IoT & M2M
Differences and Similarities between M2M and
IoT, SDN and NFV for IoT, Difference between SDN and NFV for IoT,
Basics of IoT System Management with
NETCONF, YANG-NETCONF, YANG and SNMP NETOPEER.
Size: 3.71 MB
Language: en
Added: Aug 09, 2023
Slides: 96 pages
Slide Content
Unit2
IoT &M2M
-by
GVNSKSravya
ECEDept.
GNITS
Outline
•M2M
•Differences and Similarities between M2Mand
IoT
•SDN and NFV forIoT
•Difference between SDN and NFV forIoT
•Basics of IoT System Management with
NETCONF
•YANG-NETCONF
•YANG and SNMPNETOPEER.
IV/IVECE-CIoTbyGVNSKSravya3/14/202
2
2
Machine-to-Machine(M2M)
3/14/202
2
3
IV/IVECE-CIoTbyGVNSKSravya
•Machine-to-Machine(M2M)referstonetworkingofmachines(or
devices)
•Provides communicating and computation facilities between machines or
devices
•Purpose of remote monitoring and controlanddataexchange.
•Free of an humanintervention
•M2M provides cross platformintegration.
Machine-to-Machine(M2M)
•An M2M area network comprises of machines (or M2M nodes)
whichhaveembedded hardware modules for sensing,
actuation andcommunication.
•Various communication protocols can be used for M2M local
areanetworks such as ZigBee, Bluetooh, ModBus, M-Bus,
WirlessM-Bus,PowerLine Communication (PLC),6LoWPAN,
IEEE 802.15.4,etc.
IV/IVECE-CIoTbyGVNSKSravya 2
4
3/14/202
2
M2MGateway
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
26
•Since non-IP based protocols are used within M2M areanetworks,
theM2M nodes within one network cannot communicate with
nodesinanexternalnetwork.
•To enable the communication between remote M2Marea
networks,M2M gateways areused.
Difference between IoT andM2M
CommunicationProtocols
•M2M and IoT can differ in how the communication betweenthe
machinesordeviceshappens.
•M2M uses either proprietary or non-IP basedcommunication
protocolsforcommunication within the M2M areanetworks.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
28
Difference between IoT andM2M
Machines in M2M vs Things inIoT
•The "Things" in IoT refers to physical objects that haveunique
identifiersandcan sense and communicate with theirexternal
environment(anduserapplications) or their internal physical
states.
•M2M systems, in contrast to IoT, typically havehomogeneous
machine typeswithin an M2M areanetwork.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
29
Difference between IoT andM2M
Hardware vs SoftwareEmphasis
•While the emphasis of M2M is more on hardwarewith
embeddedmodules, theemphasis of IoT is more onsoftware.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
30
Difference between IoT andM2M
Data Collection &Analysis
•M2M data is collected in point solutions and often inon-
premisesstorageinfrastructure.
•In contrast to M2M, the data in IoT is collected in thecloud
(can be public,privateorhybridcloud).
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
31
Difference between IoT andM2M
Applications
•M2M data is collected in point solutions and can beaccessed
byon-premisesapplications such as diagnosis applications,
service management applications,andon-premisis
enterpriseapplications.
•IoT data is collected in the cloud and can be accessed by
cloud applicationssuchasanalytics applications,enterprise
applications, remote diagnosis and management
applications,etc.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
32
Communication in IoT vsM2M
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Communication in IoT vsM2M
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
Over View of CurrentNetwork
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
1
4
SDN
•Software-DefinedNetworking(SDN) is a networking
architecture thatseparatesthecontrol plane from thedata
plane andcentralizesthenetworkcontroller.
•Software-basedSDN controllersmaintain a unified view ofthe
network and make configuration, management and
provisioningsimpler.
3/14/202
2
IV/IVECE-CIoTbyGVNSKSravya 46
Limitations of ConventionalNetwork
Architecture
•Complex networkdevices
•ManagementOverhead
•LimitedScalability
SDN attempts to create network architectures that aresimple,
inexpensive, scalable and easy tomanage
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
49
SDNArchitecture
3/14/202
2
5
0
IV/IVECE-CIoTby
SDN LayeredArchitecture
3/14/202
2
5
1
IV/IVECE-CIoTbyGVNSKSravya
Key elements ofSDN
Centralized NetworkController
•With decoupled control and data planes and centralized
network controller,the network administrators canrapidly
configure thenetwork.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
52
Key elements ofSDN
Programmable OpenAPIs
•SDNarchitecturesupportsprogrammableopenAPIs forinterface
betweenthe SDN application and control layers (Northbound
interface).
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
53
Open FlowSwitch
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
55
Key elements ofSDN
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
56
NFV
•Network Function Virtualization (NFV) is a technology that
leveragesvirtualization to consolidate the heterogeneous network
devices onto industry standard high volume servers, switches and
storage.
•NFViscomplementaryto SDNasNFVcanprovidethe
infrastructureonwhich SDN canrun.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
2
1
NFV
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
2
1
Key elements ofNFV
Virtualized Network Function(VNF):
•VNF is a software implementation of a network function whichis
capableofrunning over the NFV Infrastructure(NFVI).
NFV Infrastructure(NFVI):
•NFVIincludescompute,networkandstorageresourcesthatare
virtualized.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
2
2
Key elements ofNFV
NFV Management andOrchestration:
•NFV Management and Orchestration focuses on allvirtualization-
specificmanagement tasks and covers the orchestrationand life-
cyclemanagement of physical and/or software resources that
supporttheinfrastructure virtualization, and thelife-cycle
management ofVNFs.
