January 2009 and aims to provide
an end-to-end view of M2M communication
architecture.architecture.
• This end-to-end view does not mean that all
elements of an M2M system are specified by
ETSI TC M2M.
ETSI M2M Specifications Work
Typical deployment scenario of smart metering systems
Smart Metering Approach in ETSI M2M
• General Use Case Description
– A smart metering information system is configured to support the pre-
payment functionality as defined by the billing entity. The use case
describes occasions where the pre-payment functionality is managed
locally on the smart metering information system as well as instances
where the management is performed remotely by the billing entity.
• Stakeholders• Stakeholders
– Billing Entity: Organization responsible for billing the consumer(s).
– Consumer: Organization or person consuming the electricity, gas, heat,
or water at the premise location. The consumer may also be the
organization or person contracted with the billing entity to pay the bill.
– Asset Entity: Organization responsible for the installation,
configuration, operation, and maintenance of the smart metering
information system assets (e.g., meters communication devices, smart
metering gateway)
Technical Report
e-Health
eHealth: Portable Sensors
eHealth Approach in ETSI M2M:
General Use Case Description
• In a remote patient monitoring scenario where low
voltage body signals need to be acquired for remote
health monitoring purposes, the acquisition process
could be disturbed by radio transmission activities,
such as GSM/GPRS, that can take place on the nearestsuch as GSM/GPRS, that can take place on the nearest
co-located radio parts of the same M2M device.
• Where the health monitoring process is continuously
applied to the patient, for example, discovering
arrhythmias, the acquisition activity could be disrupted
by typical cellular radio communication activities
performed by the M2M device
eHealth Approach in ETSI M2M:
Stakeholders: Patient
• The patient may be any individual or surrogate
who could use a remote monitoring device
(RMD) to gather measurements, data, or
events.
• The patient measurements may be taken in
various clinical settings, such as a hospital, or
non-clinical settings, such as at home, at work,
at school, while traveling, or in assisted-living
facilities.
eHealth Approach in ETSI M2M:
Stakeholders: Remote Monitoring Device (RMD)
• An electronic M2M device with a sensor, user
interface and/or actuator, and an interface
into the M2M network.
• The device collects patient information and• The device collects patient information and
communicates to the appropriate M2M
service-capability provider and/or M2M
application via the M2M network.
• An RMD may also communicate with these
entities via an M2M gateway.
eHealth Approach in ETSI M2M:
Stakeholders: M2M service capability provider
• A network entity that provides M2M
communication services to the M2M
application entities.
• These applications may support specific• These applications may support specific
functional capabilities that assist in facilitating
health information-exchange activities.
• Additionally, the M2M service-capability
provider communicates with the RMD to
collect data or send commands.
eHealth Approach in ETSI M2M:
Stakeholders: M2M application entity
• A term created to bundle together, and treat as a single
system element, stakeholders above the M2M scope.
• High-level applications such as free-standing or
geographic health information exchanges, data analysis
centers, integrated care-delivery networks, providercenters, integrated care-delivery networks, provider
organizations, health record banks, or public health
networks, and/or specialty networks are all examples
of M2M application entities.
• The term M2M application entity also includes the
following typical RPM stakeholders.
High-Level Architecture Principles
for M2M Communications
• Lessons have been learned from early M2M
deployments.
• First, vertically integrated applications are hard to
develop, deploy and test.
Not only do these need to deal with the application– Not only do these need to deal with the application
business logic, but they must also include a large
number of network-aware functionalities.
– Looking at the M2M applications requirements, it is
clear that they all rely on a set of similar building
blocks, particularly when it comes to all aspects
related to communications and underlying networks
High-Level Architecture Principles
for M2M Communications
• Second, M2M is all about cost-effectiveness.
M2M is known to generate a fraction of the ARPU
(average revenue per user) of other consumer
handsets such as smart phones.
– However, all analysts agree that the number of– However, all analysts agree that the number of
deployed M2M devices will be an order of magnitude
higher than personal communication devices.
– As a result, the network has to become M2M-aware
and take advantage of all traffic characteristics of
M2M in order to provide the level of scaling and cost
that matches projected M2M devices and ARPU
structure.
M2M from initial to mainstream deployments
Simplified M2M Architecture
…based on Existing Technologies
Closing
• It clearly shows that M2M imposes very specific
requirements on the network in order to achieve
lower investment and operational costs that
match ARPU constraints imposed by M2M
communications.communications.
• Such a horizontal platform also provides easier
access to network enablers, such as location,
QoS, and addressing, which would otherwise be
difficult to access because of the multiplicity of
interfaces and the complexity involved in building
business relationships with multiple operators.
Syllabus Day one : Business and Architectures
Introduction to M2M
What is M2M?
The Business of M2M
Accelerating M2M Maturity
M2M Standards
The Business of M2M
The M2M Market
The M2M Market Adoption: Drivers and Barriers
The M2M Value Chain
Market Size Projections
Business Models
M2M Business Metrics
Market Evolution
Early M2M Deployments
M2M Requirements and High-Level Architectural Principles
Use-Case-Driven Approach to M2M Requirements
Smart Metering Approach in ETSI M2MSmart Metering Approach in ETSI M2M
eHealth Approach in ETSI M2M
High-Level Architecture Principles for M2M Communication
ETSI M2M Services Architecture
High-Level System Architecture
ETSI TC M2M Service Capabilities Framework
ETSI TC M2M Release 1 Scenarios
ETSI M2M Service Capabilities
Introducing REST Architectural Style for M2M
ETSI TC M2M Resource-Based M2M Communication and Procedures
Arief Hamdani GunawanArief Hamdani Gunawan
Typical components of a horizontal M2M service platform
ETSI M2M Network
ETSI M2M Network Architecture
High-level system architecture
ETSI TS 102 690
M2M High Level System Overview
M2M High Level System
Technical Specification
M2M service capabilities functional architecture framework
Glossary of M2M Capabilities
• Application Enablement (xAE),
• Generic Communication (xGC),
• Reachability, Addressing and Repository (xRAR),
• Communication Selection (xCS),
• Remote Entity Management (xREM),
• SECurity (xSEC),
History and Data Retention (xHDR),• History and Data Retention (xHDR),
• Transaction Management (xTM),
• Compensation Broker (xCB),
• Telco Operator Exposure (xTOE),
• Interworking Proxy (xIP)
• Service Capability Layer (xSCL)
where x is:
• N for Network,
• G for Gateway.
• D for Device
Service capabilities functional architecture framework
Device Types (1/2)
The following device types
• Gateway (G) is an ETSI M2M device specialized to
directly manage M2M area networks of ETSI M2M
devices; the gateway directly communicates with an
ETSI M2M core network via the mId reference point.
• Device (D) is an ETSI M2M device that can directly• Device (D) is an ETSI M2M device that can directly
communicate with an ETSI M2M core network or with
an ETSI M2M gateway.
• Device' (D') is an ETSI M2M device that does not
implement ETSI M2M SCs. It interacts indirectly with
the M2M core via the use of SCs in the M2M gateway
(G).
Device Types (2/2)
• Gateway' (G') is an ETSI M2M gateway that provides
connectivity to both D and D' devices. Note that G' is
not handled within the ETSI TC M2M Release 1
specification.
• Additionally, there is a non-ETSI M2M-compliant device
(d) belonging to an M2M area network managed by an
ETSI M2M compliant device or gateway entities. The
(d) type devices cannot access M2M SCs directly.
However, interworking with ETSI-compliant entities is
possible via the xIP (interworking proxy)
Scenarios (1/2)
• Legacy cases (legacy case 1, 2, 3, and 2+) relate to legacy
devices, referred to as “d” device (lower case d), that are
not ETSI TC M2M-compliant. These devices can be
integrated within the ETSI TC M2M architecture via an xIP
service capability where x could be N for network, G for
gateway, or D for device. xIP (NIP, GIP, DIP) is a specific
capability that makes a non-compliant device looks like an
gateway, or D for device. xIP (NIP, GIP, DIP) is a specific
capability that makes a non-compliant device looks like an
ETSI-compliant M2M device through the implementation of
the mId reference point. Note, however, that the ETSI TC
M2M specification does not say how the interworking is
done. The details of such interworking are not standardized
and are left for individual implementations.
Scenarios (2/2)
• Case 1 shows a D device which is defined as a device that
implements M2M SCs and runs DAs. The D device
interfaces with the M2M SCs in the network and
applications domain, making use of the mId reference point
• Case 2 shows a D' device which is an ETSI TC M2M-
compliant device but that does not implement M2M SCs.compliant device but that does not implement M2M SCs.
Instead, it relies on SCs in an M2M gateway, referred to as
“G”, via the dIa external (in this case) reference point.
• Case 2+ relates to D devices connecting to the M2M SCs in
the network and applications domain via an M2M gateway,
G. The motivation for such a case is to allow a D device to
make use of WAN connectivity but also when needed— for
example, in the case of mobile devices—reuse existing
WAN connectivity provided by a gateway.
ETSI M2M Service Capabilities
• Reachability, Addressing, and Repository Capability (xRAR)
is the cornerstone of the ETSI TC M2M SC work. It has
resulted from the merger of two other capabilities
introduced in the early stages of the ETSI TC M2M work:
– Device application repository: originally introduced to maintain
a record of registered DAs.a record of registered DAs.
– Naming addressing and reachability: originally introduced to
provide address translation functions and to keep track of
reachability status of devices or applications running on those
devices.
• The merging of these two capabilities, resulting in xRAR,
simplifies the structure and avoids the need for
unnecessary frequent exchanges of messages between the
two capabilities.
REST Architectural Style for M2M
• REST (representational state transfer) is an
architectural style defined by Roy T. Fielding in
2000.
• It is a set of principles that enables distributed• It is a set of principles that enables distributed
systems to achieve greater scalability and
allow distributed applications to grow and
change over time, thanks to the loose
coupling of components and stateless
interactions.
Main Concept of REST
• The main concept of REST is that a distributed application is
composed of resources, which are stateful pieces of information
residing on one or more servers.
• Regardless of their content, in REST it is possible to manipulate
resources through a uniform interface that is composed of four
basic interactions: CREATE, UPDATE, DELETE, and READ.
• Each of these operations is composed of request and response• Each of these operations is composed of request and response
messages, and, with the exception of CREATE, they are idempotent,
meaning that the end result of each operation is unchanged
regardless of how many times the operation itself is repeated.
• In other words, these operations do not have side effects, meaning
that it is possible to distribute resources and to use proxy functions.
The lack of side effects allows more efficient use of caching and
greater scalability.
REST Basics
• REST is an architectural style that relies heavily
on HTTP, and conceptualizes the idea of web-
accessible resources.
• A resource, in REST terms, could be any entity• A resource, in REST terms, could be any entity
that can be addressed using a HTTP URI
Addressing a REST resource
Proxy caching the temperature value
Sensor updating its samples using HTTP PUT
ETSI TC M2M Resource-Based M2M
Communication and Procedures
• In ETSI TC M2M, it is assumed that all three
normative reference points defined in the
M2M architecture, namely mIa, mId, and dIa,
will use REST, although there may be some
exceptions.exceptions.
• For instance, on the mId reference point,
device management is performed using
existing protocols such as BBF TR069 and OMA
DM that are RPC-based.
Primitives
• ETSI TC M2M did not assume that the HTTP
protocol would be the protocol to be used for
implementation, although HTTP is the natural
choice until CoAP (more adapted for constrained
devices) becomes widely deployed.devices) becomes widely deployed.
• To avoid the use of specific HTTP primitives, this
section will mostly use the four primitives:
– Create: create a resource.
– Retrieve: read the content of the resource.
– Update: write the content of the resource.
– Delete: delete the resource.
CRUD Methods
• Those methods are referred to as the CRUD
methods below.
• In addition to these basic methods, it is often also
useful to define methods for subscribing to a
change of a resource (S) and a notification aboutchange of a resource (S) and a notification about
a change of a resource (N) included in a more
general RESTful architecture.
• It is assumed in what follows that CRUD and SN
are applicable to the resources used in the SCL
(service capability layer).
Use of SCL and REST architectural style for data exchange.
Source: ETSI TS 102 690
Use of SCL and REST architectural style for data exchange.
Source: ETSI TS 102 690
• Step 1 shows how a DA can request that the particular
data be stored under the NSCL (network service
capability layer). Since the DA does not speak directly
with the NSCL, storing this data under the NSCL is
facilitated by the local SCL—the DSCL in this case. The
DA can either use an update or a create primitive toDA can either use an update or a create primitive to
this end.
• In Step 2, which is optional, the NSCL notifies the NA
that some data is available. This step assumes that the
NA has already subscribed to be notified when data
matching a certain criterion becomes available.
• Step 3 consists of reading the data received by the NA.
Closing
• A description of the capabilities for the ETSI TC M2M
Release 1 was provided along with the resource structure
and an overview of the most important procedures through
an example.
• ETSI TC M2M specifications represent an important step
forward for providing the foundation standards for aforward for providing the foundation standards for a
horizontal M2M service platform. While the initial release
mostly tackled data mediation, security, and device
management, it is expected that future releases will go the
extra mile in standardizing the other service capabilities.
• At the time of writing, ETSI M2M specifications are still
evolving, so some details may have slightly changed.
End of Day OneEnd of Day One
NextNext
Day Two: DeploymentDay Two: Deployment

