Skip to Content
The Internet of Things: Key Applications and Protocols
book

The Internet of Things: Key Applications and Protocols

by Olivier Hersent, David Boswarthick, Omar Elloumi
February 2012
Intermediate to advanced
370 pages
9h 8m
English
Wiley
Content preview from The Internet of Things: Key Applications and Protocols

14

The ETSI M2M Architecture

14.1 Introduction to ETSI TC M2M

At present, there are about 50 to 70 billion “machines” in the world, about 1% of which are connected to a communication network. There is obviously an enormous growth potential for M2M, but the transition from current midscale M2M applications (about 500 000 devices) to the next level (applications managing tens of millions of devices) will require new standards.

While current M2M standards address the transport level, and client to server communication protocols, the future “Internet of Things” will require a system-level architecture:

  • Enabling application developers to focus on functionality, not lower-level tasks like network access control, authentication or routing;
  • Enabling any application to read or control any sensor, under control of a horizontal security framework;
  • Providing network-based services, such as data publication and subscription.

In order to achieve these goals, common functions and network elements need to be identified and standardized at part of the M2M infrastructure: the ETSI M2M technical committee was created in January 2009 at the request of many telecom operators to create a standard system-level architecture for mass-scale M2M. ETSI TC M2M does not address one domain in particular; on the contrary, its ambition is to become the common backbone of all mass-scale M2M applications. The following domains are explicitly covered:

  • Security/serenity: surveillance applications, alarms, object/people ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Practical Industrial Internet of Things Security

Practical Industrial Internet of Things Security

Sravani Bhattacharjee

Publisher Resources

ISBN: 9781119994350Purchase book