IoT Data Management (IoTDM) Supported onem2m functionalities. Table of Contents

Size: px
Start display at page:

Download "IoT Data Management (IoTDM) Supported onem2m functionalities. Table of Contents"

Transcription

1 IoT Data Management (IoTDM) Supported onem2m functionalities This Document describes the list of onem2m functionalities the IoTDM project supports as part of the release (June 2015). Contacts Table of Contents 1 Overview Detailed list of supported functions Southbound protocols Resources CSEBase AE Container ContentInstance Subscription CRUDs Request messages Response messages Discovery Resource Addressing... 14

2 1 Overview IoT Data Management is an IoT middleware providing data collection facility for IoT things. It is implemented on open daylight. It follows as closely as possible the latest onem2m specifications. Version 1 is publicly available at onem2m has a large scope. We don t intend to implement all of it. The subset we have selected is described in details in this document. We have reused tables from the specification so it is very easy to make the link between what we support in IoTDM and what is defined in the specification. The intent is to have a minimal functional system capable of supporting CRUD ( create retrieve update delete notify) operations on a limited set of resources namely CSEBase, AE, container, contentinstance, subscription. Other resources will be supported in subsequent phases. We support CoAP and HTTP as south bound protocols. Also in phase 1, we will focus on a single system operation. We may add support for distributed systems in later phases. If you see our implementation doesn t match the specification, please let us know. 2 Detailed list of supported functions 2.1 Southbound protocols JSO over CoAP and HTTP will be supported in release 1. MQTT bindings is defined by onem2m so its implementation should be straightforward. We are hoping to leverage contributions for that protocol. 2.2 Resources In phase 1, we will support the minimum amount of resources needed to enable data collection. These resources are CSEBase, AE, container, contentinstance, subscription. We will add support for other resources in phase 2. ote that some attributes may not be supported as indicated below CSEBase The table below shows which attribute will be supported in phase 1 ( lithium)

3 Attributes of <CSEBase> Multiplicity RW/ RO/ WO Description Phase 1 resourcetype 1 RO See clause where this common resourceid 1 RO See clause where this common resourceame 1 WO See clause where this common creationtime 1 RO See clause where this common lastmodifiedtime 1 RO See clause where this common accesscontrolpolicyids 0..1 (L) RO See clause where this common labels 0..1 (L) RO See clause where this common csetype 0..1 RO Indicates the type of CSE represented by the created resource. Mandatory for an I-CSE, hence multiplicity (1). Its presence is subject to SP configuration in case of an AS- CSE or a M-CSE. CSE-ID 1 RO The CSE identifier in SP-relative CSE-ID format (clause 7.2). supportedresourcetype 1 (L) RO List of the resource types which are supported in the CSE. This attribute contains subset of resource types listed in clause 9.2. This also includes the supported optional attributes for each supported resource type. pointofaccess 1 (L) RO Represents the list of physical addresses to be used by remote CSEs to connect to this CSE (e.g. IP address, FQD). This attribute is exposed to its Registree. nodelink 0..1 RO The resourceid of a <node> resource that represents the node specific information. notificationcongestionpo 0..1 RO This attribute applies to CSEs generating subscription licy notifications. It specifies the rule which is applied when the storage of notifications for each subscriber (an AE or CSE) reaches the maximum storage limit for notifications for that subscriber. E.g. Delete stored notifications of lower notificationstoragepriority to make space for new notifications of higher notificationstoragepriority, or delete stored notifications of older creationtime to make space for new notifications when all notifications are of the same notificationstoragepriority. OTE: All the attributes of this resource type can be changed by an offline configuration mechanism, but not over the reference points (all attributes are "RO") AE The table below shows which attribute will be supported in phase 1 ( lithium)

4 Attributes of <AE> Multiplicity RW/ RO/ WO Description resourcetype 1 RO See clause where this common resourceid 1 RO See clause where this common resourceame 1 WO See clause where this common parentid 1 RO See clause where this common expirationtime 1 RW See clause where this common accesscontrolpolicyids 0..1 (L) RW See clause where this common creationtime 1 RW See clause where this common lastmodifiedtime 1 RO See clause where this common labels 0..1 (L) RO See clause where this common announceto 0..1 (L) RW See clause where this common announcedattribute 0..1 (L) RW See clause where this common appame 0..1 RW The name of the application, as declared by the application developer(e.g. "HeatingMonitoring"). Several sibling resources may share the appame. App-ID 1 WO The identifier of the Application (see clause 7.1.2). AE-ID 1 RO The identifier of the Application Entity (see clause 7.1.2). pointofaccess 0..1 (L) RW The list of addresses for communicating with the registered Application Entity over Mca reference point via the transport services provided by Underlying etwork (e.g. IP address, FQD, URI). This attribute shall be accessible only by the AE and the Hosting CSE. If this information is not provided, the AE should use <pollingchannel> resource. Then the Hosting CSE can forward a request to the AE without using the PoA. ontologyref 0..1 RW A URI of the ontology used to represent the information that is managed and understood by the AE. nodelink 0..1 RO The resourceid of a <node> resource that stores the node specific information where the AE resides. Release 1: Container The table below shows which attribute will be supported in phase 1 ( lithium)

