Machine-to-machine, or M2M for short, refers to the automated exchange of in­for­ma­tion between devices without manual in­ter­ven­tion by humans. Machine-to-machine tech­nol­o­gy is used for a wide range of ap­pli­ca­tions, from mon­i­tor­ing and con­trol­ling machines to the indexing of websites by search engines.

In­tel­li­gent machines can exchange in­for­ma­tion without human as­sis­tance and even co­or­di­nate and perform actions. In this article, you’ll learn the basics of M2M com­mu­ni­ca­tion, including how it came about, how it works, and when and where it is used. Discover the ad­van­tages of this tech­nol­o­gy for your own business.

M2M com­mu­ni­ca­tion – de­f­i­n­i­tion and history

Machine-to-machine is a broad term. Most de­f­i­n­i­tions of M2M focus on par­tic­u­lar aspects and ignore other key points.

One succinct de­f­i­n­i­tion of machine-to-machine com­mu­ni­ca­tion is as follows:

Quote

“Machine-to-machine (M2M) com­mu­ni­ca­tions means the largely automated exchange of in­for­ma­tion between technical devices them­selves, for example, machines, vending machines, vehicles, or measuring equipment (e.g. elec­tric­i­ty, gas and water meters), or between the devices and a central data pro­cess­ing unit.” – Source: https://www.bun­desnet­za­gen­tur.de/EN/Areas/Telecom­mu­ni­ca­tions/Companies/Num­ber­Man­age­ment/M2M/M2M_node.html

Although M2M usually does not involve human as­sis­tance, the cited de­f­i­n­i­tion does not rule out limited human in­ter­ven­tion.

Other de­f­i­n­i­tions of M2M focus on technical aspects and how this type of com­mu­ni­ca­tion works. According to these de­f­i­n­i­tions, machine-to-machine refers to a device that detects an event and forwards it to an ap­pli­ca­tion via a network. This ap­pli­ca­tion then trans­lates the trans­mit­ted event into un­der­stand­able in­for­ma­tion.

History of machine-to-machine com­mu­ni­ca­tion

The exchange of in­for­ma­tion between machines dates back to the early 20th century. At that time, in­for­ma­tion was only trans­mit­ted over cables. In the late 1920s, telemetry emerged, making it possible to send mea­sure­ments from a sensor to a remote data pro­cess­ing system using radio systems. In the following years, ad­vance­ments in teleg­ra­phy, telephony, radio, and tele­vi­sion inspired the math­e­mati­cian Claude Shannon to create a math­e­mat­i­cal theory of in­for­ma­tion. His efforts to reduce back­ground noise laid the foun­da­tion for clearer data trans­mis­sion and further ad­vance­ments in machine-to-machine com­mu­ni­ca­tion.

Quote

“I am rooting for the machines! I have always been on the machines’ side.” Claude Shannon in response to the question, “Do you find it de­press­ing that chess computers are getting so strong?” from a 1987 interview with Omni Magazine.

In the second half of the 20th century, the de­vel­op­ment of caller ID and automatic meter reading were further mile­stones in M2M com­mu­ni­ca­tion. By the late 20th century, and es­pe­cial­ly in the 21st century, machine-to-machine tech­nol­o­gy advanced rapidly thanks to the advent of cellular and wireless Internet con­nec­tiv­i­ty. Nowadays, automated com­mu­ni­ca­tion between machines has become such a big part of our everyday lives that we’re hardly aware of it anymore.

How M2M com­mu­ni­ca­tion works

The main purpose of machine-to-machine com­mu­ni­ca­tion is to collect data and transmit it to a network. Another goal of M2M is to au­to­mat­i­cal­ly perform actions that are triggered by sequences of events. Ad­di­tion­al­ly, the art of machine learning can be used so that machines optimize their action sequences. This ap­pli­ca­tion for M2M tech­nol­o­gy is closely related to ar­ti­fi­cial in­tel­li­gence and is the basis for the Internet of Things.

To un­der­stand the tech­nol­o­gy, it’s helpful to know its defining char­ac­ter­is­tics. All machine-to-machine systems consist of the three main com­po­nents, which are shown below.

