M2M- From Mobile to Embedded Internet
Transcript of M2M- From Mobile to Embedded Internet
IEEE Communications Magazine • April 201136 0163-6804/11/$25.00 © 2011 IEEE
INTRODUCTION
Machine-to-machine (M2M) communications inthe context of the mobile Internet has been asubject of intense discussions over the past twoyears. Some see it as the next technology revolu-tion after the computer and Internet. Some con-sider it simply hype. Others are cautious with await-and-see attitude.
Part of the confusion has been that M2M isnot something completely new. For those famil-iar with embedded control, M2M is a naturalextension of their existing business. They fail tosee the explosive growth that others are excitedabout. Other people also remember the high-tech bubbles in recent history, and question thepractical future of M2M.
Intel recently completed an extensive studyon the issues critical to the M2M industry. Weexchanged views with leading equipment manu-facturers, software vendors, and service pro-viders. In this article, we share some of ourlearning.
We begin with our vision of the future embed-ded mobile Internet. Then we look at severalM2M use cases that offer significant marketpotential. We discuss the requirements and chal-lenges associated with mass-scale M2M networks,and describe potential system architectures anddeployment options that can enable the connec-tivity of billions of low-cost devices. We describethe salient features of M2M traffic that may not
be supported efficiently by current standards andprovides an overview of potential enhancements.Finally, we summarize the progress of standardsdevelopment for M2M.
THE FUTURE OFEMBEDDED INTERNET
Mobile Internet is at a turning point. In this sec-tion, we discuss what motivates the evolutionand share our vision of M2M for the futureembedded Internet.
THE TECHNOLOGY ANDECONOMIC MOTIVATIONS FOR M2M
The proliferation of mobile Internet providesnationwide ubiquitous coverage and mobilitysupport. Today’s advanced wireless networks areready to deliver broadband data service at a sig-nificantly lower cost than in the past, thanks toextensive standardization [1]. These networksoffer many of the features necessary to enableM2M services in the future embedded Internet.
Technology is one of the main drivers ofM2M. The semiconductor industry’s shrinkinglithography and improved yield continue toreduce chipset cost and power consumption.Carrier WiFi, small cells, relay, and peer-to-peercommunication further extend the coverage ofwireless networks while dramatically reducingcost per bit transferred.
There are also profound economic motiva-tions for the wireless industry to aggressivelypursue M2M. As voice revenue continues todeteriorate, operators are under tremendouspressure to introduce new services that will filltheir revenue gap. M2M, cloud computing, andapplication stores top the list of potential rev-enue-generating services.
THE VISION OF INTERNET OF THINGSTo the authors, M2M represents a future wherebillions to trillions of everyday objects and thesurrounding environment are connected andmanaged through a range of devices, communi-cation networks, and cloud-based servers.
There are three essential components to this“Internet of Things” vision.
ABSTRACT
Is M2M hype or the future of our informa-tion society? What does it take to turn the M2Mvision into reality? In this article we discuss thebusiness motivations and technology challengesfor machine-to-machine communications. Wehighlight key M2M application requirements andmajor technology gaps. We analyze the futuredirections of air interface technology improve-ments and network architectures evolution toenable the mass deployment of M2M services. Inparticular, we consider the salient features ofM2M traffic that may not be supported efficient-ly by present standards, and provide an overviewof potential enhancements. Finally, we discussstandards development for M2M.
RECENT PROGRESS IN MACHINE-TO-MACHINECOMMUNICATIONS
Geng Wu, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson, Intel
M2M: From Mobile toEmbedded Internet
WU LAYOUT 3/22/11 10:30 AM Page 36
IEEE Communications Magazine • April 2011 37
A continuum of devices from low-cost/low-power to compute-rich/high-performance: In theM2M market, large numbers of devices areexpected to be embedded, requiring extremelylow price points and low power consumption.However, higher-end devices such as gateways,machine control modules, intelligent vision sys-tems, and even consumer electronic products arealso important growth segments.
