M2M Communications
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > M2M Communications: A Systems Approach
M2M Communications: A Systems Approach

M2M Communications: A Systems Approach


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic.  It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization. The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies.   It also considers dominant M2M application domains such as Smart Metering, Smart Grid, and eHealth. Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students. Key features: First technical book emerging from a standards perspective to respond to this highly specific       technology/business segment Covers the main challenges facing the M2M industry today, and proposes early roll-out scenarios and potential optimization solutions Examines the system level architecture and clearly defines the methodology and interfaces to be considered Includes important information presented in a logical manner essential for any engineer or business manager involved in the field of M2M and Internet of Things Provides a cross-over between vertical and horizontal M2M concepts and a possible evolution path between the two Written by experts involved at the cutting edge of M2M developments

Table of Contents:
Foreword List of Contributors List of Acronyms 1 Introduction to M2M 1.1 What is M2M? 1.2 The Business of M2M 1.3 Accelerating M2M Maturity 1.3.1 High-Level M2M Frameworks 1.3.2 Policy and Government Incentives 1.4 M2M Standards 1.4.1 Which Standards for M2M? 1.5 Roadmap of the Book References Part I M2M CURRENT LANDSCAPE 2 The Business of M2M 2.1 The M2M Market 2.1.1 Healthcare 2.1.2 Transportation 2.1.3 Energy 2.2 The M2M Market Adoption: Drivers and Barriers 2.3 The M2M Value Chain 2.4 Market Size Projections 2.5 Business Models 2.5.1 Network Operator- or CSP-Led Model 2.5.2 MVNO-Led Model 2.5.3 Corporate Customer-Led Model 2.6 M2M Business Metrics 2.7 Market Evolution Reference 3 Lessons Learned from Early M2M Deployments 3.1 Introduction 3.2 Early M2M Operational Deployments 3.2.1 Introduction 3.2.2 Early M2M Operational Deployment Examples 3.2.3 Common Questions in Early M2M Deployments 3.2.4 Possible Optimization of M2M Deployments 3.3 Chapter Conclusion Reference Part II M2M ARCHITECTURE AND PROTOCOLS 4 M2M Requirements and High-Level Architectural Principles 4.1 Introduction 4.2 Use-Case-Driven Approach to M2M Requirements 4.2.1 What is a Use Case? 4.2.2 ETSI M2M Work on Use Cases 4.2.3 Methodology for Developing Use Cases 4.3 Smart Metering Approach in ETSI M2M 4.3.1 Introduction 4.3.2 Typical Smart Metering Deployment Scenario 4.4 eHealth Approach in ETSI M2M 4.4.1 Introduction 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design 4.6.1 Why Focus on Wireless Networks? 4.7 Description of M2M Market Segments/Applications 4.7.1 Automotive 4.7.2 Smart Telemetry 4.7.3 Surveillance and Security 4.7.4 Point of Sale (PoS) 4.7.5 Vending Machines 4.7.6 eHealth 4.7.7 Live Video 4.7.8 Building Automation 4.7.9 M2M Industrial Automation 4.8 M2M Traffic Characterization 4.8.1 Detailed Traffic Characterization for Smart Metering 4.8.2 Global Traffic Characterization 4.9 High-Level Architecture Principles for M2M Communications 4.10 Chapter Conclusions References 5 ETSI M2M Services Architecture 5.1 Introduction 5.2 High-Level System Architecture 5.3 ETSI TC M2M Service Capabilities Framework 5.4 ETSI TC M2M Release 1 Scenarios 5.5 ETSI M2M Service Capabilities 5.5.1 Reachability, Addressing, and Repository Capability (xRAR) 5.5.2 Remote Entity Management Capability (x REM) 5.5.3 Security Capability (xSEC) 5.6 Introducing REST Architectural Style for M2M 5.6.1 Introduction to REST 5.6.2 Why REST for M2M? 5.6.3 REST Basics 5.6.4 Applying REST to M2M 5.6.5 Additional Functionalities 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures 5.7.1 Introduction 5.7.2 Definitions Used in this Section 5.7.3 Resource Structure 5.7.4 Interface Procedures 5.8 Chapter Conclusion References 6 M2M Optimizations in Public Mobile Networks 6.1 Chapter Overview 6.2 M2M over a Telecommunications Network 6.2.1 Introduction 6.2.2 M2M Communication Scenarios 6.2.3 Mobile or Fixed Networks 6.2.4 Data Connections for M2M Applications 6.3 Network Optimizations for M2M 6.3.1 Introduction 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications 6.3.3 Cost Reduction 6.3.4 M2M Value-Added Services 6.3.5 Numbering, Identifiers, and Addressing 6.3.6 Triggering Optimizations 6.3.7 Overload and Congestion Control References 7 The Role of IP in M2M 7.1 Introduction 7.1.1 IPv6 in Brief 7.1.2 Neighbor Discovery Protocol 7.2 IPv6 for M2M 7.3 6LoWPAN 7.3.1 Framework 7.3.2 Header Compression 7.3.3 Neighbor Discovery 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL) 7.4.1 RPL Topology 7.5 CoRE 7.5.1 Message Formats 7.5.2 Transport Protocol 7.5.3 REST Architecture References 8 M2M Security 8.1 Introduction 8.1.1 Security Characteristics of Cellular M2M 8.2 Trust Relationships in the M2M Ecosystem 8.3 Security Requirements 8.3.1 Customer/M2M Device User 8.3.2 Access Network Provider 8.3.3 M2M Service Provider 8.3.4 Application Provider 8.3.5 Bootstrapping Requirements 8.4 Which Types of Solutions are Suitable? 8.4.1 Approaches Against Hijacking 8.4.2 Public Key Solutions 8.4.3 Smart Card-Based Solutions 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption 8.4.6 Security for Groups of M2M Devices 8.5 Standardization Efforts on Securing M2M and MTC Communications 8.5.1 ETSI M2M Security 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications References 9 M2M Terminals and Modules 9.1 M2M Module Categorization 9.1.1 Access Technology 9.1.2 Physical Form Factors 9.2 Hardware Interfaces 9.2.1 Power Interface 9.2.2 USB (Universal Serial Bus) Interface 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface 9.2.4 Antenna Interface 9.2.5 UICC (Universal Integrated Circuit Card) Interface 9.2.6 GPIO (General-Purpose Input/Output Port) Interface 9.2.7 SPI (Serial Peripheral Interface) Interface 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface 9.2.9 ADC (Analog-to-Digital Converter) Interface 9.2.10 PCM (Pulse Code Modulation) Interface 9.2.11 PWM (Pulse Width Modulation) Interface 9.2.12 Analog Audio Interface 9.3 Temperature and Durability 9.4 Services 9.4.1 Application Execution Environment 9.4.2 Connectivity Services 9.4.3 Management Services 9.4.4 Application Services 9.5 Software Interface 9.5.1 AT Commands 9.5.2 SDK Interface 9.6 Cellular Certification 9.6.1 Telecom Industry Certification 9.6.2 MNO Certification 10 Smart Cards in M2M Communication 10.1 Introduction 10.2 Security and Privacy Issues in M2M Communication 10.3 The Grounds for Hardware-Based Security Solutions 10.4 Independent Secure Elements and Trusted Environments 10.4.1 Trusted Environments in M2M Devices 10.4.2 Trusting Unknown Devices: The Need for Security Certification 10.4.3 Advantages of the Smart Card Model 10.5 Specific Smart Card Properties for M2M Environments 10.5.1 Removable Smart Cards versus Embedded Secure Elements 10.5.2 UICC Resistance to Environmental Constraints 10.5.3 Adapting the Card Application Toolkit to Unattended Devices 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands 10.5.5 Confidential Remote Management of Third-Party Applications 10.6 Smart Card Future Evolutions in M2M Environments 10.6.1 UICC-Based M2M Service Identity Module Application 10.6.2 Internet Protocol Integration of the UICC 10.7 Remote Administration of M2M Secure Elements 10.7.1 Overview 10.7.2 Late Personalization of Subscription 10.7.3 Remote Management of Subscriptions on the Field References Part III BOOK CONCLUSIONS AND FUTURE VISION 11 Conclusions Index

