M2M Communications -  - E-Book

M2M Communications E-Book

4,4
80,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation

Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic.  It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization.

The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies.   It also considers dominant M2M application domains such as Smart Metering, Smart Grid, and eHealth. Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students.

Key features:

  • First technical book emerging from a standards perspective to respond to this highly specific       technology/business segment
  • Covers the main challenges facing the M2M industry today, and proposes early roll-out scenarios and potential optimization solutions
  • Examines the system level architecture and clearly defines the methodology and interfaces to be considered
  • Includes important information presented in a logical manner essential for any engineer or business manager involved in the field of M2M and Internet of Things
  • Provides a cross-over between vertical and horizontal M2M concepts and a possible evolution path between the two
  • Written by experts involved at the cutting edge of M2M developments

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 556

Veröffentlichungsjahr: 2012

Bewertungen
4,4 (16 Bewertungen)
9
4
3
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Title Page

Copyright

Foreword

List of Contributors

List of Acronyms

Chapter 1: Introduction to M2M

1.1 What is M2M?

1.2 The Business of M2M

1.3 Accelerating M2M Maturity

1.4 M2M Standards

1.5 Roadmap of the Book

References

Part One: M2M Current Landscape

Chapter 2: The Business of M2M

2.1 The M2M Market

2.2 The M2M Market Adoption: Drivers and Barriers

2.3 The M2M Value Chain

2.4 Market Size Projections

2.5 Business Models

2.6 M2M Business Metrics

2.7 Market Evolution

References

Chapter 3: Lessons Learned from Early M2M Deployments

3.1 Introduction

3.2 Early M2M Operational Deployments

3.3 Chapter Conclusion

Reference

Part Two: M2M Architecture and Protocols

Chapter 4: M2M Requirements and High-Level Architectural Principles

4.1 Introduction

4.2 Use-Case-Driven Approach to M2M Requirements

4.3 Smart Metering Approach in ETSI M2M

4.4 eHealth Approach in ETSI M2M

4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments

4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design

4.7 Description of M2M Market Segments/Applications

4.8 M2M Traffic Characterization

4.9 High-Level Architecture Principles for M2M Communications

4.10 Chapter Conclusions

References

Chapter 5: ETSI M2M Services Architecture

5.1 Introduction

5.2 High-Level System Architecture

5.3 ETSI TC M2M Service Capabilities Framework

5.4 ETSI TC M2M Release 1 Scenarios

5.5 ETSI M2M Service Capabilities

5.6 Introducing REST Architectural Style for M2M

5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures

5.8 Chapter Conclusion

References

Chapter 6: M2M Optimizations in Public Mobile Networks

6.1 Chapter Overview

6.2 M2M Over a Telecommunications Network

6.3 Network Optimizations for M2M

References

Chapter 7: The Role of IP in M2M*

7.1 Introduction

7.2 IPv6 for M2M

7.3 6LoWPAN

7.4 Routing Protocol for Low-Power and Lossy Networks (RPL)

7.5 CoRE

References

Chapter 8: M2M Security

8.1 Introduction

8.2 Trust Relationships in the M2M Ecosystem

8.3 Security Requirements

8.4 Which Types of Solutions are Suitable?

8.5 Standardization Efforts on Securing M2M and MTC Communications

References

Chapter 9: M2M Terminals and Modules

9.1 M2M Module Categorization

9.2 Hardware Interfaces

9.3 Temperature and Durability

9.4 Services

9.5 Software Interface

9.6 Cellular Certification

Chapter 10: Smart Cards in M2M Communication

10.1 Introduction

10.2 Security and Privacy Issues in M2M Communication

10.3 The Grounds for Hardware-Based Security Solutions

10.4 Independent Secure Elements and Trusted Environments

10.5 Specific Smart Card Properties for M2M Environments

10.6 Smart Card Future Evolutions in M2M Environments

10.7 Remote Administration of M2M Secure Elements

References

Part Three: Book Conclusions and Future Vision

Chapter 11: Conclusions

Index

This edition first published 2012

© 2012 John Wiley & Sons Ltd

Registered office

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom

For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.

The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

ETSI logo reproduced by kind permission of © ETSI, All Rights Reserved.