Ultra scalable connectivity: This is arguablythe most important component of the M2Mvision. A device that is not connected cannoteasily be managed or work in concert with otherdevices. Our most critical challenge, therefore, isto enable low-cost connectivity that addressesnot only the massive network scale but also thevastly diverse requirements dictated by thedevice continuum.
Cloud-based mass device management andservices: The vision of the future is no longerone device acting alone, but many devices actingtogether. Thus, although distributed processingis critical to address the complexity of M2Mapplications, centralized decision making andmanagement of billions of devices within thecloud will become an essential value of the Inter-net of Things vision.
Although this vision is not new, it is only nowgathering momentum as ubiquitous connectivityis finally becoming a reality, and Moore’s Lawhas driven device cost and size low enough tojustify “smart devices everywhere.”
THE ESSENTIAL ELEMENTS OFM2M SOLUTIONS
Third-/fourth-generation (3G/4G) wireless tech-nologies will play a central role in the future ofM2M. Its high data rate enables high value ser-vices. In markets where 2G is reaching the endof its life cycle, 3G/4G is the only option.
As the M2M market expands, operators willencounter significant technical challenges. Secu-rity will be of paramount concern. A major secu-rity breach in a network connecting billions ofdevices is unthinkable. It is expected thatadvanced solutions including “security-on-chip”will be developed.
As the M2M market expands, “zero-touch”manageability and information overload will posesignificant challenges to the network. We haveobserved in large-scale surveillance networksthat the number of video feeds overwhelmshuman operators. Thus, there will be an urgentneed for video analytics at the installed enddevices.
Similarly, as M2M solutions evolve, optimumdistribution of device and cloud intelligence willbecome critical. With increased intelligence atthe device, augmented sensing will be practicalfor innovative value-added services.
Scaling smart device installations and sup-porting future technology is a crucial smart sys-tem architecture concern. We envisionstandardized M2M plug-n-play capability to beessential to overall acceptance of M2M tech-nologies.
Finally, future M2M solutions will need tosupport a mix of legacy and new services anddevices. We expect M2M gateway/aggregation
points to play a key role in bringing the installedshort-range sensors online and providing inter-working with different wireless technologies.These gateway/aggregation points can alsobecome a platform for value-added services toenable an explosive growth of short-range smartsensors, fully managing the scale
TOWARD THE FUTURE OF EMBEDDED INTERNETFuture M2M ecosystems will be complex andspan many industries, including telecom andelectronics. Unlike current M2M markets, whichare highly segmented and often rely on propri-etary solutions, future M2M markets will needto be based on industry standards to achieveexplosive growth. This standards process will bemuch broader than writing a specification, as itinvolves not only interfaces, but also platformsand services. The M2M industry needs to lever-age existing vertical market solutions, designplatforms that horizontalize the market, andavoid the narrow solutions that come from chas-ing “killer apps.” The industry also needs toramp up efforts to develop critical technologiesfor an optimized air interface, device manage-ability, network architecture, and security inorder to enable future mass deployment ofembedded devices.
REPRESENTATIVEM2M USAGE MODELS
One can envision creating an immensely rich setof applications when thousands of objects sur-rounding us are connected. Some examples aresmart homes, where intelligent appliancesautonomously minimize energy use and cost;“connected cars” that react in real time to pre-vent accidents; and body area networks thattrack vital signs and trigger emergency responsewhen life is at risk. In this section, we studythree M2M applications and provide a briefdescription of other applications to demonstratethe broad market potential of M2M.
UTILITIES (SMART GRID)Smart grid integrates communication capabilitieswith utility generation (e.g., electric power, gas,water) and delivery infrastructure to automatemonitoring and control. Sgnificant savings inresource consumption is also possible when utilitysupply is dynamically matched with demand. Keysmart grid applications are smart metering, distri-bution network automation, demand response,equipment diagnostics, as well as wide area moni-toring and control. An example of smart grid net-work architecture is described in [2].
