Machine-to-Machine
What is Machine-to-Machine?
Machine-to-Machine is a network setup that enables devices to communicate freely with each other. This type of communication system is actively used in a variety of industries and has seen some major advancements in the last few decades, partially due to IP network systems facilitating communication between large numbers of devices over long distances.
Machine-to-Machine
Machine-to-machine (M2M) is a rather broad term, describing technology that enables devices on a network (typically cellular or wired network) to interact and exchange information. The system does not necessarily rely on human intervention during the communication process.
Utilising M2M offers some distinctive benefits over other communication models:
- It is relatively easy to roll out and low maintenance.
- Can utilise both mobile and wired networks, indoors and outdoors.
- Provides high range
- Relatively low latency
- Energy and cost-efficient
- Large collection and processing of data is made possible
- Reducing human interference decreases the risk of human error
M2M vs IoT
The terms M2M and IoT are frequently used interchangeably. While they are closely related, there are distinct differences between the two. IoT relies on M2M, while M2M systems don’t need IoT to work.
M2M systems generally incorporate direct communication between isolated, stand-alone equipment (e.g. machines, sensors, or any or any type of hardware) over wired or cellular networks.
IoT can be best described as taking M2M to the next level. IoT systems move these isolated systems into one large, interconnected ecosystem using IP-based networks to send data collected from devices to gateways or clouds. Instead of devices communicating directly with one another, IoT supports cloud communication. The cloud acts as a middleman, to/from which all data is sent/received.
M2M’s reliance on wired or cellular networks becomes quite restraining at a certain scale. Meanwhile, IoT inherently offers scalability by utilising IP-based, open-ended networks, that transfer data to cloud-based ecosystems.
Who benefits from M2M?
From vending machines informing their distributors, when a specific soft drink is running low, to utility companies billing their customers automatically. The use-cases for M2M are seemingly endless. Virtually any company that relies on device communication may find use in incorporating M2M. Some of the more established areas of application for M2M includes:
1. Facility Management: Home building automation
2. Logistics: Tracking ; tracing, fleet management, order management, asset tracking, traffic information, navigation, traffic optimisation
3. Security Systems: Surveillance, access control, alarm systems, car security, home security
4. Payment processes: PoS, gaming machines, vending machines, ATMs
5. Health care: Monitoring vital sign, remote diagnostics, surgery robots, diabetes management devices.
6. Metering: Gas, heating, water, power, grid control, industrial metering
7. Remote Control: Pumps, valves, elevators, sensors, lighting, vehicle diagnostics, vending machine control,
8. Manufacturing: Automation and monitoring of production chain
Some of the most common key attributes of M2M communication systems are:
1. Time Restrictions: Sending or receiving data only at specific periods.
2. Time Tolerance: Data transfer may be delayed.
3. Monitoring: Intended to provide the functionality of detecting events.
4. Location Specific Triggering: Triggering an M2M device within a predefined area.
5. Low Power Consumption: The system efficiently services M2M applications.
Six Pillars of M2M
M2M magazine defined six pillars, which play an integral part, not just in Machine to Machine communication, but also in the broader scope of IoT. Understanding the critical roles of these pillars is key to understanding the more general concept and use-potential of M2M. These six pillars are:
1. RFID
Radio Frequency Identification enables us to identify and track objects using electromagnetic fields. While RFID technology is typically more expensive than barcodes, the benefits tend to outweigh its costs: It does not require a line of sight, it has a read range of up to 50 feet compared to several inches, is durable, and can read many signals at once. RFID uses radio waves to gather data and enter said data directly into a database. RFID tags consist of protective material to prevent external damage to the circuit.
2. Sensor Networks
A sensor network requires a wireless connection to some connected devices. The connection is used to monitor the readings of the sensors connected. Generally, the sensors are spread out over a vast area and may report parameters, such as humidity, temperature, soil ph etc. back to to the sensor network. A sensor network typically consists of a base computer, nodes, sensors, internet and mobile devices. All of which are connected to one another.