Mais conteúdo relacionado

Mais procurados

Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Desong Bian
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDFAhmed Adel
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generationsijtsrd
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing securityZachariah Pabi
 
Intro to _evolved_packet_core_network
Intro to _evolved_packet_core_networkIntro to _evolved_packet_core_network
Intro to _evolved_packet_core_networkSanjay Shukla
 
Spectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionSpectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionIJSTA
 
Handover Management In Integrated Wlan And Mobile Wimax
Handover Management In Integrated Wlan And Mobile WimaxHandover Management In Integrated Wlan And Mobile Wimax
Handover Management In Integrated Wlan And Mobile WimaxPradeep Thomas Thundiyil
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16eSimona Halunga
 
Optimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksOptimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksIDES Editor
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingIRJET Journal
 
Video streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocolVideo streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocoljournalBEEI
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deploymentDr. Ayman Elnashar, PhD
 

Mais procurados (20)

Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
Analysis of Communication Schemes for Advanced Metering Infrastructure (AMI)
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
Wi-Fi Offloading.PDF
Wi-Fi Offloading.PDFWi-Fi Offloading.PDF
Wi-Fi Offloading.PDF
 
170 176
170 176170 176
170 176
 
handling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-augusthandling-of-signaling-storms-in-mobile-networks-august
handling-of-signaling-storms-in-mobile-networks-august
 
Study on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile GenerationsStudy on Infrastructure Developments of Mobile Generations
Study on Infrastructure Developments of Mobile Generations
 
Mobile computing security
Mobile computing securityMobile computing security
Mobile computing security
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
WAP
WAPWAP
WAP
 
M2M Strategies
M2M StrategiesM2M Strategies
M2M Strategies
 
Intro to _evolved_packet_core_network
Intro to _evolved_packet_core_networkIntro to _evolved_packet_core_network
Intro to _evolved_packet_core_network
 
Spectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionSpectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User Detection
 
Handover Management In Integrated Wlan And Mobile Wimax
Handover Management In Integrated Wlan And Mobile WimaxHandover Management In Integrated Wlan And Mobile Wimax
Handover Management In Integrated Wlan And Mobile Wimax
 
Scalable ofdma3 802.16e
Scalable ofdma3 802.16eScalable ofdma3 802.16e
Scalable ofdma3 802.16e
 
H010524049
H010524049H010524049
H010524049
 
Optimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless NetworksOptimization of Quality of Service in 4G Wireless Networks
Optimization of Quality of Service in 4G Wireless Networks
 
comparsion of LTE and wimax
comparsion of LTE and wimaxcomparsion of LTE and wimax
comparsion of LTE and wimax
 
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video StreamingOptimal Rate Allocation and Lost Packet Retransmission in Video Streaming
Optimal Rate Allocation and Lost Packet Retransmission in Video Streaming
 
Video streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocolVideo streaming over Ad hoc on-demand distance vector routing protocol
Video streaming over Ad hoc on-demand distance vector routing protocol
 
Practical aspects of lte design and deployment
Practical aspects of lte design and deploymentPractical aspects of lte design and deployment
Practical aspects of lte design and deployment
 

Destaque

Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Business of Software Conference
 
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Business of Software Conference
 
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Business of Software Conference
 
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Business of Software Conference
 
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Business of Software Conference
 
Samme references
Samme referencesSamme references
Samme referencesSynflame
 
Peran Perguruan Tinggi dalam Era Global
Peran Perguruan Tinggi dalam Era GlobalPeran Perguruan Tinggi dalam Era Global
Peran Perguruan Tinggi dalam Era GlobalDadang Solihin
 
Masonic regalia craft provincial jewels
Masonic regalia craft provincial jewelsMasonic regalia craft provincial jewels
Masonic regalia craft provincial jewelsSialkot Regalia Center
 
Chapter 02 audio recording - part i
Chapter 02   audio recording - part iChapter 02   audio recording - part i
Chapter 02 audio recording - part iNazihah Ahwan
 