An M2M-enabled smart meter collects utilityusage information from home appliances viashort-range radio or a home area network andsends the information to the M2M server by com-municating directly through the 3G/4G networkor via an M2M aggregation device and then tothe 3G/4G network. The M2M aggregation devicecollects information from many smart meters inthe area and sends the aggregated information tothe M2M application server. The home area net-work interface to the smart-meter can be basedon several short-range wireless technologies such
Future M2M
ecosystems will be
complex and span
many industries,
including telecom
and electronics.
Unlike current M2M
markets, which are
highly segmented
and often rely on
proprietary solutions,
future M2M markets
will need to be
based on industry
standards to achieve
explosive growth.
WU LAYOUT 3/22/11 10:30 AM Page 37
IEEE Communications Magazine • April 201138
as WiFi, Home-Plug, ZigBee, or even 3G/4G ifused with femto-like capability.
This hierarchical network architecture is actu-ally typical in many M2M applications.
VEHICULAR TELEMATICSMost vehicular M2M applications can be catego-rized into one of the following: safety and securi-ty, information and navigation, diagnostics, orentertainment.
An example of a safety and security service isAutomatic Crash Notification. This service uti-lizes various crash sensors on the vehicle toreport the location and extent of damage to thevehicle in the event of a crash. It also initiates avoice call to facilitate reporting of the crash toEmergency Services.
Information and navigation services provideaccess for the vehicle occupant to a variety oflocation sensitive information and content, simi-lar to what we have access to today via Googlemap search.
Diagnostic services enable the occupant and/or vehicle maintenance/repair centers to collectdata from a multitude of sensors locatedthroughout the vehicle in order make mainte-nance and/or repair recommendations.
Many vehicular M2M applications require acombination of short-range low-power low-throughput wireless access (e.g., Zigbee) forsensing processes and local connectivity withinthe vehicle, and long-range low-latency high-throughput wireless access such as 3G/4G forreporting functions and Internet access formedia content services.
HEALTHCARE (M-HEALTH)M-Health is a nascent market aimed at improv-ing the quality of patient care and reducinghealthcare costs. Services include telemedicineto improve patient care by virtue of more accu-rate and faster reporting of changes in thepatient’s physical condition, automated connec-tivity of medical devices to the hospital networkand remote management of these devices, andelectronic representation and exchange of medi-cal data between hospitals and medical groups
such as laboratories or pharmacies to lowertransaction costs.
To date, the healthcare industry has spentsignificant resources on telemedicine. One of theprimary services is remote patient monitoringand care, wherein a patient wears bio-sensors torecord health and fitness indicators such asblood pressure, body temperature, heart rate,and weight. These sensors forward their collect-ed data to an M2M device (e.g., a patient’s cellphone) that acts as an information aggregatorand forwards the data to the M2M applicationserver in the cloud. The M2M server responds tothe collected data by sending alerts and appro-priate medical records to medical providers. Inemergency situations, an M2M device can direct-ly provide the medical status of a patient enroute to the hospital (e.g., in the ambulance),allowing physicians to prepare for treatment inadvance of the patient’s arrival. This is a sce-nario where reliable high-speed connectivitysuch as 4G cellular is required.
OTHER APPLICATIONS ANDGENERAL USAGE MODELS
Many other applications can benefit from wire-less WAN capability, such as new generations ofconsumer devices that incorporate personal navi-gation, e-readers, remote digital frame functions,public surveillance systems, environment moni-toring, remote maintenance and control, e-pay-ment systems, and tracking/tracing.
Table 1 shows example M2M use cases thatrequire or benefit from wireless WAN coverage.The table is not exhaustive, but it gives an ideaof the range of M2M applications that have beendiscussed in the Third Generation PartnershipProject (3GPP) and IEEE standards [2–4].
M2M CONNECTIVITY ANDNETWORK ARCHITECTURES
As seen from the wide range of usages, theindustry needs a cost-effective, scalable M2Msolution that will support a variety of applica-
Table 1. Example M2M use cases with wireless WAN coverage and mobility support.
