M2M- From Mobile to Embedded Internet

8
IEEE Communications Magazine • April 2011 36 0163-6804/11/$25.00 © 2011 IEEE INTRODUCTION Machine-to-machine (M2M) communications in the context of the mobile Internet has been a subject of intense discussions over the past two years. Some see it as the next technology revolu- tion after the computer and Internet. Some con- sider it simply hype. Others are cautious with a wait-and-see attitude. Part of the confusion has been that M2M is not something completely new. For those famil- iar with embedded control, M2M is a natural extension of their existing business. They fail to see the explosive growth that others are excited about. Other people also remember the high- tech bubbles in recent history, and question the practical future of M2M. Intel recently completed an extensive study on the issues critical to the M2M industry. We exchanged views with leading equipment manu- facturers, software vendors, and service pro- viders. In this article, we share some of our learning. We begin with our vision of the future embed- ded mobile Internet. Then we look at several M2M use cases that offer significant market potential. We discuss the requirements and chal- lenges associated with mass-scale M2M networks, and describe potential system architectures and deployment options that can enable the connec- tivity of billions of low-cost devices. We describe the salient features of M2M traffic that may not be supported efficiently by current standards and provides an overview of potential enhancements. Finally, we summarize the progress of standards development for M2M. THE FUTURE OF EMBEDDED INTERNET Mobile Internet is at a turning point. In this sec- tion, we discuss what motivates the evolution and share our vision of M2M for the future embedded Internet. THE TECHNOLOGY AND ECONOMIC MOTIVATIONS FOR M2M The proliferation of mobile Internet provides nationwide ubiquitous coverage and mobility support. Today’s advanced wireless networks are ready to deliver broadband data service at a sig- nificantly lower cost than in the past, thanks to extensive standardization [1]. These networks offer many of the features necessary to enable M2M services in the future embedded Internet. Technology is one of the main drivers of M2M. The semiconductor industry’s shrinking lithography and improved yield continue to reduce chipset cost and power consumption. Carrier WiFi, small cells, relay, and peer-to-peer communication further extend the coverage of wireless networks while dramatically reducing cost per bit transferred. There are also profound economic motiva- tions for the wireless industry to aggressively pursue M2M. As voice revenue continues to deteriorate, operators are under tremendous pressure to introduce new services that will fill their revenue gap. M2M, cloud computing, and application stores top the list of potential rev- enue-generating services. THE VISION OF INTERNET OF THINGS To the authors, M2M represents a future where billions to trillions of everyday objects and the surrounding environment are connected and managed through a range of devices, communi- cation networks, and cloud-based servers. There are three essential components to this “Internet of Things” vision. ABSTRACT Is M2M hype or the future of our informa- tion society? What does it take to turn the M2M vision into reality? In this article we discuss the business motivations and technology challenges for machine-to-machine communications. We highlight key M2M application requirements and major technology gaps. We analyze the future directions of air interface technology improve- ments and network architectures evolution to enable the mass deployment of M2M services. In particular, we consider the salient features of M2M traffic that may not be supported efficient- ly by present standards, and provide an overview of potential enhancements. Finally, we discuss standards development for M2M. RECENT PROGRESS IN MACHINE- TO-MACHINE COMMUNICATIONS Geng Wu, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson, Intel M2M: From Mobile to Embedded Internet

Transcript of M2M- From Mobile to Embedded Internet

Page 1: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 201136 0163-6804/11/$25.00 © 2011 IEEE

INTRODUCTION

Machine-to-machine (M2M) communications inthe context of the mobile Internet has been asubject of intense discussions over the past twoyears. Some see it as the next technology revolu-tion after the computer and Internet. Some con-sider it simply hype. Others are cautious with await-and-see attitude.

Part of the confusion has been that M2M isnot something completely new. For those famil-iar with embedded control, M2M is a naturalextension of their existing business. They fail tosee the explosive growth that others are excitedabout. Other people also remember the high-tech bubbles in recent history, and question thepractical future of M2M.

Intel recently completed an extensive studyon the issues critical to the M2M industry. Weexchanged views with leading equipment manu-facturers, software vendors, and service pro-viders. In this article, we share some of ourlearning.