The essential guide_to_internet_marketing
The essential guide_to_internet_marketingThe essential guide_to_internet_marketing
The essential guide_to_internet_marketingLUONG NGUYEN
 
Презентація:Матеріали до уроків
Презентація:Матеріали до уроківПрезентація:Матеріали до уроків
Презентація:Матеріали до уроківsveta7940
 
Taller de informatica_803_(2)
Taller de informatica_803_(2)Taller de informatica_803_(2)
Taller de informatica_803_(2)Tatiana Nieves
 
Relationship of body mass index, fat and visceral fat among adolescents
Relationship of body mass index, fat and visceral fat among adolescentsRelationship of body mass index, fat and visceral fat among adolescents
Relationship of body mass index, fat and visceral fat among adolescentsSports Journal
 

Destaque (20)

Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
 
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
 
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
 
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
 
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
 
Machina research big data and IoT
Machina research big data and IoTMachina research big data and IoT
Machina research big data and IoT
 
Samme references
Samme referencesSamme references
Samme references
 
Perfil de tu facilitador
Perfil de tu facilitadorPerfil de tu facilitador
Perfil de tu facilitador
 
Peran Perguruan Tinggi dalam Era Global
Peran Perguruan Tinggi dalam Era GlobalPeran Perguruan Tinggi dalam Era Global
Peran Perguruan Tinggi dalam Era Global
 
Masonic regalia craft provincial jewels
Masonic regalia craft provincial jewelsMasonic regalia craft provincial jewels
Masonic regalia craft provincial jewels
 
Chapter 02 audio recording - part i
Chapter 02   audio recording - part iChapter 02   audio recording - part i
Chapter 02 audio recording - part i
 
Estatuto del representante legal
Estatuto del representante legalEstatuto del representante legal
Estatuto del representante legal
 
Shooting Script
Shooting ScriptShooting Script
Shooting Script
 
CV Bijander -July 16
CV Bijander -July 16CV Bijander -July 16
CV Bijander -July 16
 
Cuál es mi idea
Cuál es mi ideaCuál es mi idea
Cuál es mi idea
 
The essential guide_to_internet_marketing
The essential guide_to_internet_marketingThe essential guide_to_internet_marketing
The essential guide_to_internet_marketing
 
Презентація:Матеріали до уроків
Презентація:Матеріали до уроківПрезентація:Матеріали до уроків
Презентація:Матеріали до уроків
 
Op weg naar HAN University of Applied Sciences
Op weg naar HAN University of Applied SciencesOp weg naar HAN University of Applied Sciences
Op weg naar HAN University of Applied Sciences
 
Taller de informatica_803_(2)
Taller de informatica_803_(2)Taller de informatica_803_(2)
Taller de informatica_803_(2)
 
Relationship of body mass index, fat and visceral fat among adolescents
Relationship of body mass index, fat and visceral fat among adolescentsRelationship of body mass index, fat and visceral fat among adolescents
Relationship of body mass index, fat and visceral fat among adolescents
 

Semelhante a M2M Day One

Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer EvolutiononeM2M
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdfJohn Paul
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...Cisco Service Provider Mobility
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...Stuart Bennett
 
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...Open Mobile Alliance
 
Iot,Machine type Communications (M2M)
Iot,Machine type Communications (M2M)Iot,Machine type Communications (M2M)
Iot,Machine type Communications (M2M)Chandu Pillalamarri
 
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014Martyn Taylor
 
Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............spreya772
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
 
M2 m communication whitepaper
M2 m communication whitepaperM2 m communication whitepaper
M2 m communication whitepaperResearch48
 
M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit Alan Quayle
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesNavjyotsinh Jadeja
 

Semelhante a M2M Day One (20)

Lightweight M2M
Lightweight M2MLightweight M2M
Lightweight M2M
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
 
1.pptx
1.pptx1.pptx
1.pptx
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
 
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
Intro to IoT & the role of LwM2M Technologies (Internet of Things World 2017,...
 
Iot,Machine type Communications (M2M)
Iot,Machine type Communications (M2M)Iot,Machine type Communications (M2M)
Iot,Machine type Communications (M2M)
 
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
M2M (Machine to Machine) & MVNOs - Mobile telecommunications in 2014
 
Machine-to-Machine Communications
Machine-to-Machine CommunicationsMachine-to-Machine Communications
Machine-to-Machine Communications
 
White paper openmtc
White paper openmtcWhite paper openmtc
White paper openmtc
 
Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............Module 2 M2M, SDN, VNF.pptx...............
Module 2 M2M, SDN, VNF.pptx...............
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
M2 m communication whitepaper
M2 m communication whitepaperM2 m communication whitepaper
M2 m communication whitepaper
 
M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit M2M Market Analysis, SDP Global Summit
M2M Market Analysis, SDP Global Summit
 
M2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and SimilaritiesM2M vs IoT: The Key Differences and Similarities
M2M vs IoT: The Key Differences and Similarities
 

Mais de Arief Gunawan

Metaverse - Let's learn to understand when business becomes virtual and when ...
Metaverse - Let's learn to understand when business becomes virtual and when ...Metaverse - Let's learn to understand when business becomes virtual and when ...
Metaverse - Let's learn to understand when business becomes virtual and when ...Arief Gunawan
 
Technology Disruptions
Technology DisruptionsTechnology Disruptions
Technology DisruptionsArief Gunawan
 
Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...Arief Gunawan
 
APWiMob 2014 (Bali, 28-30 August 2014) CFP
APWiMob 2014 (Bali, 28-30 August 2014) CFPAPWiMob 2014 (Bali, 28-30 August 2014) CFP
APWiMob 2014 (Bali, 28-30 August 2014) CFPArief Gunawan
 
Prof Ekram Hossain on DLT 2013 in Indonesia
Prof Ekram Hossain on DLT 2013 in IndonesiaProf Ekram Hossain on DLT 2013 in Indonesia
Prof Ekram Hossain on DLT 2013 in IndonesiaArief Gunawan
 
Day one ofdma and mimo
Day one ofdma and mimoDay one ofdma and mimo
Day one ofdma and mimoArief Gunawan
 
Day two 10 november 2012
Day two 10 november 2012Day two 10 november 2012
Day two 10 november 2012Arief Gunawan
 
Day one 09 november 2012
Day one 09 november 2012Day one 09 november 2012
Day one 09 november 2012Arief Gunawan
 
IEEE Background presentation
IEEE Background  presentationIEEE Background  presentation
IEEE Background presentationArief Gunawan
 
Cloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraCloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraArief Gunawan
 
Cloud Computing: Peluang Bisnis dan Tantangan Regulasi
Cloud Computing: Peluang Bisnis dan Tantangan RegulasiCloud Computing: Peluang Bisnis dan Tantangan Regulasi
Cloud Computing: Peluang Bisnis dan Tantangan RegulasiArief Gunawan
 
Mobile Cloud @ Binus
Mobile Cloud @ BinusMobile Cloud @ Binus
Mobile Cloud @ BinusArief Gunawan
 
Small Cell @ IT Telkom
Small Cell @ IT TelkomSmall Cell @ IT Telkom
Small Cell @ IT TelkomArief Gunawan
 
03 Beginning Android Application Development
03 Beginning Android Application Development03 Beginning Android Application Development
03 Beginning Android Application DevelopmentArief Gunawan
 
02 BlackBerry Application Development
02 BlackBerry Application Development02 BlackBerry Application Development
02 BlackBerry Application DevelopmentArief Gunawan
 

Mais de Arief Gunawan (20)

Metaverse - Let's learn to understand when business becomes virtual and when ...
Metaverse - Let's learn to understand when business becomes virtual and when ...Metaverse - Let's learn to understand when business becomes virtual and when ...
Metaverse - Let's learn to understand when business becomes virtual and when ...
 
Technology Disruptions
Technology DisruptionsTechnology Disruptions
Technology Disruptions
 
Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...Tutorial on Network Management and Security in Wireless Communications (Bandu...
Tutorial on Network Management and Security in Wireless Communications (Bandu...
 
