OVERVIEW OF ETSI M2M ARCHITECTURE Presented by: Barbara Pareglio, Ericsson. ETSI All rights reserved
|
|
- Monica Wood
- 8 years ago
- Views:
Transcription
1 OVERVIEW OF ETSI M2M ARCHITECTURE Presented by: Barbara Pareglio, Ericsson ETSI All rights reserved October 2011
2 Why ETSI M2M Provide an M2M architecture with a generic set of capabilities for M2M services Provide a framework for developing services independently of the underlying network Facilitate deployment of vertical applications Facilitate innovation across industries by exposing data and information and providing services. 2
3 M2M High Level Architecture M2M Device & Gateway Domain M2M Network Domain M2M Device M2M Gateway WIDE AREA NETWORK M2M App. Device Application (DA) Proprietary M2M Device dia M2M AREA NETWORK Proprietary Interface M2M App. dia M2M Gateway Service Capability (GSCL) M2M Device M2M App. dia WIRELESS MOBILE FIXED mid M2M Service Capabilities Layer (M2M NSCL) mia mia mia M2M Application M2M Application M2M Application REFERENCE POINTS M2M Device Service Capability (DSCL).. OTHER mid Network Application (NA) 3
4 M2M architecture ETSI M2M adopted a RESTful architecture style Information is represented by resources which are structured as a tree ETSI M2M standardizes the resource structure that resides on an M2M Service Capability Layer (SCL) Each SCL contains a resource structure where the information is kept M2M Application and/or M2M Service Capability Layer exchange information by means of these resources over the defined reference points ETSI M2M standardizes the procedure for handling the resources 4
5 Features offered by ETSI M2M Identification of the M2M Application and the M2M Devices Asynchronous and synchronous communication Store and forward mechanism based on policies for optimising the communication Location information Device management based both on OMA DM (wireless) and BBF TR 69 (wireline) Mutual authentication between Network Service Capability Layer and Device/Gateway Service Capability Layer that are connected Secure channel for transporting data over mid reference point And much more. 5
6 Security R1 provides standardized security mechanism for the reference point mid The device/gateway needs to have keys for securing the connection. The device/gateway is provisioned with the key M2M Root Key. The high level procedure are to Perform mutual mid end point authentication Perform M2M Connection Key agreement Optionally establish a secure session over mid. Perform RESTful procedures over the mid 6
7 Example: Connected home Network Application (NA) Wireless or Wired Networks M2M Devices with Device Application (DA) M2M Gateway (GSCL) M2M Network (NSCL)
8 High level deployment M2M Device & Gateway Domain Heating WIDE AREA NETWORK M2M Network Domain Heating App wifi WIRELESS Example NSCL M2M Gateway Washingmachine Washing App dia myhome GSCL MOBILE mid mia SmartHome App FIXED.. OTHER 8
9 Flow of events M2M Device & Gateway Domain M2M Network Domain Heating WIDE AREA NETWORK Heating App wifi M2M Gateway WIRELESS Example NSCL Configure & provision Washingmachine Washing App register myhome GSCL MOBILE register register SmartHome App FIXED Configure & provision.. OTHER 9
10 Network Application registration The Network Application registers to the NSCL Name of the NSCL = examplenscl Network application register with the ID = SmartHome ID examplenscl scls applications SmartHome-ID mgmtobjs containers groups accessrights containers groups accessrights notificationch anel discovery 10