We begin with our vision of the future embed-ded mobile Internet. Then we look at severalM2M use cases that offer significant marketpotential. We discuss the requirements and chal-lenges associated with mass-scale M2M networks,and describe potential system architectures anddeployment options that can enable the connec-tivity of billions of low-cost devices. We describethe salient features of M2M traffic that may not

be supported efficiently by current standards andprovides an overview of potential enhancements.Finally, we summarize the progress of standardsdevelopment for M2M.

THE FUTURE OFEMBEDDED INTERNET

Mobile Internet is at a turning point. In this sec-tion, we discuss what motivates the evolutionand share our vision of M2M for the futureembedded Internet.

THE TECHNOLOGY ANDECONOMIC MOTIVATIONS FOR M2M

The proliferation of mobile Internet providesnationwide ubiquitous coverage and mobilitysupport. Today’s advanced wireless networks areready to deliver broadband data service at a sig-nificantly lower cost than in the past, thanks toextensive standardization [1]. These networksoffer many of the features necessary to enableM2M services in the future embedded Internet.

Technology is one of the main drivers ofM2M. The semiconductor industry’s shrinkinglithography and improved yield continue toreduce chipset cost and power consumption.Carrier WiFi, small cells, relay, and peer-to-peercommunication further extend the coverage ofwireless networks while dramatically reducingcost per bit transferred.

There are also profound economic motiva-tions for the wireless industry to aggressivelypursue M2M. As voice revenue continues todeteriorate, operators are under tremendouspressure to introduce new services that will filltheir revenue gap. M2M, cloud computing, andapplication stores top the list of potential rev-enue-generating services.

THE VISION OF INTERNET OF THINGSTo the authors, M2M represents a future wherebillions to trillions of everyday objects and thesurrounding environment are connected andmanaged through a range of devices, communi-cation networks, and cloud-based servers.

There are three essential components to this“Internet of Things” vision.

ABSTRACT

Is M2M hype or the future of our informa-tion society? What does it take to turn the M2Mvision into reality? In this article we discuss thebusiness motivations and technology challengesfor machine-to-machine communications. Wehighlight key M2M application requirements andmajor technology gaps. We analyze the futuredirections of air interface technology improve-ments and network architectures evolution toenable the mass deployment of M2M services. Inparticular, we consider the salient features ofM2M traffic that may not be supported efficient-ly by present standards, and provide an overviewof potential enhancements. Finally, we discussstandards development for M2M.

RECENT PROGRESS IN MACHINE-TO-MACHINECOMMUNICATIONS

Geng Wu, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson, Intel

M2M: From Mobile toEmbedded Internet

WU LAYOUT 3/22/11 10:30 AM Page 36

Page 2: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 2011 37

A continuum of devices from low-cost/low-power to compute-rich/high-performance: In theM2M market, large numbers of devices areexpected to be embedded, requiring extremelylow price points and low power consumption.However, higher-end devices such as gateways,machine control modules, intelligent vision sys-tems, and even consumer electronic products arealso important growth segments.

Ultra scalable connectivity: This is arguablythe most important component of the M2Mvision. A device that is not connected cannoteasily be managed or work in concert with otherdevices. Our most critical challenge, therefore, isto enable low-cost connectivity that addressesnot only the massive network scale but also thevastly diverse requirements dictated by thedevice continuum.

Cloud-based mass device management andservices: The vision of the future is no longerone device acting alone, but many devices actingtogether. Thus, although distributed processingis critical to address the complexity of M2Mapplications, centralized decision making andmanagement of billions of devices within thecloud will become an essential value of the Inter-net of Things vision.

Although this vision is not new, it is only nowgathering momentum as ubiquitous connectivityis finally becoming a reality, and Moore’s Lawhas driven device cost and size low enough tojustify “smart devices everywhere.”

THE ESSENTIAL ELEMENTS OFM2M SOLUTIONS

Third-/fourth-generation (3G/4G) wireless tech-nologies will play a central role in the future ofM2M. Its high data rate enables high value ser-vices. In markets where 2G is reaching the endof its life cycle, 3G/4G is the only option.

As the M2M market expands, operators willencounter significant technical challenges. Secu-rity will be of paramount concern. A major secu-rity breach in a network connecting billions ofdevices is unthinkable. It is expected thatadvanced solutions including “security-on-chip”will be developed.

As the M2M market expands, “zero-touch”manageability and information overload will posesignificant challenges to the network. We haveobserved in large-scale surveillance networksthat the number of video feeds overwhelmshuman operators. Thus, there will be an urgentneed for video analytics at the installed enddevices.

