M2m Communications
A Systems Approach
Herausgeber: Boswarthick, David; Hersent, Olivier; Elloumi, Omar
M2m Communications
A Systems Approach
Herausgeber: Boswarthick, David; Hersent, Olivier; Elloumi, Omar
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic. It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing…mehr
- Guillaume de la RocheLte-Advanced and Next Generation Wireless Networks149,99 €
- Byeong G. LeeWireless Communications Resource Management204,99 €
- Riaz EsmailzadehBroadband Wireless Communications Business113,99 €
- Saad Z. AsifNext Generation Mobile Communications Ecosystem138,99 €
- Richard Chia Tung LeeCommunications Engineering126,99 €
- Xavier N. FernandoRadio Over Fiber for Wireless Communications139,99 €
- William A. FlanaganVoip and Unified Communications81,99 €
-
-
-
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
- Produktdetails
- Verlag: Wiley & Sons / Wiley-Blackwell
- 1. Auflage
- Seitenzahl: 336
- Erscheinungstermin: 30. April 2012
- Englisch
- Abmessung: 312mm x 253mm x 25mm
- Gewicht: 716g
- ISBN-13: 9781119994756
- ISBN-10: 1119994756
- Artikelnr.: 34159131
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Wiley & Sons / Wiley-Blackwell