About the Author :
David Boswarthick, ETSI, France David has been extensively involved in the standardization activities of mobile, fixed and convergent networks in both the European Telecommunications Standards Institute (ETSI) and the 3rd Generation Partnership Project (3GPP) for over 10 years. He is currently involved in the M2M standards group which is defining an end to end architecture and requirements for multiple M2M applications including Smart Metering, healthcare and enhanced home living. David holds a Master's Degree in Networks and Distributed systems from the University of Nice and Sophia Antipolis, France. Omar Elloumi, Alcatel-Lucent, France Omar is currently a standardization manager at Alcatel-Lucent. He received his degree in Engineering from Universite de Rennes I. Olivier Hersent, Consultant, France Olivier Hersent was the founder of NetCentrex and former CTO of Comverse Inc., and previously worked as an R&D Engineer at Orange/France Telecom. He studied finance, quantum physics and psychology at the Ecole Polytechnique from 1991-1994 and is now an independent consultant. The contributors will include the Editors' colleagues from Alcatel-Lucent amongst others.


Best Sellers


Product Details
  • ISBN-13: 9781119974048
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Standards Information Network
  • Language: English
  • Sub Title: A Systems Approach
  • ISBN-10: 1119974046
  • Publisher Date: 06 Mar 2012
  • Binding: Digital (delivered electronically)
  • No of Pages: 336


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
M2M Communications: A Systems Approach
John Wiley & Sons Inc -
M2M Communications: A Systems Approach
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

M2M Communications: A Systems Approach

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!