© European Telecommunications Standards Institute. Further use, modification, copy and/or distribution are strictly prohibited. ETSI standards are available from http://pda.etsi.org/pda/

© 3GPP TSs and TRs are the property of ARIB, ATIS, CCSA, ETSI, TTA and TTC who jointly own the copyright in them. They are subject to further modifications and are therefore provided to you “as is” for information purposes only. Further use is strictly prohibited.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.

Library of Congress Cataloging-in-Publication Data

M2M communications : a systems approach / edited by David

Boswarthick, Omar Elloumi, Olivier Hersent.

p. cm.

Includes bibliographical references and index.

ISBN 978-1-119-99475-6 (cloth)

1. Machine-to-machine communications. I. Boswarthick, David.

II. Elloumi, Omar. III. Title: Machine-to-machine communications.

TK5105.67.M32 2012

621.39′8–dc23

2011044199

A catalogue record for this book is available from the British Library.

Print ISBN: 9781119994756

Foreword

It was with great pleasure that I accepted the invitation to write the foreword for this first of two books on M2M and Internet of Things, M2M Communications: A Systems Approach.

Although the market for Machine to Machine (M2M) devices and applications is still developing, we can already foresee that this technology will have a profound impact on our lives, as new application fields are explored. Numerous projections have been made for the growth of M2M: for example estimates include an increase from the current 6 billion cellular devices to eventually over 50 billion cellular-connected machines. Other estimates indicate the total market volume from M2M and Internet of Things reaching $11.5bn by 2012. Indeed the M2M market can already be segmented in numerous ways: distinguishing between hardware devices and software, between connection technologies, or according to specific industrial application segment.

Why are M2M markets taking off now, since many of the technologies used have existed for a number of years? A key factor in the growth of M2M today is the widespread availability of ubiquitous, low-cost connectivity. We have become used to cheap, high-speed home and business internet access. Now in many regions 3G and future LTE mobile networks offer similar access speeds at highly competitive prices. Suddenly a host of applications we have dreamt about and which require internet connectivity have become economically viable.

The large-scale deployment of IP-connected sensors, monitors and actuators, in the home and in industry, enables the development of new interconnected, interoperable services which hold the potential to transform our daily lives. M2M technologies offer a vision of mash-up applications founded in reality, utilising multiple new sources of information, in contrast to the virtual world of mash-up web services. This vision is sometimes referred to as ‘The Internet of Things’, but it's not the connected things which are important. Instead, what is important is the information which they provide us, and how we combine and present and use this information, and how we make decisions based upon it. The Internet of Things offers a technical viewpoint. We must look beyond that to see the societal impact, to understand how we will make use of this technology to change our lives for the better.

A key feature of this vision of the future is the variety and range of technologies, functionalities and requirements which we need to take into account. How can we develop a flexible architecture into which we can place today's and tomorrow's technologies? How can we enable interoperability? How can we preserve confidentiality and privacy of information while not restricting potentially beneficial new applications? How can we ensure the reliability of these systems we will build, as we grow increasingly dependent on them? The solutions to these challenges lie not with any one organization or individual. This requires cross-industry thinking, it requires collaboration between the different actors concerned and it requires co-ordination at an international level. Consensus-based international standards are essential to ensure the development of M2M technologies and markets, providing solutions to many of these challenges. ETSI's M2M Technical Committee is currently playing a leading role in driving international standards work in this domain.

Beyond the wider societal challenges, we also face many detailed technical issues. A rapid deployment and adoption of M2M technology will result in new demands being placed on our networks. M2M services often require high efficiency, low overhead, low power consumption and greater flexibility in networks. These requirements will compete with the demand for high speed, low latency and large capacity, which our networks are currently equipped to handle. We may need to re-think how we design and how we manage our networks, if M2M services become as widespread as forecast. We will need to consider new access technologies in order to enable new applications which are not well served by the current radio technologies on the market.

The growth of M2M applications will have a profound impact on the standards which define our telecoms and data networks. ETSI has many years of work ahead of it to develop the specifications and standards which will be needed. I am certain that this book and its accompanying volume will provide us with useful guidance in this task, helping us to better understand the issues we need to tackle in order to create an M2M-enabled world.

