SlideShare a Scribd company logo
Unit 2
IoT & M2M
-by
GVNSK Sravya
ECE Dept.
GNITS
Outline
• M2M
• Differences and Similarities between M2M and
IoT
• SDN and NFV for IoT
• Difference between SDN and NFV for IoT
• Basics of IoT System Management with
NETCONF
• YANG-NETCONF
• YANG and SNMP NETOPEER.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
2
Machine-to-Machine (M2M)
3/14/202
2
3
IV/IV ECE-C IoT by GVNSK Sravya
• Machine-to-Machine (M2M) refers to networking of machines (or
devices)
• Provides communicating and computation facilities between machines or
devices
• Purpose of remote monitoring and control and data exchange.
• Free of an human intervention
• M2M provides cross platform integration.
Machine-to-Machine (M2M)
3/14/202
2
4
IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
3/14/202
2
5
IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M) Applications
3/14/202
2
6
IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M) Features
3/14/202
2
7
IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
3/14/202
2
8
IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
3/14/202
2
9
IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
0
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
1
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
2
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
3
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
4
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
5
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
6
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
7
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
8
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
1
9
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
2
0
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
2
1
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
2
2
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
• Machine-to-Machine (M2M) area network comprises of machines which
have embedded hardware modules for sensing, actuation and
communication
• Various communication protocols such as ZigBee, Bluetooth, ModBus,
Power line communication (PLC), 6LoWPAN etc., can be used
Machine-to-Machine (M2M)
2
3
3/14/202
2 IV/IV ECE-C IoT by GVNSK Sravya
Machine-to-Machine (M2M)
• An M2M area network comprises of machines (or M2M nodes)
which have embedded hardware modules for sensing,
actuation and communication.
• Various communication protocols can be used for M2M local
area networks such as ZigBee, Bluetooh, ModBus, M-Bus,
Wirless M-Bus, Power Line Communication (PLC), 6LoWPAN,
IEEE 802.15.4, etc.
IV/IV ECE-C IoT by GVNSK Sravya 2
4
3/14/202
2
Machine-to-Machine (M2M)
• The communication network provides connectivity to remote
M2M area networks.
• The communication network can use either wired or wireless
networks (IP- based).
• While the M2M area networks use either proprietary or non-IP
based communication protocols, the communication network
uses IP-based networks.
IV/IV ECE-C IoT by GVNSK Sravya 2
5
3/14/202
2
M2M Gateway
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
26
• Since non-IP based protocols are used within M2M areanetworks,
the M2M nodes within one network cannot communicate with
nodes in an external network.
• T
oenable the communication between remote M2M area
networks, M2M gateways are used.
M2M Gateway
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
27
Difference between IoT and M2M
Communication Protocols
• M2M and IoT can differ in how the communication betweenthe
machines or devices happens.
• M2M uses either proprietary or non-IP based communication
protocols for communication within the M2M area networks.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
28
Difference between IoT and M2M
Machines in M2M vs Things in IoT
• The "Things" in IoT refers to physical objects that have unique
identifiers and can sense and communicate with their external
environment (and user applications) or their internal physical
states.
• M2M systems, in contrast to IoT,typically have homogeneous
machine types within an M2M area network.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
29
Difference between IoT and M2M
Hardware vs Software Emphasis
• While the emphasis of M2M is more on hardware with
embedded modules, the emphasis of IoT is more on software.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
30
Difference between IoT and M2M
Data Collection &Analysis
• M2M data is collected in point solutions and often in on-
premises storage infrastructure.
• In contrast to M2M, the data in IoT is collected in thecloud
(can be public, private or hybrid cloud).
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
31
Difference between IoT and M2M
Applications
• M2M data is collected in point solutions and can be accessed
by on-premises applications such as diagnosis applications,
service management applications, and on- premisis
enterprise applications.
• IoT data is collected in the cloud and can be accessed by
cloud applications such as analytics applications, enterprise
applications, remote diagnosis and management
applications, etc.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
32
Communication in IoT vs M2M
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Communication in IoT vs M2M
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
Over View of Current Network
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
1
4
SDN
• Software-Defined Networking (SDN) is a networking
architecture that separates the control plane from the data
plane and centralizes the network controller.