Similarly, as M2M solutions evolve, optimumdistribution of device and cloud intelligence willbecome critical. With increased intelligence atthe device, augmented sensing will be practicalfor innovative value-added services.

Scaling smart device installations and sup-porting future technology is a crucial smart sys-tem architecture concern. We envisionstandardized M2M plug-n-play capability to beessential to overall acceptance of M2M tech-nologies.

Finally, future M2M solutions will need tosupport a mix of legacy and new services anddevices. We expect M2M gateway/aggregation

points to play a key role in bringing the installedshort-range sensors online and providing inter-working with different wireless technologies.These gateway/aggregation points can alsobecome a platform for value-added services toenable an explosive growth of short-range smartsensors, fully managing the scale

TOWARD THE FUTURE OF EMBEDDED INTERNETFuture M2M ecosystems will be complex andspan many industries, including telecom andelectronics. Unlike current M2M markets, whichare highly segmented and often rely on propri-etary solutions, future M2M markets will needto be based on industry standards to achieveexplosive growth. This standards process will bemuch broader than writing a specification, as itinvolves not only interfaces, but also platformsand services. The M2M industry needs to lever-age existing vertical market solutions, designplatforms that horizontalize the market, andavoid the narrow solutions that come from chas-ing “killer apps.” The industry also needs toramp up efforts to develop critical technologiesfor an optimized air interface, device manage-ability, network architecture, and security inorder to enable future mass deployment ofembedded devices.

REPRESENTATIVEM2M USAGE MODELS

One can envision creating an immensely rich setof applications when thousands of objects sur-rounding us are connected. Some examples aresmart homes, where intelligent appliancesautonomously minimize energy use and cost;“connected cars” that react in real time to pre-vent accidents; and body area networks thattrack vital signs and trigger emergency responsewhen life is at risk. In this section, we studythree M2M applications and provide a briefdescription of other applications to demonstratethe broad market potential of M2M.

UTILITIES (SMART GRID)Smart grid integrates communication capabilitieswith utility generation (e.g., electric power, gas,water) and delivery infrastructure to automatemonitoring and control. Sgnificant savings inresource consumption is also possible when utilitysupply is dynamically matched with demand. Keysmart grid applications are smart metering, distri-bution network automation, demand response,equipment diagnostics, as well as wide area moni-toring and control. An example of smart grid net-work architecture is described in [2].

An M2M-enabled smart meter collects utilityusage information from home appliances viashort-range radio or a home area network andsends the information to the M2M server by com-municating directly through the 3G/4G networkor via an M2M aggregation device and then tothe 3G/4G network. The M2M aggregation devicecollects information from many smart meters inthe area and sends the aggregated information tothe M2M application server. The home area net-work interface to the smart-meter can be basedon several short-range wireless technologies such

Future M2M

ecosystems will be

complex and span

many industries,

including telecom

and electronics.

Unlike current M2M

markets, which are

highly segmented

and often rely on

proprietary solutions,

future M2M markets

will need to be

based on industry

standards to achieve

explosive growth.

WU LAYOUT 3/22/11 10:30 AM Page 37

Page 3: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 201138

as WiFi, Home-Plug, ZigBee, or even 3G/4G ifused with femto-like capability.

This hierarchical network architecture is actu-ally typical in many M2M applications.

VEHICULAR TELEMATICSMost vehicular M2M applications can be catego-rized into one of the following: safety and securi-ty, information and navigation, diagnostics, orentertainment.

An example of a safety and security service isAutomatic Crash Notification. This service uti-lizes various crash sensors on the vehicle toreport the location and extent of damage to thevehicle in the event of a crash. It also initiates avoice call to facilitate reporting of the crash toEmergency Services.

Information and navigation services provideaccess for the vehicle occupant to a variety oflocation sensitive information and content, simi-lar to what we have access to today via Googlemap search.

Diagnostic services enable the occupant and/or vehicle maintenance/repair centers to collectdata from a multitude of sensors locatedthroughout the vehicle in order make mainte-nance and/or repair recommendations.

Many vehicular M2M applications require acombination of short-range low-power low-throughput wireless access (e.g., Zigbee) forsensing processes and local connectivity withinthe vehicle, and long-range low-latency high-throughput wireless access such as 3G/4G forreporting functions and Internet access formedia content services.