- 1. Auflage
- Seitenzahl: 336
- Erscheinungstermin: 30. April 2012
- Englisch
- Abmessung: 312mm x 253mm x 25mm
- Gewicht: 716g
- ISBN-13: 9781119994756
- ISBN-10: 1119994756
- Artikelnr.: 34159131
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
List of Contributors
List of Acronyms
1 Introduction to M2M
1.1 What is M2M?
1.2 The Business of M2M
1.3 Accelerating M2M Maturity
1.3.1 High-Level M2M Frameworks
1.3.2 Policy and Government Incentives
1.4 M2M Standards
1.4.1 Which Standards for M2M?
1.5 Roadmap of the Book
References
Part I M2M CURRENT LANDSCAPE
2 The Business of M2M
2.1 The M2M Market
2.1.1 Healthcare
2.1.2 Transportation
2.1.3 Energy
2.2 The M2M Market Adoption: Drivers and Barriers
2.3 The M2M Value Chain
2.4 Market Size Projections
2.5 Business Models
2.5.1 Network Operator- or CSP-Led Model
2.5.2 MVNO-Led Model
2.5.3 Corporate Customer-Led Model
2.6 M2M Business Metrics
2.7 Market Evolution
Reference
3 Lessons Learned from Early M2M Deployments
3.1 Introduction
3.2 Early M2M Operational Deployments
3.2.1 Introduction
3.2.2 Early M2M Operational Deployment Examples
3.2.3 Common Questions in Early M2M Deployments
3.2.4 Possible Optimization of M2M Deployments
3.3 Chapter Conclusion
Reference
Part II M2M ARCHITECTURE AND PROTOCOLS
4 M2M Requirements and High-Level Architectural Principles
4.1 Introduction
4.2 Use-Case-Driven Approach to M2M Requirements
4.2.1 What is a Use Case?
4.2.2 ETSI M2M Work on Use Cases
4.2.3 Methodology for Developing Use Cases
4.3 Smart Metering Approach in ETSI M2M
4.3.1 Introduction
4.3.2 Typical Smart Metering Deployment Scenario
4.4 eHealth Approach in ETSI M2M
4.4.1 Introduction
4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to
Different Market Segments
4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and
Considerations for Network Architecture Design
4.6.1 Why Focus on Wireless Networks?
4.7 Description of M2M Market Segments/Applications
4.7.1 Automotive
4.7.2 Smart Telemetry
4.7.3 Surveillance and Security
4.7.4 Point of Sale (PoS)
4.7.5 Vending Machines
4.7.6 eHealth
4.7.7 Live Video
4.7.8 Building Automation
4.7.9 M2M Industrial Automation
4.8 M2M Traffic Characterization
4.8.1 Detailed Traffic Characterization for Smart Metering
4.8.2 Global Traffic Characterization
4.9 High-Level Architecture Principles for M2M Communications
4.10 Chapter Conclusions
References
5 ETSI M2M Services Architecture
5.1 Introduction
5.2 High-Level System Architecture
5.3 ETSI TC M2M Service Capabilities Framework
5.4 ETSI TC M2M Release 1 Scenarios
5.5 ETSI M2M Service Capabilities
5.5.1 Reachability, Addressing, and Repository Capability (xRAR)
5.5.2 Remote Entity Management Capability (x REM)
5.5.3 Security Capability (xSEC)
5.6 Introducing REST Architectural Style for M2M
5.6.1 Introduction to REST
5.6.2 Why REST for M2M?
5.6.3 REST Basics
5.6.4 Applying REST to M2M
5.6.5 Additional Functionalities
5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures
5.7.1 Introduction
5.7.2 Definitions Used in this Section
5.7.3 Resource Structure
5.7.4 Interface Procedures
5.8 Chapter Conclusion
References
6 M2M Optimizations in Public Mobile Networks
6.1 Chapter Overview
6.2 M2M over a Telecommunications Network
6.2.1 Introduction
6.2.2 M2M Communication Scenarios
6.2.3 Mobile or Fixed Networks
6.2.4 Data Connections for M2M Applications
6.3 Network Optimizations for M2M
6.3.1 Introduction
6.3.2 3GPP Standardization of Network Improvements for Machine Type
Communications
6.3.3 Cost Reduction
6.3.4 M2M Value-Added Services
6.3.5 Numbering, Identifiers, and Addressing
6.3.6 Triggering Optimizations
6.3.7 Overload and Congestion Control
References
7 The Role of IP in M2M
7.1 Introduction
7.1.1 IPv6 in Brief
7.1.2 Neighbor Discovery Protocol
7.2 IPv6 for M2M
7.3 6LoWPAN
7.3.1 Framework
7.3.2 Header Compression
7.3.3 Neighbor Discovery
7.4 Routing Protocol for Low-Power and Lossy Networks (RPL)
7.4.1 RPL Topology
7.5 CoRE
7.5.1 Message Formats
7.5.2 Transport Protocol
7.5.3 REST Architecture
References
8 M2M Security
8.1 Introduction
8.1.1 Security Characteristics of Cellular M2M
8.2 Trust Relationships in the M2M Ecosystem
8.3 Security Requirements
8.3.1 Customer/M2M Device User
8.3.2 Access Network Provider
8.3.3 M2M Service Provider
8.3.4 Application Provider
8.3.5 Bootstrapping Requirements
8.4 Which Types of Solutions are Suitable?
8.4.1 Approaches Against Hijacking
8.4.2 Public Key Solutions
8.4.3 Smart Card-Based Solutions
8.4.4 Methods Based on Pre-Provisioned Symmetric Keys