• Software-based SDN controllers maintain a unified view of the
network and make configuration, management and
provisioning simpler.
3/14/202
2
IV/IV ECE-C IoT by GVNSK Sravya 46
SDN
• The underlying infrastructure in SDN uses simple packet
forwarding hardware as opposed to specialized hardware in
conventional networks.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
47
Conventional Network Architecture
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
48
Limitations of Conventional Network
Architecture
• Complex network devices
• Management Overhead
• Limited Scalability
SDN attempts to create network architectures that are simple,
inexpensive, scalable and easy to manage
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
49
SDN Architecture
3/14/202
2
5
0
IV/IV ECE-C IoT by
SDN Layered Architecture
3/14/202
2
5
1
IV/IV ECE-C IoT by GVNSK Sravya
Key elements of SDN
Centralized Network Controller
• With decoupled control and data planes and centralized
network controller, the network administrators can rapidly
configure the network.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
52
Key elements of SDN
Programmable OpenAPIs
• SDN architecture supports programmable openAPIs for interface
between the SDN application and control layers (Northbound
interface).
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
53
Key elements of SDN
Standard Communication Interface (OpenFlow)
• SDN architecture uses a standard communication interface
between the control and infrastructure layers (Southbound
interface).
• OpenFlow, which is defined by the Open Networking Foundation
(ONF) is the broadly accepted SDN protocol for the Southbound
interface.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
54
Open Flow Switch
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
55
Key elements of SDN
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
56
NFV
• Network Function Virtualization (NFV) is a technology that
leverages virtualization to consolidate the heterogeneous network
devices onto industry standard high volume servers, switches and
storage.
• NFV is complementary to SDN as NFV can provide the
infrastructure on which SDN can run.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
2
1
NFV
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
2
1
Key elements of NFV
Virtualized Network Function (VNF):
• VNF is a software implementation of a network function which is
capable of running over the NFV Infrastructure(NFVI).
NFV Infrastructure (NFVI):
• NFVI includes compute, network and storage resources that are
virtualized.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
2
2
Key elements of NFV
NFV Management and Orchestration:
• NFV Management and Orchestration focuses on all virtualization-
specific management tasks and covers the orchestrationand life-
cycle management of physical and/or software resources that
support the infrastructure virtualization, and the life-cycle
management of VNFs.
IV/IV ECE-C IoT by GVNSK Sravya
3/14/202
2
2
2
NFV Use Case
 NFV can be used to virtualize the Home Gateway. The NFV
infrastructure in the cloud hosts a virtualized Home Gateway.
The virtualized gateway provides private IP addresses to the
devices in the home. The virtualized gateway also connects
to network services such as VoIP andIPTV.
3/14/202
2
61
IV/IV ECE-C IoT by GVNSK Sravya
NFV Use Case Conventional
Home Architecture
•
3/14/202
2
62
IV/IV ECE-C IoT by GVNSK Sravya
Need for IoT Systems
Management
• Automating Configuration
• Monitoring Operational & Statistical
Data
• Improved Reliability
• System Wide Configurations
• Multiple System Configurations
• Retrieving & Reusing Configurations
IoT & M2M.pdf
Simple Network Management Protocol
(SNMP)
• SNMP is a well-known and widely used
network management protocol that allows
monitoring and configuring network devices
such as routers, switches, servers, printers,
etc.
• SNMP component include
• Network Management Station (NMS)
• Managed Device
• Management Information Base (MIB)
• SNMP Agent that runs on the device
Limitations of SNMP
• SNMP is stateless in nature and each SNMP request contains all
the information to process the request. The application needs to be
intelligent to manage the device.
• SNMP is a connectionless protocol which uses UDP as the transport
protocol, making it unreliable as there was no support for
acknowledgement of requests.
• MIBs often lack writable objects without which device configuration
is not possible using SNMP.
• It is difficult to differentiate between configuration and state data in
MIBs.
• Retrieving the current configuration from a device can be difficult
with SNMP.
• Earlier versions of SNMP did not have strong security features.