5 Attributes of <container> Multiplicity RW/ RO/ WO Description resourcetype 1 RO See clause where this common resourceid 1 RO See clause where this common resourceame 1 WO See clause where this common parentid 1 RO See clause where this common expirationtime 1 RW See clause where this common accesscontrolpolicyids 0..1 (L) RW See clause where this common If no accesscontrolpolicyids are provided at the time of creation, the accesscontrolpolicyids of the parent resource is linked to this attribute labels 0..1 (L) RO See clause where this common creationtime 1 RW See clause where this common lastmodifiedtime 1 RO See clause where this common statetag 1 RO See clause where this common announceto 0..1 (L) RW See clause where this common announcedattribute 0..1 (L) RW See clause where this common creator 1 RW The AE-ID or CSE-ID of the entity which created the resource. maxrofinstances 0..1 RW Maximum number of instances of <contentinstance> child resources. maxbytesize 0..1 RW Maximum number of bytes that are allocated for a <container> resource for all instances in the <container> resource. maxinstanceage 0..1 RW Maximum age of the instances of <contentinstance> resources within the <container>. The value is expressed in seconds. currentrofinstances 1 RO Current number of instances in a <container> resource. It is limited by the maxrofinstances. currentbytesize 1 RO Current size in bytes of data stored in total using child <contentinstance> resources of a <container> resource. It is limited by the maxrofbytes. locationid 0..1 RW An ID of the resource where the attributes/policies that define how location information are obtained and managed. This attribute is defined only when the <container> resource is used for containing location information. ontologyref 0..1 RW A reference (URI) of the ontology used to represent the information that is stored in the child <contentinstance> resources of the present <container> resource (see note). OTE: The access to this URI is out of scope of onem2m. Release 1: Phase 2

6 2.2.4 ContentInstance The table below shows which attribute will be supported in phase 1 ( lithium)

7 Attributes of <contentinstance> Multiplicity RW/ RO/ WO Description resourcetype 1 RO See clause where this common resourceid 1 RO See clause where this common resourceame 1 WO See clause where this common parentid 1 RO See clause where this common labels 0..1 (L) WO See clause where this common creator 0..1 WO See clause where this common expirationtime 1 RW See clause where this common creationtime 1 RO See clause where this common lastmodifiedtime 1 RO See clause where this common announceto 0..1 (L) RW See clause where this common announcedattribute 0..1 (L) RW See clause where this common contentinfo 0..1 WO Information on the content that is needed to understand the content. This attribute is a composite attribute. It is composed first of an Internet Media Type (as defined in the IETF RFC 6838) describing the type of the data, and second of an encoding information that specifies how to first decode the received content. Both elements of information are separated by a separator defined in onem2m TS-0004 [Error! Reference source not found.]. Release 1: Phase 2 contentsize 1 RO Size in bytes of the content attribute. ontologyref 0..1 WO A reference (URI) of the ontology used to represent the information that is stored in the contentinstances resources of the <container> resource. If this attribute is not present, the contentinstance resource inherits the ontologyref from the parent <container> resource if present OTE: Access to this URI is out of scope of onem2m. content 1 WO Actual content of a contentinstance. This content may be opaque data for understandable with the help of the contentinfo. This may, for example, be an image taken by a security camera, or a temperature measurement taken by a temperature sensor Subscription

8 The table below shows which attribute will be supported in phase 1 ( lithium)

9 Attributes of <subscription> Multiplicity RW/ RO/ WO Description Release 1: resourcetype 1 WO See clause where this common resourceid 1 RO See clause where this common resourceame 1 WO See clause where this common parentid 1 RO See clause where this common expirationtime 1 RW See clause where this common Phase 2 creationtime 1 RO See clause where this common lastmodifiedtime 1 RO See clause where this common labels 1 (L) RW See clause where this common accesscontrolpolicyids 0..1 (L) RW See clause where this common If no accesscontrolpolicyids is given at the time of creation, the accescontrolpolicies of the parent resource is linked to this attribute. eventotificationcriteria 0..1 (L) RW This attribute (notification policy) indicates the event criteria for which a notification is to be generated. expirationcounter 0..1 RW This attribute (notification policy) indicates that the subscriber wants to set the life of this subscription to a limit of a maximum number of notifications. When the number of notifications sent reaches the count of this counter, the <subscription> resource shall be deleted, regardless of any other policy. notificationuri 1 (L) RW List of URI(s) and/or address(es) where the resource subscriber will receive notifications. URI(s) in the list may not represent the resource subscriber entity. For a group-related subscription, the notificationuri shall be the URI that is generated by the group Hosting CSE to receive notifications. In this case, the resource subscriber notification URI shall be included in the notificationforwardinguri. groupid 0..1 RW The ID of a <group> resource in case the subscription is made through a group. notificationforwardinguri 0..1 RW The attribute is a forwarding attribute that shall be present only for group related subscriptions. It represents the resource subscriber notification URI. It shall be used by group Hosting CSE for forwarding aggregated notifications. See clauses and batchotify 0..1 RW This attribute (notification policy) indicates that the subscriber wants to receive batches of notifications rather than receiving them one at a time. This attribute expresses the subscriber's notification policy and may include two values: the number of notifications to be batched for delivery and a duration. When either value is set, notification events are temporarily stored until either the specified number of notifications have been batched, or, until a duration which starts after the first notification was generated has expired. Following which the batched notifications are sent. If batchotify is used simultaneously with latestotify, only the latest notification shall be sent and have the Event Category set to "latest". ratelimit 0..1 RW This attribute (notification policy) indicates that the subscriber wants to limit the rate at which it receives notifications. This attribute expresses the subscriber's notification policy and includes two values: a maximum number of events that may be sent within some duration, and the ratelimit window duration. When the number of generated notifications within the ratelimit window duration exceeds the maximum number, notification events are temporarily stored, until the end of the window duration, when the sending of notification events restarts in the next window duration. The sending of notification events continues as long as the maximum Partial (see below)

