CMDH Refinement Contribution: oneM2M-ARC-0397R01

Slides:



Advertisements
Similar presentations
CMDH Refinement Contribution: oneM2M-ARC-0397
Advertisements

Summary on the M2M CMDH Policies Management Object (MCMDHMO)
Is a Node or not Node? ARC Node_resolution Group Name: ARC Source: Barbara Pareglio, NEC, Meeting Date: ARC#9.1 Agenda.
Example for SCL resource usage according to ETSI TC M2M March 2011 Josef Blanz, Qualcomm Inc.
Problem of non-Blocking Synchronous mode Group Name: ARC WG Source: Yuan Tao, Mitch Tseng, Huawei Technologies Meeting Date: ARC 15.0 Agenda Item: TBD.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Device Management using mgmtCmd resource
Device Management using mgmtCmd resource Group Name: WG2/WG5 Source: InterDigital Communications Meeting Date: Agenda Item: TBD.
Resource Announcement Procedures Group Name: WG2 Source: Rajesh Bhalla, Hao Wu - ZTE Meeting Date: Agenda Item: TBD.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
CMDH Policies Contribution: ARC R03-CMDH_Policies.ppt Source: Josef Blanz, Qualcomm UK, Hongbeom Ahn, LG Electronics,
oneM2M-OIC Interworking Technical Comparison
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Announcement Resources ARC Announcement_Issues Group Name: WG2 Source: Barbara Pareglio, NEC Meeting Date: Agenda Item: Input Contribution.
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
PRO R01-URI_mapping_discussion Discussion on URI mapping in protocol context Group Name: PRO and ARC Source: Shingo Fujimoto, FUJITSU,
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
3GPP Rel-13 Interworking discussions
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Answer the Questions Regarding Pending Issues on Access Control Group Name: WG4 SEC Source: LG Electronics Meeting Date: Agenda Item: SEC#11.4.
Management of CMDH Policies Group Name: WG5-MAS Source: Wolfgang Granzow, Qualcomm, Meeting Date: Agenda Item: Management.
Usage Scenarios for CSE Group Name: WG2(ARC-WG) Source: Shingo Meeting Date: Agenda Item: Message.
Response Status Codes Concepts for oneM2M Group Name: WG3 Source: Philip Jacobs, Cisco, Meeting Date: Agenda Item: TS-0004.
Supporting long polling Group Name: ARC WG Source: SeungMyeong, LG Electronics, Meeting Date: x-xx Agenda Item: TBD.
Customized Resource Types MAS Group Name: MAS + ARC + PRO WGs Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date:
Step by step approach Group Name: WG2 Source: Michael hs. Yang, LG uplus, Jaeseung Song, NEC Europe, Meeting.
Status Report on Access TP8 Group Name: WG2 Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Node-Specific Resource Group Name: ARC&MAS Source: LGE, Meeting Date: Agenda Item: Contribution.
Primitive End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting.
Device Management using mgmtCmd resource Group Name: WG2/WG5 Source: InterDigital Communications Meeting Date: Agenda Item: TBD.
1. How to handle Request-ID? oneM2M joint WG2 & WG3 discussion PRO Josef Blanz July 2 nd, 2014.
M2M Service Session Management (SSM) CSF
E2EKey Resource Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.3, Agenda Item: End-to-End Security.
M2M Service Subscription Profile Discussion Group Name: oneM2M TP #19.2 Source: LG Electronics Meeting Date: Agenda Item:
ARC R02 Modelling operations – problem statement and proposal Group Name: ARC#19.3 Source: Joerg Swetina, NEC,
App and Management End- to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm,
Protocol Issues related to Plugtest Group Name: TST Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date: Agenda.
App End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
LWM2M Interworking Proxy Procedures ARC Considerations
M2M Service Session Management (SSM) CSF Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP8 Agenda Item:
Adding Non-blocking Requests Contribution: oneM2M-ARC-0441R01R01 Source: Josef Blanz, Qualcomm UK, Meeting Date: ARC 7.0,
Authorization Architecture Discussion Group Name: SEC WG Source: Seongyoon Kim, LG Electronics, Meeting Date: 28 MAY, 2014 Agenda.
CMDH and Policies Contribution: oneM2M-ARC-0603
Subscription and Notification Issue Group Name: WG2 Source: Qi Yu, Mitch Tseng- Huawei Technologies, Co. LTD. Meeting Date: ~23 Agenda Item:
Consideration Security Issues on Registration Group Name: WG4 (SEC) Source: Shingo Fujimoto, FUJITSU, Meeting Date:
DM Execute Group Name: WG2/WG5 Source: Jiaxin Yin, Huawei Technologies Co., Ltd., Meeting Date: Agenda Item: TBD.
Reasons for CSF Clean-up (Issues & Next Steps) Group Name: WG2 Source: Syed Husain – NTT DOCOMO Meeting Date: (ARC_9.3) Agenda Item: 6 DOC#:
Management CSF(s) Architectural choices Group Name: WG2 (ARC), WG5(MAS) Source: Catalina Mladin, InterDigital Comm., Meeting.
Introduction to Service Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP8 Agenda Item:
Possible options of using DDS in oneM2M Group Name: ARC Source: KETI, Huawei, Hitachi, China Unicom Meeting Date: Agenda Item: DDS binding.
[authenticationProfile] <mgmtObj> specialization
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
Service Enabled AE (SAE)
End-to-End Security for Primitives
Group multicast fanOut Procedure
Possible options of using DDS in oneM2M
oneM2M Service Layer Protocol Version Handling
MAF&MEF Interface Specification discussion of the next steps
Network Services Interface
Discussion to clarify online/offline behavior
3GPP Interworking Abstraction
oneM2M Versioning Next Steps
Considering issues regarding handling token
Discussion on feature catalogue
MinitorEvent(UE_Reachability)
CMDH Policies Contribution: ARC-2014-xxxx
Service Layer Dynamic Authorization [SLDA]
Network Services Interface
3GPP Interworking and Multicast retransmission
Presentation transcript:

CMDH Refinement Contribution: oneM2M-ARC-0397R01 Source: Josef Blanz, Qualcomm UK, jblanz@qti.qualcomm.com Meeting Date: ARC 6.7, 2013-10-03 Agenda Item: CSF definitions

CMDH: Refined Description Description of what CMDH is supposed to do Starts with simple UPDATE example Proposes Stage-2 message flow Does not cover protocol specific features (to discussed in WG3)

Access to local resource AE1 trying to access local resource: For instance an UPDATE to local resource Assumes that resource is hosted on CSE1 Request can be processed without help of other CSEs No need to involve CMDH on CSE1 or any other CSEs Y2 Infrastructure Node Middle Node Application Service Node AE1 CSE2 CSE3 Y1 CSE1 X CMDH UPDATE

Access to remote resource (1) AE1 trying to access remote resource: For instance an UPDATE to remote resource Assumes resource is hosted on CSE3, connectivity for Y1/Y2 may be off-line Request may contain preferences indicating ‘expiration time’, ‘event category’ CSE1, CSE2 and CSE3 need to get involved Multiple steps needed… see following slides Infrastructure Node Middle Node Application Service Node AE1 CSE2 CSE3 CSE1 X CMDH UPDATE Y1 Y2

Access to remote resource (2) AE1 making request to local CSE (=CSE1), CSE1 checks request and accepts it (other CSFs involved) Request is targeting another CSE (=CSE3) CMDH on CSE1 takes responsibility to deliver it Infrastructure Node Middle Node Application Service Node AE1 CSE2 CSE3 CSE1 X CMDH CSE1 accepts request CMDH on CSE1 responsible to deliver Y1 Y2

Access to remote resource (3) CMDH on CSE1 is forwarding request to CSE2 CMDH on CSE1 waits until it is OK to connect to CSE2 (policies: when/how) CSE2 checks request and accepts it (other CSFs involved) Request is targeting another CSE (=CSE3) CMDH on CSE2 to takes responsibility to deliver it Infrastructure Node Middle Node Application Service Node AE1 CSE2 CSE3 CSE1 X CMDH CMDH on CSE2 responsible to deliver CSE2 accepts request CSE1 establishes connection to CSE2 Y1 Y2

Access to remote resource (4) CMDH on CSE2 is forwarding request to CSE3 CMDH on CSE2 waits until it is OK to connect to CSE3 (policies: when/how) CSE3 checks request and accepts it (other CSFs involved) Request is targeting local CSE (=CSE3) Local CSE3 executes original request (UPDATE) Infrastructure Node Middle Node Application Service Node AE1 CSE2 CSE3 CSE1 X CMDH CSE3 executes UPDATE CSE3 accepts request CSE2 establishes connection to CSE3 Y1 Y2

