M2M Communications: A Systems Approach

Overview

A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation

Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic.  It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the ...

See more details below
Other sellers (Hardcover)
  • All (3) from $74.37   
  • New (2) from $74.37   
  • Used (1) from $97.91   
M2M Communications: A Systems Approach

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$59.99
BN.com price
(Save 42%)$105.00 List Price

Overview

A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation

Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic.  It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization.

The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies.   It also considers dominant M2M application domains such as Smart Metering, Smart Grid, and eHealth.  Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students.

Key features:

  • First technical book emerging from a standards perspective to respond to this highly specific       technology/business segment
  • Covers the main challenges facing the M2M industry today, and proposes early roll-out scenarios and potential optimization solutions
  • Examines the system level architecture and clearly defines the methodology and interfaces to be considered
  • Includes important information presented in a logical manner essential for any engineer or business manager involved in the field of M2M and Internet of Things
  • Provides a cross-over between vertical and horizontal M2M concepts and a possible evolution path between the two
  • Written by experts involved at the cutting edge of M2M developments
Read More Show Less

Product Details

  • ISBN-13: 9781119994756
  • Publisher: Wiley
  • Publication date: 5/8/2012
  • Edition number: 1
  • Pages: 332
  • Product dimensions: 6.80 (w) x 9.80 (h) x 0.90 (d)

Table of Contents

Foreword

List of Contributors

List of Acronyms

1 Introduction to M2M

1.1 What is M2M?

1.2 The Business of M2M

1.3 Accelerating M2M Maturity

1.3.1 High-Level M2M Frameworks

1.3.2 Policy and Government Incentives

1.4 M2M Standards

1.4.1 Which Standards for M2M?

1.5 Roadmap of the Book

References

Part I M2M CURRENT LANDSCAPE

2 The Business of M2M

2.1 The M2M Market

2.1.1 Healthcare

2.1.2 Transportation

2.1.3 Energy

2.2 The M2M Market Adoption: Drivers and Barriers

2.3 The M2M Value Chain

2.4 Market Size Projections

2.5 Business Models

2.5.1 Network Operator- or CSP-Led Model

2.5.2 MVNO-Led Model

2.5.3 Corporate Customer-Led Model

2.6 M2M Business Metrics

2.7 Market Evolution

Reference

3 Lessons Learned from Early M2M Deployments

3.1 Introduction

3.2 Early M2M Operational Deployments

3.2.1 Introduction

3.2.2 Early M2M Operational Deployment Examples

3.2.3 Common Questions in Early M2M Deployments

3.2.4 Possible Optimization of M2M Deployments

3.3 Chapter Conclusion

Reference

Part II M2M ARCHITECTURE AND PROTOCOLS

4 M2M Requirements and High-Level ArchitecturalPrinciples

4.1 Introduction

4.2 Use-Case-Driven Approach to M2M Requirements

4.2.1 What is a Use Case?

4.2.2 ETSI M2M Work on Use Cases

4.2.3 Methodology for Developing Use Cases

4.3 Smart Metering Approach in ETSI M2M

4.3.1 Introduction

4.3.2 Typical Smart Metering Deployment Scenario

4.4 eHealth Approach in ETSI M2M

4.4.1 Introduction

4.5 ETSI M2M Service Requirements: High-Level Summary andApplicability to Different Market Segments

4.6 Traffic Models-/Characteristics-Approach to M2M Requirementsand Considerations for Network Architecture Design

4.6.1 Why Focus on Wireless Networks?

4.7 Description of M2M Market Segments/Applications

4.7.1 Automotive

4.7.2 Smart Telemetry

4.7.3 Surveillance and Security

4.7.4 Point of Sale (PoS)

4.7.5 Vending Machines

4.7.6 eHealth

4.7.7 Live Video

4.7.8 Building Automation

4.7.9 M2M Industrial Automation

4.8 M2M Traffic Characterization

4.8.1 Detailed Traffic Characterization for SmartMetering

4.8.2 Global Traffic Characterization

4.9 High-Level Architecture Principles for M2MCommunications

4.10 Chapter Conclusions

References

5 ETSI M2M Services Architecture

5.1 Introduction

5.2 High-Level System Architecture

5.3 ETSI TC M2M Service Capabilities Framework

5.4 ETSI TC M2M Release 1 Scenarios

5.5 ETSI M2M Service Capabilities

5.5.1 Reachability, Addressing, and Repository Capability(xRAR)

5.5.2 Remote Entity Management Capability (x REM)

5.5.3 Security Capability (xSEC)

5.6 Introducing REST Architectural Style for M2M

5.6.1 Introduction to REST

5.6.2 Why REST for M2M?

5.6.3 REST Basics

5.6.4 Applying REST to M2M

5.6.5 Additional Functionalities

5.7 ETSI TC M2M Resource-Based M2M Communication andProcedures

5.7.1 Introduction

5.7.2 Definitions Used in this Section

5.7.3 Resource Structure

5.7.4 Interface Procedures

5.8 Chapter Conclusion

References

6 M2M Optimizations in Public Mobile Networks

6.1 Chapter Overview

6.2 M2M over a Telecommunications Network

6.2.1 Introduction

6.2.2 M2M Communication Scenarios

6.2.3 Mobile or Fixed Networks

6.2.4 Data Connections for M2M Applications

6.3 Network Optimizations for M2M

6.3.1 Introduction

6.3.2 3GPP Standardization of Network Improvements forMachine Type Communications