HEALTHCARE (M-HEALTH)M-Health is a nascent market aimed at improv-ing the quality of patient care and reducinghealthcare costs. Services include telemedicineto improve patient care by virtue of more accu-rate and faster reporting of changes in thepatient’s physical condition, automated connec-tivity of medical devices to the hospital networkand remote management of these devices, andelectronic representation and exchange of medi-cal data between hospitals and medical groups

such as laboratories or pharmacies to lowertransaction costs.

To date, the healthcare industry has spentsignificant resources on telemedicine. One of theprimary services is remote patient monitoringand care, wherein a patient wears bio-sensors torecord health and fitness indicators such asblood pressure, body temperature, heart rate,and weight. These sensors forward their collect-ed data to an M2M device (e.g., a patient’s cellphone) that acts as an information aggregatorand forwards the data to the M2M applicationserver in the cloud. The M2M server responds tothe collected data by sending alerts and appro-priate medical records to medical providers. Inemergency situations, an M2M device can direct-ly provide the medical status of a patient enroute to the hospital (e.g., in the ambulance),allowing physicians to prepare for treatment inadvance of the patient’s arrival. This is a sce-nario where reliable high-speed connectivitysuch as 4G cellular is required.

OTHER APPLICATIONS ANDGENERAL USAGE MODELS

Many other applications can benefit from wire-less WAN capability, such as new generations ofconsumer devices that incorporate personal navi-gation, e-readers, remote digital frame functions,public surveillance systems, environment moni-toring, remote maintenance and control, e-pay-ment systems, and tracking/tracing.

Table 1 shows example M2M use cases thatrequire or benefit from wireless WAN coverage.The table is not exhaustive, but it gives an ideaof the range of M2M applications that have beendiscussed in the Third Generation PartnershipProject (3GPP) and IEEE standards [2–4].

M2M CONNECTIVITY ANDNETWORK ARCHITECTURES

As seen from the wide range of usages, theindustry needs a cost-effective, scalable M2Msolution that will support a variety of applica-

Table 1. Example M2M use cases with wireless WAN coverage and mobility support.

Security and public safety Surveillance systems, control of physical access (e.g., buildings), environmental monitoring (e.g., fornatural disasters), backup for landlines

Smart grid Electricity, gas, water, heating, grid control, industrial metering, demand response

Tracking and tracing Order management, asset tracking, human monitoring

Vehicular telematics Fleet management, car/driver security, enhanced navigation, traffic info, tolls, pay as you drive,remote vehicle diagnostics

Payment Point of sale, ATM, vending machines, gaming machines

Healthcare Monitoring vital signs, supporting the aged or handicapped, web access telemedicine points,remote diagnostics

Remote maintenance and control Industrial automation, sensors, lighting, pumps, vending machine control

Consumer devices Digital photo frame, digital camera, ebook, home management hubs.

WU LAYOUT 3/22/11 10:30 AM Page 38

Page 4: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 2011 39

tions and M2M devices. When the numbers ofdevices explodes, network access deterioratesrapidly. The expected increase in M2M devicesalso poses a network capacity concern. Hierar-chical network architectures offer an effectivesolution.

HIERARCHICAL NETWORK ARCHITECTURES FORSCALABLE CONNECTIVITY

Multiple connectivity options are availabletoday to connect M2M devices to a server andeach other. However, to do this on the scale ofbillions to trillions, particularly when manydevices are limited in range due tocost/size/power constraints, hierarchical deploy-ments that provide reliable, efficient interwork-ing between multiple communication protocols(PAN/LAN/WAN) will be needed. Figure 1 cap-tures a high-level view of a hierarchical M2Msystem architecture.

The M2M device can connect to the M2Mserver directly through a WAN connection(e.g., cellular 3G/4G) or an M2M gateway(aggregation point). The gateway is a smartM2M device that collects and processes datafrom simpler M2M devices and manages theiroperation. Typically, connecting through a gate-way is preferred when devices are sensitive tocost, power, or location. There are severallower-cost radio protocols, such as IEEE802.11, IEEE 802.15, and power line communi-cations, through which these devices can com-municate.

Many M2M applications will require connec-tivity between end devices. Peer-to-peer (P2P)connectivity can be supported in this architec-ture at various levels of hierarchy depending onlatency requirements and the type of informa-tion exchanged.