Luis Jorge Romero

ETSI Director General

List of Contributors

Samia Benrachi-Maassam
Network & Services Architect
Bouygues Telecom
299 Ter Avenue Division Leclerc
92290 Chatenay-Malabry, France
David Boswarthick
Technical Officer, TC M2M
ETSI
650, Route des Lucioles
06921 Sophia Antipolis, France
Ioannis Broustis
Member of Technical Staff
Alcatel-Lucent
600 Mountain Avenue
Murray Hill, NJ 07974, USA
Emmanuel Darmois
Vice President, Standards
Alcatel-Lucent
7–9 Avenue Morane Sauliner, BP 57
78141 Velizy, France
Omar Elloumi
Director Standardisation, M2M and Smart Technologies
Alcatel-Lucent
7–9 Avenue Morane Sauliner, BP 57
78141 Velizy, France
François Ennesser
Technical Marketing—Standardization & Technology
Gemalto S.A.
6 rue de Verrerie
92190 Meudon, France
Claudio Forlivesi
Research Engineer
Alcatel-Lucent
Copernicuslaan 50
2018 Antwerp, Belgium
Bruno Landais
Network Architect
Alcatel-Lucent
4 rue L. de Broglie, BP 50444
22304 Lannion, France
Ana Minaburo
Independant Consultant
Cesson Sevigne Cedex, France
Simon Mizikovsky
Technical Manager
Alcatel-Lucent
600 Mountain Ave.
Murray Hill, NJ 07974, USA
Toon Norp
Senior Business Consultant
TNO
Brassersplein 2,
NL-2612 Delft, Netherlands
Franck Scholler
E2E Network Solution Architect Manager
Alcatel-Lucent
7–9 Avenue Morane Sauliner, BP 57
78141 Velizy, France
Ganesh Sundaram
Distinguished Member of Technical Staff
Alcatel-Lucent
600 Mountain Ave.
Murray Hill, NJ 07974, USA
Laurent Toutain
Associate Professor
Telecom Bretagne
2 rue de la Chataigneraie, CS 17607
35576 Cesson Sevigne Cedex, France
Harish Viswanathan
CTO Advisor
Alcatel-Lucent
600 Mountain Ave.
Murray Hill, NJ 07974, USA
Gustav Vos

