What is M2M?
M2M is acronym for machine-to-machine operation and is based on the technology for allowing devices or sensing entities to "talk" to each other or to a computer or server over a network – mobile, wireless or wired.
Where is M2M solution used?
M2M affords benefits to many applications, across various industries, such as Asset Monitoring, Utilities, Transport, Retail and Security.
What are the benefits of M2M?
A solution that enables remote and / or mobile machines to communicate with a central server using M2M technology has many benefits:
- Decision-making – gathering real-time data from remote assets makes possible faster, more informed decision-making
- Operational – improving the efficiency and control of resources reduces operational costs
- Environmental – streamlining monitoring processes minimizes wastage
- Financial – new service-based offerings provide new sources of revenue
What makes up an M2M solution?
Typically, an M2M solution consists of several components:
- Device(s) or sensor(s) to collect data and/or monitor changes
- A central server to send and / or receive data transmitted by the device(s) or sensor(s).
- Connectivity (either fixed line or wireless) to connect the device or sensor to a central server.
- A modem to allow data exchange between the device(s) or sensor(s) and the central server.
- An application and database to process the data sent and received.
- An application to ensure security of the data transmitted and to monitor and manage the connectivity to the device or sensor network.
What are the essential elements of a successful M2M deployment?
As with any IT deployment, the management of people, process and technology is critical in determining the outcome of the project. An M2M project is can be very complex due to the number of different parts needed to be integrated together. The key success factors are:
- A defined business need
- A clear understanding of how M2M technology can make the link to business benefit
- A proof of concept and trial with detailed technical and commercial objectives
- A project champion
- An understanding of the risks and a means to manage them
How does it work?
M2M can be provided through either fixed line or wireless or mobile connectivity, and is for use with both fixed and mobile devices. Typically, connectivity can provided over either a GSM/GPRS network, fixed line telephone network (PSTN), satellite or the Internet.
What are the benefits of wireless and/or mobile M2M?
Devices that are wirelessly connected to a network are not limited to a physical location. This gives you the flexibility to move them when the need to do arises, for example if a vending machine is not getting much business to generate the required revenue in one location, you can simply place it elsewhere. Devices in remote locations, where it’s difficult to have cabling work, can also be connected to a wireless network quickly and easily.
Mobile devices can connect into a network, allowing data communication between the monitoring station – usually a server – and the mobile devices.
Access to information::
Wireless networks deliver real-time information to mobile devices enabling information to be received or sent whenever and wherever it is required, as such organizations can have access to live information for effective and fast decision-making.
A wireless network can be quickly and easily deployed in a building or at a location without the need for integration with the existing fixed line network, thereby delivering an independent secure network.
A wireless network can be deployed much more quickly than a fixed network as no cabling is needed between devices. This allows devices to be installed, configured and be operational in a much shorter set-up time.
There are cost savings related to the speed of deployment, the elimination of cabling costs, and the reduction in communication costs, as GPRS is more cost effective than PSTN/fixed line.
Where there is no need to do cabling work, the sites are free of clutter and the risks associated with cabling (overheating, health and safety etc.) are eliminated.
How do wireless/mobile M2M machines communicate?
M2M wireless solutions use wireless modems to communicate using 2.5G/GPRS (General Packet Radio Service) or the faster 3G mobile network, GPRS is “always on”, allowing it to communicate data immediately, and at much higher speeds. GPRS is billed according to the amount of data used and not the amount of time the connection lasts.
The wireless device communicates over the wireless networks through an APN (Access Point Name) at the Mobile Network Operator (MNO) to the customer’s firewall and onto a central server for processing. The standard MNO offering uses a general APN, so all customers use the same APN, and dynamic IP addresses on the devices i.e. the IP address keeps changing each time it communicates over the network.
We use private APN’s to increase security, enables the allocation of individual Private Fixed IP addresses for devices, which in effect creates a private network for end-to-end security of the data being transmitted.
What is a Private APN?
An APN is the access point to a GPRS network and identifies and authenticates the traffic trying to access the network. A Private APN provides the benefit of being able to have control of which devices connect through to you network.
Why do we use Private APN’s?
We use Private APN’s to have maximum control and security over connections to the network and enables customers to establish a secure end-to-end connection from their infrastructure to the remote devices. A Private APN means that the firewall is configured to allow only those devices from the Private APN and not all traffic from the general/public APN.
We go a stage further by allocating Private Fixed IP addresses to devices, so in effect they appear as though they are directly connected to the local area network. With YES DATA, the customer can even select the IP addresses to avoid duplication.
What is Private Fixed IP technology?
An IP address allows computers to communicate with one another on a network. An IP address can be private, for use on a LAN, or public, for use on the Internet or other Wide Area Network.
A static or fixed IP address is created when a user is guaranteed – by either their Internet Service Provider or IT Administrator – to have the same IP address every time they connect to the Internet. If this is available in the public domain, it is known as a Public Fixed IP address. This is the typical configuration if you have a PC connected to the Internet.
However, devices on wireless networks, such as mobile phones and M2M devices are assigned a dynamic IP address by the Mobile Operators. If the IP is not available in the public domain, it is known as a Private Fixed IP address. YES DATA allows you to have a Private Fixed IP address for your mobile and remote devices.
What are the benefits of Private Fixed IP technology?
The use of Private Fixed IP addressing offers the benefits of true two-way communication; data transfer can be initiated from either the device or the server. Without Fixed IP addressing the devices can only communicate with the server, but no messages or updates can be sent to the device, without first waking the device up by sending an SMS or making a data call. The outcome is that data usage is far more efficient and cost effective, as there is no need for "keep-alives" or SMS "wake-up" calls.
Security is also enhanced as the Private nature of the IP address means that the risk of SPAM or Denial of Service attacks is reduced. Combining the increased security, the reduced data usage and more efficient communication means that the overall Total Cost of Ownership is reduced.
How do I start working with YES DATA?
It’s simple – whether you’re a systems integrator looking to build connectivity into your solution, a hardware provider or an end user , please call us, email us at email@example.com or contact us here...
Moving checkouts (such as taxis, home delivery services and the Car Rental employees who meet returning drivers in the parking lot) benefit from wireless M2M to clear credit card transactions.
Bus System: An increasing number of bus systems in Europe use telematics to deliver updated schedule information to passengers and enable more-responsive local services.
Low population densities do not support regularly scheduled services, so these systems let passengers call in to request rides from buses assigned to specific areas but not specific routes. Wireless location and communication technologies help coordinate the fleets and optimize bus utilization.
Security industry is another sector where wireless m2m can either accomplish many tasks more cost-effectively than existing personnel or help those personnel work more effectively and with greater personal safety. Fixed sensors in remote, dangerous or particularly sensitive areas are an obvious application. Moving to a wireless approach also negates one of the intruder’s favourite techniques, which is cutting the standard phone line attached to the alarm system.
Fire and security patrols charged with protecting large geographic areas such as college campuses can also benefit from wireless telemetry.
For example, by sending alarm locations directly to personal mobile phones using text messages, systems can dispatch help immediately instead of relying on a human monitor who then relays calls to the security staff.