HIERARCHICAL NETWORKS FOR HIGH CAPACITY

Recent studies have pointed to the explosivegrowth in mobile data demand driven by populardevices and video services [5, 6]. M2M will fur-ther add to the pressure.

The most cost-effective solution to this explo-sive increase in traffic demand lies, once again,in hierarchical network architectures, comprisingboth multiple tiers and multiple radios.

Multitier: In the multitier hierarchy shownin Fig. 2, large cells provide ubiquitous cover-age to M2M devices and support high mobili-ty; while smaller network elements such asrelays and pico/femto access points (APs)bring connectivity closer to the devices,improving link reliability and increasing systemcapacity [7]. The lower cost of smaller APsmakes them an attractive method of addingcapacity, since it is done at a lower cost per bit[7, 8]. Devices (mobile stations) can also serveas a tier in the network hierarchy by creatingP2P nanocells.

Multiradio: Figure 2 also shows multipleaccess networks being integrated and man-aged as part of a single hierarchical network.Here, the additional spectrum and connec-t iv i ty avai lable across dif ferent networks(e.g., WiFi and cellular) may be exploitedsynergist ical ly to further improve systemcapacity and device quality of service. Thecost associated with this additional capacitymay be very low since the alternate spectrumcould essentially be free (e.g. , unlicensedspectrum). New network devices, such as theintegrated femtocell access point (AP), withl icensed and unl icensed capabi l i t ies , canimplement t ighter coupl ing across theseradio technologies, efficiently utilizing theavailable spectrum.

Figure 1. A high-level M2M system architecture.

Wide area network(cellular or fixed line)

Personal areanetwork (ZigBee,WiFi, Bluetooth)

P2P gatewaycommunication

M2M device(”indirect” sensors)

M2M device(”direct” sensors)

Local area network(WiFi or wired)

Gateway

Aggregation pointAggregation point

Gateway

Peer-to-peersocial network

Local userview/control

Cloud

M2Mserver

Mobile operatorsystem interface

M2M serviceconsumer

When the numbers

of devices explodes,

network access

deteriorates rapidly.

The expected

increase in M2M

devices also poses a

network capacity

concern. Hierarchical

network architec-

tures offer an

effective solution.

WU LAYOUT 3/22/11 10:30 AM Page 39

Page 5: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 201140

KEY FEATURES FORAIR INTERFACE OPTIMIZATIONS

In addition to the architectural innovations dis-cussed earlier, further optimizations of the airinterface are needed to efficiently support newM2M traffic characteristics. In this section wediscuss features that are unique to M2M, butcommon to one or more M2M use cases. Table2 summarizes several key M2M features alongwith their associated applications and potentialimpacts on air interface standards [3, 4].

MASS DEVICE TRANSMISSIONThis feature deals with the handling of simulta-neous or near simultaneous transmissionattempts to the access network’s base stationfrom an extremely large number of M2Mdevices. This feature may be required for manyuse cases such as secured access and surveil-lance, public safety, healthcare, and metering.

Support for these features may requireenhancements to the network entry/re-entry andbandwidth request protocols, link adaptation,(hybrid) automatic repeat request (HARQ/ARQ), and/or the frame structure.

HIGH RELIABILITYHigh reliability implies that connectivity and reli-able transmission are guaranteed regardless ofoperating environment (e.g., mobility, channelquality). This feature is required in emergencysituations or scenarios where privacy is extreme-ly important (e.g., healthcare, remote payment).

Improved reliability may require changes tothe link adaptation protocol or modulation/cod-ing schemes. Other solutions may involve

improved interference mitigation, device collab-oration, or redundant path establishment.

ENHANCED ACCESS PRIORITYPriority access is necessary in order to com-

municate “alarms” in a variety of use cases.Enhanced access priority may require changes

to the bandwidth request, network entry, orARQ/HARQ protocols. Changes to the framestructure may also be required.

EXTREMELY LOW POWER CONSUMPTIONThis feature is required by devices that have noor limited access to power sources, wake only ondemand, experience infrequent human or systeminteraction, or belong to a large network ofdevices that cumulatively consume a lot ofpower.

Support for this feature may require updatesto control signaling, idle and sleep mode, linkadaptation, and uplink (UL) power control.Device collaboration will also reduce power con-sumption.

SMALL BURST TRANSMISSIONSupport for this feature may require changes toburst management, the SMS transmissionmechanism, bandwidth request/allocation proto-cols, channel coding, and/or frame structure. Asmaller resource unit may be necessary to trans-mit an extremely small downlink (DL)/UL burstsize.