Network Operator
Requirements
• Ease of use
• Distinction between configuration and state
data
• Fetch configuration and state data separately
• Configuration of the network as a whole
• Configuration transactions across devices
• Configuration deltas
• Dump and restore configurations
• Configuration validation
• Configuration database schemas
• Comparing configurations
• Role-based access control
• Consistency of access control lists:
• Multiple configuration sets
• Support for both data-oriented and
task- oriented access control
NETCONF
• Network Configuration Protocol (NETCONF) is a session-based network management
protocol. NETCONF allows retrieving state or configuration data and manipulating
configuration data on network devices
NETCONF
• NETCONF works on SSH transport protocol.
• Transport layer provides end-to-end connectivity and ensure reliable delivery of
messages.
• NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing
request and response messages.
• The RPC layer provides mechanism for encoding of RPC calls and notifications.
• NETCONF provides various operations to retrieve and edit configuration
data from network devices.
• The Content Layer consists of configuration and state data which is XML-encoded.
• The schema of the configuration and state data is defined in a data modeling
language called YANG.
• NETCONF provides a clear separation of the configuration and state data.
• The configuration data resides within a NETCONF configuration datastore on the
server.
NETCONF
IV/IV ECE-C IoT by GVNSK
Sravya
6
IV/IV ECE-C IoT by GVNSK
Sravya
6
IV/IV ECE-C IoT by GVNSK
Sravya
6
IV/IV ECE-C IoT by GVNSK
Sravya
6
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
6
• YANG is a data modeling language used to model configuration and
state data
manipulated by the NETCONF protocol
• YANG modules contain the definitions of the configuration data, state
data,
RPC calls that can be issued and the format of thenotifications.
• YANG modules defines the data exchanged between the NETCONF
clientand server.
• A module comprises of a number of 'leaf' nodes which are organized
in to a hierarchical tree structure.
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
6
• The 'leaf' nodes are specified using the 'leaf' or 'leaf-list'constructs.
• Leaf nodes are organized using 'container' or 'list'constructs.
• A YANG module can import definitions from other modules.
• Constraints can be defined on the data nodes, e.g. allowed values.
• YANG can model both configuration data and state data using the
'config' statement.
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
6
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
6
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
7
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
NETOPEER
• NETOPEER is a set of open source NETCONF tools built on
the Libnetconf library.
• It allows operators to connect to their NETCONF enabled
devices as well as developers to allow control their devices via
NETCONF.
• NETOPEER tools include
NETOPEER Server
NETOPEER Agent
NETOPEER Cli
NETOPEER Manager
NETOPEER Configurator
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK Sravya
4/6/2022
NETOPEER
NETOPEER-Server
• It is a NETCONF protocol server that runs on the managed
device.
• It provides an environment for configuring the device using
NETCONF RPC operations and also retrieving the state data
from the device.
IV/IV ECE-C IoT by GVNSK
Sravya
7
NETOPEER
NETOPEER-agent
• It is a NETCONF protocol agent running as a SSH/TLS
subsystem.
• It accepts incoming NETCONF connection and passes the
NETCONF RPC operations received from the NETCONF client
to the NETOPEER Server.
IV/IV ECE-C IoT by GVNSK
Sravya
7
NETOPEER
NETOPEER-cli
• It is a NETCONF client that provides a command line interface
for interfacing with the NETOPEER- Server.
• The operator can use the NETOPEER-Cli from the
management system to send NETCONF RPC operations for
configuring the device and retrieving the state information.
IV/IV ECE-C IoT by GVNSK
Sravya
7
NETOPEER
NETOPEER-manager
• NETOPEER manager allows managing the YANG and
Libnetconf Transaction API (Trans API) modules on the
NETOPEER-Server.
• With NETOPEER manager modules can be loaded or removed
from the server.
Netopeer Configurator
• It is a tool that can be used to configure the Netopeer-Server.