Security and public safety Surveillance systems, control of physical access (e.g., buildings), environmental monitoring (e.g., fornatural disasters), backup for landlines
Smart grid Electricity, gas, water, heating, grid control, industrial metering, demand response
Tracking and tracing Order management, asset tracking, human monitoring
Vehicular telematics Fleet management, car/driver security, enhanced navigation, traffic info, tolls, pay as you drive,remote vehicle diagnostics
Payment Point of sale, ATM, vending machines, gaming machines
Healthcare Monitoring vital signs, supporting the aged or handicapped, web access telemedicine points,remote diagnostics
Remote maintenance and control Industrial automation, sensors, lighting, pumps, vending machine control
Consumer devices Digital photo frame, digital camera, ebook, home management hubs.
WU LAYOUT 3/22/11 10:30 AM Page 38
IEEE Communications Magazine • April 2011 39
tions and M2M devices. When the numbers ofdevices explodes, network access deterioratesrapidly. The expected increase in M2M devicesalso poses a network capacity concern. Hierar-chical network architectures offer an effectivesolution.
HIERARCHICAL NETWORK ARCHITECTURES FORSCALABLE CONNECTIVITY
Multiple connectivity options are availabletoday to connect M2M devices to a server andeach other. However, to do this on the scale ofbillions to trillions, particularly when manydevices are limited in range due tocost/size/power constraints, hierarchical deploy-ments that provide reliable, efficient interwork-ing between multiple communication protocols(PAN/LAN/WAN) will be needed. Figure 1 cap-tures a high-level view of a hierarchical M2Msystem architecture.
The M2M device can connect to the M2Mserver directly through a WAN connection(e.g., cellular 3G/4G) or an M2M gateway(aggregation point). The gateway is a smartM2M device that collects and processes datafrom simpler M2M devices and manages theiroperation. Typically, connecting through a gate-way is preferred when devices are sensitive tocost, power, or location. There are severallower-cost radio protocols, such as IEEE802.11, IEEE 802.15, and power line communi-cations, through which these devices can com-municate.
Many M2M applications will require connec-tivity between end devices. Peer-to-peer (P2P)connectivity can be supported in this architec-ture at various levels of hierarchy depending onlatency requirements and the type of informa-tion exchanged.
HIERARCHICAL NETWORKS FOR HIGH CAPACITY
Recent studies have pointed to the explosivegrowth in mobile data demand driven by populardevices and video services [5, 6]. M2M will fur-ther add to the pressure.
The most cost-effective solution to this explo-sive increase in traffic demand lies, once again,in hierarchical network architectures, comprisingboth multiple tiers and multiple radios.
Multitier: In the multitier hierarchy shownin Fig. 2, large cells provide ubiquitous cover-age to M2M devices and support high mobili-ty; while smaller network elements such asrelays and pico/femto access points (APs)bring connectivity closer to the devices,improving link reliability and increasing systemcapacity [7]. The lower cost of smaller APsmakes them an attractive method of addingcapacity, since it is done at a lower cost per bit[7, 8]. Devices (mobile stations) can also serveas a tier in the network hierarchy by creatingP2P nanocells.
Multiradio: Figure 2 also shows multipleaccess networks being integrated and man-aged as part of a single hierarchical network.Here, the additional spectrum and connec-t iv i ty avai lable across dif ferent networks(e.g., WiFi and cellular) may be exploitedsynergist ical ly to further improve systemcapacity and device quality of service. Thecost associated with this additional capacitymay be very low since the alternate spectrumcould essentially be free (e.g. , unlicensedspectrum). New network devices, such as theintegrated femtocell access point (AP), withl icensed and unl icensed capabi l i t ies , canimplement t ighter coupl ing across theseradio technologies, efficiently utilizing theavailable spectrum.
Figure 1. A high-level M2M system architecture.
