Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 LS to TR-50 October 2010.

Slides:



Advertisements
Similar presentations
MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
Advertisements

Access distribution for M2M devices Document Number: IEEE C802.16p-10_0028 Date Submitted: December 31, 2010 Source: Jin Lee, Youngsoo Yuk, Jeongki Kim,
-1- Management for M2M Devices [IEEE Presentation Submission Template (Rev. 9.2)] Document Number: IEEE C802.16p-10/0039 Date Submitted:
Expanding LTE for Devices European Commission Information Society and Media The aim of EXATED is to realise the vision of a new scalable.
May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
Cdma2000 Cards and Provisioning David Crowe Doug Dunn
What we do Larotecs Web2M is an off-the shelf, end-to-end, web-based solution designed to manage multiple widely distributed devices.
The 3GPP2 Vision Presented by Eileen McGrath (NEC) on behalf of the 3GPP2 Vision AdHoc Slide 1.
Binding of cdma2000 access subscription with specific device(s) 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
CDMA Standards Update M2M Small Group Discussion: CONVERGENCE LAYER CONCEPTS Orlett W. Pearson January 2012.
GSC-13 Presentation TR-45.5 Spread Spectrum Digital Technology -- Mobile and Personal Communications Standards.
Advantage Century Telecommunication Corp. AIL: Actively Intelligent Link-Layer Handoff Guo-Yuan Mikko Wang
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services Steve Cotter Director,
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
VoIP Voice Transmission Over Data Network. What is VoIP?  A method for Taking analog audio signals Turning audio signals into digital data Digital data.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
Switching Techniques Student: Blidaru Catalina Elena.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
SIGNALING. To establish a telephone call, a series of signaling messages must be exchanged. There are two basic types of signal exchanges: (1) between.
Optimized M2M interworking with mobile networks Group Name: oneM2M REQ Source: Takanori Iwai, NEC, Meeting Date: Agenda.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Establishing Connections Networking Modes: When you are evaluating a network, you concentrate on circuit switching versus packet switching. But it's also.
Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 Liaison Report to TR-50 August 2011.
The OSI Model.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
What is Bandwidth on Demand ? Bandwidth on Demand (BoD) is based on a technology that employs a new way of managing and controlling SONET-based equipment.
Chapter 12 - Packet Switching Introduction Sharing Saves Money –Arranging for multiple devices to share a single transmission path lowers cost because.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc 1.
Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 LS to TR-50 February 2011.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNP 1 v3.0 Module 1 Overview of Scalable Internetworks.
Security considerations for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE ppc-10/0037 Date Submitted:
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G Connect on demand Feature.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Data Transmission Mechanism for Multiple Gateway System Xuan He, Yuanchen Ma and Mika Mizutani, 6th International Conference on New Trends in Information.
Network Topologies.
M2M Study Item 3GPP2 Orlett W. Pearson May | 3GPP2 M2M Study Item | May GPP2 M2M This study will include the following study targets: 
Optimized M2M interworking with mobile networks Group Name: oneM2M REQ Source: Takanori Iwai, NEC, Meeting Date: Agenda.
Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 LS to TR-50 April 2011.
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
S V.MOUNICA 09551A0294.  To increase the distribution rate of present electric supply which is 70% to 100%.  Improving the supply to house holds without.
1 BCMCS Framework TSG-X BCMCS Adhoc August 20, 2003.
Network Processing Systems Design
THE OSI MODEL By: Omari Dasent.
AP Power Saving Date: Authors: May 2017 Month Year
WIRELESS INTELLIGENT NETWORKS (WIN)
Reliable and Efficient Transmission to M2M Device Groups
On AP Power Saving Usage Model
IEEE MEDIA INDEPENDENT HANDOVER
SMS.
Mobile ad hoc networking: imperatives and challenges
Update from TR-45.5 on IMT Standardization
Specialized Cloud Architectures
GPRS Introduction to GPRS. 1.1) what is GPRS?
Sept 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed MAC Comment Resolutions Date Submitted:
Device Collectives to Share Resources
On AP Power Saving Usage Model
Presentation transcript:

Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 LS to TR-50 October 2010

2 | 3GPP2 M2M | October GPP2 LS to TIA TR-50 M2M Study - Scope Identify applicable M2M communications use cases and characteristics. Identify the list of potential requirements needed to enable machine type communications on cdma2000 networks based on the identified M2M service functionalities. Identify possible enhancements that would help in providing cdma2000 network operators with lower operational complexities when offering machine-type communication services Evaluate the impact of the anticipated large number of M2M devices and how to minimize this impact on the cdma2000 networks; e.g., Group Based. Optimize network operations that can minimize the impact on device battery power usage.

3 | 3GPP2 M2M | October GPP2 LS to TIA TR-50 3GPP2 M2M Activity 3GPP2 SC Ad Hoc on M2M Numbering and Addressing M2M Study work being developed in TSG-S Completion date: 4Q2010 Items being addressed: recognizing a potentially large number of communicating devices, lower costs and less effort, data communications (packet/circuit switch), majority of these communications involve small to little traffic TSG-X kicked off an M2M joint session with TSG-A and TSG-C (September) Introduced Network Optimizations M2M E2E Procedures Architecture

4 | 3GPP2 M2M | October GPP2 LS to TIA TR-50 M2M Study – Characteristics Being Considered Low Mobility - M2M devices that have a limited scope of movement. Time Controlled - M2M Applications that can tolerate sending or receiving data during certain time intervals in order to avoid unnecessary signalling. Time Tolerant - M2M devices that can postpone their data transmission (load conditions). Location Specific Trigger – Used to trigger M2M devices that are known by the M2M Application to be in a particular area or location. Uplink Data for Provided Network Destination - Used with M2M Applications that require all data from a M2M device to be sent to a specific network (using IP address). Infrequent Transmission - Used with M2M devices that are expected to send or receive data with a long period of time between two data transmissions. Group Based M2M Characteristics, Group Based Policy, Group Based Addressing - A group of M2M devices which could share the same subscription and a common set of M2M characteristics can be handled by the network as a group rather than individually. Priority Access - Used with M2M devices that need to communicate information in an emergency situation, and may be related to public safety.

5 | 3GPP2 M2M | October GPP2 LS to TIA TR-50 M2M Study – Use Cases The group is reviewing various Use Cases relative to groups. A few are noted: Smart Metering –Fixed to Low Mobility, Small Data Transmission, Time Controlled, Group- based Policy, Group-based Billing, Group-based Addressing Professional Health Care Monitoring –Low Mobility, Small Data Transmission, High Priority Fleet Management Tracking –Small Data Transmission, Mobile Device, Group-based Billing Public Safety –Priority Access, Small Data Transmission, Group-based Policy Payment Machine –Fixed or low mobility. Some payment terminals (e.g., hand-held credit card machines used in restaurants) have low mobility. Exception cases include vending machines on high-mobility transportation (e.g., trains). Group-based address & policy - The operator might want to address this type of device on a group basis.

6 | 3GPP2 M2M | October GPP2 LS to TIA TR-50 M2M Study – Terminal Security Terminal Security: M2M devices might use detachable device such as M2M UICC with CSIM application or R-UIM to store subscription information for M2M applications. Since many M2M terminals might be installed outside and not monitored in real time, the detachable device for storing subscription information would create security issue. Develop a mechanism to prevent theft, tampering with subscription credentials and subscription information. May need to develop some special mechanism to authenticate M2M terminals.

7 | 3GPP2 M2M | October GPP2 LS to TIA TR-50 M2M Study Battery Life Battery Life Improvement for Battery Operated M2M Devices: Many M2M devices might not need to periodically wake up to monitor the network providing an opportunity to save battery life by configuring M2M devices for different sleep duration and wakeup time. Reducing unnecessary re-transmissions of M2M application packets. Consider categorizing M2M applications (allow more transmission delay/response: Low sensitive latency Medium sensitive latency High sensitive latency