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7
IV/IV ECE-C IoT by GVNSK
Sravya
7

More Related Content

PDF
Chapter 8
PDF
IoT, M2M and IoT System Management
PPTX
M2M Communication
PPTX
M2M and IoT Design Methodologies
PPTX
Overview of IoT (JNTUK - UNIT 1)
PPT
Lecture 6: IoT Data Processing
PPTX
Iot logical design
PPTX
IOT Protocols
Chapter 8
IoT, M2M and IoT System Management
M2M Communication
M2M and IoT Design Methodologies
Overview of IoT (JNTUK - UNIT 1)
Lecture 6: IoT Data Processing
Iot logical design
IOT Protocols

What's hot (20)

PDF
IoT and m2m
PPTX
IOT System Management with NETCONF-YANG.pptx
PPTX
M2M technology in IOT
PDF
IoT Physical Devices and End Points.pdf
PPTX
Iot architecture
PDF
IoT Physical Servers and Cloud Offerings.pdf
PPTX
Ppt 3 - IOT logic design
PPTX
IOT privacy and Security
PPTX
Ppt 11 - netopeer
PPTX
6LoWPAN.pptx
PPTX
Sources of IoT (JNTUK - UNIT 1)
PPTX
Io t system management with
PPTX
Unit IOT NETCONF.pptx
PDF
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
PDF
Chapter 5 IoT Design methodologies
PPTX
Physical design of io t
PPTX
PPTX
security and privacy-Internet of things
PPTX
Devices and gateways
IoT and m2m
IOT System Management with NETCONF-YANG.pptx
M2M technology in IOT
IoT Physical Devices and End Points.pdf
Iot architecture
IoT Physical Servers and Cloud Offerings.pdf
Ppt 3 - IOT logic design
IOT privacy and Security
Ppt 11 - netopeer
6LoWPAN.pptx
Sources of IoT (JNTUK - UNIT 1)
Io t system management with
Unit IOT NETCONF.pptx
Unit 2 Smart Objects _IOT by Dr.M.K.Jayanthi.pdf
Chapter 5 IoT Design methodologies
Physical design of io t
security and privacy-Internet of things
Devices and gateways
Ad

Similar to IoT & M2M.pdf (20)

DOCX
PPTX
IoT Heap 2
PPTX
iot course a hand on approach internet of things
PDF
Chapter-3.pdf
PDF
nbvbjnkgfgvjhnmnmbmnbmbnmbnbnmbnmbnmbnmbmnbnmbn
PDF
Chapter-3.pdf
PPTX
Internet of things and its applicationn
PPTX
Chapter-3.pptx
PDF
PDF
ioT and Machine 2 Machine Computing
PDF
Chapter-2.pdf
PPTX
EsIoT Unit 4 IoT ARchitecuture and management.pptx
PPT
476870776-Internet-of-Things-IoT-RGPV-syllabus-Ec-703-b-Unit-2.ppt
PPTX
IOT_UNIT-1.pptx
PDF
Io t a_de_techgigwebinar_04nov2016
PDF
M2M-IoT towards 5G
PPTX
IOT_UNIT-1_Presentation which is basic presentation level
PDF
ggfjgfjjkghkjghgkkghjghjgjhgjfgfhgfhgfhgfhf
PPTX
Chapter 4_Final_Module 1.pptx cloud comp
PPTX
Atal io t introduction
IoT Heap 2
iot course a hand on approach internet of things
Chapter-3.pdf
nbvbjnkgfgvjhnmnmbmnbmbnmbnbnmbnmbnmbnmbmnbnmbn
Chapter-3.pdf
Internet of things and its applicationn
Chapter-3.pptx
ioT and Machine 2 Machine Computing
Chapter-2.pdf
EsIoT Unit 4 IoT ARchitecuture and management.pptx
476870776-Internet-of-Things-IoT-RGPV-syllabus-Ec-703-b-Unit-2.ppt
IOT_UNIT-1.pptx
Io t a_de_techgigwebinar_04nov2016
M2M-IoT towards 5G
IOT_UNIT-1_Presentation which is basic presentation level
ggfjgfjjkghkjghgkkghjghjgjhgjfgfhgfhgfhgfhf
Chapter 4_Final_Module 1.pptx cloud comp
Atal io t introduction
Ad

More from GVNSK Sravya (11)

PDF
Python.pdf
PDF
Introduction to Internet of Things.pdf
PDF
Unit 4 DGPS
PDF
Unit II GPS Signal Characteristics
PDF
Unit1 GPS Introduction
PDF
Unit III GPS Receivers and Errors
PDF
EMI Unit IV
PDF
EMI Unit 5 Bridges and Measurement of Physical Parameters
PDF
EMI Unit 3 CRO
PDF
EMI Unit II
PDF
Emi Unit 1
Python.pdf
Introduction to Internet of Things.pdf
Unit 4 DGPS
Unit II GPS Signal Characteristics
Unit1 GPS Introduction
Unit III GPS Receivers and Errors
EMI Unit IV
EMI Unit 5 Bridges and Measurement of Physical Parameters
EMI Unit 3 CRO
EMI Unit II
Emi Unit 1

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
01-Introduction-to-Information-Management.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
TR - Agricultural Crops Production NC III.pdf
human mycosis Human fungal infections are called human mycosis..pptx
PPH.pptx obstetrics and gynecology in nursing
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pharmacology of Heart Failure /Pharmacotherapy of CHF
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Final Stretch: How to Release a Game and Not Die in the Process.
