SlideShare a Scribd company logo
1 of 36
Download to read offline
IOT & M2M
 Introduction
 M2M Vs IoT
 SDN & NFV
 IoT System Management
 SNMP
 Network Operator Requirements
 NETCONF
 YANG
 NETOPEER
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 1
CREDITS
Arshdeep bhagha & Vijay Maddisetti
MRS sir
Google
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 2
INTRODUCTION
IoT
M2M
TV-Remote
Mobile-AC
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 3
MACHINE-TO-MACHINE (M2M)
Machine-to-Machine
(M2M) refers to
networking of machines
(or devices)
for the purpose of remote
monitoring and control
and dataexchange.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 4
MACHINE-TO-MACHINE (M2M)
 An M2M area network comprises of machines (or M2M nodes) which have embedded
hardware modules for sensing, actuation and communication.
 Various communication protocols can be used for M2M local area networks such as
ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC),
6LoWPAN, IEEE 802.15.4, etc.
 The communication network provides connectivity to remote M2M area networks.
 The communication network can use either wired or wireless networks (IPbased).
 While the M2M area networks use either proprietary or non-IP based communication
protocols, the communication network uses IP-based networks.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 5
MACHINE-TO-MACHINE (M2M)
 Since non-IP based protocols
are used within M2M area
networks, the M2M nodes
within one network cannot
communicate with nodes in an
external network.
 To enable the communication
between remote M2M area
networks, M2M gateways are
used.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 6
DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)
 Communication Protocols
 M2M and IoT can differ in how the communication between the machines or devices
happens.
 M2M uses either proprietary or non-IP based communication protocols for
communication within the M2M area networks.
 Machines in M2M vs Things in IoT
 The "Things" in IoT refers to physical objects that have unique identifiers and can sense
and communicate with their external environment (and user applications) or their
internal physical states.
 M2M systems, in contrast to IoT, typically have homogeneous machine types within an
M2M area network.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 7
DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)
 Hardware vs Software Emphasis
 While the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is more on
software.
 Data Collection & Analysis
 M2M data is collected in point solutions and often in on-premises storage infrastructure.
 In contrast to M2M, the data in IoT is collected in the cloud (can be public, private or hybrid cloud).
 Applications
 M2M data is collected in point solutions and can be accessed by on-premises applications such as
diagnosis applications, service management applications, and onpremisis enterprise applications.
 IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications,
enterprise applications, remote diagnosis and management applications, etc.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 8
IOT & MACHINE-TO-MACHINE (M2M) COMMUNICATION
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 9
SDN
 Software-Defined Networking (SDN) is a
networking architecture that separates the
control plane from the data plane and
centralizes the network controller.
 Software-based SDN controllers maintain a
unified view of the network and make
configuration, management and
provisioning simpler.
 The underlying infrastructure in SDN uses
simple packet forwarding hardware as
opposed to specialized hardware in
conventional networks.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 10
KEY ELEMENTS OF SDN
 Centralized Network Controller
 With decoupled control and data planes and centralized network controller, the network
administrators can rapidly configure the network.
 Programmable Open APIs
 SDN architecture supports programmable open APIs for interface between the SDN application
and control layers (Northbound interface).
 Standard Communication Interface (OpenFlow)
 SDN architecture uses a standard communication interface between the control and
infrastructure layers (Southbound interface).
 OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted
SDN protocol for the Southbound interface.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 11
NETWORK FUNCTION VIRTUALIZATION (NFV)
 Network Function Virtualization
(NFV) is a technology that
leverages virtualization to
consolidate the heterogeneous
network devices onto industry
standard high volume servers,
switches and storage.
 NFV is complementary to SDN as
NFV can provide the infrastructure
on which SDN can run.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 12
KEY ELEMENTS OF NFV
 Virtualized Network Function (VNF):
 VNF is a software implementation of a network function which is capable of running
over the NFV Infrastructure (NFVI).
 NFV Infrastructure (NFVI):
 NFVI includes compute, network and storage resources that are virtualized.
 NFV Management and Orchestration:
 NFV Management and Orchestration focuses on all virtualization-specific management
tasks and covers the orchestration and life-cycle management of physical
and/or software resources that support the infrastructure virtualization, and
the life-cycle management of VNFs.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 13
NVF-USE CASE
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 14
NVF-USE CASE
NFV can be used to virtualize the Home Gateway.
The NFV infrastructure in the cloud hosts a virtualized Home
Gateway.
The virtualized gateway provides private IP addresses to the
devices in the home.
The virtualized gateway also connects to network services such
as VoIP and IPTV.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 15
NEED FOR IOT SYSTEM MANAGEMENT
Automating Configuration
Monitoring Operational & Statistical Data
Improved Reliability
System Wide Configurations
Multiple System Configurations
Retrieving & Reusing Configurations
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 16
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
 SNMP is a well-known and widely used
network management protocol that
allows monitoring and configuring
