File

advertisement
IS3101 MANAGEMENT OF
INFORMATION SYSTEMS
Case Study On Machine-to-Machine
Technology
Prepared By Team 15
ALEXANDRA MAGALY MARCELLE MIOQUE(A0118182J)
FU YAO (A0083580A)
MARCIN KRZYSZTOF SZYDLOWSKI (A0118300Y)
MARTIN WIDJAJA (A0075003W)
NYGEL JARON WALLACE (A0118696N)
QI MANLI (A0084692U)
1
Table of Contents
1. Introduction ............................................................................................................ 3
2. Possible solution, strategies.................................................................................... 3
3. Focus on M2M......................................................................................................... 4
3.1 What is it about? ......................................................................................................... 4
3.2 How does it work? ....................................................................................................... 4
3.3 Machine to Machine applications ................................................................................ 6
Healthcare......................................................................................................................... 6
Automotive ........................................................................................................................ 7
Home Appliances .............................................................................................................. 7
Energy and Utilities ......................................................................................................... 7
Logistics & Transportation ............................................................................................... 8
Security and public safety ................................................................................................ 8
Retails ............................................................................................................................... 8
3.4 S.W.O.T. analysis ........................................................................................................ 9
3.5 Examples .................................................................................................................... 9
3.5.1 Diebold Incorporated ............................................................................................... 9
3.5.2 Leica Microsystems .................................................................................................10
3.5.3 General Electric ......................................................................................................11
4. Conclusion ............................................................................................................ 12
4.1 How can companies benefit ....................................................................................... 12
4.2 Possible Challenges ................................................................................................... 12
Reference: ................................................................................................................. 13
2
1. Introduction
‘Money makes the world go round.’ Such is the mantra for businesses around the world
who aim to maximize their profits by increasing their competitive advantage in various
ways such as lowering prices or increasing product quality. Optimization of business
processes through the use of information systems is one such method, allowing
businesses to reduce operation costs and increase speed of information relay. The
question is, is it possible to apply the same principle of employee work optimization to
the machines that run production? The answer is in M2M information systems.
Abstract:
The purpose of this project is to briefly introduce M2M systems from business and
technical points of view, describe their applications in various industries and
demonstrate current applications by industry leaders.
2. Possible solution, strategies
A firm’s aim is to provide the best services at the lowest possible price to attain
maximum sales and profit. There strategies that will allow firms to lower their prices and
others that will increase the quality of services and goods, but they are often mutually
exclusive.
One such example for cost reduction is the six sigma supply chain management system.
Early adoption of the six sigma process improvement system can help a firm rapidly
improve and evolve their production processes to achieve lower costs. The best
example of problem that may happen in every company is the bullwhip effect, a
distortion of information about the demand of a product as it goes up the supply chain.
This causes inefficiencies to occur as managers make decisions with inaccurate
information.
Information systems used for supply chain management can help to improve the quality
of services. However, it will not help a lot if the company wants to reduce its costs. M2M
is a solution that tackles both cost reduction as well as quality improvement, while being
significantly simpler than six sigma to implement.
First, M2M allows a real-time reactivity and a better risk prevention. M2M can also
reduce costs through optimal inventory management. Customer satisfaction is also
improved due to the real-time nature of M2M systems as well as failure prevention. Last
but not least, M2M considerably reduces unnecessary travel through the possibility of
remote intervention. Remote intervention is also environmentally-friendly. With the
3
increasing importance of being pro-environment, a firm adopting M2M systems with
remote intervention would set themselves apart from the competition. In the subsequent
paragraphs, further details of the technology as well as its applications will be explored.
3. Focus on M2M
3.1 What is it about?
M2M is a broad term used to describe a group of technologies that allow communication
between machines. M2M is a part of a bigger concept called “Internet of Things” which
assumes that in the future there will be a parallel Internet used only by machines. This
system was proposed by Kevin Ashton in 1999. The whole idea may be described by
quoting its inventor.
"If we had computers that knew everything there was to know about things - using data
they gathered without any help from us - we would be able to track and count everything,
and greatly reduce waste, loss and cost. We would know when things needed replacing,
repairing or recalling, and whether they were fresh or past their best"
Decades later, people are starting to see the possibility of Kevin Ashton’s vision. More
and more devices are connected to the Internet, average bandwidth is increasing
exponentially and there are no signs of slowing down. Machine to machine systems are
broadly used by many companies. GE has even came up with their own conception
called Industrial Internet.