8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based
Encryption
8.4.6 Security for Groups of M2M Devices
8.5 Standardization Efforts on Securing M2M and MTC Communications
8.5.1 ETSI M2M Security
8.5.2 3GPP Security Related to Network Improvements for Machine Type
Communications
References
9 M2M Terminals and Modules
9.1 M2M Module Categorization
9.1.1 Access Technology
9.1.2 Physical Form Factors
9.2 Hardware Interfaces
9.2.1 Power Interface
9.2.2 USB (Universal Serial Bus) Interface
9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface
9.2.4 Antenna Interface
9.2.5 UICC (Universal Integrated Circuit Card) Interface
9.2.6 GPIO (General-Purpose Input/Output Port) Interface
9.2.7 SPI (Serial Peripheral Interface) Interface
9.2.8 I2C (Inter-Integrated Circuit Bus) Interface
9.2.9 ADC (Analog-to-Digital Converter) Interface
9.2.10 PCM (Pulse Code Modulation) Interface
9.2.11 PWM (Pulse Width Modulation) Interface
9.2.12 Analog Audio Interface
9.3 Temperature and Durability
9.4 Services
9.4.1 Application Execution Environment
9.4.2 Connectivity Services
9.4.3 Management Services
9.4.4 Application Services
9.5 Software Interface
9.5.1 AT Commands
9.5.2 SDK Interface
9.6 Cellular Certification
9.6.1 Telecom Industry Certification
9.6.2 MNO Certification
10 Smart Cards in M2M Communication
10.1 Introduction
10.2 Security and Privacy Issues in M2M Communication
10.3 The Grounds for Hardware-Based Security Solutions
10.4 Independent Secure Elements and Trusted Environments
10.4.1 Trusted Environments in M2M Devices
10.4.2 Trusting Unknown Devices: The Need for Security Certification
10.4.3 Advantages of the Smart Card Model
10.5 Specific Smart Card Properties for M2M Environments
10.5.1 Removable Smart Cards versus Embedded Secure Elements
10.5.2 UICC Resistance to Environmental Constraints
10.5.3 Adapting the Card Application Toolkit to Unattended Devices
10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands
10.5.5 Confidential Remote Management of Third-Party Applications
10.6 Smart Card Future Evolutions in M2M Environments
10.6.1 UICC-Based M2M Service Identity Module Application
10.6.2 Internet Protocol Integration of the UICC
10.7 Remote Administration of M2M Secure Elements
10.7.1 Overview
10.7.2 Late Personalization of Subscription
10.7.3 Remote Management of Subscriptions on the Field
References
Part III BOOK CONCLUSIONS AND FUTURE VISION
11 Conclusions
Index
List of Contributors
List of Acronyms
1 Introduction to M2M
1.1 What is M2M?
1.2 The Business of M2M
1.3 Accelerating M2M Maturity
1.3.1 High-Level M2M Frameworks
1.3.2 Policy and Government Incentives
1.4 M2M Standards
1.4.1 Which Standards for M2M?
1.5 Roadmap of the Book
References
Part I M2M CURRENT LANDSCAPE
2 The Business of M2M
2.1 The M2M Market
2.1.1 Healthcare
2.1.2 Transportation
2.1.3 Energy
2.2 The M2M Market Adoption: Drivers and Barriers
2.3 The M2M Value Chain
2.4 Market Size Projections
2.5 Business Models
2.5.1 Network Operator- or CSP-Led Model
2.5.2 MVNO-Led Model
2.5.3 Corporate Customer-Led Model
2.6 M2M Business Metrics
2.7 Market Evolution
Reference
3 Lessons Learned from Early M2M Deployments
3.1 Introduction
3.2 Early M2M Operational Deployments
3.2.1 Introduction
3.2.2 Early M2M Operational Deployment Examples
3.2.3 Common Questions in Early M2M Deployments
3.2.4 Possible Optimization of M2M Deployments
3.3 Chapter Conclusion
Reference
Part II M2M ARCHITECTURE AND PROTOCOLS
4 M2M Requirements and High-Level Architectural Principles
4.1 Introduction
4.2 Use-Case-Driven Approach to M2M Requirements
4.2.1 What is a Use Case?
4.2.2 ETSI M2M Work on Use Cases
4.2.3 Methodology for Developing Use Cases
4.3 Smart Metering Approach in ETSI M2M
4.3.1 Introduction
4.3.2 Typical Smart Metering Deployment Scenario
4.4 eHealth Approach in ETSI M2M
4.4.1 Introduction
4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to
Different Market Segments
4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and
Considerations for Network Architecture Design
4.6.1 Why Focus on Wireless Networks?
4.7 Description of M2M Market Segments/Applications
4.7.1 Automotive
4.7.2 Smart Telemetry
4.7.3 Surveillance and Security
4.7.4 Point of Sale (PoS)
4.7.5 Vending Machines
4.7.6 eHealth
4.7.7 Live Video
4.7.8 Building Automation
4.7.9 M2M Industrial Automation
4.8 M2M Traffic Characterization
4.8.1 Detailed Traffic Characterization for Smart Metering
4.8.2 Global Traffic Characterization
4.9 High-Level Architecture Principles for M2M Communications
4.10 Chapter Conclusions
References
5 ETSI M2M Services Architecture