APWiMob 2014 (Bali, 28-30 August 2014) CFP
APWiMob 2014 (Bali, 28-30 August 2014) CFPAPWiMob 2014 (Bali, 28-30 August 2014) CFP
APWiMob 2014 (Bali, 28-30 August 2014) CFP
 
Prof Ekram Hossain on DLT 2013 in Indonesia
Prof Ekram Hossain on DLT 2013 in IndonesiaProf Ekram Hossain on DLT 2013 in Indonesia
Prof Ekram Hossain on DLT 2013 in Indonesia
 
Day two planning
Day two planningDay two planning
Day two planning
 
Day one ofdma and mimo
Day one ofdma and mimoDay one ofdma and mimo
Day one ofdma and mimo
 
Day two 10 november 2012
Day two 10 november 2012Day two 10 november 2012
Day two 10 november 2012
 
Day one 09 november 2012
Day one 09 november 2012Day one 09 november 2012
Day one 09 november 2012
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 
Cloud Ecosystem
Cloud EcosystemCloud Ecosystem
Cloud Ecosystem
 
IEEE Background presentation
IEEE Background  presentationIEEE Background  presentation
IEEE Background presentation
 
Cloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of TeraCloud and Ubiquitous Computing in Today's Era of Tera
Cloud and Ubiquitous Computing in Today's Era of Tera
 
Cloud Computing: Peluang Bisnis dan Tantangan Regulasi
Cloud Computing: Peluang Bisnis dan Tantangan RegulasiCloud Computing: Peluang Bisnis dan Tantangan Regulasi
Cloud Computing: Peluang Bisnis dan Tantangan Regulasi
 
Mobile Cloud @ Binus
Mobile Cloud @ BinusMobile Cloud @ Binus
Mobile Cloud @ Binus
 
Small Cell @ UI
Small Cell @ UISmall Cell @ UI
Small Cell @ UI
 
Small Cell @ IT Telkom
Small Cell @ IT TelkomSmall Cell @ IT Telkom
Small Cell @ IT Telkom
 
03 Beginning Android Application Development
03 Beginning Android Application Development03 Beginning Android Application Development
03 Beginning Android Application Development
 
02 BlackBerry Application Development
02 BlackBerry Application Development02 BlackBerry Application Development
02 BlackBerry Application Development
 