6.3.3 Cost Reduction

6.3.4 M2M Value-Added Services

6.3.5 Numbering, Identifiers, and Addressing

6.3.6 Triggering Optimizations

6.3.7 Overload and Congestion Control

References

7 The Role of IP in M2M

7.1 Introduction

7.1.1 IPv6 in Brief

7.1.2 Neighbor Discovery Protocol

7.2 IPv6 for M2M

7.3 6LoWPAN

7.3.1 Framework

7.3.2 Header Compression

7.3.3 Neighbor Discovery

7.4 Routing Protocol for Low-Power and Lossy Networks (RPL)

7.4.1 RPL Topology

7.5 CoRE

7.5.1 Message Formats

7.5.2 Transport Protocol

7.5.3 REST Architecture

References

8 M2M Security

8.1 Introduction

8.1.1 Security Characteristics of Cellular M2M

8.2 Trust Relationships in the M2M Ecosystem

8.3 Security Requirements

8.3.1 Customer/M2M Device User

8.3.2 Access Network Provider

8.3.3 M2M Service Provider

8.3.4 Application Provider

8.3.5 Bootstrapping Requirements

8.4 Which Types of Solutions are Suitable?

8.4.1 Approaches Against Hijacking

8.4.2 Public Key Solutions

8.4.3 Smart Card-Based Solutions

8.4.4 Methods Based on Pre-Provisioned Symmetric Keys

8.4.5 Protocol for Automated Bootstrapping Based onIdentity-Based Encryption

8.4.6 Security for Groups of M2M Devices

8.5 Standardization Efforts on Securing M2M and MTCCommunications

8.5.1 ETSI M2M Security

8.5.2 3GPP Security Related to Network Improvements forMachine Type Communications

References

9 M2M Terminals and Modules

9.1 M2M Module Categorization

9.1.1 Access Technology

9.1.2 Physical Form Factors

9.2 Hardware Interfaces

9.2.1 Power Interface

9.2.2 USB (Universal Serial Bus) Interface

9.2.3 UART (Universal Asynchronous Receiver/ Transmitter)Interface

9.2.4 Antenna Interface

9.2.5 UICC (Universal Integrated Circuit Card)Interface

9.2.6 GPIO (General-Purpose Input/Output Port)Interface

9.2.7 SPI (Serial Peripheral Interface) Interface

9.2.8 I2C (Inter-Integrated Circuit Bus)Interface

9.2.9 ADC (Analog-to-Digital Converter) Interface

9.2.10 PCM (Pulse Code Modulation) Interface

9.2.11 PWM (Pulse Width Modulation) Interface

9.2.12 Analog Audio Interface

9.3 Temperature and Durability

9.4 Services

9.4.1 Application Execution Environment

9.4.2 Connectivity Services

9.4.3 Management Services

9.4.4 Application Services

9.5 Software Interface

9.5.1 AT Commands

9.5.2 SDK Interface

9.6 Cellular Certification

9.6.1 Telecom Industry Certification

9.6.2 MNO Certification

10 Smart Cards in M2M Communication

10.1 Introduction

10.2 Security and Privacy Issues in M2M Communication

10.3 The Grounds for Hardware-Based Security Solutions

10.4 Independent Secure Elements and Trusted Environments

10.4.1 Trusted Environments in M2M Devices

10.4.2 Trusting Unknown Devices: The Need for SecurityCertification

10.4.3 Advantages of the Smart Card Model

10.5 Specific Smart Card Properties for M2M Environments

10.5.1 Removable Smart Cards versus Embedded SecureElements

10.5.2 UICC Resistance to Environmental Constraints

10.5.3 Adapting the Card Application Toolkit to UnattendedDevices

10.5.4 Reaching UICC Peripheral Devices with ToolkitCommands

10.5.5 Confidential Remote Management of Third-PartyApplications

10.6 Smart Card Future Evolutions in M2M Environments

10.6.1 UICC-Based M2M Service Identity ModuleApplication

10.6.2 Internet Protocol Integration of the UICC

10.7 Remote Administration of M2M Secure Elements

10.7.1 Overview

10.7.2 Late Personalization of Subscription

10.7.3 Remote Management of Subscriptions on theField

References

Part III BOOK CONCLUSIONS AND FUTURE VISION

11 Conclusions

Index

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)