5.1 Introduction
5.2 High-Level System Architecture
5.3 ETSI TC M2M Service Capabilities Framework
5.4 ETSI TC M2M Release 1 Scenarios
5.5 ETSI M2M Service Capabilities
5.5.1 Reachability, Addressing, and Repository Capability (xRAR)
5.5.2 Remote Entity Management Capability (x REM)
5.5.3 Security Capability (xSEC)
5.6 Introducing REST Architectural Style for M2M
5.6.1 Introduction to REST
5.6.2 Why REST for M2M?
5.6.3 REST Basics
5.6.4 Applying REST to M2M
5.6.5 Additional Functionalities
5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures
5.7.1 Introduction
5.7.2 Definitions Used in this Section
5.7.3 Resource Structure
5.7.4 Interface Procedures
5.8 Chapter Conclusion
References
6 M2M Optimizations in Public Mobile Networks
6.1 Chapter Overview
6.2 M2M over a Telecommunications Network
6.2.1 Introduction
6.2.2 M2M Communication Scenarios
6.2.3 Mobile or Fixed Networks
6.2.4 Data Connections for M2M Applications
6.3 Network Optimizations for M2M
6.3.1 Introduction
6.3.2 3GPP Standardization of Network Improvements for Machine Type
Communications
6.3.3 Cost Reduction
6.3.4 M2M Value-Added Services
6.3.5 Numbering, Identifiers, and Addressing
6.3.6 Triggering Optimizations
6.3.7 Overload and Congestion Control
References
7 The Role of IP in M2M
7.1 Introduction
7.1.1 IPv6 in Brief
7.1.2 Neighbor Discovery Protocol
7.2 IPv6 for M2M
7.3 6LoWPAN
7.3.1 Framework
7.3.2 Header Compression
7.3.3 Neighbor Discovery
7.4 Routing Protocol for Low-Power and Lossy Networks (RPL)
7.4.1 RPL Topology
7.5 CoRE
7.5.1 Message Formats
7.5.2 Transport Protocol
7.5.3 REST Architecture
References
8 M2M Security
8.1 Introduction
8.1.1 Security Characteristics of Cellular M2M
8.2 Trust Relationships in the M2M Ecosystem
8.3 Security Requirements
8.3.1 Customer/M2M Device User
8.3.2 Access Network Provider
8.3.3 M2M Service Provider
8.3.4 Application Provider
8.3.5 Bootstrapping Requirements
8.4 Which Types of Solutions are Suitable?
8.4.1 Approaches Against Hijacking
8.4.2 Public Key Solutions
8.4.3 Smart Card-Based Solutions
8.4.4 Methods Based on Pre-Provisioned Symmetric Keys
8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based
Encryption
8.4.6 Security for Groups of M2M Devices
8.5 Standardization Efforts on Securing M2M and MTC Communications
8.5.1 ETSI M2M Security
8.5.2 3GPP Security Related to Network Improvements for Machine Type
Communications
References
9 M2M Terminals and Modules
9.1 M2M Module Categorization
9.1.1 Access Technology
9.1.2 Physical Form Factors
9.2 Hardware Interfaces
9.2.1 Power Interface
9.2.2 USB (Universal Serial Bus) Interface
9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface
9.2.4 Antenna Interface
9.2.5 UICC (Universal Integrated Circuit Card) Interface
9.2.6 GPIO (General-Purpose Input/Output Port) Interface
9.2.7 SPI (Serial Peripheral Interface) Interface
9.2.8 I2C (Inter-Integrated Circuit Bus) Interface
9.2.9 ADC (Analog-to-Digital Converter) Interface
9.2.10 PCM (Pulse Code Modulation) Interface
9.2.11 PWM (Pulse Width Modulation) Interface
9.2.12 Analog Audio Interface
9.3 Temperature and Durability
9.4 Services
9.4.1 Application Execution Environment
9.4.2 Connectivity Services
9.4.3 Management Services
9.4.4 Application Services
9.5 Software Interface
9.5.1 AT Commands
9.5.2 SDK Interface
9.6 Cellular Certification
9.6.1 Telecom Industry Certification
9.6.2 MNO Certification
10 Smart Cards in M2M Communication
10.1 Introduction
10.2 Security and Privacy Issues in M2M Communication
10.3 The Grounds for Hardware-Based Security Solutions
10.4 Independent Secure Elements and Trusted Environments
10.4.1 Trusted Environments in M2M Devices
10.4.2 Trusting Unknown Devices: The Need for Security Certification
10.4.3 Advantages of the Smart Card Model
10.5 Specific Smart Card Properties for M2M Environments
10.5.1 Removable Smart Cards versus Embedded Secure Elements
10.5.2 UICC Resistance to Environmental Constraints
10.5.3 Adapting the Card Application Toolkit to Unattended Devices
10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands
10.5.5 Confidential Remote Management of Third-Party Applications
10.6 Smart Card Future Evolutions in M2M Environments
10.6.1 UICC-Based M2M Service Identity Module Application
10.6.2 Internet Protocol Integration of the UICC
10.7 Remote Administration of M2M Secure Elements
10.7.1 Overview
10.7.2 Late Personalization of Subscription
10.7.3 Remote Management of Subscriptions on the Field
References
Part III BOOK CONCLUSIONS AND FUTURE VISION
11 Conclusions
Index