LOW/NO MOBILITYMany M2M use cases involve stationary or

low mobility devices (e.g., payment, metering,and retail). For these cases, the system should

Figure 2. Hierarchical system architecture [6].

Wireless accessWireless backhaul

Wired backhaul

Multi-tier

Integrated-AP

Relay station

Distributedantennas

Mobile PAN

Pico-BS

Femto-APWiFi-AP

Client relay

SON

Back

haul

Multi-radio

DAS

M2M systems need

to be able to detect

unusual events (such

as changed device

location, device dam-

age) and support

appropriate levels of

authentication for

M2M devices and

gateways. Enhanced

monitoring and secu-

rity may require

changes to the net-

work entry/re-entry

procedure.

WU LAYOUT 3/22/11 10:30 AM Page 40

Page 6: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 2011 41

provide simplified or optimized mobility man-agement in order to reduce power consumptionand signaling overhead.

Changes to the signaling related to handoverpreparation and execution may be required totake advantage of low/no mobility. This featuremay also impact idle mode.

MONITORING AND SECURITYThe nature of M2M deployments makes the sys-tem vulnerable to attacks on hardware and soft-ware/firmware, compromise of credentials andconfiguration, and network attacks (e.g., hackingand denial of service).

M2M systems need to be able to detectunusual events (such as changed device location,device damage) and support appropriate levelsof authentication for M2M devices and gate-ways. Enhanced monitoring and security mayrequire changes to the network entry/re-entryprocedure.

ADDRESSING EXTREMELYLARGE NUMBER OF DEVICES

Addressing extremely large numbers of devicesmay require extending the addressing space orupdating the addressing scheme.

GROUP CONTROLGroup control implies that the system supportsgroup addressing and handling of M2M devices.

Enabling group control of mass devices basedon predefined criteria (location, function, etc.)may require changes to group ID allocation,control signaling, paging, sleep-mode initiation,multicast operation, and bandwidth request/allocation. Changes to network entry/re-entryand service flow and connection managementprotocols may also be necessary.

TIME-CONTROLLED TRAFFICTime-controlled traffic is transmitted andreceived at periods of time that are defined wellin advance. This type of traffic enables power-saving reductions in the bandwidth request, net-work entry, idle/sleep mode protocols. Thesystem may release the data connection outsideof the access period.

TIME-TOLERANT TRAFFICTime-tolerant traffic can support significant delaysin data transmission and reception. This impliesthat the system can give lower access priority to ordefer data transmission of time-tolerant traffic.This feature enables simplifications to the band-width request and ARQ/HARQ protocols.

ONE-WAY DATA TRAFFICWhen data traffic is “one way,” it is only controlsignaling that is transmitted in the oppositedirection. Digital signage and consumer devicesare use cases where data may be device-termi-nated only.

One-way traffic may require changes to thenetwork entry and addressing protocols, and itmay enable simplifications to the bandwidthrequest/allocation protocol. In addition, thereceiving procedure of the DL control channelmay be simplified for one-way data traffic.

EXTREMELY LOW LATENCY

Extremely low latency requires that both net-work access latency and data transmission laten-cy be reduced. This feature is required in manyemergency situations (e.g., healthcare).

Changes to the bandwidth request and net-work entry/re-entry protocols may be required tosupport extremely low latency. This feature mayalso require changes to the frame structure,ARQ/HARQ, and control signaling.

INFREQUENT TRAFFICInfrequent traffic is common in many M2M usecases. This feature may enable sleep/idle modeimprovements that save power and channelresources.

As M2M markets continue to develop, addi-tional features may be added to this list. Weexpect that the technologies for the embeddedInternet will continue to evolve.

STANDARDS DEVELOPMENT FORM2M

Many standards are moving quickly to supportthe architectural and air interface changes dis-cussed earlier. Since the requirements andapplications are still evolving, most standardsbodies are taking a phased approach, wherebasic M2M features are being standardized andenabled quickly, with additional optimizationsexpected in later phases as the market grows.

Table 2. Summary of air interface optimizations.

