SlideShare a Scribd company logo
1 of 17
Under the guidance
of:
Prof. Deepali Shukla
Presented by-
Ashish Bhinde
Avadhesh Soni
Ayush chawda
Ayush Tiwari
INTRODUCTION
HISTORY
 THEODORE PARASKEVASKOS (1968)
 The history of M2M systems began with use of
data transmission systems by the Russian army in
1845 .
 What is M2M
 Machine to machine (M2M) Communication refers to
communication between devices capable of computing.
 Free Of Human intervention.
 Similar to SCADA (Supervisory control and data acquisition).
 Platform Independent.
 M2M is a new business concept Originating from the
telemetry Technology.
Key components of an M2M system include sensors, RFID, a
cellular or Wi-Fi communication link, and autonomous computing
software programmed to help a network device interpret data and
make decisions.
These M2M applications translate the data, which can trigger pre-
programmed automated actions.
MAIN COMPONENTS:-
Architecture
Devices; Device capable of replying to request for data
contained within those devices or capabale of transmitting
data autonomously.Ex Sensing Devices etc.
Iot Gateways(M2M area networks); Equipment that uses M2M
capabilities to ensure M2M devices inter-working and
interconnection to the communication network.
Network Carries; Provide connectivity between M2M Devices
and M2M Gateways,e.g. personal area network.
Backend System; They provide the storage and have decision
making capabilities.
Example:
 Without M2M communication,
we wouldn't be able to take cash
out of an ATM.
Applications of M2M
:
In telemedicine: M2M devices can enable the real
time monitoring of patients' vital statistics, dispensing medicine
when required or tracking healthcare assets.
Home Appliances IoT already affects home appliance connectivity
through platforms like Nest. However, M2M is expected to take
home-based IoT to the next level.
Manufacturing: Every manufacturing environment whether it’s
food processing or general product manufacturing relies on
technology to ensure costs are managed properly and processes
are executed efficiently.
Traffic Control: Traffic Control is another common area where
the use of M2M communication can be seen.
ADVANTAGES:
M2M communication is supported by cellular networks either
directly or through gateway.
It is easy to roll out and maintain.
It is available with fixed and mobile networks both indoors and
outdoors.
It offers higher range, minimum latency, higher throughput and
consume less energy
It enables communication of smart devices without any human
intervention.
KEY FEATURES OF M2M
Large number of nodes or devices.
Low cost.
Energy Efficient.
Small traffic per machine/devices.
Large quantity of collective data.
Monitoring.
Time Controlled and time tolerant.
M2M REQUIREMENTS
 Scalability: The system must function efficiently even after other connected devices
are added.
 Anonymity: The system must be able to hide the identity of connected devices.
 Logs: M2M systems must be able to record failed installations, defects or incorrect
data – and retain those records for later viewing.Systems must adhere to the basic
principles of machine-to-machine communication explained above.
 Transmission methods: The system must support different transmission methods
such as Unicast, Anycast, Multicast, and Broadcast, and be able to switch between
these methods to reduce loads during M2M data transmission.
 Scheduling of message transmission: The system must be able to schedule data
transfer times and control or delay communications based on priority.
 Selection of communication channels: Communication channels within the
machine-to-machine system should be optimized based on rules for transmission
errors, delays, and network costs.
REFERENCE
www.google.com
www.sllideshare.com
www.DataFlair.com
www.geeksforgeeks
www.tutorialspoint.com
www.w3schools
M2M_COMMUNICATION.pptx

More Related Content

Similar to M2M_COMMUNICATION.pptx

Iisi tv6p887 894-khiyal592
Iisi tv6p887 894-khiyal592Iisi tv6p887 894-khiyal592
Iisi tv6p887 894-khiyal592amna alhabib
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457IJRAT
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scadabhavuksharma10
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfAnujashejwal
 
Congestion and overload control techniques in massive M2M systems: a survey
Congestion and overload control techniques in massive M2M systems: a surveyCongestion and overload control techniques in massive M2M systems: a survey
Congestion and overload control techniques in massive M2M systems: a surveyapnegrao
 
IR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxIR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxSaikiranBasuthkar
 
MOBLE AD HOC NTWORKS
MOBLE AD HOC NTWORKSMOBLE AD HOC NTWORKS
MOBLE AD HOC NTWORKSRadhikaM42
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Yehia Mamdouh
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02NiMa Bagheriasl
 
Unit 1 embedded systems and applications
Unit 1 embedded systems and applicationsUnit 1 embedded systems and applications
Unit 1 embedded systems and applicationsDr.YNM
 
Unit 1 Embedded systems and applications
Unit 1 Embedded systems and applicationsUnit 1 Embedded systems and applications
Unit 1 Embedded systems and applicationsDr.YNM
 

Similar to M2M_COMMUNICATION.pptx (20)

Iisi tv6p887 894-khiyal592
Iisi tv6p887 894-khiyal592Iisi tv6p887 894-khiyal592
Iisi tv6p887 894-khiyal592
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
 
Machine to machine communication enabled internet of things: a review
Machine to machine communication enabled internet of things: a reviewMachine to machine communication enabled internet of things: a review
Machine to machine communication enabled internet of things: a review
 
Paper id 24201457
Paper id 24201457Paper id 24201457
Paper id 24201457
 
Lecture 16
Lecture 16Lecture 16
Lecture 16
 
Training manual on scada
Training manual on scadaTraining manual on scada
Training manual on scada
 
IoT Notes Syllabus .pdf
IoT Notes Syllabus .pdfIoT Notes Syllabus .pdf
IoT Notes Syllabus .pdf
 
4 pillers of iot
4 pillers of iot4 pillers of iot
4 pillers of iot
 
Congestion and overload control techniques in massive M2M systems: a survey
Congestion and overload control techniques in massive M2M systems: a surveyCongestion and overload control techniques in massive M2M systems: a survey
Congestion and overload control techniques in massive M2M systems: a survey
 
IR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxIR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docx
 
Scada slide
Scada slideScada slide
Scada slide
 
MOBLE AD HOC NTWORKS
MOBLE AD HOC NTWORKSMOBLE AD HOC NTWORKS
MOBLE AD HOC NTWORKS
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
 
M2M communications
M2M communicationsM2M communications
M2M communications
 
Introduction-II.pptx
Introduction-II.pptxIntroduction-II.pptx
Introduction-II.pptx
 
Unit 1 embedded systems and applications
Unit 1 embedded systems and applicationsUnit 1 embedded systems and applications
Unit 1 embedded systems and applications
 
Unit 1 Embedded systems and applications
Unit 1 Embedded systems and applicationsUnit 1 Embedded systems and applications
Unit 1 Embedded systems and applications
 

Recently uploaded

Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravitySubhadipsau21168
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTSérgio Sacani
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Jshifa
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 

Recently uploaded (20)

Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified Gravity
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Disentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOSTDisentangling the origin of chemical differences using GHOST
Disentangling the origin of chemical differences using GHOST
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)Recombination DNA Technology (Microinjection)
Recombination DNA Technology (Microinjection)
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 

M2M_COMMUNICATION.pptx

  • 1. Under the guidance of: Prof. Deepali Shukla Presented by- Ashish Bhinde Avadhesh Soni Ayush chawda Ayush Tiwari
  • 3. HISTORY  THEODORE PARASKEVASKOS (1968)  The history of M2M systems began with use of data transmission systems by the Russian army in 1845 .
  • 4.  What is M2M  Machine to machine (M2M) Communication refers to communication between devices capable of computing.  Free Of Human intervention.  Similar to SCADA (Supervisory control and data acquisition).  Platform Independent.  M2M is a new business concept Originating from the telemetry Technology.
  • 5. Key components of an M2M system include sensors, RFID, a cellular or Wi-Fi communication link, and autonomous computing software programmed to help a network device interpret data and make decisions. These M2M applications translate the data, which can trigger pre- programmed automated actions. MAIN COMPONENTS:-
  • 7. Devices; Device capable of replying to request for data contained within those devices or capabale of transmitting data autonomously.Ex Sensing Devices etc. Iot Gateways(M2M area networks); Equipment that uses M2M capabilities to ensure M2M devices inter-working and interconnection to the communication network. Network Carries; Provide connectivity between M2M Devices and M2M Gateways,e.g. personal area network. Backend System; They provide the storage and have decision making capabilities.
  • 8. Example:  Without M2M communication, we wouldn't be able to take cash out of an ATM.
  • 9.
  • 10.
  • 11. Applications of M2M : In telemedicine: M2M devices can enable the real time monitoring of patients' vital statistics, dispensing medicine when required or tracking healthcare assets. Home Appliances IoT already affects home appliance connectivity through platforms like Nest. However, M2M is expected to take home-based IoT to the next level. Manufacturing: Every manufacturing environment whether it’s food processing or general product manufacturing relies on technology to ensure costs are managed properly and processes are executed efficiently. Traffic Control: Traffic Control is another common area where the use of M2M communication can be seen.
  • 12.
  • 13. ADVANTAGES: M2M communication is supported by cellular networks either directly or through gateway. It is easy to roll out and maintain. It is available with fixed and mobile networks both indoors and outdoors. It offers higher range, minimum latency, higher throughput and consume less energy It enables communication of smart devices without any human intervention.
  • 14. KEY FEATURES OF M2M Large number of nodes or devices. Low cost. Energy Efficient. Small traffic per machine/devices. Large quantity of collective data. Monitoring. Time Controlled and time tolerant.
  • 15. M2M REQUIREMENTS  Scalability: The system must function efficiently even after other connected devices are added.  Anonymity: The system must be able to hide the identity of connected devices.  Logs: M2M systems must be able to record failed installations, defects or incorrect data – and retain those records for later viewing.Systems must adhere to the basic principles of machine-to-machine communication explained above.  Transmission methods: The system must support different transmission methods such as Unicast, Anycast, Multicast, and Broadcast, and be able to switch between these methods to reduce loads during M2M data transmission.  Scheduling of message transmission: The system must be able to schedule data transfer times and control or delay communications based on priority.  Selection of communication channels: Communication channels within the machine-to-machine system should be optimized based on rules for transmission errors, delays, and network costs.