Wide area network(cellular or fixed line)
Personal areanetwork (ZigBee,WiFi, Bluetooth)
P2P gatewaycommunication
M2M device(”indirect” sensors)
M2M device(”direct” sensors)
Local area network(WiFi or wired)
Gateway
Aggregation pointAggregation point
Gateway
Peer-to-peersocial network
Local userview/control
Cloud
M2Mserver
Mobile operatorsystem interface
M2M serviceconsumer
When the numbers
of devices explodes,
network access
deteriorates rapidly.
The expected
increase in M2M
devices also poses a
network capacity
concern. Hierarchical
network architec-
tures offer an
effective solution.
WU LAYOUT 3/22/11 10:30 AM Page 39
IEEE Communications Magazine • April 201140
KEY FEATURES FORAIR INTERFACE OPTIMIZATIONS
In addition to the architectural innovations dis-cussed earlier, further optimizations of the airinterface are needed to efficiently support newM2M traffic characteristics. In this section wediscuss features that are unique to M2M, butcommon to one or more M2M use cases. Table2 summarizes several key M2M features alongwith their associated applications and potentialimpacts on air interface standards [3, 4].
MASS DEVICE TRANSMISSIONThis feature deals with the handling of simulta-neous or near simultaneous transmissionattempts to the access network’s base stationfrom an extremely large number of M2Mdevices. This feature may be required for manyuse cases such as secured access and surveil-lance, public safety, healthcare, and metering.
Support for these features may requireenhancements to the network entry/re-entry andbandwidth request protocols, link adaptation,(hybrid) automatic repeat request (HARQ/ARQ), and/or the frame structure.
HIGH RELIABILITYHigh reliability implies that connectivity and reli-able transmission are guaranteed regardless ofoperating environment (e.g., mobility, channelquality). This feature is required in emergencysituations or scenarios where privacy is extreme-ly important (e.g., healthcare, remote payment).
Improved reliability may require changes tothe link adaptation protocol or modulation/cod-ing schemes. Other solutions may involve
improved interference mitigation, device collab-oration, or redundant path establishment.
ENHANCED ACCESS PRIORITYPriority access is necessary in order to com-
municate “alarms” in a variety of use cases.Enhanced access priority may require changes
to the bandwidth request, network entry, orARQ/HARQ protocols. Changes to the framestructure may also be required.
EXTREMELY LOW POWER CONSUMPTIONThis feature is required by devices that have noor limited access to power sources, wake only ondemand, experience infrequent human or systeminteraction, or belong to a large network ofdevices that cumulatively consume a lot ofpower.
Support for this feature may require updatesto control signaling, idle and sleep mode, linkadaptation, and uplink (UL) power control.Device collaboration will also reduce power con-sumption.
SMALL BURST TRANSMISSIONSupport for this feature may require changes toburst management, the SMS transmissionmechanism, bandwidth request/allocation proto-cols, channel coding, and/or frame structure. Asmaller resource unit may be necessary to trans-mit an extremely small downlink (DL)/UL burstsize.
LOW/NO MOBILITYMany M2M use cases involve stationary or
low mobility devices (e.g., payment, metering,and retail). For these cases, the system should
Figure 2. Hierarchical system architecture [6].
Wireless accessWireless backhaul
Wired backhaul
Multi-tier
Integrated-AP
Relay station
Distributedantennas
Mobile PAN
Pico-BS
Femto-APWiFi-AP
Client relay
SON
Back
haul
Multi-radio
DAS
M2M systems need
to be able to detect
unusual events (such
as changed device
location, device dam-
age) and support
appropriate levels of
authentication for
M2M devices and
gateways. Enhanced
monitoring and secu-
rity may require
changes to the net-
work entry/re-entry
procedure.
WU LAYOUT 3/22/11 10:30 AM Page 40
IEEE Communications Magazine • April 2011 41
provide simplified or optimized mobility man-agement in order to reduce power consumptionand signaling overhead.
Changes to the signaling related to handoverpreparation and execution may be required totake advantage of low/no mobility. This featuremay also impact idle mode.
