An era of IoT— M2M communication protocols

Machine-to-Machine (M2M) communication uses networking technologies to enable both wireless and wired systems to connect and communicate with devices of the same ability.

Key applications are :

  • Connecting machines to other machines -e.g. Remote Production Environment
  • Connecting machines to service centers — e.g. reporting maintenance issues

M2M protocols are well-defined architecture consisting of communication parameters and paradigm to exchange the data or information over the network. Each protocol defines the packet size, rules of communication, security over a network, communication requirements and other properties of the M2M network so that it will help to connect low powered, lossy devices to the world of the Internet. The structured communication scenario with system tools and processing devices at the various level of communication in IoT comprising M2M concept is well shown in the Figure.

Image for post

Protocol Classification

There are three major groups of protocols used for M2M communication:

  1. Service-oriented Architectures (SOA) are used in industrial automation systems to exchange soft real-time data for instance between programmable logic controllers and supervisory, control and Data Acquisition (SCADA) systems.
  2. Representational State Transfer (REST) architecture style which defines
    constraints to the used components, connectors, and data elements.
  3. Message Oriented Protocols supports the asynchronous data transfer between the distributed system.

According to communication paradigms:

1. The Request/Response model​, commonly used in the distributed system to exchange information through message passing between a sender and receiver. This is where clients request information from a server and server responds to these requests accordingly. Examples : HTTP, CoAP

Image for post
Image for post

2. The Publish/Subscribe model​, which is based on an event broker to forward updates (notifications) to interested users (subscribers), regarding changes of senders’ (publishers’) statuses. Example: MQTT, AMQP

Image for post
Image for post
Publisher-Subscriber pattern

This is an overview of the M2M communication protocols and its classification based on the pattern and the behavior of the data transfer over the network. In the next stories, we will draw our attention specifically towards the protocols in deep. Stay tuned, stay knowledged… :)

Predict

where the future is written

Sign up for Predict Newsletter

By Predict

Monthly updates on science and technology shaping our future. Take a look

By signing up, you will create a Medium account if you don’t already have one. Review our Privacy Policy for more information about our privacy practices.

Check your inbox
Medium sent you an email at to complete your subscription.

Killer — A Night Reader

Written by

A tiny contribution of my point of view towards life, eternity and my tech work during the study to the distinct but connected world within the universe.

Predict

Predict

where the future is written

Killer — A Night Reader

Written by

A tiny contribution of my point of view towards life, eternity and my tech work during the study to the distinct but connected world within the universe.

Predict

Predict

where the future is written

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch

Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore

Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store