01 Mobile Jungle
01 Mobile Jungle01 Mobile Jungle
01 Mobile Jungle
 

Último

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

M2M Day One

  • 1. Syllabus Day one : Business and Architectures Introduction to M2M What is M2M? The Business of M2M Accelerating M2M Maturity M2M Standards The Business of M2M The M2M Market The M2M Market Adoption: Drivers and Barriers The M2M Value Chain Market Size Projections Business Models M2M Business Metrics Market Evolution Early M2M Deployments M2M Requirements and High-Level Architectural Principles Use-Case-Driven Approach to M2M Requirements Smart Metering Approach in ETSI M2M Syllabus Day Two : Deployment M2M Optimizations in Public Mobile Networks M2M Over a Telecommunications Network Network Optimizations for M2M The Role of IP in M2M IPv6 for M2M 6LoWPAN Routing Protocol for Low-Power and Lossy Networks (RPL) CoRE M2M Security Trust Relationships in the M2M Ecosystem Security Requirements Which Types of Solutions are Suitable? Standardization Efforts on Securing M2M and MTC Communications M2M Terminals and Modules M2M Module Categorization Hardware Interfaces Temperature and Durability ServicesSmart Metering Approach in ETSI M2M eHealth Approach in ETSI M2M High-Level Architecture Principles for M2M Communication ETSI M2M Services Architecture High-Level System Architecture ETSI TC M2M Service Capabilities Framework ETSI TC M2M Release 1 Scenarios ETSI M2M Service Capabilities Introducing REST Architectural Style for M2M ETSI TC M2M Resource-Based M2M Communication and Procedures Temperature and Durability Services Software Interface Cellular Certification
  • 2. 6 April 20136 April 2013 Day one : Business and ArchitecturesDay one : Business and Architectures
  • 3. Syllabus Day one : Business and Architectures Introduction to M2M What is M2M? The Business of M2M Accelerating M2M Maturity M2M Standards The Business of M2M The M2M Market The M2M Market Adoption: Drivers and Barriers The M2M Value Chain Market Size Projections Business Models M2M Business Metrics Market Evolution Early M2M Deployments M2M Requirements and High-Level Architectural PrinciplesM2M Requirements and High-Level Architectural Principles Use-Case-Driven Approach to M2M Requirements Smart Metering Approach in ETSI M2M eHealth Approach in ETSI M2M High-Level Architecture Principles for M2M Communication ETSI M2M Services Architecture High-Level System Architecture ETSI TC M2M Service Capabilities Framework ETSI TC M2M Release 1 Scenarios ETSI M2M Service Capabilities Introducing REST Architectural Style for M2M ETSI TC M2M Resource-Based M2M Communication and Procedures Arief Hamdani GunawanArief Hamdani Gunawan
  • 4. The Essence of M2M (1/2) • The role of M2M is to establish the conditions that allow – a device to (bidirectionally) exchange informationinformation – with a business application – via a communication network, – so that the device and/or application can act as the basis for this information exchange.
  • 5. The Essence of M2M (2/2) • The basic way to describe M2M is shown in the “essence” of M2M. – The role of M2M is to establish the conditions that allow a device to (bidirectionally) exchange information with a business application via awith a business application via a communication network, so that the device and/or application can act as the basis for this information exchange. – In this definition, the communication network has a key role: a collocated application and device can hardly be considered as having an M2M relationship.
  • 6. Group of Devices in an M2M Relationship (1/2) • In many cases, –M2M involves a group of similar devices interacting with a single application.
  • 7. Group of Devices in an M2M Relationship (2/2) • In many cases, M2M involves a group of similar devices interacting with a single application. • Fleet management is an example of such an application, where devices are, for example, trucks, and the communication network is a mobile network.
  • 8. The Mediated M2M Relationship (1/2) • In some cases, – the devices in the group may not directly interact with the application owing to having onlyapplication owing to having only limited capacities. • The relationship is mediated by another device (e.g., a gateway) – that enables some form of consolidation of the communication.
  • 9. The Mediated M2M Relationship (2/2) • In some cases, the devices in the group may not directly interact with the application owing to having only limited capacities. • In this scenario, the relationship is mediated by another device (e.g., amediated by another device (e.g., a gateway) that enables some form of consolidation of the communication. • “Smart metering” is an example of such an application where the devices are smart meters and the communication network can be a mobile network or the public Internet
  • 10. M2M area network • The term “M2M area network” has been introduced by the European Telecommunication Standards Institute (ETSI). • An M2M area network provides – physical and – MAC layer connectivity between different M2M devices connected to the same M2M area network, thus allowing M2M devices to gain access to a public network via a router or a gateway.
  • 11. Characteristic • M2M's unique characteristic is largely due to the key role of the end-device. • Devices are not new in the world of information and communication technologies (ICT), butcommunication technologies (ICT), but with M2M that market is seeing a new family of devices with very specific characteristics. • These characteristics are further discussed below, particularly their impact on the requirements for applications and networks that have not until now been fully taken into account.
  • 12. Characteristic : Multitude • This is the most advocated change brought about by M2M. • It is generally agreed that the number of “devices” connected in M2M relationships will soon largely exceed the sum of all those that directly interact withexceed the sum of all those that directly interact with humans (e.g., mobile phones, PCs, tablets, etc.). • An increased order of magnitude in the number of devices results in significantly more pressure on applications architectures, as well as on network load, creating in particular scalability problems on systems that have been designed to accommodate fewer “actors” and far greater levels and types of traffic.
  • 13. Characteristic : Variety • There are already a particularly large number of documented possible use cases for M2M that apply to a variety of contexts and business domains. • The initial implementations of M2M applications have already led to the emergence of a large variety of devices with extremely diverse requirements in terms of data exchange rate, form factor, computing, or communication capabilities. • One result of the wide variety is heterogeneity, which is in itself a major challenge to interoperability.
  • 14. Characteristic : Invisibility • This is a strong requirement in many M2M applications: the devices have to routinely deliver their service with very little or no human control. • In particular, this is preventing humans from correcting mistakes (and also from creating new ones). • As a result, device management more than ever becomes a key part of service and network management and needs to be integrated seamlessly.
  • 15. Characteristic : Critically • Some devices are life-savers, such as in the field of eHealth (blood captors, fall detectors, etc.). • Some are key elements of life-critical infrastructures, such as voltage or phase detectors, breakers, etc, in the Smart Grid. • Their usage places stringent requirements upon latency or reliability, which may challenge or exceed the capabilities of today's networks
  • 16. Characteristic : Intrusiveness • Many new M2M devices are designed with the explicit intention to “better manage” some of the systems that deal with the end-users' well-being, health, etc. • Examples are the eHealth devices already mentioned, smart meters for measuring and/or controlling electrical consumption in the home, etc. • This in turn leads to issues of privacy.
  • 17. Specificities of M2M devices • In addition to the above-listed characteristics and their impact on the architecture of M2M systems, it is important to consider the other specificities of M2M devices that put additional constraints on the way they communicate through the network, it is important tocommunicate through the network, it is important to consider the other specificities of M2M devices that put additional constraints on the way they communicate through the network. • This may require new ways to group the devices together. • Among other things, devices can be:
  • 18. Limited in functionality • Most M2M devices have computational capabilities several orders of magnitude below what is currently present in a modern portable computer or a smart phone. • In particular, devices may be lack remote software• In particular, devices may be lack remote software update capabilities. • One of the main reasons for this design choice is cost, often because the business model requires very competitively priced devices (e.g., smart meters in many cases).
  • 19. Low-powered • Although many M2M devices are connected to a power network, many of them have to be powered differently (often on batteries) for a variety of reasons. • For instance, a large number of them are, or will be,• For instance, a large number of them are, or will be, located outdoors and cannot be easily connected to a power supply (e.g., industrial process sensors, water meters, roadside captors). • This will reduce the amount of interaction between such devices and the M2M applications (e.g., in the frequency and quantity of information exchanged).
  • 20. Embedded • Many devices are, and will be, deployed in systems with specific (hostile, secure) operating conditions that will make them difficult to change without a significant impact on the system itself. • Examples are systems embedded in buildings or in cars that are hard to replace (e.g., when they are soldered to the car engine, as is the case with some M2M devices).
  • 21. Here to stay • Last but not least, many of the new M2M devices are and will be deployed in non-ICT applications with very different lifetime expectancy. • The rate of equipment change in many potential M2M business domains may be lower than in the ICT industry. • This may be linked to cost issues due to different• This may be linked to cost issues due to different business models (e.g., no subsidization of devices by the operators), to the fact that they are embedded, but also to the complexity of evolution of the industrial process in which the device is operating (e.g., criticality of the service makes changing equipment in a electricity network very difficult, which leads to long life cycle of equipment in the field).
  • 22. M2M World of Connected Services
  • 23. Stages of M2M Industry Maturity
  • 24. Challenges Despite progress in M2M technologies, there remain many challenges, the most pressing ones being:
  • 25. Challenges: Fragmentation 1. Fragmentation of solutions In the vast majority of cases, the solutions developed and implemented to date have been addressingto date have been addressing specific vertical applications requirements in isolation from all others.
  • 26. Challenges: Network Misalignment 2. Network misalignment As already stated, communication networks have been designedhave been designed with many requirements that differ substantially from those of M2M.
  • 27. Challenges: Security 3. Security As already outlined, some of the most promising M2 applications (eHealth, Smart Grids)(eHealth, Smart Grids) are safety-critical and must be made robust against a large variety of security threats.
  • 28. Challenges: Privacy 4. Privacy To develop and resolve the sensitive issue of privacy, both regulationboth regulation (an essential precondition) and standardization are required.
  • 29. Challenges: Service Capabilities 5. Service capabilities In order to deal with the fragmented market, it is necessary to outline capabilities that can be reusedthat can be reused across several applications.
