M2M and the Internet of Things: A guide

M2M and the Internet of Things: A guide

Summary: The Internet of Things will consist primarily of machines talking to one another, with computer-connected humans observing, analysing and acting upon the resulting 'big data' explosion. Here's how the next internet revolution is shaping up.

SHARE:

Conclusion
The Internet of Things, powered by Machine-to-Machine communication, is already with us, but remains a massive opportunity. Properly implemented, it can retool large parts of the world for better efficiency, security and environmental responsibility — and of course it can generate potentially huge amounts of business for the IT companies that will build and run the systems involved.

Many technology sectors stand to benefit from this new world order, including mobile network operators and fixed broadband providers, system integrators, cloud service providers, mobile app developers, sensor and wireless infrastructure vendors, and purveyors of Big Data infrastructure and analytics.

In an ideal world, M2M equipment will interoperate smoothly, service providers will compete on a level open-standards playing field without attempting to lock customers into their ecosystems, and the Internet of Things will develop with the same explosive inventiveness as did the original internet. The remaining articles in this series will explore how likely that is to happen, and present some examples of M2M in action.

Read more:

Topics: Tapping M2M: The Internet of Things, Cloud, Emerging Tech, Networking

About

Charles has been in tech publishing since the late 1980s, starting with Reed's Practical Computing, then moving to Ziff-Davis to help launch the UK version of PC Magazine in 1992. ZDNet came looking for a Reviews Editor in 2000, and he's been here ever since.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

18 comments
Log in or register to join the discussion
  • Excellent article

    A clear, comprehensive and prescient piece on M2M. Nicely done. (Disclaimer: I have no financial interest, just an interested observer).
    Manek Dubash
  • Informative Guide

    An easy to read concise overview of the M2M market and opportunities. Extremely beneficial for professionals who have interest in M2M.
    richvcrawford
  • No such thing as an H2H internet.

    "A point worth stressing is that data transfer patterns in the M2M-driven Internet of Things will differ fundamentally from those in the classic 'human-to-human' (H2H) internet. "

    There's actually no such thing as an H2H internet.

    Protocols such as TCP/IP don't actually care about whether the ultimate destination connects to a human or not. They just transfer data from one point to another. They are completely agnostic as to whether it's upload/download biased, and they are completely agnostic as to whether there's a human on the other end or not.
    CobraA1
    • H2H internet

      In one aspect you are correct, in another you are wrong. Humans require monitors, keyboards, complex operating systems with applications. This is largely why the Internet is somewhat not built for M2M. The Internet you have known until now technically is and was H2H internet. The time is now to consider an adjoining M2M internet with new controls. You are correct TCP/IP is not equipped. The internet was built for war and got many things backwards, yet everything built was necessary. Machines have the capability to get straight to the business and even do calculations in the data itself. I believe it foolish that a merger of man and machine not forecast to make BIG PROBLEMS but you cannot stop proprietors that wish to push their wares. Telecom can help, they may soon if we're lucky.
      mitch2014
  • You Miss The Point

    H2H doesn't have anything to do with network protocols. It's an observation of network traffic patterns - completely protocol agnostic - and network topologies.
    Andrew_McGee
  • At the heart of it all.

    At the heart of all this M2M, or the internet of things, are "Embedded Systems" without which none of it is possible. Now tell me that RIM's acquisition of QNX, a world leader in embedded systems, and their development of the BB10 mobile platform wasn't a very forward looking move on their part. RIM has been positioning themselves to be a leader in M2M for years now.
    xenrobia
    • M2M lead

      Somewhat consider how universality is now trumping individual language. As everyone seeks to be the M2M leader, again many new languages are born. One or a few will win and some will perpetuate as a road block to clear communication again. Even the government knows Open Source helps a lot and it will be a winner here too. Diversity has it's own advantage in the natural selection theory of things. If only we could stop the diversity explosions in every little thing we build. This fuels a lack of security so badly.
      mitch2014
  • Mess-up of terms?

    Don't you think that M2M and the IoT should be treated as seperate terms? An M2M-connection via Zigbee or other short-range communication protocols does not need any Internet-connection. It may be related to the concept of the Internet of Things. However, these terms should not be used synonymously.
    Dieter Uckelmann
  • Yeah, as soon as full IPv6 gets implimented

    If only all the firbre optic cable were in use. That would allow full IPv6. Then every cow could have its own IP address. With US's medieval version of internet and lack of sound leadership, this is going to take the next 15 to 20 years to roll out. Then 10 years to shake out how to really use it. The current internet infrustructure is not ready for prime time.
    maszsam
  • One word. Skynet.

    Am I the only one who thought that when he read about M-to-M?

    josh@ecohistorical.com
    ecohistorical
    • @ecohistorical: Nope. Sky net was the first thing I thought of as well!

      After skynet, I also thought of the matrix!
      T-Wrench
      • Skynet

        We are closer to Skynet than you might think. This is why we need a broad discussion on how to protect our assets from machines, people that might tinker with them. Multicasts should have rung some alarm bells from a viral capability standpoint as well. Exponential disease spreading all by a machine is threatening. I believe we can still outsmart machines if we are not foolish as to give them free reign.
        mitch2014
  • get it

    M2M is a little difficult to me ,but this article make me get some ideas ,it's nice
    allen_zhang
  • Many organizations are desperately looking for effective ways to comply

    I agree that "The Internet of Things, powered by Machine-to-Machine communication, is already with us, but remains a massive opportunity.

    Properly implemented, it can retool large parts of the world for better efficiency, security and environmental responsibility — and of course it can generate potentially huge amounts of business for the IT companies that will build and run the systems involved."

    It "can generate potentially huge amounts of business for the IT companies that will build and run the systems involved" and it will be based on Big Data.

    Many organizations are desperately looking for effective ways to comply to new stringent privacy regulations.

    I think that there are several gaps in privacy that need to be filled and now Big Data is adding to this issue.

    A Big Crisis is likely to occur very soon:

    1. A Big Data security crisis is likely to occur and few organizations have the ability to deal with it.
    2. We have little knowledge about data loss or theft in big data environments.
    3. I imagine it is happening today but has not been disclosed to the public.

    I recently read an interesting report from Aberdeen Group that revealed that “Over the last 12 months, tokenization users had 50% fewer security-related incidents(e.g., unauthorized access, data loss or data exposure than tokenization non-users”. The name of the study is “Tokenization Gets Traction”. This type of measurable information about security should be communicated to management. Data tokenization can also add business value and increase creativity by allowing more people to have access to more data in a less risky way than before.

    Ulf Mattsson, CTO Protegrity, +1-203-570-6919.
    ulf.mattsson
  • This is the future

    I like the article, very informative. There are many m2m languages that he could have listed. I hope he discusses his thoughts on a merger of man, machine on one set of communication lines. Is this prudent? Will machines come to be a nuisance to humans on their own communication lines?
    mitch2014
  • On security

    With security at new lows, violation of encryption looming as a real possibility I think more companies should consider keeping some specific content offline entirely in the interim.
    mitch2014
    • Yeah, but...

      That makes perfect common sense, but the "Cloudies" won't permit such thoughtcrime. They want it all out there beyond your reach and control (unless they push it down on you). No?
      KnowBuddy1
  • CBB ~ Crippling Bandwidth Bloat

    Who gets the lion's share of the bottle-necked bandwidth... machines, corporations, or human individuals?? Might be worth watching closely, going forward standing still.
    KnowBuddy1