11 Gateway registration The gateway (GSCL) registers to the NSCL Name of the NSCL = examplenscl Name of the GSCL = myhomegscl Before registration the GSCL and NSCL are authenticated by means of the M2M Communication procedures examplenscl scls myhomegscl mgmtobjs applications containers groups accessrights containers groups applications accessrights mgmtobjs notificationscha nnel m2mpocs attacheddevices discovery 11
12 Result of Gateway registration As a result of the gateway registration a resource representing the NSCL is created in the GSCL. myhomegscl scls examplenscl containers groups applications accessrights applications containers groups accessrights mgmtobjs notificationscha nnel discovery 12
13 Device applications registration The device Applications register to the GSCL Name of GSCL = myhomegscl Device application heating register with the ID = Heating App ID Device application washing mashing register with the ID = Washing App ID myhomegscl scls applications Heating-App-ID Washing-App-ID containers groups accessrights containers groups accessrights notificationch anel discovery 13
14 What s next Appropriate access rights needs to be set up. For example the network application that knows the GSCL and the applications is setting up the accessrights information can now be transferred over the mid. 14
15 Store information The information from the 2 device applications are stored in the containers in the NSCL examplenscl scls myhomegscl containers heaterinfo washinginfo contentinstances 15
16 Flow of events: add & read data M2M Device & Gateway Domain M2M Network Domain Heating Heating App M2M Gateway Example NSCL add Washingmachine Washing App add myhome GSCL add read SmartHome App 16
17 Flow of events: subscribe & notify M2M Device & Gateway Domain M2M Network Domain Heating Heating App M2M Gateway Example NSCL subscribe Washingmachine Washing App myhome GSCL notify SmartHome App 17
18 What if A new Network Application would like to reuse some of the data produced? For example the device manufacturer that controls the performance and status of the device The utility company that monitors the levels of utilization for each appliances. All you need to do is to develop the Network Application and Ask the owner of the information to give you read permission by updating the access right Retrieve the information and consume it 18
19 High level deployment M2M Device & Gateway Domain M2M Network Domain Heating WIDE AREA NETWORK Heating App wifi M2M Gateway WIRELESS Example NSCL Utility App Washingmachine Washing App dia myhome GSCL MOBILE FIXED mid mia SmartHome App Manufacturer App.. OTHER 19
20 Questions Contact details: Barbara Pareglio, 20
ETSI M2M application developers guideline
Cod. Doc. TTGSTSPI1300029 ETSI M2M application developers guideline Version: 1.0 Date: 27.05.2013 Privacy: Public Pages: 43 AUTHORS: FIRST APPROVAL: FINAL APPROVAL: Michele LUPANO (T.TG.ST.SPI) Roberto
More informationYassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira www.om2m.org. yassine.banouar@laas.
Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira O: Standardized service platform for interoperability www.om2m.org yassine.banouar@laas.fr @YassineBANOUAR 1 Agenda Introduction
More informationM2M Service Architecture: Delivering M2M Services Over Heterogeneous Networks
Service Architecture: Delivering Services Over Heterogeneous Networks IEEE Communications Quality & Reliability 202 International Workshop May 7, 202 Chonggang Wang InterDigtial Communications Chonggang.Wang@InterDigital.com
More informationETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) (joerg.swetina@neclab.eu)
ETSI M2M / onem2m and the need for semantics Joerg Swetina (NEC) (joerg.swetina@neclab.eu) Outline of this presentation A simple picture of Machine-to-Machine (M2M) communications Where do standards apply