10 Attributes of <subscription> Multiplicity RW/ RO/ WO Description number of notification events is not exceeded during the window duration. The ratelimit policy may be used simultaneously with other notification policies. presubscriptionotify 0..1 WO This attribute (notification policy) indicates that the subscriber wants to be sent notifications for events that were generated prior to the creation of this subscription. This attribute has a value of the number of prior notification events requested. If up-to-date caching of retained events is supported on the Hosting CSE and contains the subscribed events then prior notification events will be sent up to the number requested. The presubscriptionotify policy may be used simultaneously with any other notification policy. pendingotification 0..1 RW This attribute (notification policy), if set, indicates how missed notifications due to a period of connectivity (according to the reachability and notification schedules). The possible values for pendingotification are: "sendlatest" "sendallpending" This policy depends upon caching of retained notifications on the hosted CSE. When this attribute is set to "sendlater", only the last notification shall be sent and it shall have the Event Category set to "latest". If this attribute is not present, the Hosting CSE sends no missed notifications. This policy applies to all notifications regardless of the selected delivery policy (batchotify, latestotify, etc.) ote that unreachability due to reasons other than scheduling is not covered by this policy. notificationstoragepriority 0..1 RW Indicates that the subscriber wants to set a priority for this subscription relative to other subscriptions belonging to this same subscriber. This attribute sets a number within the priority range. When storage of notifications exceeds the allocated size, this policy is used as an input with the storage congestion policy (notificationcongestionpolicy) specified in clause to determine which stored and generated notifications to drop and which ones to retain. latestotify 0..1 RW This attribute (notification policy) indicates if the subscriber wants only the latest notification. If multiple notifications of this subscription are buffered, and if the value of this attribute is set to true, then only the last notification shall be sent and it shall have the Event Category value set to "latest". notificationcontenttype 1 RW Indicates a notification content type that shall be contained in notifications. The allowed values are: modified attributes only whole resource optionally the reference to this subscription resource. notificationeventcat 0..1 RW This attribute (notification policy) indicates the subscriber's requested Event Category to be used for notification messages generated by this subscription. creator 0..1 WO AE-ID or CSE-ID which created the <subscription> resource. subscriberuri 0..1 WO URI that is sent a notification when this <subscription> is deleted. Release 1: eventotificationcriteria supported in phase 1 is described in the table below

11 Condition tag Multiplicity Matching condition createdbefore 0..1 The creationtime attribute of the resource is chronologically before the specified value. createdafter 0..1 The creationtime attribute of the resource is chronologically after the specified value. modifiedsince 0..1 The lastmodifiedtime attribute of the resource is chronologically after the specified value. unmodifiedsince 0..1 The lastmodifiedtime attribute of the resource is chronologically before the specified value. statetagsmaller 0..1 The statetag attribute of the resource is smaller than the specified value. statetagbigger 0..1 The statetag attribute of the resource is bigger than the specified value. expirebefore 0..1 The expirationtime attribute of the resource is chronologically before the specified value. expireafter 0..1 The expirationtime attribute of the resource is chronologically after the specified value. sizeabove 0..1 The contentsize attribute of the <contentinstance> resource is equal to or greater than the specified value. sizebelow 0..1 The contentsize attribute of the <contentinstance> resource is smaller than the specified value. resourcestatus 0..n When the subscribed-to resource is changed by the operations or expiration, the resource status is the same as the specified value. Possible values are: child created, updated, child deleted, deleted. If child created or child deleted is configured, other eventotificationcriteria conditions shall be applied to the created or deleted child resource. otification contains the contents for a created child resource or deleted child resource based on value of notificationcontenttype attribute. If this condition is not specified, the default value is updated. operationmonitor 0..n The operations accessing the subscribed-to resource matches with the specified value. It allows monitoring which operation is attempted to the subscribed-to resource regardless of whether the operation is performed. This feature is useful when to find malicious AEs. Possible string arguments are: create, retrieve, update, delete. attribute 0..n This is an attribute name of resource types (clause 9.6). E.g. creator of container resource type can be used as "creator=sam". When multiple attributes are set then the result is based upon the AD of all attributes. Release 1: 2.3 CRUDs CRUD operations can be expressed in various ways. The tables below show which message fields will be supported in phase Request messages