  • 30. Challenges: Testing, certification 6. Testing, certification A large number of M2M solutions will have to be developed outside of the traditional service silos,outside of the traditional service silos, integrated with other M2M or traditional applications.
  • 31. Accelerators Taking into account the above challenges, “Stages of M2M industry maturity” also outlines three major maturity accelerators for M2M, namely: 1. high-level frameworks – This refers to an emerging set of standards- based architectures, platforms, and technologies integrated in a way that allows for the development of “non-silo,” future-proof applications. 2. policy and government incentives – Based on the realization that some M2M challenges may not be addressed by the industry alone, public authorities and governments have started to play an active role both in M2M challenges may not be addressed by the industry alone, public authorities and governments have started to play an active role both in stimulating the investment by setting up ambitious incentive programs and in policy-making. 3. standards – A large number of credible industrial partners, large and small, from various industries (including but not only ICT) have started to work together in order to create the new standards required to address M2M at the global system level.
  • 32. Accelerating M2M Maturity: High-Level M2M Frameworks • The largest part of the challenge facing the M2M actors is to transform vertical silos into a set of easily developable and incrementally deployable applications.deployable applications. • “Stages of M2M Industry Maturity” shows that the transition to the phase two of M2M maturity will be marked by the advent and deployment of horizontal platforms.
  • 33. Accelerating M2M Maturity: High-Level M2M Frameworks • What is meant by “horizontal” is a coherent framework valid across a large variety of business domains, networks, and devices, that is, a set of technologies, architectures, andis, a set of technologies, architectures, and processes that will enable functional separations, in particular application and network layers, as depicted in “An M2M challenge: emergence of the M2M service layer”
  • 34. Inverting The Pipes existing proprietary vertical applications… applications share common infrastructure, environments and network elements
  • 35. An M2M challenge: emergence of the M2M service layer
  • 36. Accelerating M2M Maturity: Policy and Government Incentives • After initial slow progress, public authorities and governments have now realized that they have a key role to play in the take-off of M2M communications, especially because M2M is an integral element in many of the new systems that are deemed to be essential for the future of their countries or regions.the future of their countries or regions. • Several lessons have been learnt and measures applied in the definition of incentives regarding, in particular, the role of standards to allow for infrastructure optimization, or the positive effect of economies of scale and reusability of service capabilities as a major enabler for mainstream deployments.
  • 37. M2M Standards • Unlike in several other ICT segments where it may be possible to deploy operational systems despite a lack of standards, several M2M market segments demand strong standards to ensure long-term investment protection. • For several M2M applications, including smart metering or Smart Grids, there is an expectation that the installedSmart Grids, there is an expectation that the installed equipment will be deployed for more than 20 years. • While such a lifetime may appear unrealistic (or at least unusual) for traditional Telco deployments, the infrastructures deployed by utilities have very long deployment cycles that could dramatically influence their design and henceforth the related standards.
  • 39. ZigBee alliance • A set of specifications of communication protocols (but also data models) using small low-power radio devices based on the IEEE 802.15.4.802.15.4. • Target applications include switches with lamps, electricity meters with in-home displays, consumer electronics equipment, etc.
  • 40. KNX • A purpose-built radio frequency standard developed for home and building control. • It is approved as an International Standard (ISO/IEC 14543-3) as well as a European(ISO/IEC 14543-3) as well as a European Standard (CENELEC EN 50090 and CEN EN 13321-1) and Chinese Standard (GB/Z 20965).
  • 41. Home grid • Based on the ITU-T specification suite known as G.hn that is designed to provide communications within the home environment, making use of existing wiresenvironment, making use of existing wires such as powerline, coax cable or copper pairs.
  • 42. IETF protocol suite • Based on 802.15.4 providing a specification for L1 and L2 WPAN, the IETF has developed a set of protocols aimed at bringing native IP support to constrained devicesupport to constrained device
  • 43. Syllabus Day one : Business and Architectures Introduction to M2M What is M2M? The Business of M2M Accelerating M2M Maturity M2M Standards The Business of M2M The M2M Market The M2M Market Adoption: Drivers and Barriers The M2M Value Chain Market Size Projections Business Models M2M Business Metrics Market Evolution Early M2M Deployments M2M Requirements and High-Level Architectural Principles Use-Case-Driven Approach to M2M Requirements Smart Metering Approach in ETSI M2M eHealth Approach in ETSI M2M High-Level Architecture Principles for M2M Communication ETSI M2M Services Architecture High-Level System Architecture ETSI TC M2M Service Capabilities Framework ETSI TC M2M Release 1 Scenarios ETSI M2M Service Capabilities Introducing REST Architectural Style for M2M ETSI TC M2M Resource-Based M2M Communication and Procedures Muhammad Ary MurtiMuhammad Ary Murti
  • 44. The Business of M2M M2M: Architecture and Applications BTP, Bandung, 6-7 April 2013. Muhammad Ary Murti m_ary_murti@ieee.org
  • 45. The Business of M2M • The M2M Market • Market Size Projections • Market Evolution • The M2M Market Adoption: Drivers and Barriers• The M2M Market Adoption: Drivers and Barriers • The M2M Value Chain • M2M Business Metrics • Business Models • Early M2M Deployments m_ARy_murti@ieee.org, 6-7 April 2013
  • 46. The M2M MarketThe M2M Market m_ARy_murti@ieee.org, 6-7 April 2013
  • 47. ICT arena is changing very quickly • about a decade ago, headlines were dominated by companies like Vodafone, Orange, Telefonica, Nokia, Ericsson, Siemens, etcetc • today, headlines are only dominated by companies like Google, Apple, Facebook • ICT infrastructures and technologies have been sidelined to facilitators/enablers! m_ARy_murti@ieee.org, 6-7 April 2013
  • 48. A few additional observations from these latest trends • whoever provides only hardware & infrastructure is loosing out on the long run being close to the user (or to the problem) is paramount (see Apple’s iPhone) • allowing for true scalability via ability for 3rd parties to capitalize on entire system, i.e. hardware and softwarecapitalize on entire system, i.e. hardware and software and services, is key (see App Store concept which Steve Jobs by the way was against) • having a hand on the data is absolute key (see Google who search, but also IBM who store, Cisco who route, etc) m_ARy_murti@ieee.org, 6-7 April 2013
  • 50. M2M solutions deliver many compelling benefits Measures that drive investments in M2M vary greatly across different industries and applications Source: Harbor Research, Inc., September 2010 m_ARy_murti@ieee.org, 6-7 April 2013
  • 51. Identifying the Potential of the e-Health Vertical User types: –Personal fitness/health –Worried wells –Telemedicine –First responders –Connected medical environments–Connected medical environments –Remote monitoring –Assisted living –Trials These user types are projected to have roughly 774 million connected devices by 2020 Source: Machina Research m_ARy_murti@ieee.org, 6-7 April 2013
  • 52. Growing Cellular M2M Market Predictions on M2M LTE: • minor market until 2014 • 2.5% (1.7M) of total M2M market • LTE module = twice 3G costcost Predictions on Automotive: • primary market on M2M cellular • unique (short-term) market for M2M LTE m_ARy_murti@ieee.org, 6-7 April 2013
  • 53. • The M2M Value Chain • M2M Business Metrics • Business Models• Business Models m_ARy_murti@ieee.org, 6-7 April 2013
  • 54. ETSI: TC M2M Architecture m_ARy_murti@ieee.org, 6-7 April 2013
  • 55. ETSI: TC M2M Architecture m_ARy_murti@ieee.org, 6-7 April 2013
  • 56. M2M Supply Chain • Telecom operator • MNVO (mobile virtual network operator) • MVNE (Mobile Virtual Network Enabler) • Satellite operator • Telecom software vendor / ISV• Telecom software vendor / ISV • Cloud services provider • Telecom equipment vendor • Device. module, chipset maker • Integrator / consultancy m_ARy_murti@ieee.org, 6-7 April 2013
  • 57. Value shift • Today, CSPs are doing what they do easily and very well– selling connectivity. This represents almost 90% of M2M revenue in the current market • Tomorrow, certainly within three years – revenue• Tomorrow, certainly within three years – revenue distribution will make an inexorable shift to what end users want to do with M2M: — Support business decisions with M2M data intelligence. — Secure and manage M2M data. — Identify and create new applications for M2M. m_ARy_murti@ieee.org, 6-7 April 2013
  • 59. Revenue models • “To avoid being a bit pipe, operators must find a way to play a greater role. The only way forward is to develop partnerships with M2M developers based on revenue sharing.” – Operator, Eastern EuropeEurope — Most CSPs function as M2M data wholesalers. — Only one in every 10 CSPs actively runs revenue- sharing models with partners. — Fewer than one in 10 routinely offers service- level or application-based pricing for M2M. m_ARy_murti@ieee.org, 6-7 April 2013
  • 60. Operational focus areas for M2M service providers m_ARy_murti@ieee.org, 6-7 April 2013
  • 61. WAN Dominates the Wireless Connection Space Mobile networks are expected to host roughly 86 million connections • Fixed installations• Fixed installations are usually short range to a home hub • Greater demand for mobility, faster data speeds and remote monitoring Source: Machina Research m_ARy_murti@ieee.org, 6-7 April 2013
  • 62. M2M Module Price Comparison Source: Harbor Research, Inc., September 2010 m_ARy_murti@ieee.org, 6-7 April 2013
  • 63. M2M mobile traffic revenues by service type MNOs to Realize Revenues in the Billions Source: Machina Research m_ARy_murti@ieee.org, 6-7 April 2013
  • 64. M2M mobile traffic revenues by M2M player e-Health is a Good Opportunity for Many Players Source: Machina Research m_ARy_murti@ieee.org, 6-7 April 2013
  • 65. New Dynamics for M2M (1 of 3) m_ARy_murti@ieee.org, 6-7 April 2013
  • 66. New Dynamics for M2M (2 of 3) m_ARy_murti@ieee.org, 6-7 April 2013
  • 67. New Dynamics for M2M (3 of 3) m_ARy_murti@ieee.org, 6-7 April 2013
  • 68. Top 10 things you need to know 1. The total opportunity will be huge 2. Addressing the opportunity requires tailored solutions 3. Impossible for one company to serve all3. Impossible for one company to serve all verticals: partnerships will abound 4. Traffic: M2M (generally) does not need new, high capacity networks 5. QoS guarantees may be pre-requisite for some industrial applications m_ARy_murti@ieee.org, 6-7 April 2013
  • 69. Top 10 things you need to know 6. Energy and e-Health are the targets for investment 7. Distribution channels, billing, brand, etc. are all significant assets for MNOsall significant assets for MNOs 8. MNOs can increase margins with network capabilities 9. Revenues for a wide range of industry players 10. The industry is in a period of disruption m_ARy_murti@ieee.org, 6-7 April 2013
  • 70. Key Question: “How to make money with IoT?” m_ARy_murti@ieee.org, 6-7 April 2013
  • 71. Starting with a Customer Centric View to Develop the Value Proposition m_ARy_murti@ieee.org, 6-7 April 2013
  • 72. What is it others want? - The Value Proposition Needs – How do you get access to the customer? • listen to your customer carefully before and during the design • pick him up and accompany him to Needs growing with him Product - What is „this“ at all? • Physical, tangible Object • Service • Feelings ( Peace of Mind, Safety, Comfort, Belonging ) -> Customer Experience (Customer Journey) The whole is more than the sum of its parts. m_ARy_murti@ieee.org, 6-7 April 2013
