Device Management Deployments In oneM2m Group Name: MAS Working Group Source: Timothy Carey, Alcatel-Lucent, Meeting Date:

Slides:



Advertisements
Similar presentations
Cellular Networks.
Advertisements

Configured network infrastructure changes Lefthand P4500 SAN Configured, Deployed, and Certified Blade Server Chassis and Server Blades Assembled.
ETSI M2M / TIA architecture harmonization O. Elloumi.
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
CURRENT STANDARDIZATION ACTIVITIES – ONEM2M GSC-18 Meeting, July 2014, Sophia Antipolis, France Document No: GSC(14)18_012 Source: ETSI Contact:
Authors list to be completed.
Device Management using mgmtCmd resource
Device Management using mgmtCmd resource Group Name: WG2/WG5 Source: InterDigital Communications Meeting Date: Agenda Item: TBD.
B2C Extended Packaging Bar Code Standard
Authors list to be completed.
RoA and SoA Integration for Message Brokers Group Name: WG2-ARC Source: ALU Meeting Date: Agenda Item:
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
Progressing the Work on the MAS TR-0006, TR-0007 Group Name: Management Abstraction and Semantics Source: Tim Carey, ALU,
Step by step approach Group Name: WG2
An Operators Input for oneM2M Baseline  Group name: TP#2/WG1  Source: DTAG, Vodafone Group  Meeting Date:  Agenda Item: WG1 agenda item.
A system sharing informati on and services with individuals and groups webster.com/dictionary/ne tworking webster.com/dictionary/ne.
Introduction of PRO WG activities Group Name: TP Source: Shingo Fujimoto, FUJITSU, Meeting Date: Agenda Item:
Application Policy on Network Functions (APONF) G. Karagiannis and T.Tsou 1.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Authorization for IoT Group Name: oneM2M SEC WG Source: Francois Ennesser, Gemalto NV Meeting Date: Agenda Item:
1 ECHO SSL Ordering With ECHO 9.0 Dan Pilone. 2 Agenda Introduction SSL Ordering Overview Order Fulfillment Features Provider Requirements Configuring.
3GPP Rel-13 Interworking discussions
An operator’s perspective on support for different M2M deployment scenarios AT&T Group Name: TP Source: Farooq Bari, Jianrong Wang; AT&T;
Considerations on M2M URIs Group Name: WG2(ARC) Source: Yong-Suk Park, Sung-Chan Choi, Jaeho Kim, KETI, Meeting Date:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Device Management A unified way of managing devices enabled by different management technologies Group Name: WG2/WG5 Source: Huawei Technologies Co., Ltd.
Proposal for WG3 & WG5 work area split
HUAWEI TECHNOLOGIES CO., LTD. Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers.
Final Class Diagram for C++ Implementation Clickermatic Software Clicker.
Step by step approach Group Name: WG2 Source: Michael hs. Yang, LG uplus, Jaeseung Song, NEC Europe, Meeting.
EE3402- Data Communication Networks Lecture 1 Muhammad Qaisar Shafi.
Doc.: IEEE /1306r0 Submission November 2015 Tim Godfrey (EPRI)Slide 1 Use Case for LRLP and Full Function in STA. Date: Authors:
Introducing concept of M2M-application data modeling Group Name: MAS Source: FUJITSU Meeting Date: Agenda Item: Semantics and Device Configuration.
Omniran CF00 1 Fault Diagnosis and Maintenance Date: [ ] Authors: NameAffiliationPhone Hao WangFujitsu R&D
Access Control Status Report Group Name: ARC/SEC Source: Dragan Vujcic, Oberthur Technologies, Meeting Date: 09/12/2013 Agenda Item:
1 Trusted Transitive Introduction Max Pritikin (Presentation by Cullen Jennings) Revision A.
3GPP Rel-13 Interworking discussions
Role Based Access Control In oneM2m
XXX Engagement Due Diligence Report Date: DD-MON-YYYY.
Realizing Ms Interface with OMA DM Group Name: MAS WG Source: Seungkyu Park, LG Meeting Date:
OneM2M Partnership Project. Contents Introduction Founding Partners Participation Scope & Objectives Structure Deliverables Contacts © 2013 oneM2M Partners.
Architectural Considerations for Semantic Support Group Name: WG5 Source: Martin Bauer (NEC), Joerg Swetina (NEC) Meeting Date: Agenda Item:
Discussion about RESTful Admin API Group Name: SEC & ARC Source: FUJITSU Meeting Date: Agenda Item: Device Configuration.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
WG5 – MAS#21 Status Report Group Name: WG5 MAS (Management, Abstraction & Semantics) Source: Yongjing Zhang (Huawei, WG5 Chair) Meeting Date:
WG5 - MAS Progress Report at TP #8 Group Name: WG5 MAS (Management, Abstraction & Semantics) Source: Yongjing Zhang, Chair, Meeting.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Issues about management Group Name: MAS9.2 Source: Jiaxin Yin, Huawei Technologies Co., Ltd., Meeting Date: Agenda Item:
Introducing concept of M2M-application data modeling Group Name: MAS Source: FUJITSU Meeting Date: Agenda Item: Semantics and Device Configuration.
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
Directions for Release 3 Group Name: SEC Source: NEC Europe Ltd. Meeting Date: SEC22, Agenda Item: Discuss directions.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Possible options of using DDS in oneM2M Group Name: ARC Source: KETI, Huawei, Hitachi, China Unicom Meeting Date: Agenda Item: DDS binding.
Provisional Architecture for oneM2M
WUR-based Power Save Operations of AP
3GPP interworking in R3 Group Name: ARC
Possible options of using DDS in oneM2M
Implementing Network Access Protection
3GPP Rel-13 Interworking discussions
3GPP Interworking Abstraction
oneM2M Work on IoT Semantic and Data Model Interoperability
Considering issues regarding handling token
Unit 27: Network Operating Systems
Presentation transcript:

Device Management Deployments In oneM2m Group Name: MAS Working Group Source: Timothy Carey, Alcatel-Lucent, Meeting Date: Agenda Item: MAS Working Group

Scope Device management considerations for oneM2M Focus is on underlaying network (including cellular) connected devices Device Management refers to – A. Application software and firmware management – B. Configuration management – C. Fault and performance management In the remaining of this slide-set the terms Device Management is used to refer to A+B+C unless otherwise stated

Device Management (Phones) Network operators operate the communications infrastructure that underlay M2M Services Network operator resources are sandboxed by the network operator approved firmware Typically devices have 1 Management Client that connects to the network operator’s management server

Device Management (M2M) Network operators operate the communications infrastructure that underlay M2M Services Network operator resources are controlled through firmware certification by the network operator Service Provider can deploy new firmwares OTA after network operator approval and certification

Device Management (M2M-alt0) Network operators operate the communications infrastructure that underlay M2M Services Network operator resources are sandboxed by the network operator approved firmware The network operator exposes capabilities to the M2M Service Layer The network operator restricts access rights to network operator resources within the M2M Service Layer by exposing accounts/capabilities to the M2M Service Platform.

Device Management (M2M-alt1) Network operators operate the communications infrastructure that underlay M2M Services Network operator resources are sandboxed by the network operator approved firmware The network operator permits access rights to application resources to the Service Provider Mgmt Server from the Network Operator Mgmt Server This deployment scenario exists in some implementations (e.g., OMA-DM) but not others (e.g., TR-069)

Device Management (M2M-alt2) Network operators operate the communications infrastructure that underlay M2M Services Network operator resources are sandboxed by the network operator approved firmware The Service Provider Mgmt Server and Network Operator Mgmt Server expose the capabilities to the M2M Service Platform. The Mgmt Client uses ACLs to authorize access to resources within the Device. The Network Operator is the owner of the ACLs. The Service Provider Mgmt Server and Network Operator Management expose their capabilities to the M2M Service Platform The Network Operator and M2M Service Provide agree on the ACLs out-of-band.

Device Management (M2M-memc) Network operators operate the communications infrastructure that underlay M2M Services Network operator resources are sandboxed by the network operator approved firmware within its own environment Application resources are sandboxed by the service provider approved firmware within its own environment

Device Management Principles When Network Operator and Application Resources share the same operating environment: – Network Operator resources are sandboxed by the Network Operator approved firmware – Network Operator (Underlying Network Layer Provider) delegates access rights to the upper layers (Service, Application) When Network Operator and Application Resources have different operating environments – Resources are sandboxed by the respective operator/provider approved firmware