Overview of analysis of existing SDO M2M architectures Group Name: REQ ARC#2 Source: Alcatel-Lucent.

Slides:



Advertisements
Similar presentations
Internet of Things (IoT) Work Group
Advertisements

A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
ETSI M2M / TIA architecture harmonization O. Elloumi.
Example for SCL resource usage according to ETSI TC M2M March 2011 Josef Blanz, Qualcomm Inc.
IoT in ODL Lionel Florit, Principal Engineer, ODL ID lflorit
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
SIP roaming solution amongst different WLAN-based service providers Julián F. Gutiérrez 1, Alessandro Ordine 1, Luca Veltri 2 1 DIE, University of Rome.
REQ WG Reuse of underlying networks, 3GPP
REQ WG Reuse of underlying networks, 3GPP
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
The Open Grid Service Architecture (OGSA) Standard for Grid Computing Prepared by: Haoliang Robin Yu.
TTA Views on Technical Scope of M2M Consolidation 17 August 2011 TTA M2MCons02_16 (Agenda 4.3)
OneM2M Draft proposal for slide set. This is not intended to be a oneM2M presentation. It is a collection of source material slides which can be used.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
ETSI M2M / TIA architecture harmonization next steps.
Authors list to be completed.
Device Management using mgmtCmd resource
Device Management using mgmtCmd resource Group Name: WG2/WG5 Source: InterDigital Communications Meeting Date: Agenda Item: TBD.
Presentation of ETSI TC M2M security features Group Name: WG4 Securtity Source: Francois Ennesser, Gemalto Meeting Date: Agenda Item: SEC.
xx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: July,
FI-WARE – Future Internet Core Platform FI-WARE Interface to Networks and Devices (I2ND) July 2011 High-level description.
SIP/RTSP convergence draft-whitehead-mmusic-sip-for-streaming-media-05
Authors list to be completed.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
Unrestricted Connection manager MIF WG IETF 78, Maastricht Gaëtan Feige, Cisco (presenter) Pierrick Seïté, France Telecom -
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
Network Resource Gateway (NRG) Application DevelopmentDSLD Unit Florin van Slingerland Rev A Slide 1 Application Development Presentation/Course Teaser.
Common Service Entities
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
SOFTWARE DESIGN AND ARCHITECTURE LECTURE 09. Review Introduction to architectural styles Distributed architectures – Client Server Architecture – Multi-tier.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
SWIM-SUIT Information Models & Services
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
An operator’s perspective on support for different M2M deployment scenarios AT&T Group Name: TP Source: Farooq Bari, Jianrong Wang; AT&T;
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
HUAWEI TECHNOLOGIES CO., LTD. Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Step by step approach Group Name: WG2 Source: Michael hs. Yang, LG uplus, Jaeseung Song, NEC Europe, Meeting.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
© 2007 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Device Management using mgmtCmd resource Group Name: WG2/WG5 Source: InterDigital Communications Meeting Date: Agenda Item: TBD.
IEEE MEDIA INDEPENDENT HANDOVER DCN: MISU Title: Interworking Service Architecture and Requirements Date Submitted: September 17,
LWM2M Interworking Group Name: Architecture
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Realizing Ms Interface with OMA DM Group Name: MAS WG Source: Seungkyu Park, LG Meeting Date:
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Submission doc.: IEEE arc March 2014 Max Riegel (NSN)Slide 1 Cross-WG cooperation on OmniRAN P802.1CF E.g.: Network Discovery and Selection.
Consideration Security Issues on Registration Group Name: WG4 (SEC) Source: Shingo Fujimoto, FUJITSU, Meeting Date:
Submission doc.: IEEE 11-12/0346r2 WLAN and Cellular Interworking and Discovery Use Case Date: Slide 1Joseph Levy, InterDigital Communications,
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
IEEE MEDIA INDEPENDENT HANDOVER DCN: hwnm Title: Thoughts on IEEE relation with IEEE Date Submitted: May 13, 2010.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: August,
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE 802 OmniRAN Study Group: SDN Use Case
CMDH Refinement Contribution: oneM2M-ARC-0397R01
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Requirements and Approach
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Requirements and Approach
Presentation transcript:

Overview of analysis of existing SDO M2M architectures Group Name: REQ ARC#2 Source: Alcatel-Lucent

Overview of capabilities based on SDO architecture work SDO architecture reference point analysis Aspects that need clarification and/or further requirements guidance Summary of aspects that need clarification/followup Outline

Introduction The purpose of this slide is to encourage discussion and ensure common understanding of existing SDO specification work

Service capabilities listed in SDO specifications Connectivity support related Service layer capabilityBrief descriptionRelated requirements (TBC) Comment / guidelines Protocol translationTranslation between protocols used different reference points of the architecture (HTTP, CoAP, etc.) HLR-XX Device triggeringTriggering the device through secondary mechanism (e.g. SMS) to establish a connection to the M2M service layer HLR-XX Interworking with area network technologies Interworking aspects towards M2M area network technologies such as ZigBee HLR-XX