More informationStandardized Machine-to-Machine (M2M) Software Development Platform
WHITE PAPER Standardized Machine-to-Machine (M2M) Software Development Platform Standardized service layer and APIs create a common framework and roadmap for cellular operators, service providers and device
More informationOpenMTC. M2M Solutions for Smart Cities and the Internet of Things. www.open-mtc.org info@open-mtc.org
OpenMTC M2M Solutions for Smart Cities and the Internet of Things www.open-mtc.org info@open-mtc.org 2. March März 2, 2013 Understanding M2M Machine-to-Machine (M2M) is a paradigm in which the end-to-end
More informationThe following slides describe these prototypes above in more details
MERA is a full ETSI member and is actively involved in M2M technology investigation and expertise development in the M2M domain. As such we have a full time R&D team dedicated to the study of use-cases,
More information! Context: IoT, CPS and M2M! Challenges in M2M! Evolutionary M2M the FiDM way! Focus on: ! Conclusion 2
UMR 5205 On the Integration of Federated Identity Management in M2M middleware Youakim Badr!! LIRIS Lab, SOC team! INSA-Lyon! The 3 rd Franco American Workshop On CyberSecurity, Lyon, December 9-11, 2014
More informationONEM2M SERVICE LAYER PLATFORM
ONEM2M SERVICE LAYER PLATFORM Roland Hechwartner (Deutsche Telekom) onem2m TP Vice Chair Roland.hechwartner@t mobile.at onem2m www.onem2m.org 2015 onem2m The Partnership Project Over 200 member organizations
More informationETSI Machine-to-Machine (M2M) Standardization
ETSI Machine-to-Machine (M2M) Standardization Presentation for TIA/ETSI workshop 21st March 2011, Jersey City Participants on behalf of ETSI TC M2M Josef Blanz, Qualcomm Barbara Pareglio & Enrico Brancaccio,
More informationMASHUPS FOR THE INTERNET OF THINGS
MASHUPS FOR THE INTERNET OF THINGS Matthias Heyde / Fraunhofer FOKUS glue.things a Mashup Platform for wiring the Internet of Things with the Internet of Services 5th International Workshop on the Web
More informationASTRI s Internet-of-Things (IoT) Gateway and Management Platform
ASTRI s Internet-of-Things (IoT) Gateway and Management Platform Dr. Billy Chan Principal Engineer Communications Technologies, ASTRI Software Technologies, CT 1 Sensor/IoT Applications & Market Smart
More informationBETaaS. Building the Environment for the Things as a Service D1.4.2
Building the Environment for the Things as a Service Grant Agreement no.: 317674 Call identifier: FP7-ICT-2011-8 D1.4.2 - TaaS Reference Model Deliverable: Title: D1.4.2 TaaS Reference Model Due date:
More informationONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE
ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE Omar Elloumi (ALU) onem2m TP Chair (Elect) omar.elloumi@alcatel lucent.com onem2m www.onem2m.org 2014 onem2m The Partnership Project Over 200 member organizations
More informationArchitecting Information Centric ETSI-M2M systems
Architecting Information Centric ETSI-M2M systems Luigi Alfredo Grieco, Mahdi Ben Alaya, Thierry Monteil and Khalil Drira LAAS-CNRS and Univ. de Toulouse, Toulouse, France. DEI, Politecnico di Bari, Bari,
More informationTS-M2M-0002v0.6.2 onem2m Requirements Technical Specification
TS-M2M-0002v0.6.2 onem2m Requirements Technical Specification 2014 年 1 月 17 日 制 定 一 般 社 団 法 人 情 報 通 信 技 術 委 員 会 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 本 書 は 一 般 社 団 法 人 情 報 通 信 技 術 委 員 会 が 著 作 権 を
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More information3G/Wi-Fi Seamless Offload
Qualcomm Incorporated March 2010 Table of Contents [1] Introduction... 1 [2] The Role of WLAN... 2 [3] 3G/Wi-Fi Seamless Offload Pathway... 2 [4] Application-Based Switching... 3 [5] Wi-Fi Mobility...