List of Acronyms

3GPP

Third-Generation Partnership Project

6LoWPAN

IPv6 Over Low Power and Lossy Networks

AAA

Authentication, Authorization and Accounting

ABRO

Authoritative Border Router Option

ADC

Analog-to-Digital Converter

AKA

Authentication and Key Agreement

ALG

Application Level Gateway

AMPS

American Mobile Phone Service

AODV

Ad hoc On-Demand Distance Vector

API

Application Programming Interface

APN

Access Point Name

ARO

Address Registration Option

ARP

Allocation and Retention Priority

ARPU

Average Revenue Per User

ARRA

American Recovery and Reinvestment Act

ATM

Automated Teller Machine

B2B

Business-to-Business

B2C

Business-to-Consumer

BGA

Ball Grid Array

BOM

Bill of Materials

CA

Certificate Authority

CAPEX

CAPital EXpenditure

CAT

Card Application Toolkit

CBC

Cell Broadcast Center

CCF

CDMA Certification Forum

CDMA

Code Division Multiple Access

CDR

Charging Data Record

CEN

Comité Européen de Normalisation

CENELEC

Comité Européen de Normalisation Électrotechnique

CHAP

CHallenge Authentication Protocol

CID

Connection IDentifier

CIDR

Classless Interdomain Routing

CM

Configuration Management

CoAP

Constrained Application Protocol

CRL

Certificate Revocation List

CSD

Circuit-Switched Data

CSP

Communications Service Provider

DA

Device Application

DAD

Duplicate Address Detection

DAO

DODAG Advertisement Object

DAR

Discovery Address Request

DHCP

Dynamic Host Configuration Protocol

DIO

DODAG Information Object

DIS

DODAG Information Solicitation

DLMS

Device Language Message Specification

DM

Device Management

DNS

Domain Name Server

DODAG

Direction Oriented Directed Acyclic Graph

DoE

Department of Energy

DPWS

Devices Profile for Web Services

DSCL

Device Service Capabilities Layer

DSCP

Differentiated Services Control Point

DTLS

Datagram Transport Layer Security

DTMF

Dual Tone Multi-Frequency

EAB

Extended Access Barring

EAL

Evaluation Assurance Level

EAP

Extensible Authentication Protocol

ECC

Elliptic Curve Cryptography

EEPROM

Electrically Erasable Programmable Read-Only Memory

ESO

European Standard Organisation

ETSI

European Telecommunications Standards Institute

EUSD

European Universal Service Directive

EV

Electric Vehicle

EVDO

Evolution-Data Optimized

FCC

Federal Communication Commission

FDMA

Frequency Division Multiple Access

FOTA

Firmware-Over-The-Air

FP8

8th Framework Program

FQDN

Fully Qualified Domain Name

FTP

File Transfer Protocol

FTTH

Fibre To The Home

GBA

Generic Bootstrapping Architecture

GCF

Global Certification Forum

GGSN

Gateway GPRS Support Node

GMSC

GSM Mobile Services Switching Center

GP

Global Prefix

GPIO

General Purpose Input Output

GPRS

General Packet Radio Service

GPS

Global Positioning System

GPSK

Generalized Pre-Shared Key

GRE

Generic Routing Encapsulation

GSCL

Gateway Service Capabilities Layer

GSM

Global Systems

for

Mobile

Communications

GSMA

GSM Association

GW

GateWay

H2H

Human-to-Human

HCI

Host Controller Interface

HLIM

Hop Limit

HLR

Home Location Register

HSPA

High Speed Packet Access

HSS

Home Subscriber Service

HTTP

HyperText Transfer Protocol

IBAKE

Identity-Based Authenticated Key Exchange

IBE

Identity Based Encryption

IC

Integrated Circuit

ICCID

Integrated Circuit Card Identifier

ICMP

Internet Control Message Protocol

ICS

In-Vehicle System

ICT

Information and Communication Technologies

IDE

Integrated Development Environment

IETF

Internet Engineering Task Force

IID

Interface IDentification

IKE

Internet Key Exchange

IMEI

International Mobile Equipment Identifier

IMEISV

IMEI Software Version

IMS

IP Multimedia Subsystem

IMSI

International Mobile Subscriber Identity

IoT

Internet of Things

IOT

Interoperability Testing

IP

Internet Protocol

IPHC

IP Header Compression

IPSEC

Internet Protocol Security

ISC

IMS Service Control

IS-IS

Intermediate System to Intermediate System

ITU

International Telecommunication Union

J2EE

Java 2 Enterprise Edition

KGF

Key Generation Function

LAN

Local Area Network

LBR

LoWPAN Border Router

LDAP

Lightweight Directory Access Protocol

LGA

Line Grid Array

LLN

Low Power and Lossy Network

LTE

Long Term Evolution

M2M

Machine-to-Machine

M2ME

M2M Equipment

MAC

Medium Access Control

MAS

M2M Authentication Server

M-BUS

Meter BUS

MCM

Multichip Module

MEID

Mobile Equipment Identifier

MIMO

Multiple-Input, Multiple-Output

MME

Mobility Management Entity

MMI

Man-Machine Interface

MNC

Mobile Network Code

MNO

Mobile Network Operator

MO

Management Object

MP2P

Multi-Point To Point

MPLS

Multiprotocol Label Switching

MRHOF

Minimum Rank with Hysteresis Objective Function

MSC

Mobile Switching Center

MSF

M2M Service Bootstrap Function

MSIM

M2M Service Identity Module

MSIN

Mobile Subscriber Identification Number

MSISDN

Mobile Station Integrated Services Digital Network

MTC

Machine Type Communications

MTC-GW

Machine Type Communication Gateway

MTU

Maximum Transfer Unit

MVNO

Mobile Virtual Network Operator

