- Information
- AI Chat
Sukhjeet kaur - simple project file
Fundamentals of Computer and IT Laboratory (UGCA1906)
I. K. Gujral Punjab Technical University
Preview text
1. What do you mean by M2M Application.
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
M2M (Machine to Machine) is a concept that enables networked devices to perform actions by exchange information without the manual assistance of humans.
Machine to Machine refers to direct communication between devices using wired or wireless communications channel.
Key Components for M2M System:
Key components of an M2M system include
o Sensors, o RFID, o a Wi-Fi or cellular communications link and o To help a networked device to interpret data and make decisions, the need for Autonomic Computing software programmed.
Machine to machine communication can include industrial instrumentation,
o Enabling a sensor to communicate the data it records (such as temperature, inventory level, etc.) to application software o This application software can use it (for example, adjusting an industrial process based on temperature or placing orders to replenish inventory).
Applications of Machine to Machine communication:
M2M communication is often used for
o Remote monitoring o Product restocking (a vending machine can generate an alert or message the distributor when a particular item is running low) o In Warehouse management to remote control, robotics, traffic control, supply chain management, fleet management, logistic services, and telemedicine services.
Products built with Machine to Machine communication capabilities are often marketed to end-users as being “smart.”
Such communication initiated by a remote network of machines generated information sent to a central hub for analysis, which would then share with a system like a personal computer.
Benefits of Machine to Machine:
M2M wireless networks can use to
o Improve the efficiency and production of machines, o To increase the reliability and safety of complex systems, and o To encourage the life-cycle management for key assets and products.
M2M in everyday life
M2M technology is all around us. It’s in our homes, on the commute to work, in the way that we shop, exercise and entertain ourselves. Here are just a few examples of M2M, or IoT technology that you might come across on a daily basis:
Commuting: if your train is cancelled due to poor weather, a smart alarm clock would determine the extra time you’ll need to take a different route, and wake you up early enough so that you’re not late for work. Smart homes: a connected thermostat can automatically switch the heating on when room temperature falls below a certain point. You might also have a remote-locking system enabling you to open the door to a visitor via your smart phone if you’re not at home. Health and fitness: wearable devices can track the number of steps you take in a day, monitor your heart beat and count calories to determine dietary patterns and work out whether you’re missing vital nutrients. Shopping: based on your location, previous shopping experiences and personal preferences, your local supermarket could ping you a voucher for your favourite groceries when you’re in the area.
2 Software Defined Network.
Software-Defined Networking (SDN) is an approach to networking that uses software-based controllers or application programming interfaces (APIs) to communicate with underlying hardware infrastructure and direct traffic on a network.
Why Software-Defined Networking is important?
SDN represents a substantial step forward from traditional networking, in that it enables the following:
Increased control with greater speed and flexibility: Instead of manually programming multiple vendor-specific hardware devices, developers can control the flow of traffic over a network simply by programming an open standard software-based controller. Networking administrators also have more flexibility in choosing networking equipment, since they can choose a single protocol to communicate with any number of hardware devices through a central controller. Customizable network infrastructure: With a software-defined network, administrators can configure network services and allocate virtual resources to change the network infrastructure in real time through one centralized location. This allows network administrators to optimize the flow of data through the network and prioritize applications that require more availability. Robust security: A software-defined network delivers visibility into the entire network, providing a more holistic view of security threats. With the proliferation of smart devices that connect to the internet, SDN offers clear advantages over traditional networking. Operators can create separate zones for devices that require different levels of security, or immediately quarantine compromised devices so that they cannot infect the rest of the network.
Benefits of SDN
SDN architecture comes with many advantages, largely due to the centralization of network control and management. Some of the benefits include:
· Ease of network control – Separating the packet forwarding functions from the data plane enables direct programming and simpler network control. This could include configuring network services in real time, such as Ethernet or firewalls, or quickly allocating virtual network resources to change the network infrastructure through one centralized location.
· Agility – Because SDN enables dynamic load balancing to manage the traffic flow as need and usage fluctuates, it reduces latency, increasing the efficiency of the network.
· Flexibility – With a software-based control layer, network operators have more flexibility to control the network, change configuration settings, provision resources, and increase network capacity.
· Greater control over network security – SDN lets network administrators set policies from one central location to determine access control and security measures across the network by workload type or by network segments. You can also use micro- segmentation to reduce complexity and establish consistency across any network architecture—whether public cloud, private cloud, hybrid cloud or multicloud.