MONITORING AND SECURITYThe nature of M2M deployments makes the sys-tem vulnerable to attacks on hardware and soft-ware/firmware, compromise of credentials andconfiguration, and network attacks (e.g., hackingand denial of service).
M2M systems need to be able to detectunusual events (such as changed device location,device damage) and support appropriate levelsof authentication for M2M devices and gate-ways. Enhanced monitoring and security mayrequire changes to the network entry/re-entryprocedure.
ADDRESSING EXTREMELYLARGE NUMBER OF DEVICES
Addressing extremely large numbers of devicesmay require extending the addressing space orupdating the addressing scheme.
GROUP CONTROLGroup control implies that the system supportsgroup addressing and handling of M2M devices.
Enabling group control of mass devices basedon predefined criteria (location, function, etc.)may require changes to group ID allocation,control signaling, paging, sleep-mode initiation,multicast operation, and bandwidth request/allocation. Changes to network entry/re-entryand service flow and connection managementprotocols may also be necessary.
TIME-CONTROLLED TRAFFICTime-controlled traffic is transmitted andreceived at periods of time that are defined wellin advance. This type of traffic enables power-saving reductions in the bandwidth request, net-work entry, idle/sleep mode protocols. Thesystem may release the data connection outsideof the access period.
TIME-TOLERANT TRAFFICTime-tolerant traffic can support significant delaysin data transmission and reception. This impliesthat the system can give lower access priority to ordefer data transmission of time-tolerant traffic.This feature enables simplifications to the band-width request and ARQ/HARQ protocols.
ONE-WAY DATA TRAFFICWhen data traffic is “one way,” it is only controlsignaling that is transmitted in the oppositedirection. Digital signage and consumer devicesare use cases where data may be device-termi-nated only.
One-way traffic may require changes to thenetwork entry and addressing protocols, and itmay enable simplifications to the bandwidthrequest/allocation protocol. In addition, thereceiving procedure of the DL control channelmay be simplified for one-way data traffic.
EXTREMELY LOW LATENCY
Extremely low latency requires that both net-work access latency and data transmission laten-cy be reduced. This feature is required in manyemergency situations (e.g., healthcare).
Changes to the bandwidth request and net-work entry/re-entry protocols may be required tosupport extremely low latency. This feature mayalso require changes to the frame structure,ARQ/HARQ, and control signaling.
INFREQUENT TRAFFICInfrequent traffic is common in many M2M usecases. This feature may enable sleep/idle modeimprovements that save power and channelresources.
As M2M markets continue to develop, addi-tional features may be added to this list. Weexpect that the technologies for the embeddedInternet will continue to evolve.
STANDARDS DEVELOPMENT FORM2M
Many standards are moving quickly to supportthe architectural and air interface changes dis-cussed earlier. Since the requirements andapplications are still evolving, most standardsbodies are taking a phased approach, wherebasic M2M features are being standardized andenabled quickly, with additional optimizationsexpected in later phases as the market grows.
Table 2. Summary of air interface optimizations.
Features Applications
Standards impacts
Slee
p a
nd
idle
mo
de
Mo
bili
ty m
anag
emen
t
Lin
k ad
apta
tio
n
BW
req
ues
t &
Allo
cati
on
HA
RQ
an
d A
RQ
Fram
e st
ruct
ure
Net
wo
rk e
ntr
y
Co
op
erat
ion
Mass devicetransmission
SecurityMeteringTracking
√ √ √ √ √ √ √
High reliability
Access priority
HealthSecurityHealth
Remote maint& control
√ √ √ √ √ √ √
√ √ √ √ √ √
Very low power TrackingRemote maint
& control√ √ √ √ √ √ √ √
Small databurst
Low/no mobility
Monitoring andsecurity
MeteringRemote maint
& control
Metering
VehicularPayment
√ √
√ √ √ √ √ √
√ √ √
WU LAYOUT 3/22/11 10:30 AM Page 41
IEEE Communications Magazine • April 201142
For example, in the first phase, only enhance-ments that require firmware and softwarechanges (e.g., medium access control [MAC]modifications) are enabled. In later phases,more extensive modifications to the PHY andMAC are expected, which will accommodateadvanced requirements such as those for theM2M gateway, which serves as a bridge betweenmultiple protocols.