There are a lot of names and variations of this technology, but the core idea is the same
– connecting devices to the Internet. The next paragraph will briefly describe how is it
done.
3.2 How does it work?
M2M is strongly related to cloud computing, as it often utilizes the cloud for data storage
and processing. Supervisory control and data acquisition (SCADA) systems are
predecessors of M2M systems that are known nowadays. These systems are based on
PLC (programmable logical controllers) which are connected directly to the sensors and
executive devices (pumps, valves etc.). After executing specific tasks PLCs send data
to the information systems where it is processed to more user friendly form. That were
the origins of the M2M systems that are used now and will be used in the future.
With the fast expansion of the computer networks, technicians decided that it is possible
to connect every single machine to the Internet and process the information in the cloud.
4
However, new technologies had to be developed to make it possible without large
energy consumption. People started to think about new wireless personal area networks
(WPAN) standards which would allow to do the measurements and transfer data without
large expenses.
Key issues of the new standards had to be:
● Battery powered nodes with low power consumption
● Optimized wireless communication to lower power consumption
● Autonomic computing – immunity to single node failure
● Low delay
● Minimization of human intervention in management of sensor networks
Keeping in mind the requirements, IEEE created the 802.15 working group which
specifies WPAN standards.
The best known WPAN technologies are:
● Zigbee
● Popular in smart metering
● Mesh topology (better breakdown resistance)
● Simpler than other technologies
● Bluetooth Smart Ready
● Low power Bluetooth
● Health & Sports applications
Many companies (like Zensys) created their own technologies (ZWave) tailored
specifically for their products. What is common amongst WPAN technologies is that
they are designed to exchange information amongst various devices with low energy
consumption.
Devices which are used in M2M systems are described below:
● Communication modules – installed in the devices by producers to provide
communication with the gateways
● Gateways/Routers – receive data from various communication modules and
send it by Ethernet or cellular network to the Cloud for processing
● Information system – analyzes and processes received data (e.g. Axeda)
● Applications – communicates with the user, control devices, etc.
Not all of the devices have to be a part of WPAN to be a part of M2M system (e.g.they
might be connected to the Internet directly via cellular network). Raw data collected
from different devices is sent to the gateway which routes it to the cloud, where it is
5
processed and analyzed by cloud platforms like Axeda. Axeda allows their customers to
write their own applications using web services. After this stage, information systems
may display various graphs or charts formatted for user friendliness or send information
to another machine via Internet to perform any action. Example presented below will
better explain typical applications of M2M systems. Detailed explanations on the
applications in various areas will be covered in section 3.3.
1. Motion sensors detect movement in different sectors of company warehouse
2. CCTV cameras are turned on
3. Information system located in the cloud performs image analysis and identifies
human through facial recognition
4. IS turns on the alarm, locks doors, calls security company, starts recording in
higher definition, sends text messages to warehouse staff
5. Warehouse staff watches on their mobile phones how thief is caught by the
police.
Cisco predicts that in 2020 there will be 50 billion devices connected to the Internet
(currently 8,7 billion). They are going to generate significant amount of Internet traffic.
Network operators will need to adjust their networks to be ready for more uplink traffic,
as opposed to current Internet usage which is download-heavy. The increase in load of
data coupled with the change in proportion of uplink/downlink traffic might be
overwhelming for unprepared cellular networks. The increasing popularity of M2M
systems will be a challenge for network operators and telecoms, though the bigger
telecommunication companies are likely to be adequately prepared, seeing as some of
them already offer M2M services. (AT&T and SingTel)
3.3 Machine to Machine applications
M2M solutions possess the potential to significantly change and improve the way
various industrial sectors perform. Let’s examine some of these applications in various
sectors.
Healthcare
The potential of M2M communication technology is increasingly being explored and
adopted by healthcare sector. The real time communication between patients and
medical devices alleviates the problem of the scarcity and cost of medical human
6
resources, shortens waiting time and improves efficiency. Remote sensors could be
equipped onto treatment devices to gather vital statistics such as blood pressure,
heartbeats rate and sugar level. Once this data is obtained, it is transferred and routed
to a controlling server for examinations (Aasha B., 2012). When these health conditions
experience irregular change, medical staff will be alerted and respond appropriately. By
adopting M2M system, patients’ health condition can be monitored 24/7 without the
need for a large pool of medical staff, while improving the response time for medical
response.
