OVERVIEW OF ETSI M2M ARCHITECTURE Presented by: Barbara Pareglio, Ericsson. ETSI All rights reserved
|
|
|
- Monica Wood
- 10 years ago
- Views:
Transcription
1 OVERVIEW OF ETSI M2M ARCHITECTURE Presented by: Barbara Pareglio, Ericsson ETSI All rights reserved October 2011
2 Why ETSI M2M Provide an M2M architecture with a generic set of capabilities for M2M services Provide a framework for developing services independently of the underlying network Facilitate deployment of vertical applications Facilitate innovation across industries by exposing data and information and providing services. 2
3 M2M High Level Architecture M2M Device & Gateway Domain M2M Network Domain M2M Device M2M Gateway WIDE AREA NETWORK M2M App. Device Application (DA) Proprietary M2M Device dia M2M AREA NETWORK Proprietary Interface M2M App. dia M2M Gateway Service Capability (GSCL) M2M Device M2M App. dia WIRELESS MOBILE FIXED mid M2M Service Capabilities Layer (M2M NSCL) mia mia mia M2M Application M2M Application M2M Application REFERENCE POINTS M2M Device Service Capability (DSCL).. OTHER mid Network Application (NA) 3
4 M2M architecture ETSI M2M adopted a RESTful architecture style Information is represented by resources which are structured as a tree ETSI M2M standardizes the resource structure that resides on an M2M Service Capability Layer (SCL) Each SCL contains a resource structure where the information is kept M2M Application and/or M2M Service Capability Layer exchange information by means of these resources over the defined reference points ETSI M2M standardizes the procedure for handling the resources 4
5 Features offered by ETSI M2M Identification of the M2M Application and the M2M Devices Asynchronous and synchronous communication Store and forward mechanism based on policies for optimising the communication Location information Device management based both on OMA DM (wireless) and BBF TR 69 (wireline) Mutual authentication between Network Service Capability Layer and Device/Gateway Service Capability Layer that are connected Secure channel for transporting data over mid reference point And much more. 5
6 Security R1 provides standardized security mechanism for the reference point mid The device/gateway needs to have keys for securing the connection. The device/gateway is provisioned with the key M2M Root Key. The high level procedure are to Perform mutual mid end point authentication Perform M2M Connection Key agreement Optionally establish a secure session over mid. Perform RESTful procedures over the mid 6
7 Example: Connected home Network Application (NA) Wireless or Wired Networks M2M Devices with Device Application (DA) M2M Gateway (GSCL) M2M Network (NSCL)
8 High level deployment M2M Device & Gateway Domain Heating WIDE AREA NETWORK M2M Network Domain Heating App wifi WIRELESS Example NSCL M2M Gateway Washingmachine Washing App dia myhome GSCL MOBILE mid mia SmartHome App FIXED.. OTHER 8
9 Flow of events M2M Device & Gateway Domain M2M Network Domain Heating WIDE AREA NETWORK Heating App wifi M2M Gateway WIRELESS Example NSCL Configure & provision Washingmachine Washing App register myhome GSCL MOBILE register register SmartHome App FIXED Configure & provision.. OTHER 9
10 Network Application registration The Network Application registers to the NSCL Name of the NSCL = examplenscl Network application register with the ID = SmartHome ID examplenscl scls applications SmartHome-ID mgmtobjs containers groups accessrights containers groups accessrights notificationch anel discovery 10
11 Gateway registration The gateway (GSCL) registers to the NSCL Name of the NSCL = examplenscl Name of the GSCL = myhomegscl Before registration the GSCL and NSCL are authenticated by means of the M2M Communication procedures examplenscl scls myhomegscl mgmtobjs applications containers groups accessrights containers groups applications accessrights mgmtobjs notificationscha nnel m2mpocs attacheddevices discovery 11
12 Result of Gateway registration As a result of the gateway registration a resource representing the NSCL is created in the GSCL. myhomegscl scls examplenscl containers groups applications accessrights applications containers groups accessrights mgmtobjs notificationscha nnel discovery 12
13 Device applications registration The device Applications register to the GSCL Name of GSCL = myhomegscl Device application heating register with the ID = Heating App ID Device application washing mashing register with the ID = Washing App ID myhomegscl scls applications Heating-App-ID Washing-App-ID containers groups accessrights containers groups accessrights notificationch anel discovery 13
14 What s next Appropriate access rights needs to be set up. For example the network application that knows the GSCL and the applications is setting up the accessrights information can now be transferred over the mid. 14
15 Store information The information from the 2 device applications are stored in the containers in the NSCL examplenscl scls myhomegscl containers heaterinfo washinginfo contentinstances 15