M2M is dependent on many technologiesacross multiple industries. Consequently, therequired scope of standardization is significantlygreater than that of any traditional standardsdevelopment. As shown in Table 3, the scope ofvarious standards organizations active in M2Mranges from air interface and network architec-ture (e.g., 3GPP, IEEE, European Telecommu-nications Standards Institute [ETSI]), to selectedvertical applications (e.g., TelecommunicationsIndustry Association [TIA], Wi-Fi Alliance[WFA], GSM Association [GSMA]), to certaincritical technical areas (e.g., Open MobileAlliance [OMA] on device manageability). Col-laboration among standards organizations acrossdifferent industries is therefore essential. Fortu-nately, the M2M community is starting to recog-nize this need, and joint efforts andcollaborations among standards bodies areincreasing.
In addition to developing open interfaces andstandard system architectures, M2M ecosystemsalso need to establish a set of common softwareand hardware platforms to substantially reducedevelopment costs and improve time to market.Most of the existing proprietary vertical M2Msolutions have difficulty scaling. Horizontaldevelopments in the M2M industry are essentialfor realizing the embedded Internet vision. Thisis of particular importance to consumer or homeM2M applications where the biggest marketgrowth is yet to come.
CONCLUSIONMobile Internet is evolving towards embeddedInternet. M2M presents both challenges andopportunities to the industry. Although there aresignificant business and economic motivationsfor wireless operators and equipment manufac-turers to invest in future generations of M2Mservices, the highly fragmented markets remain ahurdle and risk the forecasted growth of M2Mmarkets. Two things are needed for the embed-ded Internet vision to materialize: the develop-ment of new technologies that scale with thegrowth of M2M markets, and a broad standard-ization effort in system interfaces, network archi-tecture, and implementation platforms.
Table 3. Status of global M2M standards development.
SDO M2M development
3GPP
Release 10: identify requirements and optimize radio and network for features such as low power, congestion andoverload control, identifiers, addressing, subscription control and security.Release 11 and beyond: network improvements for device to device communication, M2M gateway, enhancements forM2M group and co-located M2M devices, network selection and steering, service requirements and optimizations.
ETSI M2M network architecture: define functional and behavioral requirements of each network element to provide anend-to-end view.
GSMAGSM operation for M2M: define a set of GSM based embedded modules that address operational issues, such asmodule design, radio interface, remote management, UICC provisioning and authentication, and basic elementscosts. Also define use-cases in vertical markets: health, utilities, automotive, and consumer devices.
IEEE
802.16p (WiMAX): optimize air interface for low power, mass device transmission, small bursts, and device authenti-cation. Future topics: M2M gateway, co-operative M2M networks, advanced M2M features802.11 (WiFi): update air interface to enable use of sub-GHz spectrum802.15.4 (ZigBee): air interface optimization for smart grid networks
WiMAX Forum Network system architecture specification: define usages, deployment models with low OPEX, functional require-ments based on IEEE 802.16 protocols, and performance guidelines for end-to-end M2M system.
WFA
Smart grid task group: promote the adoption of Wi-Fi within the smart grid through marketing initiatives, govern-ment and industry engagement, and technical/certification programsHealthcare task group: maintain Wi-Fi as the preferred wireless access technology and increase adoption in theHome and Hospital Healthcare market segment.
OMA Device manageability: define requirements for the gateway managed object
TIA M2M SW architecture TR50: develop and maintain access agnostic interface standards for monitoring and bi-direc-tional communication of events and information between smart devices and other devices, applications or networks.
CCSA NITS
CCSA TC10: focus on pervasive networks, including general requirements, applications, networking, sensing andrelated short range RF connectivity.NITS WGSN: focus on sensor network interface and data format, ID and security, vertical applications including air-port and smart buildings.
