YES DATA for M2M Applications 
   
 

YES DATA is ideal for use in M2M (Machine to Machine) applications where the entity being monitored or controlled is mobile roaming or where it is installed for use in a location for which the YES DATA rate for data transfer is low and affordable.

YES DATA provides data transfer facility and SMS communication between the monitoring/controlling service platform and the entity being monitored and controlled.


YES DATA is useful in the following kinds of application by M2M operations:

In agriculture, mining, oil pumping and other activities that tend to take place over wide geographical areas; telemetry is used to monitor critical conditions and events. Users can also monitor expensive, mission-critical machinery at remote sites, without the time and expense of sending technicians out for periodic checks.

Automated Meter Reading (AMR)
The fleets of vehicles and personnel now engaged in reading utility meters at homes, offices and factories can be replaced entirely by telemetry-equipped meters that phone in the readings automatically. This is particularly appropriate in a deregulated market.

Environmental monitoring systems keep an eye on ground water remediation systems, waste treatment plants and toxic chemical storage facilities.

Industries and agencies that employ field service teams for monitoring, replenishment or repair can be well-supported by M2M.

Warehousing, inventory management and flow and level monitoring is also an application area for M2M. Whether it's a tank farm or a distributed warehouse network, wireless terminals can:

  • Track product transfers
  • Track fluid pressure
  • Track tank levels
  • And other variables required for operational control.

Checkout Stands: Both temporary checkout stands (at fairs, market stalls or trade shows, for instance) and roving checkouts (such as taxis, home delivery services and the Car Rental employees who meet returning drivers in the parking lot) benefit from wireless M2M to clear credit card transactions.

Machine-to-machine communications (M2M) is a rapidly growing field of business. Across the globe, more and more industries are moving towards integrated connectivity solutions into machines, devices and vehicles of different kinds. The purpose may vary but the overall objective is naturally to stay competitive. Connected products bring business value through:

  • Increased revenue opportunities - by adding new service offerings enhancing the core product
  • Improved operational efficiency - real-time access to monitor and manage remote assets such as machines and equipment help minimize down-time and improve operational levels
  • Reduced cost - enable you to manage and monitor assets remotely no matter where the unit is located
  • Reduced environmental effects -  enables for example more efficient usage of connected fleets or streamlining monitoring processes


In Europe alone there are several billion devices that could potentially be networked by wireless technologies such as GSM/UMTS. The combination of standard GSM technology and the Internet form the basis of adding new business value to your products no matter where they are located  in the world.

Whatever your motives are, you will need a reliable and experienced partner to solve your communication needs. YES DATA together with its technology and carrier partners provides managed connectivity solutions on a global basis for various industries and applications - some examples include:

  • The connected car - we are working closely with several of the car manufacturers to integrate connectivity into the car for various reasons. Airlert services (automatic alarm in case of an accident), remote diagnostics and infotainment systems are some of the areas that are growing rapidly.
  • The connected truck - Scania, Daimler, MAN, Volvo are all users of M2M technology on an international level. The most common application is fleet management solutions, where real-time connectivity is an absolute must - no matter where the truck is being located.
  • The connected electricity meter - automated meter reading/management via wireless technologies is adapted by many utility companies across the globe to increase control and provide a better service towards its customers.
  • The connected container - different kinds of asset tracking and monitoring solutions are increasingly developing areas. Container tracking is of course one area, but the same needs apply to many different assets that might be "on the move" such as trailers, rail cargo, shipments, etc..
  • The connected alarm - although for example home alarms have been connected before, many alarm manufactures are now moving into wireless technologies instead of fixed lines. Improved operations/accessibility and easier installations are some of the reasons for deploying wireless connectivity.

There are many other kinds of applications and the possibilities of applications of M2M in practical situations are numerous and only limited by one's imagination.

 

YES DATA in GPS and M2M Applications

YES DATA is ideal for use in M2M (Machine to Machine) applications where the entity being monitored or controlled is mobile roaming or where it is installed for use in a location for which the YES DATA rate for data transfer is low and affordable.

YES DATA provides data transfer facility and SMS communication between the monitoring/controlling service platform and the entity being monitored and controlled.