12 Request message parameter\operation Create Retrieve Update Delete otify Release 1: Operation - operation to be executed M M M M M To - the address of the target resource on M M M M M the target CSE From - the identifier of the message M M M M M Originator Request Identifier - uniquely identifies a M M M M M Request message Resource Type - of resource to be created M /A /A /A /A ame - of resource to be created O /A /A /A /A Content - to be transferred M O M /A M Originating Timestamp - when the message was built Request Expiration Timestamp - when the request message expires Result Expiration Timestamp - when the result message expires Operational Execution Time - the time when the specified operation is to be executed by the target CSE Response Type - type of response that shall be sent to the Originator Result Persistence - the duration for which the reference containing the responses is to persist Result Content - the expected components of the result Event Category - indicates how and when the system should deliver the message Delivery Aggregation - aggregation of requests to the same target CSE is to be used Group Request Identifier - Identifier added to the group request that is to be fanned out to each member of the group Filter Criteria - conditions for filtered retrieve operation Discovery Result Type - format of information returned for Discovery operation O O O O /A O O O O /A /A O /A /A /A /A O /A /A /A ( blockingrequ est only) (see below details) Result Content - the expected components of the result. Value Interpretation Release 1: 0 nothing 1 attributes 2 hierarchical address 3 hierarchical address and attributes 4 attributes and child resources 5 attributes and child resource references 6 child resource references 7 original resource OTE: See clause Error! Reference source not found. Request message parameter data types

13 Response message parameter/success or not Response Code - successful, unsuccessful, ack Request Identifier - uniquely identifies a Request message Content - to be transferred To - the identifier of the Originator or the Transit CSE that sent the corresponding nonblocking request From - the identifier of the Receiver Originating Timestamp - when the message was built Result Expiration Timestamp - when the message expires Event Category - what event category shall be used for the response message Status Code - (e.g. authorization timeout, etc.) Response messages Response Code = Ack Response Code = successful: Operation = Create Response Code = successful: Operation = Retrieve Response Code = successful. Operation = Update Response Code = successful. Operation = Delete Response Code = successful Operation = otify Response Code = unsuccessful Operation = C,R,U,D or Release 1: M M M M M M M M M M M M M M O (address of <request> resource if response is ACK of a nonblocking request) O (The address and/or the content of the created resource) M (the retrieved resource content or aggregated contents of discovered resources) O (The content replaced in an existing resource. The content of the new attributes created. The name of the attributes deleted.) O (The content actually deleted) /A O (Additional error info) O O O O O O /A O O O O O 2.4 Discovery Allows tree discovery below a given resource such as: GET /root?label=one&label=two&createdbefore= t00:00:00&limit=128&filterusage=discovery. The example discovers a maximum of 128 resources matching the following logical condition: createdbefore < T00:00:00 AD (label = one OR label = two). Support for the table below is on-going ;-)

14 Condition tag Multiplicity Matching condition createdbefore 0..1 The creationtime attribute of the resource is chronologically before the specified value. createdafter 0..1 The creationtime attribute of the resource is chronologically after the specified value. modifiedsince 0..1 The lastmodifiedtime attribute of the resource is chronologically after the specified value. unmodifiedsince 0..1 The lastmodifiedtime attribute of the resource is chronologically before the specified value. statetagsmaller 0..1 The statetag attribute of the resource is smaller than the specified value. statetagbigger 0..1 The statetag attribute of the resource is bigger than the specified value. expirebefore 0..1 The expirationtime attribute of the resource is chronologically before the specified value. expireafter 0..1 The expirationtime attribute of the resource is chronologically after the specified value. labels 0..n The labels attributes of the resource matches the specified value. resourcetype 0..n The resourcetype attribute of the resource is the same as the specified value. It also allows differentiating between normal and announced resources. sizeabove 0..1 The contentsize attribute of the <contentinstance> resource is equal to or greater than the specified value. sizebelow 0..1 The contentsize attribute of the <contentinstance> resource is smaller than the specified value. contenttype 0..n The contentinfo attribute of the <contentinstance> resource matches the specified value. limit 0..1 Limitation the number of matching resources to the specified value. attribute 0..n This is an attribute of resource types (clause 9.6). Therefore, a real tag name is variable and depends on its usage. E.g. creator of container resource type can be used as a filter criteria tag as "creator=sam". filterusage 0..1 Indicates how the filter criteria is used. E.g. if this parameter is not provided, the Retrieve operation is for generic retrieve operation. If filterusage is provided, the Retrieve operation is for resource <discovery> (clause ). Release 1: for discovery 2.5 Resource Addressing on-hierarchical and Hierarchical CSE-relative addressing are supported in Release 1:

TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1)

TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) TR 118 525 V1.0.0 (2016-03) TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) 2 TR 118 525 V1.0.0 (2016-03) Reference DTR/oneM2M-000025 Keywords application,

More information

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification. This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification. The present document has not been subject to any approval

More information

ETSI M2M application developers guideline

ETSI M2M application developers guideline Cod. Doc. TTGSTSPI1300029 ETSI M2M application developers guideline Version: 1.0 Date: 27.05.2013 Privacy: Public Pages: 43 AUTHORS: FIRST APPROVAL: FINAL APPROVAL: Michele LUPANO (T.TG.ST.SPI) Roberto

More information

ONEM2M SERVICE LAYER PLATFORM

ONEM2M SERVICE LAYER PLATFORM ONEM2M SERVICE LAYER PLATFORM Roland Hechwartner (Deutsche Telekom) onem2m TP Vice Chair Roland.hechwartner@t mobile.at onem2m www.onem2m.org 2015 onem2m The Partnership Project Over 200 member organizations