16 Flow of events: add & read data M2M Device & Gateway Domain M2M Network Domain Heating Heating App M2M Gateway Example NSCL add Washingmachine Washing App add myhome GSCL add read SmartHome App 16
17 Flow of events: subscribe & notify M2M Device & Gateway Domain M2M Network Domain Heating Heating App M2M Gateway Example NSCL subscribe Washingmachine Washing App myhome GSCL notify SmartHome App 17
18 What if A new Network Application would like to reuse some of the data produced? For example the device manufacturer that controls the performance and status of the device The utility company that monitors the levels of utilization for each appliances. All you need to do is to develop the Network Application and Ask the owner of the information to give you read permission by updating the access right Retrieve the information and consume it 18
19 High level deployment M2M Device & Gateway Domain M2M Network Domain Heating WIDE AREA NETWORK Heating App wifi M2M Gateway WIRELESS Example NSCL Utility App Washingmachine Washing App dia myhome GSCL MOBILE FIXED mid mia SmartHome App Manufacturer App.. OTHER 19
20 Questions Contact details: Barbara Pareglio, 20
ETSI M2M application developers guideline
Cod. Doc. TTGSTSPI1300029 ETSI M2M application developers guideline Version: 1.0 Date: 27.05.2013 Privacy: Public Pages: 43 AUTHORS: FIRST APPROVAL: FINAL APPROVAL: Michele LUPANO (T.TG.ST.SPI) Roberto
Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira www.om2m.org. yassine.banouar@laas.
Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira O: Standardized service platform for interoperability www.om2m.org [email protected] @YassineBANOUAR 1 Agenda Introduction
M2M Service Architecture: Delivering M2M Services Over Heterogeneous Networks
Service Architecture: Delivering Services Over Heterogeneous Networks IEEE Communications Quality & Reliability 202 International Workshop May 7, 202 Chonggang Wang InterDigtial Communications [email protected]
ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) ([email protected])
ETSI M2M / onem2m and the need for semantics Joerg Swetina (NEC) ([email protected]) Outline of this presentation A simple picture of Machine-to-Machine (M2M) communications Where do standards apply
Standardized Machine-to-Machine (M2M) Software Development Platform
WHITE PAPER Standardized Machine-to-Machine (M2M) Software Development Platform Standardized service layer and APIs create a common framework and roadmap for cellular operators, service providers and device
OpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org [email protected]
OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org [email protected] 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end
! Context: IoT, CPS and M2M! Challenges in M2M! Evolutionary M2M the FiDM way! Focus on: ! Conclusion 2
UMR 5205 On the Integration of Federated Identity Management in M2M middleware Youakim Badr!! LIRIS Lab, SOC team! INSA-Lyon! The 3 rd Franco American Workshop On CyberSecurity, Lyon, December 9-11, 2014
ONEM2M SERVICE LAYER PLATFORM
ONEM2M SERVICE LAYER PLATFORM Roland Hechwartner (Deutsche Telekom) onem2m TP Vice Chair Roland.hechwartner@t mobile.at onem2m www.onem2m.org 2015 onem2m The Partnership Project Over 200 member organizations
ETSI Machine-to-Machine (M2M) Standardization
ETSI Machine-to-Machine (M2M) Standardization Presentation for TIA/ETSI workshop 21st March 2011, Jersey City Participants on behalf of ETSI TC M2M Josef Blanz, Qualcomm Barbara Pareglio & Enrico Brancaccio,
MASHUPS FOR THE INTERNET OF THINGS
MASHUPS FOR THE INTERNET OF THINGS Matthias Heyde / Fraunhofer FOKUS glue.things a Mashup Platform for wiring the Internet of Things with the Internet of Services 5th International Workshop on the Web
ASTRI s Internet-of-Things (IoT) Gateway and Management Platform
ASTRI s Internet-of-Things (IoT) Gateway and Management Platform Dr. Billy Chan Principal Engineer Communications Technologies, ASTRI Software Technologies, CT 1 Sensor/IoT Applications & Market Smart
ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE
ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE Omar Elloumi (ALU) onem2m TP Chair (Elect) omar.elloumi@alcatel lucent.com onem2m www.onem2m.org 2014 onem2m The Partnership Project Over 200 member organizations
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
Mobile Devices: Server and Management Lesson 06 Device Management
Mobile Devices: Server and Management Lesson 06 Device Management Oxford University Press 2007. All rights reserved. 1 Device Management (DM) Many types of devices in a mobile network Managed by a mobile
W52P IP DECT Phones (with firmware version 30 or later)
This technote mainly provides a general introduction of TR-069 (Technical Report 069) and the way of enabling the TR-069 on the Yealink IP phones. It also provides the supported RPC methods and the information
SERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
Broadband Forum Machine-to-Machine (M2M) Solutions
Broadband Forum Machine-to-Machine (M2M) Solutions OMA Workshop, February 2012 Barcelona, Spain Robin Mersh, CEO [email protected] Tim Spets, Motorola The information in this presentation is public
TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1)
TR 118 525 V1.0.0 (2016-03) TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) 2 TR 118 525 V1.0.0 (2016-03) Reference DTR/oneM2M-000025 Keywords application,
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
ETSI M2M Release 2 Numbering IP Address Ranges Radio Spectrum Raymond Forbes LM Ericsson ETSI TC Smart M2M Vice Chairman BEREC MACHINE-2-MACHINE
Numbering IP Address Ranges Radio Spectrum Raymond Forbes LM Ericsson ETSI TC Smart M2M Vice Chairman BEREC MACHINE-2-MACHINE WORKSHOP From thrm2m stovepipes to integrated offering Vertical#1 1 Application,
Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI
Hybrid AP NWA-316x Agenda What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI What is Hybrid AP? Hybrid AP, known as the Hybrid Wireless Access
MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011
MACHINE TO MACHINE COMMUNICATIONS ETSI TC M2M Overview June 2011 About the ETSI TC M2M ETSI: the European Telecommunication Standards Institute One of the 3 European SDOs (CEN, CENELEC, ETSI). ETSI is
MDM and Telco Service Development OMA Device Management and Platforms
MDM and Telco Service Development OMA Device Management and Platforms Berlin, 21 September 2010 Friedhelm Rodermund, Vice-Chair, Device Management Working Group, OMA www.openmobilealliance.org Agenda Overview
IBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
Nimble out-out-of-band authentication for EAP
Nimble out-out-of-band authentication for EAP draft-aura-eap-noob-00 Tuomas Aura, Aalto University, Finland Mohit Sethi, Ericsson Research, Finland Aura, Sethi: draft-aura-eap-noob 1 EAP-NOOB rationale
XML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
M2M/IoT standards in ETSI and onem2m
M2M/IoT standards in ETSI and onem2m Enrico Scarrone, ETSI TC Smart M2M Vice-Chairman, onem2m SC Vice Chairman Telecom Italia ALMANAC Workshop, Copenhagen, September 2015 TC SmartM2M (formerly TC M2M)
SMART IoT PROTOCOLS. Creating the Living Network. Chonggang Wang Innovation Lab, InterDigital Communications. December 8, 2014
SMART IoT PROTOCOLS Chonggang Wang Innovation Lab, InterDigital Communications December 8, 2014 Creating the Living Network Content IoT Overview IoT Protocols C6-based Smart IoT Smart IoT Protocols Challenges
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
A Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
Mobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
Key requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures
Firewall Agenda Unit 1 Understanding of Firewall s definition and Categorization Unit 2 Understanding of Firewall s Deployment Architectures Unit 3 Three Representative Firewall Deployment Examples in
The Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
Open Mobile Alliance (OMA) Device Management Overview. Peter Thompson Mark Staskauskas Qualcomm Incorporated
Open Mobile Alliance (OMA) Device Management Overview Peter Thompson Mark Staskauskas Qualcomm Incorporated Motivation for this Presentation Many of the features envisioned for the TR-50 Smart Device Communications
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
Configuring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
introducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
congatec AG How to come around the IoT data security challenges
congatec AG How to come around the IoT data security challenges Christian Eder Director Marketing We simplify the use of embedded technology fast, dedicated and reliable Technology Driven Products Customer
Broadband Forum - Remote Management Work
Broadband Forum - Remote Management Work Why Standardize Management Protocols? 2 BroadbandHome Remote Management Framework OSS/BSS Policy Call Center WT-131, WT-132: ACS Northbound Interface Auto-Configuration
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
Zenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
SyncML Device Management
SyncML Device Management An overview and toolkit implementation Radu State Ph.D. The MADYNES Research Team LORIA INRIA Lorraine 615, rue du Jardin Botanique 54602 Villers-lès-Nancy France [email protected]
Software Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
WIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications Musa Unmehopa Technical Plenary Chairman, OMA Director of Standards, Alcatel-Lucent M2M devices outnumber mobile devices by an order of magnitude
Migrating your custom settings to version 7.6
Migrating your custom settings to version 7.6 Webinar July 2011 web security data security email security 2009, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
It is highly recommended to view in full screen mode
It is highly recommended to view in full screen mode Smart Phone Connectivity Use your phone s Settings to toggle between Wi-Fi networks During the set up process, you ll see in the guide on of two messages:
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Meraki as Cisco Cloud Services Manage your network Where ever you are!