WU LAYOUT 3/22/11 10:30 AM Page 42
IEEE Communications Magazine • April 2011 43
ACKNOWLEDGMENT
The authors would like to thank Geoff Weaverand Boyd Bangerter of Intel Labs for their tech-nology insights and valuable comments.
REFERENCES[1] Morgan Stanley, “Internet Trends,” March 9, 2010[2] IEEE C80216-10_0002r7, “Machine to Machine (M2M)
Communication Study Report,” IEEE802.16 Contribu-tion, May, 2010.
[3] DRAFT-T31-127-R020-v01, “Recommendations andRequirements for WiMAX Machine to Machine (M2M),WiMAX Forum doc., Aug. 2010.
[4] 3GPP TS 22.368 v10.1.0, “Service Requirements forMachine-Type Communications (Stage 1),” Release 10,June 2010.
[5] Cisco Visual Networking Index, Cisco VNI, Oct. 2009.[6] IEEE C80216-10_0016r1, “Future 802.16 Network: Chal-
lenges and Possibilities,” Mar. 2010.[7] S. Yeh, S. Talwar, S. Lee and H. Kim, “WiMAX Femto-
cells: A Perspective on Network Architecture, Capacityand Coverage,” IEEE Commun. Mag., Oct. 2008.
[8] Johansson et al., “A Methodology for Estimating Costand Performance of Heterogeneous Wireless AccessNetworks,” PIMRC ’07.
BIOGRAPHIESGENG WU ([email protected]) is chief architect and direc-tor of Wireless Standards in the Wireless Technology Divi-sion at Intel Corporation. He has 20 years of experience inthe wireless industry. Prior to Intel, he was director ofWireless Architecture and Standards at Nortel Networks,with extensive experience in 3G/4G technology develop-ments. He obtained his B.Sc. in electrical engineering fromTianjin University, China, and his Ph.D. in telecommunica-tions from Université Laval, Canada.
SHILPA TALWAR ([email protected]) is a principalengineer in the Wireless Communications Laboratory atIntel, where she is conducting research on mobile broad-band technologies. She has over 15 years of experiencein wireless. Prior to Intel, she held several senior techni-cal positions in the wireless industry. She graduatedfrom Stanford University in 1996 with a Ph.D. in appliedmathematics and an M.S. in electrical engineering. She isthe author of numerous technical publications andpatents.
KERSTIN JOHNSSON ([email protected]) is a seniorresearch scientist in the Wireless Communications Labora-tory at Intel, where she conducts research on network,MAC, and PHY optimizations that improve wireless net-work cost, coverage, and capacity. She graduated fromStanford with a Ph.D. in electrical engineering and hasalmost 10 years’ experience in the wireless industry. She isthe author of numerous publications and patents in thefield of wireless communications.
NAGEEN HIMAYAT ([email protected]) is a seniorresearch scientist with Intel Labs, where she performsresearch on broadband wireless systems, including hetero-geneous networks, cross-layer radio resource management,MIMO-OFDM techniques, and optimizations for M2M com-munications. She has over 15 years of research and devel-opment experience in the telecom industry. She obtainedher B.S.E.E from Rice University and her Ph.D. in electricalengineering from the University of Pennsylvania in 1989and 1994, respectively.
KEVIN D. JOHNSON ([email protected]) is directorof Embedded Connected Devices at Intel Corporation. Hedirects the team that has responsibility for acceleratingembedded products and technologies in the M2M indus-try. He has over 20 years of product, technology, andbusiness experience in the computing and embedded mar-kets. He holds a B.S. in engineering from Oregon StateUniversity and a Master’s in business from the Universityof Portland.
Two things are need-
ed for the embed-
ded Internet vision to
materialize: the
development of new
technologies that
scale with the
growth of M2M
markets, and a
broad standardiza-
tion effort in system
interfaces, network
architecture, and
implementation
platforms.
WU LAYOUT 3/22/11 10:30 AM Page 43