YES DATA is useful in the following kinds of application by M2M operations:

Bus System: An increasing number of bus systems in Europe use telematics to deliver updated schedule information to passengers and enable more-responsive local services.

Low population densities do not support regularly scheduled services, so these systems let passengers call in to request rides from buses assigned to specific areas but not specific routes. Wireless location and communication technologies help coordinate the fleets and optimize bus utilization.

Security industry is another sector where wireless m2m can either accomplish many tasks more cost-effectively than existing personnel or help those personnel work more effectively and with greater personal safety. Fixed sensors in remote, dangerous or particularly sensitive areas are an obvious application. Moving to a wireless approach also negates one of the intruder's favourite techniques, which is cutting the standard phone line attached to the alarm system.

Fire and security patrols charged with protecting large geographic areas such as college campuses can also benefit from wireless telemetry.
For example, by sending alarm locations directly to personal mobile phones using text messages, systems can dispatch help immediately instead of relying on a human monitor who then relays calls to the security staff.

   
  YES DATA  FAQ
   
 

What is M2M?
M2M is acronym for machine-to-machine operation and is based on the technology for allowing devices or sensing entities to "talk" to each other or to a computer or server over a network – mobile, wireless or wired.

Where is M2M solution used?
M2M affords benefits to many applications, across various industries, such as Asset Monitoring, Utilities, Transport, Retail and Security.

What are the benefits of M2M?
A solution that enables remote and / or mobile machines to communicate with a central server using M2M technology has many benefits:

  • Decision-making – gathering real-time data from remote assets makes possible faster, more informed decision-making
  • Operational – improving the efficiency and control of resources reduces operational costs
  • Environmental – streamlining monitoring processes minimizes wastage
  • Financial – new service-based offerings provide new sources of revenue


What makes up an M2M solution?
Typically, an M2M solution consists of several components:

  • Device(s) or sensor(s) to collect data and/or monitor changes
  • A central server to send and / or receive data transmitted by the device(s) or sensor(s).
  • Connectivity (either fixed line or wireless) to connect the device or sensor to a central server.
  • A modem to allow data exchange between the device(s) or sensor(s) and the central server.
  • An application and database to process the data sent and received.
  • An application to ensure security of the data transmitted and to monitor and manage the connectivity to the device or sensor network.


What are the essential elements of  a successful M2M deployment?
As with any IT deployment, the management of people, process and technology is critical in determining the outcome of the project. An M2M project is can be very complex due to the number of different parts needed to be integrated together. The key success factors are:

  • A defined business need
  • A clear understanding of how M2M technology can make the link to business benefit
  • A proof of concept and trial with detailed technical and commercial objectives
  • A project champion
  • An understanding of the risks and a means to manage them


How does it work?
M2M can be provided through either fixed line or wireless or mobile connectivity, and is for use with both fixed and mobile devices. Typically, connectivity can provided over either a GSM/GPRS network, fixed line telephone network (PSTN), satellite or the Internet.

What are the benefits of wireless and/or mobile M2M?

Flexibility:
Devices that are wirelessly connected to a network are not limited to a physical location. This gives you the flexibility to move them when the need to do arises, for example if a vending machine is not getting much business to generate the required revenue in one location, you can simply place it elsewhere. Devices in remote locations, where it’s difficult to have cabling work, can also be connected to a wireless network quickly and easily.

Mobility:
Mobile devices can connect into a network, allowing data communication between the monitoring station – usually a server – and the mobile devices.

Access to information::
Wireless networks deliver real-time information to mobile devices enabling information to be received or sent whenever and wherever it is required, as such organizations can have access to live information for effective and fast decision-making.

Independent network:
A wireless network can be quickly and easily deployed in a building or at a location without the need for integration with the existing fixed line network, thereby delivering an independent secure network.

Speed:
A wireless network can be deployed much more quickly than a fixed network as no cabling is needed between devices. This allows devices to be installed, configured and be operational in a much shorter set-up time.

Cost:
There are cost savings related to the speed of deployment, the elimination of cabling costs, and the reduction in communication costs, as GPRS is more cost effective than PSTN/fixed line.

Space:
Where there is no need to do cabling work, the sites are free of clutter and the risks associated with cabling (overheating, health and safety etc.) are eliminated.