Meraki as Cisco Cloud Services Manage your network Where ever you are! Marketing/Technical description for services Scope of the Service Cloud services can deliver big technology benefits to midsized and
How To Use Blackberry Mobile Voice System On A Blackberry Phone
B l a c k B e r r y M o b i l e Vo i c e S y s t e m BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and
How To Build An Internet Of Things (Iot)
The Internet of Things: Devices, Avatars, Worlds, and APPs Tom Berarducci Director, Platform Product Mgmt Zebra Technologies Corp. Zebra Technologies Corp. Goal of the Internet of Things (IoT) A key goal
Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N450000431 Rev 003 Issue 1
Nokia Call Connect v1.1 for Cisco User s Guide Part Number: N450000431 Rev 003 Issue 1 Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without
3GPP Femtocells: Architecture and Protocols. by Gavin Horn
3GPP Femtocells: Architecture and Protocols by Gavin Horn QUALCOMM Incorporated 5775 Morehouse Drive San Diego, CA 92121-1714 U.S.A. 3GPP Femtocells: Architecture and Protocols September 2010-2 - Contents
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Licensing Guide BES12. Version 12.1
Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to
Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions
Messaging over IP (MoIP) 6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 MESSAGING-OVER-IP (MOIP) 6.1 SYSTEM SURVEY... 4 MESSAGING-OVER-IP (MOIP)
Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for
M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: [email protected] WHAT IS EURECOM A graduate school & research centre in communication
Metastorm BPM Interwoven Integration. Process Mapping solutions. Metastorm BPM Interwoven Integration. Introduction. The solution
Metastorm BPM Interwoven Integration Introduction A proven and cost effective solution for companies that need to create and maintain high volumes of Interwoven WorkSpaces and their associated documents
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.
Internet of Things (IoT): Middleware Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ A Fence Surveillance System Y. Kim et al, Autonomics
The OMA Perspective On SOA in Telecoms
The OMA Perspective On SOA in Telecoms Adopting SOA for Telecom Workshop, Open Standards Forum 2008 Ditton Manor, 30 September 3 October 2008 Musa Unmehopa» Chairman OMA Architecture Working Group» Distinguished
Personalisation through the use of personal profile
Personalisation through the use of personal profile Alf Sollund, Telenor IST project eperspace N 506775 1 IST project eperspace N 506775 2 Outline Introduction Personalisation Personal profile Architecture
SmartSantander Open Data access using FI-WARE G.E. [ORION]
SmartSantander Open Data access using FI-WARE G.E. [ORION What to find in this doc FI-WARE is an open cloud-based infrastructure for Future Internet applications and services, composed by different building
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using
An Open Source SCADA Toolkit
An Open Source SCADA Toolkit Stanley A. Klein Open Secure Energy Control Systems, LLC (301) 565 4025 [email protected] This work was supported by the United States Department of Homeland Security Agenda
User and Iot Data Analytics. Empowered by Ericsson User Data Consolidation (UDC)
User and Iot Data Analytics Empowered by Ericsson User Data Consolidation (UDC) content Market trends Opportunities Ericsson solution Benefits Extended view Values from insights Use cases Conclusion Ericsson
M2M: EE Connectivity. 22 July 2015 2015, EE LIMITED 1
M2M: EE Connectivity 22 July 2015 2015, EE LIMITED 1 EE network and service access Our M2M service gives you access to our mobile network, to facilitate communication between devices and application servers,
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Connect for new business opportunities
Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine
Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS
Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks
Software Defined Network
Software Defined Network Jerry Holland Vice President Proprietary Statement This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate
Presence SIMPLE Architecture
Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Mobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
SpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
Network Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks
Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions
