This document discusses M2M and IoT design methodologies. It begins with an overview of M2M architecture, including the key components of an M2M area network, M2M core network, M2M gateways, and M2M applications. It then contrasts M2M and IoT, noting differences in communication protocols, types of connected devices, emphasis on hardware vs software, how data is collected and analyzed, and applications. The document also introduces software-defined networking (SDN) and network function virtualization (NFV) as approaches to address limitations of conventional network architectures for IoT.
on successful go through of this complete PPT, the learners can be able to understand the Raspberry PI, Raspberry Pi Interfaces(Serial, SPI,I2C) Programming, Python programming with Raspberry PI with the focus of Interfacing external gadgets
Controlling output Reading input from pins.
This IOT architecture describes about how things get connected via internet.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.
on successful go through of this complete PPT, the learners can be able to understand the Raspberry PI, Raspberry Pi Interfaces(Serial, SPI,I2C) Programming, Python programming with Raspberry PI with the focus of Interfacing external gadgets
Controlling output Reading input from pins.
This IOT architecture describes about how things get connected via internet.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.In short, the Internet of Things refers to the rapidly growing network of connected objects that are able to collect and exchange data using embedded sensors. Thermostats, cars, lights, refrigerators, and more appliances can all be connected to the IoT.
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
ABSTRACT
Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. For securing user data from such attacks a new paradigm called fog computing can be used. Fog Computing is a paradigm that extends Cloud computing and services to the edge of the network. Similar to Cloud, Fog provides data, compute, storage, and application services to end-users. The motivation of Fog computing lies in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined network .This technique can monitor the user activity to identify the legitimacy and prevent from any unauthorized user access. Here we have discussed this paradigm for preventing misuse of user data and securing information.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
Primarily M2M and IoT are similar in upper layer such as hardware, networking or devices. But they differ in system architecture, types of applications and underlying Technologies.
This will be helpful for GTU IOT subject course understanding too!
If you like the video please subscribe to our channel and turn notifications on for future videos.
Follow us on:
Website: http://www.edtechnology.in/
Instagram: https://www.instagram.com/ed.tech/
Facebook: https://www.facebook.com/Edtech18/
Development Tools: a key driver for the M2M market take-offsimon_anyware
This is the presentation that was made at the 2005 Wireless Congress in Dusseldorf.
It shows how development tools can help the M2M market to take off by leveraging some level of technologies into IDE
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...ijcsit
IoT applications usually rely on cloud computing services to perform data analysis such as filtering, aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT needs to deal with unique constraints. Besides the hostile environment such as vibration and electricmagnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions. In this context, we present STEAM++, a lightweight and extensible framework for real-time data stream processing and decision-making in the network edge, targeting hardware-limited devices, besides proposing a micro-benchmark methodology for assessing embedded IoT applications. In real-case experiments in a semiconductor industry, we processed an entire data flow, from values sensing, processing and analysing data, detecting relevant events, and finally, publishing results to a dashboard. On average, the application consumed less than 500kb RAM and 1.0% of CPU usage, processing up to 239 data packets per second and reducing the output data size to 14% of the input raw data size when notifying events.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
This PPT is very much useful for practitioners who are all making products and services to society. Mangers think innovatively and come up with innovative ideas. It is a 5 stage processing also called a design thinking process. The stages are empathize, define, ideate, prototype and test.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
2. M2M and IoT Design
Methodologies
Unit 2
Courtesy to the author of the book shown in right side.
3. Contents
1. M2M
2. Difference between M2M and IoT
3. Software Defined Networks (SDN)
4. Network Function Virtualization (NFV)
5. IoT Platform Design Methodologies
1/7/2021 3M2M and IoT Design Methodologies
4. 1. M2M
• Machine-to-Machine (M2M) refers
networking of machines (devices) for the
purpose of
– Remote Monitoring and Control
– Data Exchange.
1/7/2021 4M2M and IoT Design Methodologies
5. M2M Architecture
1/7/2021 M2M and IoT Design Methodologies 5
• M2M Systems Comprising of 4 parts,
– M2M Area Network
– M2M Core Network (Communication Network)
– M3M Gateways
– M2M Applications
6. M2M Area Network
• M2M Area Network comprises of machines (or M2M
Nodes) which have embedded hardware modules for
– Sensing
– Actuation
– Communication
• Various Communication Protocols can be used for
M2M LAN such as Zigbee, Bluetooth, ModBus, M-Bus,
Wireless M-Bus, Power Line Communication(PLC),
6LoWPAN, IEEE 802.15.4, etc.
• These Communication Protocols provide connectivity
between M2M Nodes within an M2M area network.
1/7/2021 M2M and IoT Design Methodologies 6
7. M2M Core Network(Communication N/w)
• The communication network provides connectivity to
remote M2M area networks.
• The communication network can use either wired or
wireless networks (IP-based).
• While the M2M area networks use either proprietary
or non-IP based communication protocols, the
communication network uses IP-based networks.
• Since non-IP based protocols are used within M2M
area networks, the M2M nodes within one network
cannot communicate with nodes in an external
network.
1/7/2021 M2M and IoT Design Methodologies 7
8. M2M Gateways
• To enable the communication between remote M2M area networks, M2M
gateways are used.
• The communication between the M2M nodes and the M2M Gateway is
based on the communication protocols which are native to the M2M area
networks.
• M2M gateways performs protocol translations to enable IP-connectivity
for M2M Area Networks.
• M2M gateway act as a proxy performing translations from/to native
protocols to/from Internet Protocol(IP).
• With M2M gateway, each node in an M2M area network appears as
virtualized node for external M2M area networks.
1/7/2021 M2M and IoT Design Methodologies 8
9. M2M Application
1/7/2021 M2M and IoT Design Methodologies 9
• M2M data is gathered into point
solutions such as
– Enterprise Applications
– Service Management Applications
– Remote Monitoring Applications
• M2M has various application domains
such as
– Smart Metering
– Home Automation
– Industrial Automation
– Smart Grids, etc.
• M2M solution designs (such as data
collection, storage architecture and
applications) are specific to the M2M
application domain.
11. Difference between M2M and IoT
• Both M2M and IoT involve networking of
machines or devices, but differ in
– Technology
– System Architecture
– Types of Applications
1/7/2021 11M2M and IoT Design Methodologies
13. Difference in M2M and IoT
• Communication Protocols
• Machines vs Things
• Hardware vs Software
• Data Collection & Analysis
• Applications
1/7/2021 13M2M and IoT Design Methodologies
14. Communication in IoT vs M2M
M2M IOT
M2M uses either proprietary or non-
IP based communication protocols
within M2M area networks and M2M
communication network uses IP-based
networks.
IoT uses IP based communication
protocols.
Focus of Communication in M2M –
below network layer.
Focus of Communication in IoT -
above network layer.
M2M commonly uses Zigbee,
Bluetooth, ModBus, M-Bus, Wireless
M-Bus, Power Line communication
(PLC), 6LoWPAN, IEEE 802.15.4, etc
IoT Commonly uses HTTP, CoAP,
Websockets, MQTT, XMPP, DDS,
AMQP, TCP, UDP,etc.
It supports Point-to-Point
Communication.
It supports Cloud Communication.
1/7/2021 14M2M and IoT Design Methodologies
16. Machines in M2M vs Things in IoT
Machines in M2M Things in IOT
M2M uses homogeneous
machine types within a M2M area
network .
IoT systems can have heterogeneous
things.
(Ex: HA includes Fire Alarm, Door
Alarm, Lighting Control, etc)
Machines in M2Mrefers
to two machines “communicating,”
or exchanging data, without human
interfacing or interaction.
Things in IoT refers to physical objects
that have unique identifiers and can
sense and communicate with their
external network. (Ex for UI: IP Address,
MAC Address)
M2M have hardware
components to communicate.
Things have Software Components for
accessing, processing, and storing sensor
information, or controlling actuators.
It is less scalable It is more scalable
1/7/2021 16M2M and IoT Design Methodologies
17. Hardware vs Software Emphasis
M2M IOT
The emphasis of M2M is more
on hardware with embedded
modules
The emphasis of IoT is more on
software and less on hardware.
Minimal Software Usage IoT devices run specialized software for
sensor data collection, data analysis and
interfacing with cloud.
Data Collection in M2M is tiny. Data collected in IoT is massive, cloud
based analysis is used.
1/7/2021 17M2M and IoT Design Methodologies
18. Data Collection & Analysis
• M2M data is collected in point solutions and often in
on-premises storage infrastructure.
– Point Solution means, Solving one particular problem
without regard to related issues. Point solutions are widely
used to fix a problem or implement a new service quickly.
• IoT data is collected in the cloud (can be public, private
or hybrid cloud).
– Cloud based analysis
– Cloud based storage
– Cloud based application
1/7/2021 18M2M and IoT Design Methodologies
19. On-premises
• “On premises” also referred to as “on-premise,” “on-
premises,” or “on-prem,” is a method of deploying software.
With on-prem, the computer programs are installed right on
the user’s computer through CDs or USB drives.
• Whereas with off-premise, the installer can be anywhere on
the Web.
• Many companies opt for on-prem because it doesn’t require
third-party access, gives owners physical control over the
server hardware and software, and does not require them to
pay month after month for access.
• Example:
• Think of how you buy your fast food meal. You could buy it and
eat it “on premise” at the fast food restaurant. Or you can call
and order your meal, and have it delivered to your home.
1/7/2021 19M2M and IoT Design Methodologies
20. Applications
• M2M data is collected in point solutions and can
be accessed by on-premises applications such as
– diagnosis applications
– service management applications, and
– on-premises enterprise applications.
• IoT data is collected in the cloud and can be
accessed by cloud applications such as
– IoT analytics applications
– enterprise applications
– remote diagnosis and management applications, etc.
1/7/2021 20M2M and IoT Design Methodologies
21. Final Words
• In a nutshell, both technologies enable machines to
communicate, collect, store, and exchange data;
autonomously make corresponding decisions; and
perform tasks with very minimal human
intervention.
• However, M2M and IoT are not synonymous. They
are different solutions for the enterprise.
• M2M and IoT primarily vary in terms of how they
achieve connectivity, what they aim to connect,
how scalable they are, and how data is utilized.
1/7/2021 21M2M and IoT Design Methodologies
38. Think !!!! How a network
administrator can able to manage?
1/7/2021 M2M and IoT Design Methodologies 38
39. Solution is ....
1/7/2021 M2M and IoT Design Methodologies 39
• Network Management Protocols
– SNMP (Simple Network Management Protocol)
– ICMP (Internet Control Message Protocol)
– CDP (CISCO Discovery Protocol)
• Network Monitoring Tools and Software's
• Network Architectures like SDN,NFV,etc
40. Conventional Network Architecture
• Conventional architecture built with specialized
hardware (Switch, Router, etc).
• Here network devices are getting exceedingly
complex with the increasing number of
distributed protocols being implemented and
the use of propitiatory hardware and interface.
• In CNA, the control plane and data plane are
coupled.
• Control plane – carries the signalling and routing
message traffic.
• Data plane – carries the payload data traffic.
1/7/2021 M2M and IoT Design Methodologies 40
42. Limitations of CNA
• (1) Complex Network Design
– More and more protocols being implemented to improve
link speed and reliability.
– Interoperability is limited due to lack of standard and
open interface.
– Use of propitiatory hardware and software and have slow
product life cycle.
1/7/2021 M2M and IoT Design Methodologies 42
• The CNA is well suited for
– Static traffic pattern.
– Design a specific application with large no. of protocols.
• For IoT applications which are deployed in cloud
computing environment,
– The traffic pattern are more dynamic.
43. Limitations of CNA
• (2)Management overhead
– Network Managers find it increasingly difficult to
manage multiple network devices and interfaces
from multiple vendors.
– Upgradation of network requires configuration
changes in multiple devices.
1/7/2021 M2M and IoT Design Methodologies 43
• In CNA, there is a (3)limited scalability issue.
In IoT, Virtualization technologies used in Cloud
Computing environments has increased the
number of virtual hosts.
Distributed algorithms are helps to exchange huge
amount of data.
So scalability is achieved in IoT.
44. SDN
• SDN architecture are
– Simpler
– Inexpensive
– Scalable
– Agile
– Easy to manage
• Software-Defined Networking (SDN) is a
– networking architecture that separates the control plane from
the data plane and
– centralizes the network controller.