Features Applications

Standards impacts

Slee

p a

nd

idle

mo

de

Mo

bili

ty m

anag

emen

t

Lin

k ad

apta

tio

n

BW

req

ues

t &

Allo

cati

on

HA

RQ

an

d A

RQ

Fram

e st

ruct

ure

Net

wo

rk e

ntr

y

Co

op

erat

ion

Mass devicetransmission

SecurityMeteringTracking

√ √ √ √ √ √ √

High reliability

Access priority

HealthSecurityHealth

Remote maint& control

√ √ √ √ √ √ √

√ √ √ √ √ √

Very low power TrackingRemote maint

& control√ √ √ √ √ √ √ √

Small databurst

Low/no mobility

Monitoring andsecurity

MeteringRemote maint

& control

Metering

VehicularPayment

√ √

√ √ √ √ √ √

√ √ √

WU LAYOUT 3/22/11 10:30 AM Page 41

Page 7: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 201142

For example, in the first phase, only enhance-ments that require firmware and softwarechanges (e.g., medium access control [MAC]modifications) are enabled. In later phases,more extensive modifications to the PHY andMAC are expected, which will accommodateadvanced requirements such as those for theM2M gateway, which serves as a bridge betweenmultiple protocols.

M2M is dependent on many technologiesacross multiple industries. Consequently, therequired scope of standardization is significantlygreater than that of any traditional standardsdevelopment. As shown in Table 3, the scope ofvarious standards organizations active in M2Mranges from air interface and network architec-ture (e.g., 3GPP, IEEE, European Telecommu-nications Standards Institute [ETSI]), to selectedvertical applications (e.g., TelecommunicationsIndustry Association [TIA], Wi-Fi Alliance[WFA], GSM Association [GSMA]), to certaincritical technical areas (e.g., Open MobileAlliance [OMA] on device manageability). Col-laboration among standards organizations acrossdifferent industries is therefore essential. Fortu-nately, the M2M community is starting to recog-nize this need, and joint efforts andcollaborations among standards bodies areincreasing.

In addition to developing open interfaces andstandard system architectures, M2M ecosystemsalso need to establish a set of common softwareand hardware platforms to substantially reducedevelopment costs and improve time to market.Most of the existing proprietary vertical M2Msolutions have difficulty scaling. Horizontaldevelopments in the M2M industry are essentialfor realizing the embedded Internet vision. Thisis of particular importance to consumer or homeM2M applications where the biggest marketgrowth is yet to come.

CONCLUSIONMobile Internet is evolving towards embeddedInternet. M2M presents both challenges andopportunities to the industry. Although there aresignificant business and economic motivationsfor wireless operators and equipment manufac-turers to invest in future generations of M2Mservices, the highly fragmented markets remain ahurdle and risk the forecasted growth of M2Mmarkets. Two things are needed for the embed-ded Internet vision to materialize: the develop-ment of new technologies that scale with thegrowth of M2M markets, and a broad standard-ization effort in system interfaces, network archi-tecture, and implementation platforms.

Table 3. Status of global M2M standards development.

SDO M2M development

3GPP

Release 10: identify requirements and optimize radio and network for features such as low power, congestion andoverload control, identifiers, addressing, subscription control and security.Release 11 and beyond: network improvements for device to device communication, M2M gateway, enhancements forM2M group and co-located M2M devices, network selection and steering, service requirements and optimizations.

ETSI M2M network architecture: define functional and behavioral requirements of each network element to provide anend-to-end view.

GSMAGSM operation for M2M: define a set of GSM based embedded modules that address operational issues, such asmodule design, radio interface, remote management, UICC provisioning and authentication, and basic elementscosts. Also define use-cases in vertical markets: health, utilities, automotive, and consumer devices.

IEEE

802.16p (WiMAX): optimize air interface for low power, mass device transmission, small bursts, and device authenti-cation. Future topics: M2M gateway, co-operative M2M networks, advanced M2M features802.11 (WiFi): update air interface to enable use of sub-GHz spectrum802.15.4 (ZigBee): air interface optimization for smart grid networks

WiMAX Forum Network system architecture specification: define usages, deployment models with low OPEX, functional require-ments based on IEEE 802.16 protocols, and performance guidelines for end-to-end M2M system.

WFA

Smart grid task group: promote the adoption of Wi-Fi within the smart grid through marketing initiatives, govern-ment and industry engagement, and technical/certification programsHealthcare task group: maintain Wi-Fi as the preferred wireless access technology and increase adoption in theHome and Hospital Healthcare market segment.

OMA Device manageability: define requirements for the gateway managed object

TIA M2M SW architecture TR50: develop and maintain access agnostic interface standards for monitoring and bi-direc-tional communication of events and information between smart devices and other devices, applications or networks.

CCSA NITS

CCSA TC10: focus on pervasive networks, including general requirements, applications, networking, sensing andrelated short range RF connectivity.NITS WGSN: focus on sensor network interface and data format, ID and security, vertical applications including air-port and smart buildings.

WU LAYOUT 3/22/11 10:30 AM Page 42

Page 8: M2M- From Mobile to Embedded Internet

IEEE Communications Magazine • April 2011 43

ACKNOWLEDGMENT

The authors would like to thank Geoff Weaverand Boyd Bangerter of Intel Labs for their tech-nology insights and valuable comments.

REFERENCES[1] Morgan Stanley, “Internet Trends,” March 9, 2010[2] IEEE C80216-10_0002r7, “Machine to Machine (M2M)

Communication Study Report,” IEEE802.16 Contribu-tion, May, 2010.

[3] DRAFT-T31-127-R020-v01, “Recommendations andRequirements for WiMAX Machine to Machine (M2M),WiMAX Forum doc., Aug. 2010.

[4] 3GPP TS 22.368 v10.1.0, “Service Requirements forMachine-Type Communications (Stage 1),” Release 10,June 2010.

[5] Cisco Visual Networking Index, Cisco VNI, Oct. 2009.[6] IEEE C80216-10_0016r1, “Future 802.16 Network: Chal-

lenges and Possibilities,” Mar. 2010.[7] S. Yeh, S. Talwar, S. Lee and H. Kim, “WiMAX Femto-

cells: A Perspective on Network Architecture, Capacityand Coverage,” IEEE Commun. Mag., Oct. 2008.

[8] Johansson et al., “A Methodology for Estimating Costand Performance of Heterogeneous Wireless AccessNetworks,” PIMRC ’07.

BIOGRAPHIESGENG WU ([email protected]) is chief architect and direc-tor of Wireless Standards in the Wireless Technology Divi-sion at Intel Corporation. He has 20 years of experience inthe wireless industry. Prior to Intel, he was director ofWireless Architecture and Standards at Nortel Networks,with extensive experience in 3G/4G technology develop-ments. He obtained his B.Sc. in electrical engineering fromTianjin University, China, and his Ph.D. in telecommunica-tions from Université Laval, Canada.

SHILPA TALWAR ([email protected]) is a principalengineer in the Wireless Communications Laboratory atIntel, where she is conducting research on mobile broad-band technologies. She has over 15 years of experiencein wireless. Prior to Intel, she held several senior techni-cal positions in the wireless industry. She graduatedfrom Stanford University in 1996 with a Ph.D. in appliedmathematics and an M.S. in electrical engineering. She isthe author of numerous technical publications andpatents.

KERSTIN JOHNSSON ([email protected]) is a seniorresearch scientist in the Wireless Communications Labora-tory at Intel, where she conducts research on network,MAC, and PHY optimizations that improve wireless net-work cost, coverage, and capacity. She graduated fromStanford with a Ph.D. in electrical engineering and hasalmost 10 years’ experience in the wireless industry. She isthe author of numerous publications and patents in thefield of wireless communications.

NAGEEN HIMAYAT ([email protected]) is a seniorresearch scientist with Intel Labs, where she performsresearch on broadband wireless systems, including hetero-geneous networks, cross-layer radio resource management,MIMO-OFDM techniques, and optimizations for M2M com-munications. She has over 15 years of research and devel-opment experience in the telecom industry. She obtainedher B.S.E.E from Rice University and her Ph.D. in electricalengineering from the University of Pennsylvania in 1989and 1994, respectively.

KEVIN D. JOHNSON ([email protected]) is directorof Embedded Connected Devices at Intel Corporation. Hedirects the team that has responsibility for acceleratingembedded products and technologies in the M2M indus-try. He has over 20 years of product, technology, andbusiness experience in the computing and embedded mar-kets. He holds a B.S. in engineering from Oregon StateUniversity and a Master’s in business from the Universityof Portland.

Two things are need-

ed for the embed-

ded Internet vision to

materialize: the

development of new

technologies that

scale with the

growth of M2M

markets, and a

broad standardiza-

tion effort in system

interfaces, network

architecture, and

implementation

platforms.

WU LAYOUT 3/22/11 10:30 AM Page 43