Open Quiz Monsoon Mind Game Final Set.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Cardiovascular Pharmacology for pharmacy students.pptx
Open folder Downloads.pdf yes yes ges yes
O7-L3 Supply Chain Operations - ICLT Program
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Renaissance Architecture: A Journey from Faith to Humanism
01-Introduction-to-Information-Management.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf

IoT & M2M.pdf

  • 1. Unit 2 IoT & M2M -by GVNSK Sravya ECE Dept. GNITS
  • 2. Outline • M2M • Differences and Similarities between M2M and IoT • SDN and NFV for IoT • Difference between SDN and NFV for IoT • Basics of IoT System Management with NETCONF • YANG-NETCONF • YANG and SNMP NETOPEER. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 2
  • 3. Machine-to-Machine (M2M) 3/14/202 2 3 IV/IV ECE-C IoT by GVNSK Sravya • Machine-to-Machine (M2M) refers to networking of machines (or devices) • Provides communicating and computation facilities between machines or devices • Purpose of remote monitoring and control and data exchange. • Free of an human intervention • M2M provides cross platform integration.
  • 22. Machine-to-Machine (M2M) 2 2 3/14/202 2 IV/IV ECE-C IoT by GVNSK Sravya • Machine-to-Machine (M2M) area network comprises of machines which have embedded hardware modules for sensing, actuation and communication • Various communication protocols such as ZigBee, Bluetooth, ModBus, Power line communication (PLC), 6LoWPAN etc., can be used
  • 24. Machine-to-Machine (M2M) • An M2M area network comprises of machines (or M2M nodes) which have embedded hardware modules for sensing, actuation and communication. • Various communication protocols can be used for M2M local area networks such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc. IV/IV ECE-C IoT by GVNSK Sravya 2 4 3/14/202 2
  • 25. Machine-to-Machine (M2M) • The communication network provides connectivity to remote M2M area networks. • The communication network can use either wired or wireless networks (IP- based). • While the M2M area networks use either proprietary or non-IP based communication protocols, the communication network uses IP-based networks. IV/IV ECE-C IoT by GVNSK Sravya 2 5 3/14/202 2
  • 26. M2M Gateway IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 26 • Since non-IP based protocols are used within M2M areanetworks, the M2M nodes within one network cannot communicate with nodes in an external network. • T oenable the communication between remote M2M area networks, M2M gateways are used.