· Simplified network design and operation – Administrators can use a single protocol to communicate with a wide range of hardware devices through a central controller. It also offers more flexibility in choosing networking equipment, since organizations often prefer to use open controllers rather than vendor-specific devices and protocols.
· Modernizing telecommunications – SDN technology combined with virtual machines and virtualization of networks lets service providers provide distinct network separation and control to customers. This helps service providers improve their scalability and provide bandwidth on demand to customers who need greater flexibility and have variable bandwidth usage.
3 do you mean by network function Virtualization.
Network function virtualization or NFV is a concept in network architecture that decouples hardware and and network functions using virtualization technologies. By virtualizing entire categories of network node functions into modular units, NFV achieves greater scalability in communication and computing services.
NFV utilizes traditional server-virtualization methods like those deployed in enterprise IT, but it is unique. Custom hardware appliances for each network function are not necessary for a virtualized network function (VNF). Instead, one or multiple virtual machines (VMs) deploying distinct processes and software on top of switches and storage devices, typical high-volume servers, or cloud computing infrastructure can comprise a VNF.
Network function virtualization examples include virtualized load balancers, session border controllers, firewalls, WAN accelerators, intrusion detection devices, and more. Administrators may deploy any of these to deliver network services or protect a network without the typical complexity and cost of acquiring and installing physical units.
Why network functions virtualization?
NFV allows for the separation of communication services from dedicated hardware, such
as routers and firewalls. This separation means network operations can provide new
services dynamically and without installing new hardware. Deploying network
components with network functions virtualization takes hours instead of months like with
traditional networking. Also, the virtualized services can run on less expensive, generic
servers instead of proprietary hardware.
Additional reasons to use network functions virtualization include:
Pay-as-you-go: Pay-as-you-go NFV models can reduce costs because businesses pay only for what they need. Fewer appliances: Because NFV runs on virtual machines instead of physical machines, fewer appliances are necessary and operational costs are lower. Scalability: Scaling the network architecture with virtual machines is faster and easier, and it does not require purchasing additional hardware.
Risks of network functions virtualization
NFV makes a network more responsive and flexible, and easily scalable. It can accelerate
time to market and significantly reduce equipment costs. However, there are security
risks, and network functions virtualization security concerns have proven to be a hurdle
for wide adoption among telecommunications providers. Here are some of the risks of
implementing network functions virtualization that service providers need to consider:
Physical security controls are not effective: Virtualizing network components increases their vulnerability to new kinds of attacks compared to physical equipment that is locked in a data center. Malware is difficult to isolate and contain: It is easier for malware to travel among virtual components that are all running off of one virtual machine than between hardware components that can be isolated or physically separated. Network traffic is less transparent: Traditional traffic monitoring tools have a hard time spotting potentially malicious anomalies within network traffic that is traveling east-west between virtual machines, so NFV requires more fine-grained security solutions. Complex layers require multiple forms of security: Network functions virtualization environments are inherently complex, with multiple layers that are hard to secure with blanket security policies.
Benefits of NFV:
Many service providers believe that advantages outweigh the issues of NFV. Traditional hardware-based networks are time-consuming as these require network administrators to buy specialized hardware units, manually configure them, then join them to form a network. For this skilled or well-equipped worker is required. It costs less as it works under the management of a hypervisor, which is significantly less expensive than buying specialized hardware that serves the same purpose. Easy to configure and administer the network because of a virtualized network. As a result, network capabilities may be updated or added instantly.
Network Functions Virtualization Use Cases
NFVs can be applied to a number of different use cases. Some examples include:
Service Chaining: Communication Service Providers (CSP) may chain and link
together services or applications such as firewalls and SD-WAN network optimization and offer them as a service for delivery on-demand.
Software-Defined Branch and SD-WAN: SD-WAN network optimization
and SD-Branch security functionality can be defined as NFVs. This enables these functions to be fully virtualized and offered as a service.
Network Monitoring and Security: A firewall can be implemented using NFV.
This allows fully-virtualized monitoring of network flows and application of security policies for traffic routed through the firewall.
Sukhjeet kaur - simple project file
Course: Fundamentals of Computer and IT Laboratory (UGCA1906)
University: I. K. Gujral Punjab Technical University
- Discover more from: