Hotline:+8618073152920
CONTACT US/ CONTACT US
Consumer hotline +8618073152920
Changsha Zoko Link Technology Co., Ltd.

Email:sales@zoko-link.com

WhatsApp:+8615367865107

Address:Room 102, District D, Houhu Industrial Park, Yuelu District, Changsha City, Hunan Province, China

Position:Home >> Blogs >> Product knowledge

Product knowledge

Introduction to M2M applications and several key M2M standards

Time:2021-12-25 15:38:49 Popularity:733

Introduction to M2M applications and several key M2M standards

  M2M is machine-to-machine communication usually used for remote monitoring, the main purpose is to use sensor data and transmit it to the network. The main components of the system include sensors, RFID, Wi-Fi or cellular communication links, and autonomous computing software programmed to help network devices interpret data and make decisions. So what is the difference between M2M and IoT?

   Although many people can use these terms interchangeably, M2M and the Internet of Things are not the same. The Internet of Things requires M2M, but M2M does not require the Internet of Things. M2M systems are usually independent independent network devices. The Internet of Things system takes M2M to a new level, integrating different systems into a large interconnected ecosystem. M2M systems use point-to-point communication between machines, sensors and hardware on cellular or wired networks, while IoT systems rely on IP-based networks to send data collected from IoT connected devices to a gateway, cloud or middleware platform.

M2M.jpg

  M2M security

  Machine-to-machine systems face many security issues, from unauthorized access to wireless intrusion to device hacking. Physical security, privacy, fraud and the exposure of mission-critical applications must also be considered.

   Typical M2M security measures include making devices and machines tamper-proof, embedding security into the machines, and ensuring communication security through encryption and protection of back-end servers. Dividing M2M devices into their own networks and managing device identities, data confidentiality and device availability also help to resist M2M security risks.

  M2M standard

   There is no standardized equipment platform for machine-to-machine technology, and many M2M systems are built to be task-specific or equipment-specific. Several key M2M standards have emerged over the years, many of which are also used in IoT settings, including:

  OMA DM (Open Mobile Alliance Device Management), a device management protocol

  OMA LightweightM2M, a device management protocol

   MQTT, a messaging protocol

  TR-069 (Technical Report 069), an application layer protocol

   HyperCat, a data discovery protocol

  OneM2M, a communication protocol

  Google Threads, a wireless mesh protocol

  AllJoyn, an open source software framework

Related recommendations

Related products

Tell us your requirements, Let's discuss more about your project.we can do more.

Name*

Tel*

Email*

Company*

Country*

Message

online
Contacts
Email
Top
XIntroduction to M2M applications and several key M2M standards-Product knowledge-Soil sensors_temperature and humidity sensor_PH sensor_NPK sensor_Pyranometer_agricultural weather stations-NiuBoL

Screenshot, WhatsApp to identify the QR code

WhatsApp number:+8615367865107

(Click on WhatsApp to copy and add friends)

Open WhatsApp

The WhatsApp ID has been copied, please open WhatsApp to add consultation details!