  • 73. What the Customers Expect from Us The results of the customer insights (interviews) strongly influence product design (customer experience design) and thus the business model. m_ARy_murti@ieee.org, 6-7 April 2013
  • 74. One technical solution – two very different products Allianz: Crash Recorder versus Help Box The whole is more than the sum of its parts. m_ARy_murti@ieee.org, 6-7 April 2013
  • 75. Fleshing out the Business Model looking at the interactions between the blocks m_ARy_murti@ieee.org, 6-7 April 2013
  • 76. Many individuals need to be reached Many individual needs need to be reached m_ARy_murti@ieee.org, 6-7 April 2013
  • 78. The five critical M2M success factors for CS P success [Source: Analysys Mason, 2012] m_ARy_murti@ieee.org, 6-7 April 2013
  • 79. Recommendations for communication service providers (CSPs) • Combine partnership, resale, and acquisition models to bring M2M solutions to market. The go-to-market approach for each CS P will vary according to specific competencies, but sales of a more end-to-end solution require a fairly strong presence across the supply chain. Partnerships, particularly at the applications layer, will be critical for most CS Ps. • Prioritize M2M solutions based on revenue and profitability metrics. There are more M2M applications in the enterprise and consumer worlds than may be addressed profitably. Pick the top solutions andconsumer worlds than may be addressed profitably. Pick the top solutions and focus your resources. • Dedicate human resources to an M2M business unit Treat M2M like a start-up business unit and dedicate staff and budget to the group. Reconsider the placement of human resources – whether in corporate functions or in the field. Allocate profit and loss responsibility accordingly. • Create an M2M identity based on existing, enterprise perceptions and brand awareness. M2M is a solution in which communications – with growing emphasis on mobility – and IT overlap. It will be important in creating an M2M identity for a CS P to understand the enterprise IT buyer’s impressions of its overall enterprise capabilities. m_ARy_murti@ieee.org, 6-7 April 2013
  • 82. M2M at Sea • Most of the world’s cargo transportation needs are• Most of the world’s cargo transportation needs are served by ocean transport, yet these vast areas have been cut off from communication, as no network has been able to supply connectivity • With Ericsson’s technology, vessel fleets in the middle of the ocean are essentially running their own wireless networks via satellite uplink. m_ARy_murti@ieee.org, 6-7 April 2013
  • 83. M2M at Sea • Achieving Benefits Across the Sea • Making• Making Containers Smart • Creating Industry-Wide Efficiencies m_ARy_murti@ieee.org, 6-7 April 2013
  • 84. M2M at Sea Achieving Benefits Across the Sea •This kind of communication also paves the way for immediate access to remote•This kind of communication also paves the way for immediate access to remote expertise, resulting in extended access to information and, in turn, improved efficiency in vessels’ daily operations. •Shipping companies will have real-time access to information about vessel operation, bunker fuel consumption, and electric conditions. They will also be able to monitor and prevent any difficulties in systems on board before they happen. •One of the primary benefits for shipping companies will come from their ability to proactively manage bunker consumption through real-time data, which will create significant operational savings. m_ARy_murti@ieee.org, 6-7 April 2013
  • 85. M2M at Sea • Making Containers Smart •A full view of every container will be available,•A full view of every container will be available, whether a vessel is in the middle of the ocean or at a dock in a port. •Once docked, the device connectivity of containers will switch to a local operator network so that the tracking can continue when the next leg of trucking transportation begins. m_ARy_murti@ieee.org, 6-7 April 2013
  • 86. M2M at Sea • Creating Industry-Wide Efficiencies • Machine-to-machine (M2M) solutions, such as the one• Machine-to-machine (M2M) solutions, such as the one described here, will help shipping companies employ new and efficient ways of addressing fleet management. • This technology will help manage delivery times, improve interaction with vessels, and increase the efficiency of the global supply chain. Shipping companies will be able to proactively resolve issues, promptly share information with customers, and even improve energy efficiency m_ARy_murti@ieee.org, 6-7 April 2013
  • 87. Speed Up Traffic with M2M Improving logistics in the Port of Hamburg • second largest port in Europe, the size of 7,000 soccer fields and welcomes up to 40,000 trucks a day, each carrying six or twelve containers. • Physical expansion was not an option, since the city of Hamburg surrounds the port.city of Hamburg surrounds the port. • The port’s road infrastructure – over 80 miles (130 kilometers) – is restricted, and offers very limited ability to expand. • What was needed was an efficient traffic management system. m_ARy_murti@ieee.org, 6-7 April 2013
  • 88. • partnered with SAP and Deutsche Telekom in its Smart Port Logistics pilot project. During an initial three- month trial, 30 trucks were fitted with tabletsconnected to the prototype Smart Port Logistics System. • The system receives and integrates three sources of Speed Up Traffic with M2M Improving logistics in the Port of Hamburg • The system receives and integrates three sources of information in real time: 1. traffic information; 2. infrastructure information, including parking and the status of tunnels and moving bridges; 3. location of participating trucks approaching or within the Port of Hamburg. m_ARy_murti@ieee.org, 6-7 April 2013
  • 89. Smart Port Logistics Drivers receive automated, personalized text-based messages with relevant traffic information and details about available parking, allowing them to take optimal routes and avoid long waits. As an added benefit, participating freight forwarding companies are also able to track their transport orders in real time. waiting times for trucks will decrease, and there will be fewer traffic jams within the port area and on the approach roads. m_ARy_murti@ieee.org, 6-7 April 2013
  • 91. Syllabus Day one : Business and Architectures Introduction to M2M What is M2M? The Business of M2M Accelerating M2M Maturity M2M Standards The Business of M2M The M2M Market The M2M Market Adoption: Drivers and Barriers The M2M Value Chain Market Size Projections Business Models M2M Business Metrics Market Evolution Early M2M Deployments M2M Requirements and High-Level Architectural Principles Use-Case-Driven Approach to M2M RequirementsUse-Case-Driven Approach to M2M Requirements Smart Metering Approach in ETSI M2M eHealth Approach in ETSI M2M High-Level Architecture Principles for M2M Communication ETSI M2M Services Architecture High-Level System Architecture ETSI TC M2M Service Capabilities Framework ETSI TC M2M Release 1 Scenarios ETSI M2M Service Capabilities Introducing REST Architectural Style for M2M ETSI TC M2M Resource-Based M2M Communication and Procedures Arief Hamdani GunawanArief Hamdani Gunawan
  • 92. M2M Requirements and High-Level Architectural Principles • Most standards organizations, including 3GPP, 3GPP2, and ETSI, have adopted a use-case-driven approach as a means with which to derive the set of requirements that further define the service architecture. ETSI, however, has adopted a more formal way of describing the use cases. • In addition to the use-case-driven approach, it became very• In addition to the use-case-driven approach, it became very clear that all network optimization matters, both equipment features and the design or operational networks, also have to take into account fundamental characteristics of M2M-generated traffic and growth patterns. • Both issues put forward new and particularly challenging requirements on the access and core network
  • 93. What is a Use Case? • The term use case is very commonly used. However, a commonly agreed definition is more difficult to find. The Object Management Group (OMG) provides an excellent definition and(OMG) provides an excellent definition and approach regarding the description of use cases. • According to the OMG, a use case describes the interactions between one or more actors on the one hand and the system under consideration on the other.
  • 94. ETSI M2M Work on Use Cases • The ETSI Technical Committee (TC) M2M was created in January 2009 and aims to provide an end-to-end view of M2M communication architecture.architecture. • This end-to-end view does not mean that all elements of an M2M system are specified by ETSI TC M2M.
  • 96. Typical deployment scenario of smart metering systems
  • 97. Smart Metering Approach in ETSI M2M • General Use Case Description – A smart metering information system is configured to support the pre- payment functionality as defined by the billing entity. The use case describes occasions where the pre-payment functionality is managed locally on the smart metering information system as well as instances where the management is performed remotely by the billing entity. • Stakeholders• Stakeholders – Billing Entity: Organization responsible for billing the consumer(s). – Consumer: Organization or person consuming the electricity, gas, heat, or water at the premise location. The consumer may also be the organization or person contracted with the billing entity to pay the bill. – Asset Entity: Organization responsible for the installation, configuration, operation, and maintenance of the smart metering information system assets (e.g., meters communication devices, smart metering gateway)
  • 101. eHealth Approach in ETSI M2M: General Use Case Description • In a remote patient monitoring scenario where low voltage body signals need to be acquired for remote health monitoring purposes, the acquisition process could be disturbed by radio transmission activities, such as GSM/GPRS, that can take place on the nearestsuch as GSM/GPRS, that can take place on the nearest co-located radio parts of the same M2M device. • Where the health monitoring process is continuously applied to the patient, for example, discovering arrhythmias, the acquisition activity could be disrupted by typical cellular radio communication activities performed by the M2M device
  • 102. eHealth Approach in ETSI M2M: Stakeholders: Patient • The patient may be any individual or surrogate who could use a remote monitoring device (RMD) to gather measurements, data, or events. • The patient measurements may be taken in various clinical settings, such as a hospital, or non-clinical settings, such as at home, at work, at school, while traveling, or in assisted-living facilities.
  • 103. eHealth Approach in ETSI M2M: Stakeholders: Remote Monitoring Device (RMD) • An electronic M2M device with a sensor, user interface and/or actuator, and an interface into the M2M network. • The device collects patient information and• The device collects patient information and communicates to the appropriate M2M service-capability provider and/or M2M application via the M2M network. • An RMD may also communicate with these entities via an M2M gateway.
  • 104. eHealth Approach in ETSI M2M: Stakeholders: M2M service capability provider • A network entity that provides M2M communication services to the M2M application entities. • These applications may support specific• These applications may support specific functional capabilities that assist in facilitating health information-exchange activities. • Additionally, the M2M service-capability provider communicates with the RMD to collect data or send commands.