Data endpoint (DEP)

The data endpoint is the system con­tain­ing the data to be trans­mit­ted or monitored. A DEP can be a vending machine that sends inventory in­for­ma­tion to a central office, an in­stru­ment that records weather data, or a medical device that transmits patient health data. Data endpoints are mi­cro­com­put­er systems, meaning trans­mit­ters that are linked to a receiver. An M2M com­mu­ni­ca­tion network can consist of numerous data endpoints and connected devices. The data endpoints send the desired in­for­ma­tion to the network, where it is trans­mit­ted to the data in­te­gra­tion point. In­di­vid­ual data endpoints also com­mu­ni­cate with each other via the network.

Com­mu­ni­ca­tion networks

There are different types of com­mu­ni­ca­tion networks for trans­fer­ring data from one machine to another. These include the cellular networks and wireless or wired Internet con­nec­tions that we use every day. However, there are also a variety of other tech­nolo­gies for trans­fer­ring data that are primarily used in Internet of Things ap­pli­ca­tions:

  • RFID tech­nol­o­gy (Radio Frequency Iden­ti­fi­ca­tion) uses elec­tro­mag­net­ic waves to enable con­tact­less data exchanges and is mainly used in logistics. RFID is also used for payment cards and animal ID tags.
  • The short-range radio standard NFC is also based on RFID. NFC is used ex­ten­sive­ly for con­tact­less payment, paperless access control, two-factor au­then­ti­ca­tion, and much more. There are even some smart­phone apps and games that use NFC signals to com­mu­ni­cate with users.
  • Bluetooth is also used in the Internet of Things. This tech­nol­o­gy allows you to quickly transfer data in a piconet. Bluetooth is not only used for sending photos and videos, but also in audio systems in smart homes or hands-free systems in cars. In addition, Bluetooth plays an important role in medical equipment such as hearing aids, pros­the­ses, or devices for mon­i­tor­ing blood sugar.

Data in­te­gra­tion point (DIP)

The machine that receives the in­for­ma­tion is called the data in­te­gra­tion point. While there can be many data endpoints, there is only one data in­te­gra­tion point in a network. The DIP can be a server, a control center that monitors meter readings, or a web crawler that collects data on a large number of websites.

Ad­van­tages and char­ac­ter­is­tics of machine-to-machine com­mu­ni­ca­tion

Un­der­stand­ing exactly how M2M works is es­pe­cial­ly useful if you deal with this tech­nol­o­gy in your work. M2M is in­cred­i­bly versatile and has a vast range of functions and uses. Below, you’ll learn more about the char­ac­ter­is­tic features and ad­van­tages of machine-to-machine com­mu­ni­ca­tion.

Char­ac­ter­is­tics of M2M

One char­ac­ter­is­tic of M2M com­mu­ni­ca­tion is that its low energy use increases the ef­fi­cien­cy of systems during data exchanges. The network operator is re­spon­si­ble for service packages – often including mon­i­tor­ing functions – so that users can keep track of important events. Data transfers can be delayed in the network if higher priority data is sent si­mul­ta­ne­ous­ly. Al­ter­na­tive­ly, users can schedule data transfers using a timer, or small amounts of data can be trans­ferred con­tin­u­ous­ly. In logistics, machines can even be pro­grammed by location so that they au­to­mat­i­cal­ly send out no­ti­fi­ca­tions or turn on when they are in a certain area.

Re­quire­ments for machine-to-machine systems

While the domestic reg­u­la­to­ry framework sur­round­ing M2M systems in the US is com­par­a­tive­ly un­der­de­vel­oped, things look quite different across the Atlantic. The European Telecom­mu­ni­ca­tions Standards Institute (ETSI) is tasked with creating global standards for in­for­ma­tion and com­mu­ni­ca­tions tech­nolo­gies, which could have im­pli­ca­tions for anyone who wants to do business in the EU or elsewhere while using M2M systems. ETSI defines the following re­quire­ments for machine-to-machine systems:

  • Scal­a­bil­i­ty: The system must function ef­fi­cient­ly even after other connected devices are added.
  • Anonymity: The system must be able to hide the identity of connected devices.
  • Logs: M2M systems must be able to record failed in­stal­la­tions, defects or incorrect data – and retain those records for later viewing.
  • Systems must adhere to the basic prin­ci­ples of machine-to-machine com­mu­ni­ca­tion explained above.
  • Trans­mis­sion methods: The system must support different trans­mis­sion methods such as Unicast, Anycast, Multicast, and Broadcast, and be able to switch between these methods to reduce loads during M2M data trans­mis­sion.
  • Sched­ul­ing of message trans­mis­sion: The system must be able to schedule data transfer times and control or delay com­mu­ni­ca­tions based on priority.
  • Selection of com­mu­ni­ca­tion channels: Com­mu­ni­ca­tion channels within the machine-to-machine system should be optimized based on rules for trans­mis­sion errors, delays, and network costs.

Ad­van­tages of M2M com­mu­ni­ca­tion

Machine-to-machine com­mu­ni­ca­tion has more ad­van­tages beyond faster trans­mis­sion methods and the ability to schedule data transfers. These include remote control of devices, reduced need for main­te­nance, pre­ven­tion of outages, and sub­se­quent cost savings. Machine-to-machine also creates new business op­por­tu­ni­ties for IT services and enables companies to improve main­te­nance and customer services in existing lines of business.

Where is machine-to-machine com­mu­ni­ca­tion used?

M2M com­mu­ni­ca­tion is fre­quent­ly used for remote control ap­pli­ca­tions in logistics. For example, a vending machine can notify the sales de­part­ment that an item is in short supply so that it can be re­plen­ished in time. M2M is also used in inventory man­age­ment, in ware­hous­es, and for supply chain mon­i­tor­ing.

Energy companies use machine-to-machine com­mu­ni­ca­tion to read meters and bill customers. They can also use sensor data to monitor all devices and ensure con­ti­nu­ity of service. In the health­care industry, doctors can use M2M tech­nol­o­gy to monitor a patient’s heartbeat or other vital signs in real time, even if the patient is not phys­i­cal­ly present.

M2M in the Internet of Things

Mobile payment services use a com­bi­na­tion of the Internet of Things, ar­ti­fi­cial in­tel­li­gence, and machine learning. A growing number of consumers are adopting this tech­nol­o­gy and use e-wallets such as Google Wallet or Apple Pay. Similarly, there are many ways of using M2M com­mu­ni­ca­tion in smart homes to control lighting, turn elec­tri­cal ap­pli­ances on or off, or au­to­mat­i­cal­ly create shopping lists.

Machine-to-machine com­mu­ni­ca­tion in online marketing

Online marketing is closely connected to M2M com­mu­ni­ca­tion. As mentioned above, the process of web crawling by search engines is one example of machine-to-machine com­mu­ni­ca­tion. However, this tech­nol­o­gy is also important for paid ads on social media sites or search engines. To show these ads, al­go­rithms choose options from a huge set of possible data. During this process, the al­go­rithms com­mu­ni­cate with machines that supply them with this data. These could be ads that you enter in your Google Ads account or the server that hosts your website.

Machine-to-machine com­mu­ni­ca­tion also comes into play when we use web services to shop online, watch movies, or make ap­point­ments. During these processes, the client and server send requests and responses back and forth.

Ap­pli­ca­tion servers: M2M in small busi­ness­es

Ap­pli­ca­tion servers are the most common example of how free­lancers or small busi­ness­es use M2M on a daily basis. These servers are part of a client-server network that the business and its employees or customers use to directly access ap­pli­ca­tions such as Microsoft Office or contact man­age­ment software. Ap­pli­ca­tion servers also allow companies to perform trans­ac­tions, exchange data, manage databases, or host their own web server.

For all of these functions, there are special ap­pli­ca­tions that can be installed on the server. You can also easily access a data-exchange server from your PC just as you would access an ad­di­tion­al folder. Before you can do this, you have to be connected to the network of the server.

Go to Main Menu