IV/IVECE-CIoTbyGVNSKSravya
3/14/202
2
2
2
NFV UseCase
NFV can be used to virtualize the Home Gateway. The NFV
infrastructure in the cloud hosts a virtualized Home Gateway.
The virtualized gateway provides private IP addresses to the
devices in the home. The virtualized gateway also connects
to network services such as VoIP andIPTV.
3/14/202
2
61IV/IVECE-CIoTbyGVNSKSravya
NFV Use CaseConventional
HomeArchitecture
•
3/14/202
2
62IV/IVECE-CIoTbyGVNSKSravya
Need for IoT Systems
Management
•AutomatingConfiguration
•Monitoring Operational & Statistical
Data
•ImprovedReliability
•System WideConfigurations
•Multiple SystemConfigurations
•Retrieving & ReusingConfigurations
Simple Network Management Protocol
(SNMP)
•SNMP is a well-known and widely used
network management protocol that allows
monitoring and configuring network devices
such as routers, switches, servers, printers,
etc.
•SNMP component include
•Network Management Station(NMS)
•Managed Device
•Management Information Base(MIB)
•SNMP Agent that runs on thedevice
Limitations ofSNMP
•SNMP is stateless in nature and each SNMP request contains all
the information to process the request. The application needs to be
intelligent to manage thedevice.
•SNMP is a connectionless protocol which uses UDP as the transport
protocol, making it unreliable as there was no support for
acknowledgement of requests.
•MIBs often lack writable objects without which device configuration
is not possible usingSNMP.
•It is difficult to differentiate between configuration and state data in
MIBs.
•Retrieving the current configuration from a device can be difficult
with SNMP.
•Earlier versions of SNMP did not have strong securityfeatures.
Network Operator
Requirements
•Ease ofuse
•Distinction between configuration and state
data
•Fetch configuration and state dataseparately
•Configuration of the network as awhole
•Configuration transactions across devices
•Configuration deltas
•Dump and restoreconfigurations
•Configuration validation
•Configuration databaseschemas
•Comparingconfigurations
•Role-based accesscontrol
•Consistency of access control lists:
•Multiple configurationsets
•Support for both data-oriented and
task-oriented access control
NETCONF
•NETCONF works on SSH transportprotocol.
•Transport layer provides end-to-end connectivity and ensure reliable delivery of
messages.
•NETCONF uses XML-encoded Remote Procedure Calls (RPCs) for framing
request and responsemessages.
•The RPC layer provides mechanism for encoding of RPC calls andnotifications.
•NETCONF provides various operations to retrieve and edit configuration
data from networkdevices.
•The Content Layer consists of configuration and state data which isXML-encoded.
•The schema of the configuration and state data is defined in a data modeling
language calledYANG.
•NETCONF provides a clear separation of the configuration and statedata.
•The configuration data resides within a NETCONF configuration datastore on the
server.
NETCONF
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
3
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
4
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
5
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
6
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
7
•YANGisadatamodelinglanguageusedtomodelconfigurationand
statedata
manipulated by the NETCONFprotocol
•YANG modules contain the definitions of the configuration data, state
data,
RPC calls that can be issued and the format of thenotifications.
•YANG modules defines the data exchanged between the NETCONF
clientand server.
•Amodulecomprisesofanumberof'leaf'nodeswhichareorganized
intoa hierarchical treestructure.
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
8
•The 'leaf' nodes are specified using the 'leaf' or 'leaf-list'constructs.
•Leaf nodes are organized using 'container' or 'list'constructs.
•A YANG module can import definitions from othermodules.
•Constraints can be defined on the data nodes, e.g. allowedvalues.
•YANGcanmodelbothconfigurationdataandstatedatausingthe
'config' statement.
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
8
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
6
9
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
YANG
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
0
NETOPEER
•NETOPEER is a set of open source NETCONF tools built on
the Libnetconflibrary.
•It allows operators to connect to their NETCONF enabled
devices as well as developers to allow control their devices via
NETCONF.
•NETOPEER tools include
NETOPEER Server
NETOPEER Agent
NETOPEER Cli
NETOPEER Manager
NETOPEER Configurator
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
1
IV/IV ECE-C IoT by GVNSKSravya
4/6/2022
NETOPEER
NETOPEER-Server
•It is a NETCONF protocol server that runs on the managed
device.
•It provides an environment for configuring the device using
NETCONF RPC operations and also retrieving the state data
from the device.
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
1
NETOPEER
NETOPEER-agent
•It is a NETCONF protocol agent running as a SSH/TLS
subsystem.
•It accepts incoming NETCONF connection and passes the
NETCONF RPC operations received from the NETCONF client
to the NETOPEER Server.
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
1
NETOPEER
NETOPEER-cli
•It is a NETCONF client that provides a command line interface
for interfacing with the NETOPEER-Server.
•The operator can use the NETOPEER-Clifrom the
management system to send NETCONF RPC operations for
configuring the device and retrieving the state information.
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
1
NETOPEER
NETOPEER-manager
•NETOPEER manager allows managing the YANG and
LibnetconfTransaction API (Trans API) modules on the
NETOPEER-Server.
•With NETOPEER manager modules can be loaded or removed
from the server.
NetopeerConfigurator
•It is a tool that can be used to configure the Netopeer-Server.
IV/IV ECE-C IoT by GVNSK
Sravya
4/6/2022
7
1