Service capabilities listed in SDO specifications Security related Service layer capabilityBrief descriptionRelated requirements (TBD) Comment / guidelines Key managementGeneration, exchange, storage, use, and replacement of keys used for security purposes HLR-190, HLR-212, HLR- XX Authentication authorisation and accounting Control over which entities are allowed access to which services, and how much of the resources they have used HLR-057, HLR-206, HLR- 192, HLR-184, HLR-174, HLR-198, HLR-175, HLR- 205, HLR-193, HLR-185, HLR-183, HLR-202, HLR- 211 M2M service bootstrapping Secure provisioning of (secret) M2M Root Key in M2M Device/Gateway and M2M Authentication Server; HLR-XX API managementAuthentication and authorization of calls to APIs HLR-XX

Service capabilities listed in SDO specifications Object/resource management related Service layer capabilityBrief descriptionRelated requirements (TBD) Comment / guidelines Application and Device Registrations Making the device and/or device application known to the service layer HLR-XX Resource managementCreate, update, retrieve, disvocer and delete resource objects containing various attributes in the service layer. HLR-XX Content push/pullUnicast and multicast data push to specified devices HLR-XX Store and forward of dataStore data in intermediate nodes. Forward data subject to permissions and access rights HLR-XX Subscribe/notifysubscribe to receive notifications upon certain events or when certain resources are updated. HLR-XX Group managementgroup creation, modification etc. HLR-XX

Service capabilities listed in SDO specifications Remote management related Service layer capabilityBrief descriptionRelated requirements (TBD) Comment / guidelines Device managementConfiguration, firmware upgrades, application lifecycle management, device lock and wipe HLR-XX Network operators provide already DM functions. Need to articulate how oneM2M service architecture interacts with Network device management DM sometimes uses specific reference points (#from reference points used for M2M data) Proxy managementDevice management of devices behind gateways. HLR-XX MonitoringMonitoring of connectivity, application, etc. HLR-XX Need to articulate how oneM2M service architecture interacts with capabilities already existing in the operator network

Service capabilities listed in SDO specifications Other Service layer capabilityBrief descriptionRelated requirements (TBD) Comment / guidelines ChargingCharging pertaining to the usage of the service layer or network usage HLR-XX Data processingProvide e.g. threshold and expression rules setting and execution on the various data collected from the devices. Notifications could be triggered based on the outcome of the rules testing. HLR-XX Semanticssemantic description of stored data. Such description can be used for the purpose of e.g. data processing HLR-XX

SDO architecture reference point analysis

Reference points analysis TIA ATISETSITIAAspects that needs clarification no equivalent A1, A2, A3/A3': interfaces between applications (PoA, node, home) and a AAA-SD for the purpose of providing AAA Clarify if the use of AAA is to allow applications to access the network; AAA ownership no equivalent B1, B2, B3: provide for interaction between a PoA application and a node application, including bi-directional communication of control information, events and data. Need to clarify if these are application to application interfaces - without making use of the service layer Traffic flow (option 2) no equivalent (in ETSI there is no loopback referenc e points) B5/B5'/B9: provides for interaction between the different PoA applications/PoA devices, possibly in different containers, including bi-directional communication of control information, events and data. Need to clarify if these are application to application interfaces - without making use of the service layer no equivalent B4: provides for interaction between the different node applications, possibly in different containers, including bi-directional communication of control information, events and data. no equivalent B6/B7/B8: provides for interaction between an application and a container (node, PoA, server container) Need to clarify if the container (TIA) and SCL (ETSI) are functionally equivalent

Reference points analysis ETSI ATISETSITIAAspects that needs clarification equivalent to MSP IF mIa: The mIa reference point offers generic and extendable mechanism for Network Applications interactions with the NSCL.no equivalent dIa: The dIa reference point offers generic and extendable mechanism for Device Application (DA)/Gateway Application (GA) interactions with the DSCL/GSCLno equivalent no equivalent (but ATIS shows traffic flows which could be equivalent to ETSI mId) mId: The mId reference point offers generic and extendable mechanism for SCL interactions.no equivalent there appears to be no container to container reference point in TIA no equivalent mIm: The mIm reference point offers generic and extendable mechanism for NSCL to NSCK interactions.no equivalent

Reference points analysis ATIS ATISETSITIAAspects that needs clarification NW IF: This is the interface between the M2M Device and the Network Provider to provision and manage the connection of the device to the network. As indicated in the diagram it may also enforce the network policies Need to clarify what aspects of this reference points are M2M specific MSP IF: This is the interface between the Network Provider and the M2M Service Provider to provision, manage service delivery, and define service capability policies on the M2M Devices Need clarify if this reference point is equivalent to Tsp, Tsms, Gi/SGi, etc. ASP IF: This is the interface between the M2M Service Provider and the Application Services to Bootstrap, Activate, Provision, Secure, Meter, Manage Application Services delivered on the M2M Devices mIa equivalent (TBC) Need to confirm if this reference point is equivalent to mIa

Summary of aspects that need clarification/followup Link between service capabilities and requirements Clarify if the PoA device in TIA is equivalent of ETSI d device Clarify if the ETSI SCL is equivalent to the container in TIA Seek common understanding on which existing SDO reference points are within scope of oneM2M (e.g. loopback reference points)