Message Flow: Example Assumptions: Originator is AE1 Original request is an ‘UPDATE’ to a remote resource on CSE3 ‘UPDATE’ options selected such that no feedback from update operation was requested, i.e. AE decided that it does not need to hear back from CSE3 (expressed in mi) Delivery related parameters (to be discussed separately): Lifespan time (ls in mi) Event Category (ec in mi)

Resource Based CMDH Requesting a CSE to ‘deliver’ something could be done via a resource based service A CSE receiving such requests may have a simple path for that, e.g. /{CSE-base}/dh A resource type <delivery> is proposed to capture relevant delivery data and meta-data Possible actions: Request to Deliver something CREATE(to=/{CSE-base}/dh,fr={requesting-CSE},cn=data,mi={et, lifespan, eventCat, options}) or CREATE(to=/{CSE-base}/dh/{pref-ID},fr={requesting-CSE},cn=data,mi={et, lifespan, eventCat, options}) => If accepted, CSE responds with actual dhr-ID (possibly more data, depends on selected options) and executes on the delivery Request to retrieve status of delivery request RETRIEVE(/{CSE-base}/dh/{dhr-ID}) Request to change delivery parameters UPDATE(/{CSE-base}/dh/{dhr-ID}/lifespan, newLifespanValue, options) Request to delete / cancel a delivery request DELETE(/{CSE-base}/dh/{dhr-ID}, options) Delivery of data can be offered as a resource-based service in a RESTful manner

Message Flow (Resources) Assumptions: Originator is AE1 Original request is an ‘UPDATE’ to a remote resource on CSE3 ‘UPDATE’ options selected such that no feedback from update operation was requested, i.e. AE decided that it does not need to hear back from CSE3 (somehow expressed in mi) Delivery related parameters (to be discussed separately): Lifespan (ls in mi) Event Category (ec in mi)

Resource Type <delivery> Representing a request to deliver data from one CSE to another CSE CMDH on local CSE triggered by another local CSF: Starts delivery process and represents the context of the request in a <delivery> resource CMDH on first CSE forwards data to CMDH on second CSE (next hop): Request from first CSE to second CSE to create <delivery> resource on second CSE <delivery> resources can be managed with normal CRUD operations source: CSE that started delivery process target: Destination CSE for delivery of data lifespan: Time by which delivery should be completed / delivery can be purged eventCat: Category of event that triggered this delivery deliveryMetaData: Meta data on delivery process (status, parameters regarding encryption, tracing information ) data: Data to be delivered (includes original request)

Motivation Resource Type <request> CMDH description in clause 6.2.2.2 of TS 0001 already points out that “The content of the data provided by the requestor shall be opaque to the delivery handling function and shall not influence the behaviour of the CMDH. In particular, the CMDH CSF shall not be aware of the specific destination function (CSF) within the target entity including the parameters of such a function. For instance if the destination of the data to be delivered is a DMR CSF within a target entity (CSE, NSF, AF), the CMDH CSF shall not be aware of the DMR CSF including the specific storage location or other parameters pertaining to that DMR CSF. That means all attributes that are intended to be shared with the destination function (e.g., which CSF is the destination on the target entity, what that CSF should do with the data etc.) should be hidden from the CMDH CSF” Description of “Request Identifier (M2M-Request-ID)” in clause 7.1.7 of TS 0001 “This is an identifier that tracks a Request initiated by a CSE end to end. It is also included in the Response to the Request. The M2M-Request-ID is allocated by the CSE initiating the Request. The Request initiated by the CSE could be the result of an Application Request, or a Request initiated autonomously by the CSE to fulfil a service” When a request is targeting a remote CSE, the request needs to be put inside the data that gets delivered to the target CSE When delivery data reaches a target CSE, it needs to extract what the original request was When a result of a requested operation comes back from a target CSE to the originating CSE, the result may have to be stored for later access by the originator of the triggering request => definition of a resource type <request> CMDH on target CSE can forward the received data to other CSFs for unpacking the original request from the delivery data The target CSE can understand what the original request was and act on it

Resource Type <request> The ID of the <request> resource could simply be the M2M-Request-ID operation: Operation being requested, see op in clause 8.1 target: Targeted resource, see to in clause 8.1 originator: Entity that originated the request, see fr in clause 8.1 metaInformation: Meta information on the request (expiration time etc.), see mi in clause 8.1 Content: Content going to / coming from target, see cn in clause 8.1 requestStatus: Status of the request, see rs in clause 8.1 (e.q. accepted & pending) operationResult: Result of the requested operation, see cs in clause 8.1 (e.g resource created under URI xyz)