1/7/2021 M2M and IoT Design Methodologies 44
• Software-defined networking (SDN) technology is an approach
to network management that enables dynamic, programmatically
efficient network configuration in order to improve network
performance and monitoring, making it more like cloud
computing than traditional network management - Wikipedia
47. SDN Advantages
• Software-based SDN controllers maintain a unified view of
the network and make configuration, management and
provisioning simpler.
• The underlying infrastructure in SDN uses simple packet
forwarding hardware as opposed to specialized hardware
in conventional networks.
• The underlying network infrastructure is abstracted from
the applications.
• Network devices
– become simple with SDN as they do not require
implementations of large no.of protocols.
– receive instructions from the SDN controller on how to forward
the packets.
– can be simpler and cost less as they can be built from standard
hardware and software components.
1/7/2021 47M2M and IoT Design Methodologies
48. SDN issues
• However, the intelligent centralization has its
own drawbacks when it comes to
– Security
– Scalability and
– Elasticity
• Research of SDN continues as
many emulators are being developed for
research purposes, like
– vSDNEmul
– EstiNet
– Mininet
1/7/2021 M2M and IoT Design Methodologies 48
49. Key Elements of SDN
• Centralized Network Controller
– With decoupled control and data planes and centralized
network controller, the network administrators can rapidly
configure the network.
• Programmable Open APIs
– Interface between the SDN application and control layers
(Northbound interface).
– Various n/w services can be implemented such as routing,
QoS, etc.
• Standard Communication Interface (OpenFlow)
– Interface between the control and infrastructure layers
(Southbound interface).
– OpenFlow, which is defined by the Open Networking
Foundation (ONF) is the broadly accepted SDN protocol for
the Southbound interface.
1/7/2021 M2M and IoT Design Methodologies 49
50. OpenFlow
• SDN was commonly associated with
the OpenFlow protocol.
• It’s for remote communication with network plane
elements for the purpose of determining the path
of network packets across network switches.
• With OpenFlow, the forwarding plane of the network
devices can be directly accessed and manipulated.
• Uses the concept of flows to identify network traffic
based on pre-defined match rules.
• Flows can be programmed statistically or dynamically
by SDN control software.
1/7/2021 M2M and IoT Design Methodologies 50
54. Network Virtual Function (NFV)
• Network Function Virtualization (NFV) is a
technology that leverages virtualization to
consolidate the heterogeneous network devices
onto industry standard high volume servers,
switches and storage.
• NFV is complementary to SDN as NFV can
provide the infrastructure on which SDN can run.
• Network functions can be visualized without SDN,
similarly, SDN can run without NFV.
• NFV architecture is standardized by ETSI.
1/7/2021 M2M and IoT Design Methodologies 54
56. Key Elements of NFV
• Virtualized Network Function (VNF):
– VNF is a software implementation of a network function
which is capable of running over the NFV Infrastructure
(NFVI).
• NFV Infrastructure (NFVI):
– NFVI includes compute, network and storage resources
that are virtualized.
• NFV Management and Orchestration:
– NFV Management and Orchestration focuses on all
virtualization-specific management tasks and covers the
orchestration and life-cycle management of physical
and/or software resources that support the infrastructure
virtualization, and the life-cycle management of VNFs.
1/7/2021 M2M and IoT Design Methodologies 56
57. NFV Advantages
• NFV comprises of network functions
implemented in software that run on virtualized
resource in the cloud.
• NFV enables separation of network functions
which are implemented in software from the
underlying hardware.
• NFV is applicable only on data plane and control
plane functions in fixed and mobile networks.
1/7/2021 M2M and IoT Design Methodologies 57
60. Home Gateway
• Home gateway performs various functions like
– DHCP
– NAT
– Application specific gateway and firewall.
– Private IP address to each connected device in the house.
– Routing capabilities
– Translation of private IP address into Public IP address.
1/7/2021 M2M and IoT Design Methodologies 60
61. Home Network with Virtualized Home Gateway
1/7/2021 M2M and IoT Design Methodologies 61
62. Virtualized Home Gateway
• NFV can be used to virtualize the Home Gateway.
• The NFV infrastructure in the cloud hosts a virtualized
Home Gateway.
• The virtualized gateway provides private IP addresses
to the devices in the home.
• The virtualized gateway also connects to network
services such as VoIP and IPTV.
1/7/2021 M2M and IoT Design Methodologies 62