More information

3GPP TS 24.623 V8.1.0 (2008-09)

3GPP TS 24.623 V8.1.0 (2008-09) TS 24.623 V8.1.0 (2008-09) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Extensible Markup Language (XML) Configuration Access Protocol

More information

Request for Comments: 4579. August 2006

Request for Comments: 4579. August 2006 Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)

More information

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org info@open-mtc.org 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end

More information

ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE

ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE Omar Elloumi (ALU) onem2m TP Chair (Elect) omar.elloumi@alcatel lucent.com onem2m www.onem2m.org 2014 onem2m The Partnership Project Over 200 member organizations

More information

SmartSantander Open Data access using FI-WARE G.E. [ORION]

SmartSantander Open Data access using FI-WARE G.E. [ORION] SmartSantander Open Data access using FI-WARE G.E. [ORION What to find in this doc FI-WARE is an open cloud-based infrastructure for Future Internet applications and services, composed by different building

More information

Introduction to Resource-Oriented Applications in Constrained Networks. Zach Shelby. Smart Objects Tutorial, IETF-80 Prague.

Introduction to Resource-Oriented Applications in Constrained Networks. Zach Shelby. Smart Objects Tutorial, IETF-80 Prague. Introduction to Resource-Oriented Applications in Constrained Networks Zach Shelby Smart Objects Tutorial, IETF-80 Prague Tutorial Overview Powering M2M with a Web of Things So What are Web Services? CoRE

More information

RELOAD Usages for P2P Data Storage and Discovery

RELOAD Usages for P2P Data Storage and Discovery RELOAD Usages for P2P Data Storage and Discovery AW2-presentation from Alexander Knauf Alexander.Knauf@Haw-Hamburg.de Review Infrastructure Independent Conferencing: Decentralized fashion Multiple conference

More information

XML Document Management Architecture

XML Document Management Architecture XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the

More information

Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira www.om2m.org. yassine.banouar@laas.

Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira www.om2m.org. yassine.banouar@laas. Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira O: Standardized service platform for interoperability www.om2m.org yassine.banouar@laas.fr @YassineBANOUAR 1 Agenda Introduction

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

My IC Customizer: Descriptors of Skins and Webapps for third party User Guide

My IC Customizer: Descriptors of Skins and Webapps for third party User Guide User Guide 8AL 90892 USAA ed01 09/2013 Table of Content 1. About this Document... 3 1.1 Who Should Read This document... 3 1.2 What This Document Tells You... 3 1.3 Terminology and Definitions... 3 2.

More information

ECMA-400. Smart Data Centre Resource Monitoring and Control. 1 st Edition / December 2011. Reference number ECMA-123:2009

ECMA-400. Smart Data Centre Resource Monitoring and Control. 1 st Edition / December 2011. Reference number ECMA-123:2009 ECMA-400 1 st Edition / December 2011 Smart Data Centre Resource Monitoring and Control Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2011 Contents

More information

Contents. 2 Alfresco API Version 1.0

Contents. 2 Alfresco API Version 1.0 The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS

More information

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview M2M Machine-to-Machine Intelligence Corporation M2M Intelligence Architecture Overview M2M Intelligence - Essential platform for the M2M and IoT Economy Architecture Overview Revised styles and edits 6/3/2016

More information

onem2m-ts-0001 - V-2014-08 onem2m Functional Architecture Baseline Draft

onem2m-ts-0001 - V-2014-08 onem2m Functional Architecture Baseline Draft Document Number Document Name: O NEM2M T ECHNICAL SPECIFICATION onem2m-ts-000 - V-204-08 onem2m Functional Architecture Baseline Draft Date: 204-08-0 Abstract: This document specifies the initial relase

More information

Internet of Things based approach to Agriculture Monitoring

Internet of Things based approach to Agriculture Monitoring Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based

More information

Terms and Definitions for CMS Administrators, Architects, and Developers

Terms and Definitions for CMS Administrators, Architects, and Developers Sitecore CMS 6 Glossary Rev. 081028 Sitecore CMS 6 Glossary Terms and Definitions for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction... 3 1.1 Glossary... 4 Page

More information

Corporate Telephony Toolbar User Guide

Corporate Telephony Toolbar User Guide Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...

More information

ETSI TS 124 423 V8.4.0 (2012-01)

ETSI TS 124 423 V8.4.0 (2012-01) TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;

More information

XEP-0060: Publish-Subscribe

XEP-0060: Publish-Subscribe XEP-0060: Publish-Subscribe Peter Millard Peter Saint-Andre mailto:peter@andyet.net xmpp:stpeter@stpeter.im https://stpeter.im/ 2010-07-12 Version 1.13 Ralph Meijer mailto:ralphm@ik.nu xmpp:ralphm@ik.nu

More information

M2M/IoT standards in ETSI and onem2m

M2M/IoT standards in ETSI and onem2m M2M/IoT standards in ETSI and onem2m Enrico Scarrone, ETSI TC Smart M2M Vice-Chairman, onem2m SC Vice Chairman Telecom Italia ALMANAC Workshop, Copenhagen, September 2015 TC SmartM2M (formerly TC M2M)

More information

Presence SIMPLE Architecture

Presence SIMPLE Architecture Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject

More information

Intended status: Standards Track Expires: April 18, 2016 Universitaet Bremen TZI P. van der Stok consultant October 16, 2015

Intended status: Standards Track Expires: April 18, 2016 Universitaet Bremen TZI P. van der Stok consultant October 16, 2015 CoRE Internet-Draft Intended status: Standards Track Expires: April 18, 2016 Z. Shelby M. Koster ARM C. Bormann Universitaet Bremen TZI P. van der Stok consultant October 16, 2015 CoRE Resource Directory

More information

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -

Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i - Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging

More information

Fleet Connectivity Extension

Fleet Connectivity Extension Fleet Connectivity Extension Developer's Guide Version 1.0 Fleet Connectivity Extension Developer's Guide 2 Contents Contents Legal Notices...3 Document Information... 4 Chapter 1: Overview... 5 What is

More information

Proliphix. Installer. Remote Management. Guide

Proliphix. Installer. Remote Management. Guide Proliphix Installer Remote Management Guide Rev 2.0 Page 2 of 21 Table of Contents 1. Intended Audience...3 2. Remote Management Overview...4 3. Installer Profile Modification...5 4. Remote Management

More information

Z-Way Home Automation User Interface Documentation. (c) Z-Wave.Me Team, based on Version 2.0

Z-Way Home Automation User Interface Documentation. (c) Z-Wave.Me Team, based on Version 2.0 Z-Way Home Automation User Interface Documentation (c) Z-Wave.Me Team, based on Version 2.0 2 Contents 1 The Z-Way HA User Manual 5 1.1 Widgets......................................... 6 1.2 Notifications......................................

More information

About Firewall Protection

About Firewall Protection 1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote

More information

CERTIFIED MULESOFT DEVELOPER EXAM. Preparation Guide

CERTIFIED MULESOFT DEVELOPER EXAM. Preparation Guide CERTIFIED MULESOFT DEVELOPER EXAM Preparation Guide v. November, 2014 2 TABLE OF CONTENTS Table of Contents... 3 Preparation Guide Overview... 5 Guide Purpose... 5 General Preparation Recommendations...

More information

IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS

IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS IMPLEMENTATION OF AN AGENT MONITORING SYSTEM IN A JINI ENVIRONMENT WITH RESTRICTED USER ACCESS Marietta A. Gittens (Dr. Sadanand Srivastava, Dr. James Gil De Lamadrid) {mgittens, ssrivas, gildelam}@cs.bowiestate.edu

More information

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES

DOSarrest External MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES AND / OR ISSUES .com DOSarrest External Monitoring S ystem (DEMS) User s Guide REAL BROWSER MONITORING OF YOUR WEBSITE MULTI-SENSOR ARRAY FOR ANALYSIS OF YOUR CDN'S PERFORMANCE IMMEDIATE DETECTION AND REPORTING OF OUTAGES

More information

EHR OAuth 2.0 Security

EHR OAuth 2.0 Security Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems

More information

RDF Provisioning for the Internet of Things. Henning Hasemann, Alexander Kröller, Max Pagel TU Braunschweig

RDF Provisioning for the Internet of Things. Henning Hasemann, Alexander Kröller, Max Pagel TU Braunschweig RDF Provisioning for the Internet of Things Henning Hasemann, Alexander Kröller, Max Pagel TU Braunschweig RDF Provisioning for the Internet of Things Henning Hasemann, Alexander Kröller, Max Pagel TU

More information

Internationalization and Web Services

Internationalization and Web Services Internationalization and Web Services 25 th Internationalization and Unicode Conference Presented by Addison P. Phillips Director, Globalization Architecture webmethods, Inc. 25 th Internationalization

More information

SIP: Protocol Overview

SIP: Protocol Overview SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright

More information

Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems

Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems WHITEPAPER Repeat Success, Not Mistakes; Use DDS Best Practices to Design Your Complex Distributed Systems Abstract RTI Connext DDS (Data Distribution Service) is a powerful tool that lets you efficiently

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Location in SIP/IP Core (LOCSIP)

Location in SIP/IP Core (LOCSIP) in SIP/IP Core (LOCSIP) Conveyance with IMS: the OMA LOCSIP Service Enabler Mike Loushine / Don Lukacs Telcordia Applied Research 2009, Telcordia Technologies Inc. in SIP/IP Core (LOCSIP) Topics General

More information

Monitoring Techniques for Cisco Network Registrar

Monitoring Techniques for Cisco Network Registrar White Paper Monitoring Techniques for Cisco Network Registrar White Paper 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 14 Introduction...