Automotive
Automotive sector are continuously looking for M2M solutions to improve safety, control,
capacities and functionalities in automobiles. With M2M technologies being integrated
into existing automotive systems, applications such as body electronics, power train,
vehicle security and controls, and telematics could be applied (M2M MAGAZINE, 2013).
By attaching sensors such as sensors for temperature, speed and fuel levels into the
built-in systems, communication between automobiles and road infrastructure could be
established. The sensors could send data about current road conditions, possible
problems, dangers and viable solutions to devices and the devices could alert drivers
timely. In addition, traffic could be controlled. The sensors could send data about traffic
volume and speed to other applications or relevant departments for controlling purposes,
facilitating traffic flow through two-way communication between the car and the relevant
traffic authorities.
Home Appliances
M2M technology could offer innovative solutions to improve quality of life and enhance
end-user experience. With increased wireless connectivity, various smart home
appliances based on M2M can be invented. For instance, a M2M based food
management system being integrated with refrigerator could allow users to use their
smart phones to check food conditions and locations stored inside the refrigerator. In
this case, there is a communication between refrigerator and smart phone via the
Internet. M2M solutions for home appliances have the capabilities to improve the
efficiency of home management.
Energy and Utilities
By implementing M2M technology into utility meters, the process for transforming
energy products and billing customers will be efficient. For example, with remote
sensors being attached into oil drill machine, data about equipment pressure, flow rate
and temperatures could be sent to a centralized computer for controlling. By doing so,
7
efficiency and energy savings could be maximized. Utility meters based on M2M can
automatically measure and send data about energy usage to utilities companies for
billing and controlling purposes. In addition, intelligent grid management can enhance
the reliability of energy distribution. M2M technology in the field of metering and utilities
helps prevent energy loss and improve overall performance.
Logistics & Transportation
M2M could be applied to control transport operations and facilitate logistics tracking.
Fleet management system is an M2M based system that incorporates satellite
positioning and data communication to increase visibility and control over transport
operations. By applying M2M technology, vehicles and cargo containers could be
tracked easily and data could be sent to centralized computer for better resource
management. For instance, data transmitted may include fuel level, delivery status,
temperature and humidity, current location and road conditions. The instant availability
of these tracking data is crucial for ensuring a timely and efficient logistics and
transportation.
Security and public safety
By integrating M2M to existing security systems, alarms could be triggered
automatically when potential dangers emerge and corresponding actions taken
automatically to ensure safety. Security and surveillance systems, motion detectors,
personal tracking and alarm response system are just some examples of M2M
applications in the field of security and public safety. Surveillance system, for instance,
can be used to monitor open spaces, keep track of incidents and alert authorities. In the
case of emergency, corresponding authorities could take actions such as controlling
exits by opening or closing gates remotely to contain the situation.
Retails
Retail industry increasingly uses M2M to monitor and control their operations, optimize
inventory and handle transactions. Vending machines, for example, often utilize M2M
systems to manage its operations. Real-time inventory data and operational status of
individual vending machines are sent to a server. Operators working with suppliers will
thus be able to manage the supply chain and provide adequate inventory for each
vending machine without suffering from the bullwhip effect. Point-of-sale (POS) M2M
application is another important application that enables the retail sector to gain
competitive advantages. It enables cashless payment by means of credit card payment
(Margaret R., 2011). Customers, on the other hands, enjoy enhanced shopping
experience with less need for cash payment.
8
3.4 S.W.O.T. analysis
Strengths
● M2M is a fast-growing market.
● M2M helps manufactures gain
efficiency, reduce waste, enhance
machine productivity, identify
maintenance issues before they
occur, and cut cost in a tough
economy (General Electric, 2013)
Weaknesses
● The M2M market is immature
● Many firms have limited
awareness of M2M technology or
have doubts about the true
business benefits
● IT challenge of ensuring that the
M2M data flows can be integrated
into existing enterprise IT systems.
Opportunities
● Government regulations to help
simplify technology standards and
foster innovation
● The expectation of cheaper
technology, smaller devices, and
the increase of connected devices
will further drive the need for M2M
● Long-term growth and innovation
from experimentation within
individual sectors
Threats
● The M2M market may not develop
as rapidly as expected
● Customer concerns about privacy
and security
● The high potential for security
threats on M2M systems
3.5 Examples
M2M has the potential to bring immense benefits to people and organizations. Many of
them truly believe that M2M is going to be the next big thing that revolutionizes the
industry. Some companies across different industries have utilized M2M technology to
great effect for their organizations.