3. Telemetry
Telemetry is the automated recording and transfer of data from remote sources to a network in a different location. Telemetry data can be relayed using GSM, radio, infrared, ultrasonic, cable or satellite, depending on its desired type of application. Telemetry is predominantly utilised in the manufacturing industry and the medical field. The primary benefit is the end user’s ability to monitor the state of an object while being far away from it. It enables the remote handling of an industrial system. A wireless technology that is used to transfer data gathered by connected devices to a remote system. Telemetry has been thoroughly researched and is mostly used when data needs to be recorded continuously over an extended period.
4. Smart Devices
A smart device reduces human interference by making logical, rational decisions, that are comparable to cognitive human thinking to complete a specific task. Smart devices use a computer network to obtain data from any type of sensor. They enable their users to connect, share and interact with the collected data.
5. Telematics
Telematics is a very interdisciplinary term. It is generally used, when information needs to be transmitted over long distances and enables us to send, store and receive data to control distant objections. It is mainly utilised by electrical engineers, telecommunication providers, road safety operators and the automotive industry.
6. Remote Monitoring
Remote monitoring is a crucial part of any Machine to Machine communication system. It enables the end-user to access different devices connected to a network from remote locations. Remote monitoring encompasses the use of devices, servers and management software to create a system enabling large scale automation. Typically, monitoring systems also feature debugging and diagnostic functionalities, so potential issues can be resolved efficiently.
The drawbacks of M2M communication:
- Security and large-scale data collection is a significant concern
- It was designed and optimised to be used for only a small number of connected devices.
- Interoperability between cloud and IoT devices in such networks is often limited.
- Utilising cloud computing in M2M creates dependence on others, which may limit
innovation and agility. - M2M communication requires constant network connection with reasonable speed to
function.
Security concerns of M2M:
Like any other communication system, M2M systems face a variety of security issues ranging from network intrusion to physical device hacking. Risk factors, such as privacy, fraud, exposure of vital applications, as well as physical device security must all be considered, before conceiving an M2M communication system.
Some typical, preventative security measures for M2M systems include:
- Ensuring machines and devices are tamper-resistant
- Embedding security features into all connected machines
- Encrypting communication between all devices and securing back-end services.
- Segmenting M2M devices onto individual networks and managing, device identity and
device availability.
Machine-to-Machine
Machine-to-machine (M2M) is a rather broad term, describing technology that enables devices on a network (typically cellular or wired network) to interact and exchange information. The system does not necessarily rely on human intervention during the communication process.
Utilising M2M offers some distinctive benefits over other communication models:
- It is relatively easy to roll out and low maintenance.
- Can utilise both mobile and wired networks, indoors and outdoors.
- Provides high range
- Relatively low latency
- Energy and cost-efficient
- Large collection and processing of data is made possible
- Reducing human interference decreases the risk of human error
References
https://smart-it.io/machine-to-machine-m2m-how-does-it-work/
https://www.sciencedirect.com/science/article/abs/pii/S138912861830851X
https://data-flair.training/blogs/iot-m2m/
https://computer.howstuffworks.com/m2m-communication3.htm
https://smart-it.io/machine-to-machine-m2m-how-does-it-work/
https://www.ibm.com/blogs/internet-of-things/what-is-m2m-technology/
http://www.sk-el.co.jp/sales/rfid/en/glossary/b02.html
https://www.itpro.co.uk/strategy/29588/what-is-a-sensor-network
https://www.sumologic.com/insight/what-is-telemetry/
https://smart-it.io/machine-to-machine-m2m-how-does-it-work/
https://www.fleeteurope.com/en/fleet-services/united-kingdom/features/who-uses-telematics-and-why
https://www.peerbits.com/blog/difference-between-m2m-and-iot.html
https://www.avsystem.com/blog/iot-and-m2m-what-is-the-difference/