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Managing Virtual Servers

Managing Virtual Servers CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,

More information

LifeSize UVC Video Center Deployment Guide

LifeSize UVC Video Center Deployment Guide LifeSize UVC Video Center Deployment Guide November 2013 LifeSize UVC Video Center Deployment Guide 2 LifeSize UVC Video Center LifeSize UVC Video Center records and streams video sent by LifeSize video

More information

CORD Monitoring Service

CORD Monitoring Service CORD Design Notes CORD Monitoring Service Srikanth Vavilapalli, Ericsson Larry Peterson, Open Networking Lab November 17, 2015 Introduction The XOS Monitoring service provides a generic platform to support

More information

Support the Self-Contained NAS Profile (reporting only)

Support the Self-Contained NAS Profile (reporting only) Support the Self-Contained NAS Profile (reporting only) Main Components of the Architecture The Self-contained NAS profile defines NAS systems that are self-contained in that all the storage they use to

More information

Introducing the Microsoft IIS deployment guide

Introducing the Microsoft IIS deployment guide Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying

More information

3] E-mail Alert Configuration for User Login Failure and Incorrect Guest Details [HIA]

3] E-mail Alert Configuration for User Login Failure and Incorrect Guest Details [HIA] Version X.3.6.5.0 Product: 24online Release Number: X.3.6.5.0 Customer Support: For more information or support, please visit us at www.24onlinebilling.com or email support@24onlinebilling.com. This document

More information

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide AdRadionet to IBM Bluemix Connectivity Quickstart User Guide Platform: EV-ADRN-WSN-1Z Evaluation Kit, AdRadionet-to-IBM-Bluemix-Connectivity January 20, 2015 Table of Contents Introduction... 3 Things

More information

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott Symantec Enterprise Firewalls From the Internet Thomas Symantec Firewalls Symantec offers a whole line of firewalls The Symantec Enterprise Firewall, which emerged from the older RAPTOR product We are

More information

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem

Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem GPP X.S00-0 Version.0 Version Date: May 00 Conferencing Using the IP Multimedia (IM) Core Network (CN) Subsystem Revision: 0 COPYRIGHT GPP and its Organizational Partners claim copyright in this document

More information

Patterns of Information Management

Patterns of Information Management PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy

More information

P. van der Stok. Intended status: Standards Track Expires: April 18, 2016. J. Schoenwaelder Jacobs University A. Sehgal. consultant.

P. van der Stok. Intended status: Standards Track Expires: April 18, 2016. J. Schoenwaelder Jacobs University A. Sehgal. consultant. core Internet-Draft Intended status: Standards Track Expires: April 18, 2016 P. van der Stok consultant A. Bierman YumaWorks J. Schoenwaelder Jacobs University A. Sehgal consultant October 16, 2015 CoAP

More information

CONVERGENCE Glossary (version of 30/10/2012)

CONVERGENCE Glossary (version of 30/10/2012) Glossary (version of 30/10/2012) Term Access Rights Advertise Application Business Scenario CA CCN Cl_Auth_SC Cl_Auth_User_Pw Clean-slate architecture CoApp CoApp Provider CoMid CoMid Provider CoMid Resource

More information

friendlyway composer network services server

friendlyway composer network services server HelpAndManual_illegal_keygen friendlyway composer network services server User manual Contents I Contents Welcome 1 Why composer network services? 2 Support 3 Introduction 4... 4 Getting started with

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

vcloud Air Platform Programmer's Guide

vcloud Air Platform Programmer's Guide vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

The Enterprise Service Bus: Making Service-Oriented Architecture Real

The Enterprise Service Bus: Making Service-Oriented Architecture Real The Enterprise Service Bus: Making Service-Oriented Architecture Real M.T. Schmidt et al. Presented by: Mikael Fernandus Simalango SOA in Early Days Introduction Service Requester bind find Service Registry

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Integrating Avaya Aura Presence Services with Microsoft OCS

Integrating Avaya Aura Presence Services with Microsoft OCS Integrating Avaya Aura Presence Services with Microsoft OCS 6.1 Service Pack 5 December 2012 Contents Chapter 1: Introduction... 5 Overview - OCS/Lync integration... 5 The Presence Services server and

More information

A New Approach to IoT Security

A New Approach to IoT Security A New Approach to IoT Security 5 Key Requirements to Securing IoT Communications The Internet of Things promises to bring everything from microwaves to pacemakers and shipping fleets online, leverage enormous

More information

Error Codes for F-Secure Anti-Virus for Firewalls, Windows 6.20

Error Codes for F-Secure Anti-Virus for Firewalls, Windows 6.20 Error Codes for F-Secure Anti-Virus for Firewalls, Windows 6.20 The two tables described here list the error codes sent by F-Secure Content Scanner Server and F-Secure Anti-Virus for Firewalls. Error codes

More information

ebay's - LB Management Service (for OpenStack)

ebay's - LB Management Service (for OpenStack) ebay's - LB Management Service (for OpenStack) 1. Overview ebay Load Balancer Management Service (LBMS) provides a RESTFul Service to manage complete life cycle for Load Balancers. It does not expose APIs

More information

MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS

MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS Number: 70-595 Passing Score: 700 Time Limit: 150 min File Version: 26.5 http://www.gratisexam.com/ MICROSOFT 70-595 EXAM QUESTIONS & ANSWERS Exam Name: TS: Developing

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

Internet of Everything: On the importance of the right Standard. Nicolas Graube, June, 2015

Internet of Everything: On the importance of the right Standard. Nicolas Graube, June, 2015 Internet of Everything: On the importance of the right Standard. Nicolas Graube, June, 2015 The Argument IoT/IoE is viewed as a source of enormous growth The nature of the growth shall be refined is it

More information

RUNNING A HELPDESK CONTENTS. using HP Web Jetadmin

RUNNING A HELPDESK CONTENTS. using HP Web Jetadmin RUNNING A HELPDESK using HP Web Jetadmin CONTENTS Overview... 2 Helpdesk examples... 2 Viewing devices... 2 Quick Device Discovery... 3 Search... 3 Filters... 3 Columns... 4 Device Groups... 4 Troubleshooting