  • 27. M2M Gateway IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 27
  • 28. Difference between IoT and M2M Communication Protocols • M2M and IoT can differ in how the communication betweenthe machines or devices happens. • M2M uses either proprietary or non-IP based communication protocols for communication within the M2M area networks. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 28
  • 29. Difference between IoT and M2M Machines in M2M vs Things in IoT • The "Things" in IoT refers to physical objects that have unique identifiers and can sense and communicate with their external environment (and user applications) or their internal physical states. • M2M systems, in contrast to IoT,typically have homogeneous machine types within an M2M area network. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 29
  • 30. Difference between IoT and M2M Hardware vs Software Emphasis • While the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is more on software. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 30
  • 31. Difference between IoT and M2M Data Collection &Analysis • M2M data is collected in point solutions and often in on- premises storage infrastructure. • In contrast to M2M, the data in IoT is collected in thecloud (can be public, private or hybrid cloud). IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 31
  • 32. Difference between IoT and M2M Applications • M2M data is collected in point solutions and can be accessed by on-premises applications such as diagnosis applications, service management applications, and on- premisis enterprise applications. • IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications, enterprise applications, remote diagnosis and management applications, etc. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 32
  • 33. Communication in IoT vs M2M IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 34. Communication in IoT vs M2M IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 35. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 36. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 37. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 38. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 39. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 40. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 41. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 42. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 43. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 44. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 45. Over View of Current Network IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 1 4
  • 46. SDN • Software-Defined Networking (SDN) is a networking architecture that separates the control plane from the data plane and centralizes the network controller. • Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler. 3/14/202 2 IV/IV ECE-C IoT by GVNSK Sravya 46
  • 47. SDN • The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional networks. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 47
  • 48. Conventional Network Architecture IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 48
  • 49. Limitations of Conventional Network Architecture • Complex network devices • Management Overhead • Limited Scalability SDN attempts to create network architectures that are simple, inexpensive, scalable and easy to manage IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 49
  • 52. Key elements of SDN Centralized Network Controller • With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 52
  • 53. Key elements of SDN Programmable OpenAPIs • SDN architecture supports programmable openAPIs for interface between the SDN application and control layers (Northbound interface). IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 53
  • 54. Key elements of SDN Standard Communication Interface (OpenFlow) • SDN architecture uses a standard communication interface between the control and infrastructure layers (Southbound interface). • OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 54
  • 55. Open Flow Switch IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 55
  • 56. Key elements of SDN IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 56
  • 57. NFV • Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network devices onto industry standard high volume servers, switches and storage. • NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 2 1
  • 58. NFV IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 2 1
  • 59. Key elements of NFV Virtualized Network Function (VNF): • VNF is a software implementation of a network function which is capable of running over the NFV Infrastructure(NFVI). NFV Infrastructure (NFVI): • NFVI includes compute, network and storage resources that are virtualized. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 2 2
  • 60. Key elements of NFV NFV Management and Orchestration: • NFV Management and Orchestration focuses on all virtualization- specific management tasks and covers the orchestrationand life- cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs. IV/IV ECE-C IoT by GVNSK Sravya 3/14/202 2 2 2
  • 61. NFV Use Case  NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the devices in the home. The virtualized gateway also connects to network services such as VoIP andIPTV. 3/14/202 2 61 IV/IV ECE-C IoT by GVNSK Sravya
  • 62. NFV Use Case Conventional Home Architecture • 3/14/202 2 62 IV/IV ECE-C IoT by GVNSK Sravya
  • 63. Need for IoT Systems Management • Automating Configuration • Monitoring Operational & Statistical Data • Improved Reliability • System Wide Configurations • Multiple System Configurations • Retrieving & Reusing Configurations
  • 65. Simple Network Management Protocol (SNMP) • SNMP is a well-known and widely used network management protocol that allows monitoring and configuring network devices such as routers, switches, servers, printers, etc. • SNMP component include • Network Management Station (NMS) • Managed Device • Management Information Base (MIB) • SNMP Agent that runs on the device
  • 66. Limitations of SNMP • SNMP is stateless in nature and each SNMP request contains all the information to process the request. The application needs to be intelligent to manage the device. • SNMP is a connectionless protocol which uses UDP as the transport protocol, making it unreliable as there was no support for acknowledgement of requests. • MIBs often lack writable objects without which device configuration is not possible using SNMP. • It is difficult to differentiate between configuration and state data in MIBs. • Retrieving the current configuration from a device can be difficult with SNMP. • Earlier versions of SNMP did not have strong security features.