How do wireless/mobile M2M machines communicate?
M2M wireless solutions use wireless modems to communicate using 2.5G/GPRS (General Packet Radio Service) or the faster 3G mobile network, GPRS is “always on”, allowing it to communicate data immediately, and at much higher speeds. GPRS is billed according to the amount of data used and not the amount of time the connection lasts.
The wireless device communicates over the wireless networks through an APN (Access Point Name) at the Mobile Network Operator (MNO) to the customer’s firewall and onto a central server for processing. The standard MNO offering uses a general APN, so all customers use the same APN, and dynamic IP addresses on the devices i.e. the IP address keeps changing each time it communicates over the network.
We use private APN’s to increase security, enables the allocation of individual Private Fixed IP addresses for devices, which in effect creates a private network for end-to-end security of the data being transmitted.

What is a Private APN?
An APN is the access point to a GPRS network and identifies and authenticates the traffic trying to access the network. A Private APN provides the benefit of being able to have control of which devices connect through to you network.

Why do we use Private APN’s?
We use Private APN’s to have maximum control and security over connections to the network and enables customers to establish a secure end-to-end connection from their infrastructure to the remote devices. A Private APN means that the firewall is configured to allow only those devices from the Private APN and not all traffic from the general/public APN.
We go a stage further by allocating Private Fixed IP addresses to devices, so in effect they appear as though they are directly connected to the local area network. With YES DATA, the customer can even select the IP addresses to avoid duplication.

What is Private Fixed IP technology?
An IP address allows computers to communicate with one another on a network. An IP address can be private, for use on a LAN, or public, for use on the Internet or other Wide Area Network.
A static or fixed IP address is created when a user is guaranteed – by either their Internet Service Provider or IT Administrator – to have the same IP address every time they connect to the Internet. If this is available in the public domain, it is known as a Public Fixed IP address. This is the typical configuration if you have a PC connected to the Internet.
However, devices on wireless networks, such as mobile phones and M2M devices are assigned a dynamic IP address by the Mobile Operators. If the IP is not available in the public domain, it is known as a Private Fixed IP address. YES DATA allows you to have a Private Fixed IP address for your mobile and remote devices.

What are the benefits of Private Fixed IP technology?
The use of Private Fixed IP addressing offers the benefits of true two-way communication; data transfer can be initiated from either the device or the server. Without Fixed IP addressing the devices can only communicate with the server, but no messages or updates can be sent to the device, without first waking the device up by sending an SMS or making a data call. The outcome is that data usage is far more efficient and cost effective, as there is no need for "keep-alives" or SMS "wake-up" calls.
Security is also enhanced as the Private nature of the IP address means that the risk of SPAM or Denial of Service attacks is reduced. Combining the increased security, the reduced data usage and more efficient communication means that the overall Total Cost of Ownership is reduced.

How do I start working with YES DATA?
It’s simple – whether you’re a systems integrator looking to build connectivity into your solution, a hardware provider or an end user , please call us, email us at info@ex4u.org or contact us here...

Moving checkouts (such as taxis, home delivery services and the Car Rental employees who meet returning drivers in the parking lot) benefit from wireless M2M to clear credit card transactions.

Bus System:  An increasing number of bus systems in Europe use telematics to deliver updated schedule information to passengers and enable more-responsive local services.

Low population densities do not support regularly scheduled services, so these systems let passengers call in to request rides from buses assigned to specific areas but not specific routes. Wireless location and communication technologies help coordinate the fleets and optimize bus utilization.

Security industry is another sector where wireless m2m can either accomplish many tasks more cost-effectively than existing personnel or help those personnel work more effectively and with greater personal safety. Fixed sensors in remote, dangerous or particularly sensitive areas are an obvious application. Moving to a wireless approach also negates one of the intruder’s favourite techniques, which is cutting the standard phone line attached to the alarm system.

Fire and security patrols charged with protecting large geographic areas such as college campuses can also benefit from wireless telemetry.
For example, by sending alarm locations directly to personal mobile phones using text messages, systems can dispatch help immediately instead of relying on a human monitor who then relays calls to the security staff.

   
 

top

back to YES DATA