network devices such as routers,
switches, servers, printers, etc.
 SNMP component include
 Network Management Station (NMS)
 Managed Device
 Management Information Base (MIB)
 SNMP Agent that runs on the device
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 17
DRAWBACKS OF SNMP
 SNMP is stateless in nature and each SNMP request contains all the information to
process the request. The application needs to be intelligent to manage the device.
 SNMP is a connectionless protocol which uses UDP as the transport protocol, making it
unreliable as there was no support for acknowledgement of requests.
 MIBs often lack writable objects without which device configuration is not possible using
SNMP.
 It is difficult to differentiate between configuration and state data in MIBs.
 Retrieving the current configuration from a device can be difficult with SNMP.
 Earlier versions of SNMP did not have strong security features.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 18
NETWORK OPERATOR REQUIREMENTS
 Ease of use
 Distinction between configuration and
state data
 Fetch configuration and state data
separately
 Configuration of the network as a whole
 Configuration transactions across
services
 Configuration deltas
 Dump and restore configurations
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 19
 Configuration validation
 Configuration database schemas
 Comparing configurations
 Role-based access control
 Consistency of access control lists:
 Multiple configuration sets
 Support for both data-oriented and
task oriented access control
NETCONF
 Network Configuration Protocol (NETCONF) is a session-based network management protocol.
 NETCONF allows retrieving state or configuration data and manipulating configuration data on network
devices
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 20
NETCONF
 NETCONF works on SSH transport protocol.
 Transport layer provides end-to-end connectivity and ensure reliable delivery of messages.
 NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and response messages.
 The RPC layer provides mechanism for encoding of RPC calls and notifications.
 NETCONF provides various operations to retrieve and edit configuration data from network devices.
 The Content Layer consists of configuration and state data which is XML-encoded.
 The schema of the configuration and state data is defined in a data modelling language called YANG.
 NETCONF provides a clear separation of the configuration and state data.
 The configuration data resides within a NETCONF configuration data store on the server.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 21
YANG
 YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF
protocol
 YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and
the format of the notifications.
 YANG modules defines the data exchanged between the NETCONF client and server.
 A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree structure.
 The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.
 Leaf nodes are organized using 'container' or 'list' constructs.
 A YANG module can import definitions from other modules.
 Constraints can be defined on the data nodes, e.g. allowed values.
 YANG can model both configuration data and state data using the 'config' statement.
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 22
IOT SYSTEMS MANAGEMENT WITH NETCONF-YANG
 Management System
 • Management API
 • Transaction Manager
 • Rollback Manager
 • Data Model Manager
 • Configuration Validator
 • Configuration Database
 • Configuration API
 • Data Provider API
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 23
NETOPEER-NETCONF-YANG
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 24
SUMMARY
 Introduction
 M2M Vs IoT
 SDN & NFV
 IoT System Management
 SNMP
 Network Operator Requirements
 NETCONF
 YANG
 NETOPEER
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 25
LUXE: Smart Homes / Office
HARMONIZER APP DESIGN – for
SMART SWITCHES
Design by: Vikram + MRS
Sept 2020
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 26
LUXE: Smart Homes / Office LUXE: Smart Homes / Office
Single room
1BHK
2BHK
3BHK
Villa
LUXE: Smart Homes / Office
Single room
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 27
LUXE: Smart Homes / Office
Single room
1BHK
2BHK
3BHK
Villa
LUXE: Smart Homes / Office
Bed Room: SB 1
Switch 1
Switch 2
Switch 3
Switch 4
Switch 5
LUXE: Smart Homes / Office
Single room
1BHK
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 28
HARMONIZER INDIA PVT LTD.,
INTRODUCING
“CANNY” INTELLIGENT PANELS
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 29
PROBLEM STATEMENT IN ELECTRICAL
PANELS
 Temperature inside the Enclosure
 Heat Trap
 Deterioration of Insulation
 Smoke due to insulation burning
 Smoke due to Short circuit
 Vibration due to Busbar
 Vibration due to over
load/harmonics
 Over Load on the equipment
“CANNY” INTELLIGENT PANELS
SMART SOLUTION WITH MACHINE LEARNING TECHNOLOGY
Convert your existing Electrical
Switchboard to “Canny”
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 30
CANNY – AN INTELLIGENT ELECTRIC SWITCH BOARD
Measure
Analyse
Control
Field devices to measure
 Temperature in each Feeder, Cable,
Busbar
 Vibration on the Electric Switchboard
 Hot Spot Temperature
 Busbar alignment
 Insect, animal movement
 Smoke detection
Mobile APP for
 Monitoring Temperature
 Vibration on the Electric Switchboard
 Hot Spot Temperature
 Busbar alignment
Machine Learning Technology
 Alert
 Automatic Solution recommendation
Monitor
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 31
Canny
PCC 1
PCC 2
MCC 1
MCC 2
MCC 3
Canny
CANNY – MOBILE APP
PCC 1
Temperature
Smoke
Vibration
Canny
PCC 1 - Feeders
Feeder 1
Feeder 2
Feeder N
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 32
CANNY – MOBILE APP
Canny
PCC 1 - Feeders
Feeder 1
Feeder 2
Feeder N
Canny
Feeder 1
Tmax = 60Deg C
Tmini = 40Deg C
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 33
HARMONIZER INDIA PVT LTD.,
INTRODUCING INTELLIGENT PANELS
Measure
Monitor
Analyse
Control
Canny – Intelligent Switch board
Canny , Dapper
PCC 1
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 34
ANY CLARIFICATIONS?
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 35
THANK YOU FOR YOUR TIME
12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 36