  • 105. eHealth Approach in ETSI M2M: Stakeholders: M2M application entity • A term created to bundle together, and treat as a single system element, stakeholders above the M2M scope. • High-level applications such as free-standing or geographic health information exchanges, data analysis centers, integrated care-delivery networks, providercenters, integrated care-delivery networks, provider organizations, health record banks, or public health networks, and/or specialty networks are all examples of M2M application entities. • The term M2M application entity also includes the following typical RPM stakeholders.
  • 106. High-Level Architecture Principles for M2M Communications • Lessons have been learned from early M2M deployments. • First, vertically integrated applications are hard to develop, deploy and test. Not only do these need to deal with the application– Not only do these need to deal with the application business logic, but they must also include a large number of network-aware functionalities. – Looking at the M2M applications requirements, it is clear that they all rely on a set of similar building blocks, particularly when it comes to all aspects related to communications and underlying networks
  • 107. High-Level Architecture Principles for M2M Communications • Second, M2M is all about cost-effectiveness. M2M is known to generate a fraction of the ARPU (average revenue per user) of other consumer handsets such as smart phones. – However, all analysts agree that the number of– However, all analysts agree that the number of deployed M2M devices will be an order of magnitude higher than personal communication devices. – As a result, the network has to become M2M-aware and take advantage of all traffic characteristics of M2M in order to provide the level of scaling and cost that matches projected M2M devices and ARPU structure.
  • 108. M2M from initial to mainstream deployments
  • 110. …based on Existing Technologies
  • 111. Closing • It clearly shows that M2M imposes very specific requirements on the network in order to achieve lower investment and operational costs that match ARPU constraints imposed by M2M communications.communications. • Such a horizontal platform also provides easier access to network enablers, such as location, QoS, and addressing, which would otherwise be difficult to access because of the multiplicity of interfaces and the complexity involved in building business relationships with multiple operators.
  • 112. Syllabus Day one : Business and Architectures Introduction to M2M What is M2M? The Business of M2M Accelerating M2M Maturity M2M Standards The Business of M2M The M2M Market The M2M Market Adoption: Drivers and Barriers The M2M Value Chain Market Size Projections Business Models M2M Business Metrics Market Evolution Early M2M Deployments M2M Requirements and High-Level Architectural Principles Use-Case-Driven Approach to M2M Requirements Smart Metering Approach in ETSI M2MSmart Metering Approach in ETSI M2M eHealth Approach in ETSI M2M High-Level Architecture Principles for M2M Communication ETSI M2M Services Architecture High-Level System Architecture ETSI TC M2M Service Capabilities Framework ETSI TC M2M Release 1 Scenarios ETSI M2M Service Capabilities Introducing REST Architectural Style for M2M ETSI TC M2M Resource-Based M2M Communication and Procedures Arief Hamdani GunawanArief Hamdani Gunawan
  • 113. Typical components of a horizontal M2M service platform
  • 115. ETSI M2M Network Architecture
  • 117. M2M High Level System Overview
  • 118. M2M High Level System
  • 120. M2M service capabilities functional architecture framework
  • 121. Glossary of M2M Capabilities • Application Enablement (xAE), • Generic Communication (xGC), • Reachability, Addressing and Repository (xRAR), • Communication Selection (xCS), • Remote Entity Management (xREM), • SECurity (xSEC), History and Data Retention (xHDR),• History and Data Retention (xHDR), • Transaction Management (xTM), • Compensation Broker (xCB), • Telco Operator Exposure (xTOE), • Interworking Proxy (xIP) • Service Capability Layer (xSCL) where x is: • N for Network, • G for Gateway. • D for Device
  • 122. Service capabilities functional architecture framework
  • 123. Device Types (1/2) The following device types • Gateway (G) is an ETSI M2M device specialized to directly manage M2M area networks of ETSI M2M devices; the gateway directly communicates with an ETSI M2M core network via the mId reference point. • Device (D) is an ETSI M2M device that can directly• Device (D) is an ETSI M2M device that can directly communicate with an ETSI M2M core network or with an ETSI M2M gateway. • Device' (D') is an ETSI M2M device that does not implement ETSI M2M SCs. It interacts indirectly with the M2M core via the use of SCs in the M2M gateway (G).
  • 124. Device Types (2/2) • Gateway' (G') is an ETSI M2M gateway that provides connectivity to both D and D' devices. Note that G' is not handled within the ETSI TC M2M Release 1 specification. • Additionally, there is a non-ETSI M2M-compliant device (d) belonging to an M2M area network managed by an ETSI M2M compliant device or gateway entities. The (d) type devices cannot access M2M SCs directly. However, interworking with ETSI-compliant entities is possible via the xIP (interworking proxy)
  • 125. Scenarios (1/2) • Legacy cases (legacy case 1, 2, 3, and 2+) relate to legacy devices, referred to as “d” device (lower case d), that are not ETSI TC M2M-compliant. These devices can be integrated within the ETSI TC M2M architecture via an xIP service capability where x could be N for network, G for gateway, or D for device. xIP (NIP, GIP, DIP) is a specific capability that makes a non-compliant device looks like an gateway, or D for device. xIP (NIP, GIP, DIP) is a specific capability that makes a non-compliant device looks like an ETSI-compliant M2M device through the implementation of the mId reference point. Note, however, that the ETSI TC M2M specification does not say how the interworking is done. The details of such interworking are not standardized and are left for individual implementations.
  • 126. Scenarios (2/2) • Case 1 shows a D device which is defined as a device that implements M2M SCs and runs DAs. The D device interfaces with the M2M SCs in the network and applications domain, making use of the mId reference point • Case 2 shows a D' device which is an ETSI TC M2M- compliant device but that does not implement M2M SCs.compliant device but that does not implement M2M SCs. Instead, it relies on SCs in an M2M gateway, referred to as “G”, via the dIa external (in this case) reference point. • Case 2+ relates to D devices connecting to the M2M SCs in the network and applications domain via an M2M gateway, G. The motivation for such a case is to allow a D device to make use of WAN connectivity but also when needed— for example, in the case of mobile devices—reuse existing WAN connectivity provided by a gateway.
  • 127. ETSI M2M Service Capabilities • Reachability, Addressing, and Repository Capability (xRAR) is the cornerstone of the ETSI TC M2M SC work. It has resulted from the merger of two other capabilities introduced in the early stages of the ETSI TC M2M work: – Device application repository: originally introduced to maintain a record of registered DAs.a record of registered DAs. – Naming addressing and reachability: originally introduced to provide address translation functions and to keep track of reachability status of devices or applications running on those devices. • The merging of these two capabilities, resulting in xRAR, simplifies the structure and avoids the need for unnecessary frequent exchanges of messages between the two capabilities.
  • 128. REST Architectural Style for M2M • REST (representational state transfer) is an architectural style defined by Roy T. Fielding in 2000. • It is a set of principles that enables distributed• It is a set of principles that enables distributed systems to achieve greater scalability and allow distributed applications to grow and change over time, thanks to the loose coupling of components and stateless interactions.
  • 129. Main Concept of REST • The main concept of REST is that a distributed application is composed of resources, which are stateful pieces of information residing on one or more servers. • Regardless of their content, in REST it is possible to manipulate resources through a uniform interface that is composed of four basic interactions: CREATE, UPDATE, DELETE, and READ. • Each of these operations is composed of request and response• Each of these operations is composed of request and response messages, and, with the exception of CREATE, they are idempotent, meaning that the end result of each operation is unchanged regardless of how many times the operation itself is repeated. • In other words, these operations do not have side effects, meaning that it is possible to distribute resources and to use proxy functions. The lack of side effects allows more efficient use of caching and greater scalability.
  • 130. REST Basics • REST is an architectural style that relies heavily on HTTP, and conceptualizes the idea of web- accessible resources. • A resource, in REST terms, could be any entity• A resource, in REST terms, could be any entity that can be addressed using a HTTP URI
  • 131. Addressing a REST resource
  • 132. Proxy caching the temperature value
  • 133. Sensor updating its samples using HTTP PUT
  • 134. ETSI TC M2M Resource-Based M2M Communication and Procedures • In ETSI TC M2M, it is assumed that all three normative reference points defined in the M2M architecture, namely mIa, mId, and dIa, will use REST, although there may be some exceptions.exceptions. • For instance, on the mId reference point, device management is performed using existing protocols such as BBF TR069 and OMA DM that are RPC-based.
  • 135. Primitives • ETSI TC M2M did not assume that the HTTP protocol would be the protocol to be used for implementation, although HTTP is the natural choice until CoAP (more adapted for constrained devices) becomes widely deployed.devices) becomes widely deployed. • To avoid the use of specific HTTP primitives, this section will mostly use the four primitives: – Create: create a resource. – Retrieve: read the content of the resource. – Update: write the content of the resource. – Delete: delete the resource.
  • 136. CRUD Methods • Those methods are referred to as the CRUD methods below. • In addition to these basic methods, it is often also useful to define methods for subscribing to a change of a resource (S) and a notification aboutchange of a resource (S) and a notification about a change of a resource (N) included in a more general RESTful architecture. • It is assumed in what follows that CRUD and SN are applicable to the resources used in the SCL (service capability layer).
  • 137. Use of SCL and REST architectural style for data exchange. Source: ETSI TS 102 690
  • 138. Use of SCL and REST architectural style for data exchange. Source: ETSI TS 102 690 • Step 1 shows how a DA can request that the particular data be stored under the NSCL (network service capability layer). Since the DA does not speak directly with the NSCL, storing this data under the NSCL is facilitated by the local SCL—the DSCL in this case. The DA can either use an update or a create primitive toDA can either use an update or a create primitive to this end. • In Step 2, which is optional, the NSCL notifies the NA that some data is available. This step assumes that the NA has already subscribed to be notified when data matching a certain criterion becomes available. • Step 3 consists of reading the data received by the NA.
  • 139. Closing • A description of the capabilities for the ETSI TC M2M Release 1 was provided along with the resource structure and an overview of the most important procedures through an example. • ETSI TC M2M specifications represent an important step forward for providing the foundation standards for aforward for providing the foundation standards for a horizontal M2M service platform. While the initial release mostly tackled data mediation, security, and device management, it is expected that future releases will go the extra mile in standardizing the other service capabilities. • At the time of writing, ETSI M2M specifications are still evolving, so some details may have slightly changed.
  • 140. End of Day OneEnd of Day One NextNext Day Two: DeploymentDay Two: Deployment