3.5.1 Diebold Incorporated
Diebold Incorporated is company that provides integrated self-service delivery as well
as security systems and services. As the technological trend is moving towards a more
software-driven self-service terminal, Diebold sought to service its ATMs remotely over
the Internet.
Instead of sending a technician on site, remote service software enables them to
service machines within minutes. When there is a need to dispatch a technician,
9
diagnosis can be done remotely while the technician is en route to the ATM, and this
significantly reduces unnecessary downtime wasted while travelling. (Lee, The
Connected Effect-part 1,2013)
Embracing the concept of M2M, ATMs are equipped with remote services and datacapture technology. It stores relevant information regarding the performance of devices.
It is also can be accessed quickly via remote software. Diebold’s remote support
operators are also directly alerted when an ATM fails, and can immediately start
resolving the problem by viewing a mirror image of the module. Thus the information is
more detailed for analysis and resolution. Technician could be well informed of the
problem with good knowledge of the specific machine that is down before they arrive.
This increased their fix-it-the-first-time measurements. (Lee,The Connected Effect-part
1, 2013)
Implementation of M2M systems was highly fruitful for Diebold. The company resolved
approximately 17 percent of total issues remotely and cut overall downtime by 15
percent. Turnaround time for problem resolution decreased from an average of one to
three hours to fewer than 30 minutes when remote corrective action is successful.(Lee,
The Connected Effect-part 1,2013)
In addition, Diebold could now even expand the level of its service and support offerings
to include predictive maintenance, software version control and remote monitoring &
notification, all because of M2M.
3.5.2 Leica Microsystems
Another example is Leica Microsystems, a manufacturer of microscopic imaging
applications, measurement, and analysis.
The company aims to move from a reactive to proactive service that focuses on
downtime avoidance, predicting potential problems and providing preventive repair all
over the world. Customers would thus benefit from negligible product downtime, faster
service, and higher productivity through this change.
Leica Microsystems outsourced a site from Axeda called Leica RemoteCare that
allowed registered users to log into the site and view the devices in the regions that are
under their maintenance. Using Axeda ServiceLinkTM applications, users could
compare current parameters with the products’ specifications. These include hardware
and calibration changes, software and PC system status, laser errors, galvanometer
settings and critical temperatures. With such information available for monitoring, critical
events are now becoming more predictable and thus less prone to downtime.(Lee, The
Connected Effect-part2, 2013)
For example, they could monitor the performance of tissue processors with Leica
RemoteCare. When the temperature goes out of allowable range, an alarm is raised
and an email will be sent to users and customers, who could then make necessary
adjustment before losing a specimen. The company also monitors cleaning sequences,
10
so that if the system is required to clean, the user is alerted so that they don’t waste
specimens. RemoteCare could also be used when power is diminishing. The system will
prompt users to adjust the microscope prior to any issue, ensuring uninterrupted
research.
Leica could also remotely inform its users about a failing program which is under their
remote monitoring. For example, Leica received an error message about a program
failing with a tissue processor at a university. The service representative called the
customer, who was unaware of any issue, and advised him to inspect his machine
immediately. The customer removed debris, and the tissue processor worked just as
fine as before. As a result of this proactive service, the university avoided possible
system downtime with no loss of specimen.(Lee, The Connected Effect-part2, 2013)
Leica Microsystems has realized substantial benefits from this program, it reduced 40%
unscheduled downtime and 33% field service visits. They also reduced 50 onsite visits
in the first half of 2009 and 400 visits at the end of 2009. That translates into a saving of
more than 500,000 U.S. dollars.(Lee, The Connected Effect-part2, 2013)
3.5.3 General Electric
General Electric (GE), one of the most influential multinational conglomerate corporation
with business scope spanning across energy, IT, consumer and industrial electronics
also sees the great potential of M2M technology and they truly believe it will change the
way business operates. They have recently held a conference, “Minds and Machines” to
announce the use of “Industry Internet”(based on M2M technology concept) in
industries such as aviation, transportation, manufacturing and hospitals(General Electric,
2013).
During the conference, they have announced nine M2M technologies that could be used
in industries to significantly increase efficiency decrease downtime and reduce cost. For
example, by connecting machines to the Internet, railway industries could now move
freight around more intelligently with remote monitoring and diagnostic. Another
technology is to increase efficiency in hospital operation management. It is used to
integrate the assignment of beds, workflow between departments, inflow and outflow of
patients as well as equipment management data to reduce waiting time and increase
service quality.