More Related Content

What's hot

bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)
sandhibhide
 

What's hot (20)

Arrow IoT Quadro Wifi Kit
Arrow IoT Quadro Wifi KitArrow IoT Quadro Wifi Kit
Arrow IoT Quadro Wifi Kit
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
 
Lecture 4
Lecture  4Lecture  4
Lecture 4
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Embedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and BuildEmbedded system & IoT Course | certification Program | Learn and Build
Embedded system & IoT Course | certification Program | Learn and Build
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)bhide_connected_raleigh2016 (1)
bhide_connected_raleigh2016 (1)
 
Watson IoT - IBM
Watson IoT - IBMWatson IoT - IBM
Watson IoT - IBM
 
AStar IoT and smart hospital architecture
AStar IoT and smart hospital architectureAStar IoT and smart hospital architecture
AStar IoT and smart hospital architecture
 
Device Management for OSGi IoT Gateways
Device Management for OSGi IoT GatewaysDevice Management for OSGi IoT Gateways
Device Management for OSGi IoT Gateways
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
30 9137 e implementation of cloud connected smart plug (edit lafi)
30 9137 e implementation of cloud connected smart plug (edit lafi)30 9137 e implementation of cloud connected smart plug (edit lafi)
30 9137 e implementation of cloud connected smart plug (edit lafi)
 
Iot gateways march 2015
Iot gateways march 2015Iot gateways march 2015
Iot gateways march 2015
 
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and AzureGuide to IoT Projects and Architecture with Microsoft Cloud and Azure
Guide to IoT Projects and Architecture with Microsoft Cloud and Azure
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
Unified Middleware for Internet of Things
Unified Middleware for Internet of ThingsUnified Middleware for Internet of Things
Unified Middleware for Internet of Things
 

Similar to ioT and Machine 2 Machine Computing

Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
freddysarabia1
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
Patricia Viljoen
 

Similar to ioT and Machine 2 Machine Computing (20)

Unit 3 IOT.docx
Unit 3 IOT.docxUnit 3 IOT.docx
Unit 3 IOT.docx
 
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
Whitepaper: Mobile Networks in a smart digital future - deploying a platform ...
 
SDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic ConceptsSDN and Mininet: Some Basic Concepts
SDN and Mininet: Some Basic Concepts
 
Chapter-2.pdf
Chapter-2.pdfChapter-2.pdf
Chapter-2.pdf
 
Software Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer NetworkSoftware Defined Networking (SDN): A Revolution in Computer Network
Software Defined Networking (SDN): A Revolution in Computer Network
 
IoT & M2M.pdf
IoT & M2M.pdfIoT & M2M.pdf
IoT & M2M.pdf
 
Security of software defined networks: evolution and challenges
Security of software defined networks: evolution and challengesSecurity of software defined networks: evolution and challenges
Security of software defined networks: evolution and challenges
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
SECURITY FOR SOFTWARE-DEFINED (CLOUD, SDN AND NFV) INFRASTRUCTURES – ISSUES A...
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
Lec2.pptx
Lec2.pptxLec2.pptx
Lec2.pptx
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
Towards an Open Data Center with an Interoperable Network (ODIN) Volume 3: So...
 