NA

Network Application

NAPT

Network Address and Port Translation

NAS

Non Access Stratum

NAT

Network Address Translator

NBMA

Non-Broadcast Multiple-Access

NC

Node Confirmation

NDIS

Network Driver Interface Specification

NDP

Neighbor Discovery Protocol

NFC

Near Field Communications

NGC

Network Generic Communication

NGN

Next Generation Networks

NIST

National Institute of Standards and Technology

NR

Node Registration

NRPCA

Network-Requested PDP Context Activation

NS

Neigbour Solicitation

NSCL

Network Service Capabilities Layer

NSEC

Network Security Capability

NTACS

Narrowband Total Access Communication System

NUD

Neighbor Unreachability Detection

OC

Option Count

OCS

Online Charging Services

OCSP

Online Certificate Status Protocol

OFDMA

Orthogonal Frequency Division Multiple Access

OLSR

Optimized Link State Routing

OMA

Open Mobile Alliance

OPEX

OPerational EXpenditure

OS

Operating System

OSPF

Open Shortest Path First

OTA

Over-The-Air

OTASP

Over-The-Air Service Provisioning

P2MP

Point to Multi-Point

PAK

Password-Authenticated Key Exchange

PAN

Personal Area Network

PAP

Password Authentication Protocol

PCB

Printed Circuit Board

PCM

Pulse Code Modulation

PCRF

Policy and Charging Rules Function

PDA

Personal Digital Assistant

PDN

Packet Data Network

PDP

Packet Data Protocol

PDP-C

Packet Data Protocol Context

PDSN

Packet Data Serving Node

PGW

PDN (Public Data Network) Gateway

PIN

Personal Identifiaction Number

PKI

Public Key Infrastructure

PLC

Power Line Communication

PM

Performance Management

PoS

Point of Sale

PS

Packet Switched

PSAP

Public Safety Answering Point

PTCRB

PCS Terminal Certification Review Board

PWM

Pulse Width Modulation

QoS

Quality of Service

RA

Registration Authority

RA

Router Advertisement

RAN

Radio Access Network

RAT

Radio Access Technologies

REST

REpresentation State Transfer

RF

Radio Frequency

RFC

Request For Comment

RFID

Radio Frequency IDentification

RIP

Routing Information Protocol

RNC

Radio Network Controller

RoI

Return on Investment

RPL

Routing Protocol for LLN (Low Power and Lossy Network)s

RRC

Radio Resource Control

RSSI

Received Signal Strength Indicator

SAC

Source Address Compression

SAM

Source Address Mode

SC

Service Capabilities

SCADA

Supervisory Control and Data Acquisition

SCP

Smart Card Platform

S-CSCF

Serving Call Session Control Function

SDK

Software Development Kit

SDO

Standards Development Organization

SGSN

Serving GPRS Support Node

SGW

Serving Gateway

SID

Subnet IDentifier

SIM

Subscriber Identification Module

SLAAC

StateLess Auto Address Configuration

SLLAO

Source Link-Layer Adress Option

SMS SC

SMS Service Center

SMS

Short Message Service

SMS-C

Short Message Service Center

SMT

Survace Mount Technology

SMTP

Simple Mail Transfer Protocol

SNMP

Simple Network Management Protocol

SNR

Serial NumbeR

SOA

Service Oriented Architecture

SOAP

Simple Object Access Protocol

TACS

Total Access Communications System

TCG

Trusted Computing Group

TCO

Total Cost of Ownership

TCP

Transmission Control Protocol

TDMA

Time Division Multiple Access

TD-SCDMA

Time Division Synchronous Code Division Multiple Access

TIS

Total Isotropic Sensitivity

TLS

Transport Layer Security

TLS-PSK

Transport Layer Security Pre-Shared Key

TLV

Type Length Value

TRP

Total Radiated Power

TTM

Time-to-Market

UART

Universal Asynchronous Receiver/Transmitter

UATI

Unicast Access Terminal Identifier

UDC

Universal Decimal Classification

UDDI

Universal Description Discovery and Integration

UDP

User Datagram Protocol

UE

User Equipment

UICC

Universal Integrated Circuit Card

ULA

Unique Local Address

UMB

Ultra-Mobile Broadband

UMTS

Universal Mobile Telecommunications System

USB

Universal Serial Bus

USIM

Universal Subscriber Identity Module

VLR

Visitor Location Register

VPN

Virtual Private Network

WAN

Wide Area Network

WLAN

Wireless Local-Area Networks

WPAN

Wireless Personal Area Network

WSDL

Web Service Description Language

WSN

Wireless Sensor Network

WWAN

Wireless Wide-Area Networks

xDSL

x Digital Subscriber Line

Chapter 1

Introduction to M2M

Emmanuel Darmois and Omar Elloumi

Alcatel-Lucent, Velizy, France

M2M (Machine-to-Machine) has come of age. It has been almost a decade since the idea of expanding the scope of entities connected to “the network” (wireless, wireline; private, public) beyond mere humans and their preferred communication gadgets has emerged around the notions of the “Internet of Things” (IoT), the “Internet of Objects” or M2M. The initial vision was that of a myriad of new devices, largely unnoticed by humans, working together to expand the footprint of end-user services. This will create new ways to care for safety or comfort, optimizing a variety of goods-delivery mechanisms, enabling efficient tracking of people or vehicles, and at the same time creating new systems and generating new value.

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!