More information

onetransport 2016 InterDigital, Inc. All Rights Reserved.

onetransport 2016 InterDigital, Inc. All Rights Reserved. onetransport 1 onetransport: Who We are Today Platform Provider Transport Expert Analytics Sensors / Analytics Data providers / Use case owners 11 partners 2- year project 3.5m Total funding 2 How this

More information

Session Initiation Protocol

Session Initiation Protocol TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Network Working Group. Intended status: Informational Expires: June 18, 2016 S. Hares Huawei D. Ward Cisco Systems T. Nadeau Brocade December 16, 2015

Network Working Group. Intended status: Informational Expires: June 18, 2016 S. Hares Huawei D. Ward Cisco Systems T. Nadeau Brocade December 16, 2015 Network Working Group Internet-Draft Intended status: Informational Expires: June 18, 2016 A. Atlas Juniper Networks J. Halpern Ericsson S. Hares Huawei D. Ward Cisco Systems T. Nadeau Brocade December

More information

3GPP TS 31.220 V8.0.0 (2008-03)

3GPP TS 31.220 V8.0.0 (2008-03) TS 31.220 V8.0.0 (2008-03) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Contact Manager for UICC applications

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

ZooKeeper. Table of contents

ZooKeeper. Table of contents by Table of contents 1 ZooKeeper: A Distributed Coordination Service for Distributed Applications... 2 1.1 Design Goals...2 1.2 Data model and the hierarchical namespace...3 1.3 Nodes and ephemeral nodes...

More information

Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.

Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia. Internet of Things (IoT): Middleware Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ A Fence Surveillance System Y. Kim et al, Autonomics

More information

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence

Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide VOIP-211RS/210RS/220RS/440S SIP VoIP Router User s Guide Trademarks Contents are subject to revise without prior notice. All trademarks belong to their respective owners. FCC Warning This equipment has

More information

JoramMQ, a distributed MQTT broker for the Internet of Things

JoramMQ, a distributed MQTT broker for the Internet of Things JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is

More information

Key requirements for Interoperable IoT systems

Key requirements for Interoperable IoT systems Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards

More information

THE SNMP PROTOCOL THE SNMP REQUEST MIB SATELLAR 2DS/20DS SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET SMART RADIO

THE SNMP PROTOCOL THE SNMP REQUEST MIB SATELLAR 2DS/20DS SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET SMART RADIO SATELLAR 2DS/20DS SIMPLE NETWORK MANAGEMENT PROTOCOL SATELLAR MANAGEMENT WITH SNMP GET AND SET Technical Bulletin 2/14 THE SNMP PROTOCOL The SIMPLE NETWORK MANAGEMENT PROTOCOL, SNMP is a widely used management

More information

CA Nimsoft Monitor. Probe Guide for Internet Control Message Protocol Ping. icmp v1.1 series

CA Nimsoft Monitor. Probe Guide for Internet Control Message Protocol Ping. icmp v1.1 series CA Nimsoft Monitor Probe Guide for Internet Control Message Protocol Ping icmp v1.1 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes

More information

Features Overview Guide About new features in WhatsUp Gold v14

Features Overview Guide About new features in WhatsUp Gold v14 Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...

More information

Management of VMware ESXi. on HP ProLiant Servers

Management of VMware ESXi. on HP ProLiant Servers Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................

More information

Access Control Rules: URL Filtering

Access Control Rules: URL Filtering The following topics describe how to configure URL filtering for your Firepower System: URL Filtering and Access Control, page 1 Reputation-Based URL Filtering, page 2 Manual URL Filtering, page 5 Limitations

More information

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2.

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2. IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version 6.3.1 Fix Pack 2 Reference IBM Tivoli Composite Application Manager for Microsoft

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Lecture 5: Foundation of Network Management

Lecture 5: Foundation of Network Management Lecture 5: Foundation of Network Management Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4395 5-1 Network Management Standards OSI: Common Management Information

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

POS UNITS. Installation and user guide. Count, video recording and POS control unit ENGLISH

POS UNITS. Installation and user guide. Count, video recording and POS control unit ENGLISH ENGLISH POS UNITS Installation and user guide Count, video recording and POS control unit INDEX 1 FUNCTIONALITY... 2 2 GENERAL CONSIDERATIONS... 4 3 CAMERAS INSTALLATION... 5 3.1 CAMERA TYPES... 5 3.2

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Product Comparison List

Product Comparison List Product Comparison List Data Center Size Site Solution / Feature

More information

Oracle Marketing Encyclopedia System

Oracle Marketing Encyclopedia System Oracle Marketing Encyclopedia System Concepts and Procedures Release 11i April 2000 Part No. A83637-01 Understanding Oracle Marketing Encyclopedia This topic group provides overviews of the application

More information

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function

... Figure 2: Proposed Service Invocation Mechanism. AS Service invocation 2 SC invocation 2. Session/Call Control Function Next Generation Network Service Architecture in the IP Multimedia Subsystem Anahita Gouya, Noël Crespi, Lina Oueslati, {anahita.gouya, noel.crespi, lina.oueslati}@int-evry.fr, Institut National des Télécommunications

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information