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...A Survey on the Placement of Virtual Security Network Functions in Softwarise...
A Survey on the Placement of Virtual Security Network Functions in Softwarise...
 
Software Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic EngineeringSoftware Defined Networking – Virtualization of Traffic Engineering
Software Defined Networking – Virtualization of Traffic Engineering
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 

More from Vikram Nandini

More from Vikram Nandini (20)

IoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold BarIoT: From Copper strip to Gold Bar
IoT: From Copper strip to Gold Bar
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Linux File Trees and Commands
Linux File Trees and CommandsLinux File Trees and Commands
Linux File Trees and Commands
 
Introduction to Linux & Basic Commands
Introduction to Linux & Basic CommandsIntroduction to Linux & Basic Commands
Introduction to Linux & Basic Commands
 
INTRODUCTION to OOAD
INTRODUCTION to OOADINTRODUCTION to OOAD
INTRODUCTION to OOAD
 
Ethics
EthicsEthics
Ethics
 
Manufacturing - II Part
Manufacturing - II PartManufacturing - II Part
Manufacturing - II Part
 
Manufacturing
ManufacturingManufacturing
Manufacturing
 
Business Models
Business ModelsBusiness Models
Business Models
 
Prototyping Online Components
Prototyping Online ComponentsPrototyping Online Components
Prototyping Online Components
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
IoT-Prototyping
IoT-PrototypingIoT-Prototyping
IoT-Prototyping
 
Design Principles for Connected Devices
Design Principles for Connected DevicesDesign Principles for Connected Devices
Design Principles for Connected Devices
 
Introduction to IoT
Introduction to IoTIntroduction to IoT
Introduction to IoT
 
Embedded decices
Embedded decicesEmbedded decices
Embedded decices
 
Communication in the IoT
Communication in the IoTCommunication in the IoT
Communication in the IoT
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
cloud computing UNIT-2.pdf
cloud computing UNIT-2.pdfcloud computing UNIT-2.pdf
cloud computing UNIT-2.pdf
 
Introduction to Web Technologies
Introduction to Web TechnologiesIntroduction to Web Technologies
Introduction to Web Technologies
 
Cascading Style Sheets
Cascading Style SheetsCascading Style Sheets
Cascading Style Sheets
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 