  • 67. Network Operator Requirements • Ease of use • Distinction between configuration and state data • Fetch configuration and state data separately • Configuration of the network as a whole • Configuration transactions across devices • Configuration deltas • Dump and restore configurations • Configuration validation • Configuration database schemas • Comparing configurations • Role-based access control • Consistency of access control lists: • Multiple configuration sets • Support for both data-oriented and task- oriented access control
  • 68. NETCONF • Network Configuration Protocol (NETCONF) is a session-based network management protocol. NETCONF allows retrieving state or configuration data and manipulating configuration data on network devices
  • 69. NETCONF • NETCONF works on SSH transport protocol. • Transport layer provides end-to-end connectivity and ensure reliable delivery of messages. • NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and response messages. • The RPC layer provides mechanism for encoding of RPC calls and notifications. • NETCONF provides various operations to retrieve and edit configuration data from network devices. • The Content Layer consists of configuration and state data which is XML-encoded. • The schema of the configuration and state data is defined in a data modeling language called YANG. • NETCONF provides a clear separation of the configuration and state data. • The configuration data resides within a NETCONF configuration datastore on the server.
  • 71. IV/IV ECE-C IoT by GVNSK Sravya 6
  • 72. IV/IV ECE-C IoT by GVNSK Sravya 6
  • 73. IV/IV ECE-C IoT by GVNSK Sravya 6
  • 74. IV/IV ECE-C IoT by GVNSK Sravya 6
  • 75. YANG IV/IV ECE-C IoT by GVNSK Sravya 6 • YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF protocol • YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and the format of thenotifications. • YANG modules defines the data exchanged between the NETCONF clientand server. • A module comprises of a number of 'leaf' nodes which are organized in to a hierarchical tree structure.
  • 76. YANG IV/IV ECE-C IoT by GVNSK Sravya 6 • The 'leaf' nodes are specified using the 'leaf' or 'leaf-list'constructs. • Leaf nodes are organized using 'container' or 'list'constructs. • A YANG module can import definitions from other modules. • Constraints can be defined on the data nodes, e.g. allowed values. • YANG can model both configuration data and state data using the 'config' statement.
  • 77. YANG IV/IV ECE-C IoT by GVNSK Sravya 6
  • 78. YANG IV/IV ECE-C IoT by GVNSK Sravya 6
  • 79. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 80. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 81. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 82. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 83. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 84. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 85. YANG IV/IV ECE-C IoT by GVNSK Sravya 7
  • 86. YANG IV/IV ECE-C IoT by GVNSK Sravya 7
  • 87. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 88. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 89. NETOPEER • NETOPEER is a set of open source NETCONF tools built on the Libnetconf library. • It allows operators to connect to their NETCONF enabled devices as well as developers to allow control their devices via NETCONF. • NETOPEER tools include NETOPEER Server NETOPEER Agent NETOPEER Cli NETOPEER Manager NETOPEER Configurator IV/IV ECE-C IoT by GVNSK Sravya 7
  • 90. IV/IV ECE-C IoT by GVNSK Sravya 4/6/2022
  • 91. NETOPEER NETOPEER-Server • It is a NETCONF protocol server that runs on the managed device. • It provides an environment for configuring the device using NETCONF RPC operations and also retrieving the state data from the device. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 92. NETOPEER NETOPEER-agent • It is a NETCONF protocol agent running as a SSH/TLS subsystem. • It accepts incoming NETCONF connection and passes the NETCONF RPC operations received from the NETCONF client to the NETOPEER Server. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 93. NETOPEER NETOPEER-cli • It is a NETCONF client that provides a command line interface for interfacing with the NETOPEER- Server. • The operator can use the NETOPEER-Cli from the management system to send NETCONF RPC operations for configuring the device and retrieving the state information. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 94. NETOPEER NETOPEER-manager • NETOPEER manager allows managing the YANG and Libnetconf Transaction API (Trans API) modules on the NETOPEER-Server. • With NETOPEER manager modules can be loaded or removed from the server. Netopeer Configurator • It is a tool that can be used to configure the Netopeer-Server. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 95. IV/IV ECE-C IoT by GVNSK Sravya 7
  • 96. IV/IV ECE-C IoT by GVNSK Sravya 7