GE aims at achieving real material outcome for customers. It estimates an overall 1%
increase in efficiency in all industries with the use of smart machines, analytics and
mobility.1% is a significant improvement for large, multibillion-dollar industries where
competitive advantages are increasingly difficult to attain. For example, a 1% savings in
fuel consumption translates to $33 billion for the aviation industry, and 1% operational
savings translates to $63 billion for the healthcare industry. (Nusca, 2012)
11
4. Conclusion
4.1 How can companies benefit
In conclusion, M2M technology has transformed the way business gets done. By
connecting machines, devices, systems and people together, businesses and
organizations are able to use the new forms of data to transform existing operations,
explore new market opportunities and gain powerful insights. With the adoption of M2M,
various operational processes such as monitoring, controlling, inspection, production
and transportation processes becomes more efficient, reliable, automated and
productive. The enhanced level of control optimizes operational processes, streamlines
supply chain, thus saving costs and reducing operation delay. When data can be
gathered from remote machines in real-time, decision making is faster, more accurate
and informed. On-going communication with customers could also help companies
understand customer’s needs and bring out new products to market effectively. In
addition, intelligent transport, intelligent grid management and waste management
systems empowered by M2M can dramatically reduce energy loss. It is beneficial to
sustainable development in the long run. In sum, M2M can help companies to achieve
their business objectives and enable them to gain competitive advantages.
4.2 Possible Challenges
Although there are many benefits related to using M2M technology, they do not come
without challenges. Security is the main risk of implementing a M2M solution. The digital
nature of M2M systems lends itself to digital threats, such as worms, viruses, and trojan
horses. There are several known M2M threats than can adversely impact a business,
including interception and interruption attacks on the system. These attacks can lead to
the disclosure of information to unauthorized parties, fraud, and critical infrastructure
exposure. In order to reduce security threats communication networks, connected
devices, and communication components must be secured to combat potential attacks.
This can be accomplished through several security measures including protecting
physical devices from tamper-resistant enclosure to protect physical devices,
authentication via certificates, SSL/TLS encryption, two-factor authentication with SMS,
and data encryption. In addition, it is very important that M2M customers educate
themselves abouts risks related to the technology. Firms should utilize their existing
expertise and seek proper consulting if needed. (Ennesser, 2013)
12
Reference:
Aasha B., 2012. Engineering and Technology Magazine. M2M in healthcare.
Retrieved from http://eandt.theiet.org/magazine/2012/04/wellness-connected.cfm on 10
Oct 2013
Ennesser F., 2013. Security in Machine-to-Machine Communication: The role of the
Telecommunication Operator. Retrieved from http://docbox.etsi.org/ on 11 Oct 2013
Margaret R., Mar 2011. point-of-sale terminal (POS terminal). Retrieved from
http://whatis.techtarget.com/definition/point-of-sale-terminal-POS-terminal on 11 Oct
2013
M2M MAGAZINE, 2013. M2M Report: Automotive Sensors Market Forecast. Retrieved
from http://www.machinetomachinemagazine.com/2013/09/22/m2m-report-automotivesensors-market-forecast-2022/ on 10 Oct 2013
General Electric. (2013). Minds and Machines. Retrieved 10 19, 2013, from General
Electric: http://www.ge.com/mindsandmachines
Nusca, A. (2012, 11 29). GE unwraps 'Industrial Internet': M2M for planes, trains,
manufacturing. Retrieved 10 19, 2013, from Zdnet: http://www.zdnet.com/ge-unwrapsindustrial-internet-m2m-for-planes-trains-manufacturing-7000008097/
Lee, I. (2013, 6 20). The Connected Effect-part2. Retrieved from Axeda Blog:
http://blog.axeda.com/archived-axeda-blog-/tabid/90718/bid/99355/M2M-in-the-WildReal-World-Examples-Part-2-Healthcare-costs-and-security.aspx
Lee, I. (2013, 6 10). The Connected Effect-part 1. Retrieved 10 19, 2013, from Axeda
blog: http://blog.axeda.com/archived-axeda-blog-/tabid/90718/bid/99009/M2M-in-theWild-Real-World-Examples-Part-1.aspx
Connectivity to Machine (M2M) and electronic banking for businesses. Retrieved 2013
10 19 from SFR (french operator):
http://pme.sfrbusinessteam.fr/internet-et-reseau/M2M/
Machine-to-machine application, retrieve from Singtel:
http://info.singtel.com/large-enterprise/m2m/machine-to-machine-application
13
Download