ioT and Machine 2 Machine Computing

  • 1. IOT & M2M  Introduction  M2M Vs IoT  SDN & NFV  IoT System Management  SNMP  Network Operator Requirements  NETCONF  YANG  NETOPEER 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 1
  • 2. CREDITS Arshdeep bhagha & Vijay Maddisetti MRS sir Google 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 2
  • 4. MACHINE-TO-MACHINE (M2M) Machine-to-Machine (M2M) refers to networking of machines (or devices) for the purpose of remote monitoring and control and dataexchange. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 4
  • 5. MACHINE-TO-MACHINE (M2M)  An M2M area network comprises of machines (or M2M nodes) which have embedded hardware modules for sensing, actuation and communication.  Various communication protocols can be used for M2M local area networks such as ZigBee, Bluetooh, ModBus, M-Bus, Wirless M-Bus, Power Line Communication (PLC), 6LoWPAN, IEEE 802.15.4, etc.  The communication network provides connectivity to remote M2M area networks.  The communication network can use either wired or wireless networks (IPbased).  While the M2M area networks use either proprietary or non-IP based communication protocols, the communication network uses IP-based networks. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 5
  • 6. MACHINE-TO-MACHINE (M2M)  Since non-IP based protocols are used within M2M area networks, the M2M nodes within one network cannot communicate with nodes in an external network.  To enable the communication between remote M2M area networks, M2M gateways are used. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 6
  • 7. DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)  Communication Protocols  M2M and IoT can differ in how the communication between the machines or devices happens.  M2M uses either proprietary or non-IP based communication protocols for communication within the M2M area networks.  Machines in M2M vs Things in IoT  The "Things" in IoT refers to physical objects that have unique identifiers and can sense and communicate with their external environment (and user applications) or their internal physical states.  M2M systems, in contrast to IoT, typically have homogeneous machine types within an M2M area network. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 7
  • 8. DIFFERENCE BETWEEN IOT &MACHINE-TO-MACHINE (M2M)  Hardware vs Software Emphasis  While the emphasis of M2M is more on hardware with embedded modules, the emphasis of IoT is more on software.  Data Collection & Analysis  M2M data is collected in point solutions and often in on-premises storage infrastructure.  In contrast to M2M, the data in IoT is collected in the cloud (can be public, private or hybrid cloud).  Applications  M2M data is collected in point solutions and can be accessed by on-premises applications such as diagnosis applications, service management applications, and onpremisis enterprise applications.  IoT data is collected in the cloud and can be accessed by cloud applications such as analytics applications, enterprise applications, remote diagnosis and management applications, etc. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 8
  • 9. IOT & MACHINE-TO-MACHINE (M2M) COMMUNICATION 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 9
  • 10. SDN  Software-Defined Networking (SDN) is a networking architecture that separates the control plane from the data plane and centralizes the network controller.  Software-based SDN controllers maintain a unified view of the network and make configuration, management and provisioning simpler.  The underlying infrastructure in SDN uses simple packet forwarding hardware as opposed to specialized hardware in conventional networks. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 10
  • 11. KEY ELEMENTS OF SDN  Centralized Network Controller  With decoupled control and data planes and centralized network controller, the network administrators can rapidly configure the network.  Programmable Open APIs  SDN architecture supports programmable open APIs for interface between the SDN application and control layers (Northbound interface).  Standard Communication Interface (OpenFlow)  SDN architecture uses a standard communication interface between the control and infrastructure layers (Southbound interface).  OpenFlow, which is defined by the Open Networking Foundation (ONF) is the broadly accepted SDN protocol for the Southbound interface. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 11
  • 12. NETWORK FUNCTION VIRTUALIZATION (NFV)  Network Function Virtualization (NFV) is a technology that leverages virtualization to consolidate the heterogeneous network devices onto industry standard high volume servers, switches and storage.  NFV is complementary to SDN as NFV can provide the infrastructure on which SDN can run. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 12
  • 13. KEY ELEMENTS OF NFV  Virtualized Network Function (VNF):  VNF is a software implementation of a network function which is capable of running over the NFV Infrastructure (NFVI).  NFV Infrastructure (NFVI):  NFVI includes compute, network and storage resources that are virtualized.  NFV Management and Orchestration:  NFV Management and Orchestration focuses on all virtualization-specific management tasks and covers the orchestration and life-cycle management of physical and/or software resources that support the infrastructure virtualization, and the life-cycle management of VNFs. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 13
  • 15. NVF-USE CASE NFV can be used to virtualize the Home Gateway. The NFV infrastructure in the cloud hosts a virtualized Home Gateway. The virtualized gateway provides private IP addresses to the devices in the home. The virtualized gateway also connects to network services such as VoIP and IPTV. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 15
  • 16. NEED FOR IOT SYSTEM MANAGEMENT Automating Configuration Monitoring Operational & Statistical Data Improved Reliability System Wide Configurations Multiple System Configurations Retrieving & Reusing Configurations 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 16
  • 17. SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)  SNMP is a well-known and widely used network management protocol that allows monitoring and configuring network devices such as routers, switches, servers, printers, etc.  SNMP component include  Network Management Station (NMS)  Managed Device  Management Information Base (MIB)  SNMP Agent that runs on the device 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 17
  • 18. DRAWBACKS OF SNMP  SNMP is stateless in nature and each SNMP request contains all the information to process the request. The application needs to be intelligent to manage the device.  SNMP is a connectionless protocol which uses UDP as the transport protocol, making it unreliable as there was no support for acknowledgement of requests.  MIBs often lack writable objects without which device configuration is not possible using SNMP.  It is difficult to differentiate between configuration and state data in MIBs.  Retrieving the current configuration from a device can be difficult with SNMP.  Earlier versions of SNMP did not have strong security features. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 18
  • 19. NETWORK OPERATOR REQUIREMENTS  Ease of use  Distinction between configuration and state data  Fetch configuration and state data separately  Configuration of the network as a whole  Configuration transactions across services  Configuration deltas  Dump and restore configurations 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 19  Configuration validation  Configuration database schemas  Comparing configurations  Role-based access control  Consistency of access control lists:  Multiple configuration sets  Support for both data-oriented and task oriented access control
  • 20. NETCONF  Network Configuration Protocol (NETCONF) is a session-based network management protocol.  NETCONF allows retrieving state or configuration data and manipulating configuration data on network devices 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 20
  • 21. NETCONF  NETCONF works on SSH transport protocol.  Transport layer provides end-to-end connectivity and ensure reliable delivery of messages.  NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing request and response messages.  The RPC layer provides mechanism for encoding of RPC calls and notifications.  NETCONF provides various operations to retrieve and edit configuration data from network devices.  The Content Layer consists of configuration and state data which is XML-encoded.  The schema of the configuration and state data is defined in a data modelling language called YANG.  NETCONF provides a clear separation of the configuration and state data.  The configuration data resides within a NETCONF configuration data store on the server. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 21
  • 22. YANG  YANG is a data modeling language used to model configuration and state data manipulated by the NETCONF protocol  YANG modules contain the definitions of the configuration data, state data, RPC calls that can be issued and the format of the notifications.  YANG modules defines the data exchanged between the NETCONF client and server.  A module comprises of a number of 'leaf' nodes which are organized into a hierarchical tree structure.  The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.  Leaf nodes are organized using 'container' or 'list' constructs.  A YANG module can import definitions from other modules.  Constraints can be defined on the data nodes, e.g. allowed values.  YANG can model both configuration data and state data using the 'config' statement. 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 22
  • 23. IOT SYSTEMS MANAGEMENT WITH NETCONF-YANG  Management System  • Management API  • Transaction Manager  • Rollback Manager  • Data Model Manager  • Configuration Validator  • Configuration Database  • Configuration API  • Data Provider API 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 23
  • 25. SUMMARY  Introduction  M2M Vs IoT  SDN & NFV  IoT System Management  SNMP  Network Operator Requirements  NETCONF  YANG  NETOPEER 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 25
  • 26. LUXE: Smart Homes / Office HARMONIZER APP DESIGN – for SMART SWITCHES Design by: Vikram + MRS Sept 2020 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 26
  • 27. LUXE: Smart Homes / Office LUXE: Smart Homes / Office Single room 1BHK 2BHK 3BHK Villa LUXE: Smart Homes / Office Single room Switch 1 Switch 2 Switch 3 Switch 4 Switch 5 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 27
  • 28. LUXE: Smart Homes / Office Single room 1BHK 2BHK 3BHK Villa LUXE: Smart Homes / Office Bed Room: SB 1 Switch 1 Switch 2 Switch 3 Switch 4 Switch 5 LUXE: Smart Homes / Office Single room 1BHK 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 28
  • 29. HARMONIZER INDIA PVT LTD., INTRODUCING “CANNY” INTELLIGENT PANELS 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 29
  • 30. PROBLEM STATEMENT IN ELECTRICAL PANELS  Temperature inside the Enclosure  Heat Trap  Deterioration of Insulation  Smoke due to insulation burning  Smoke due to Short circuit  Vibration due to Busbar  Vibration due to over load/harmonics  Over Load on the equipment “CANNY” INTELLIGENT PANELS SMART SOLUTION WITH MACHINE LEARNING TECHNOLOGY Convert your existing Electrical Switchboard to “Canny” 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 30
  • 31. CANNY – AN INTELLIGENT ELECTRIC SWITCH BOARD Measure Analyse Control Field devices to measure  Temperature in each Feeder, Cable, Busbar  Vibration on the Electric Switchboard  Hot Spot Temperature  Busbar alignment  Insect, animal movement  Smoke detection Mobile APP for  Monitoring Temperature  Vibration on the Electric Switchboard  Hot Spot Temperature  Busbar alignment Machine Learning Technology  Alert  Automatic Solution recommendation Monitor 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 31
  • 32. Canny PCC 1 PCC 2 MCC 1 MCC 2 MCC 3 Canny CANNY – MOBILE APP PCC 1 Temperature Smoke Vibration Canny PCC 1 - Feeders Feeder 1 Feeder 2 Feeder N 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 32
  • 33. CANNY – MOBILE APP Canny PCC 1 - Feeders Feeder 1 Feeder 2 Feeder N Canny Feeder 1 Tmax = 60Deg C Tmini = 40Deg C 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 33
  • 34. HARMONIZER INDIA PVT LTD., INTRODUCING INTELLIGENT PANELS Measure Monitor Analyse Control Canny – Intelligent Switch board Canny , Dapper PCC 1 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 34
  • 36. THANK YOU FOR YOUR TIME 12/26/2020VIKRAM NEERUGATTI, SVCET, CHITTOOR. 36