More informationMobile Devices: Server and Management Lesson 06 Device Management
Mobile Devices: Server and Management Lesson 06 Device Management Oxford University Press 2007. All rights reserved. 1 Device Management (DM) Many types of devices in a mobile network Managed by a mobile
More informationW52P IP DECT Phones (with firmware version 30 or later)
This technote mainly provides a general introduction of TR-069 (Technical Report 069) and the way of enabling the TR-069 on the Yealink IP phones. It also provides the supported RPC methods and the information
More informationSERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
More informationBroadband Forum Machine-to-Machine (M2M) Solutions
Broadband Forum Machine-to-Machine (M2M) Solutions OMA Workshop, February 2012 Barcelona, Spain Robin Mersh, CEO rmersh@broadband-forum.org Tim Spets, Motorola The information in this presentation is public
More informationTECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1)
TR 118 525 V1.0.0 (2016-03) TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) 2 TR 118 525 V1.0.0 (2016-03) Reference DTR/oneM2M-000025 Keywords application,
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationETSI M2M Release 2 Numbering IP Address Ranges Radio Spectrum Raymond Forbes LM Ericsson ETSI TC Smart M2M Vice Chairman BEREC MACHINE-2-MACHINE
Numbering IP Address Ranges Radio Spectrum Raymond Forbes LM Ericsson ETSI TC Smart M2M Vice Chairman BEREC MACHINE-2-MACHINE WORKSHOP From thrm2m stovepipes to integrated offering Vertical#1 1 Application,
More informationAgenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI
Hybrid AP NWA-316x Agenda What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI What is Hybrid AP? Hybrid AP, known as the Hybrid Wireless Access
More informationMACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011
MACHINE TO MACHINE COMMUNICATIONS ETSI TC M2M Overview June 2011 About the ETSI TC M2M ETSI: the European Telecommunication Standards Institute One of the 3 European SDOs (CEN, CENELEC, ETSI). ETSI is
More informationMDM and Telco Service Development OMA Device Management and Platforms
MDM and Telco Service Development OMA Device Management and Platforms Berlin, 21 September 2010 Friedhelm Rodermund, Vice-Chair, Device Management Working Group, OMA www.openmobilealliance.org Agenda Overview
More informationIBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
More informationNimble out-out-of-band authentication for EAP
Nimble out-out-of-band authentication for EAP draft-aura-eap-noob-00 Tuomas Aura, Aalto University, Finland Mohit Sethi, Ericsson Research, Finland Aura, Sethi: draft-aura-eap-noob 1 EAP-NOOB rationale
More informationXML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
More informationM2M/IoT standards in ETSI and onem2m
M2M/IoT standards in ETSI and onem2m Enrico Scarrone, ETSI TC Smart M2M Vice-Chairman, onem2m SC Vice Chairman Telecom Italia ALMANAC Workshop, Copenhagen, September 2015 TC SmartM2M (formerly TC M2M)
More informationSelf-management of Machine-to-Machine communications: a bi-layered approach
Self-management of Machine-to-Machine communications: a bi-layered approach Cédric Eichler, Ghada Gharbi, Thierry Monteil, Patricia Stolf, Nawal Guermouche To cite this version: Cédric Eichler, Ghada Gharbi,
More informationSMART IoT PROTOCOLS. Creating the Living Network. Chonggang Wang Innovation Lab, InterDigital Communications. December 8, 2014
SMART IoT PROTOCOLS Chonggang Wang Innovation Lab, InterDigital Communications December 8, 2014 Creating the Living Network Content IoT Overview IoT Protocols C6-based Smart IoT Smart IoT Protocols Challenges
More informationWebsense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
More informationfuture internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet
Future Internet 2014, 6, 261-301; doi:10.3390/fi6020261 Article OPEN ACCESS future internet ISSN 1999-5903 www.mdpi.com/journal/futureinternet Towards Horizontal Architecture for Autonomic M2M Service
More informationA Comparison of Protocols for Device Management and Software Updates
B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering
More informationMobile Device Management A Functional Overview
Mobile Device Management A Functional Overview Gopal Tatte #1, Dr. G. R. Bamnote #2 1# ME 1 st Yr. Department of Computer Science and Engineering, Sant Gadge Baba Amravati University Prof Ram Meghe Institute
More informationInternet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
More informationKey requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
More informationAgenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures
Firewall Agenda Unit 1 Understanding of Firewall s definition and Categorization Unit 2 Understanding of Firewall s Deployment Architectures Unit 3 Three Representative Firewall Deployment Examples in
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationOpen Mobile Alliance (OMA) Device Management Overview. Peter Thompson Mark Staskauskas Qualcomm Incorporated
Open Mobile Alliance (OMA) Device Management Overview Peter Thompson Mark Staskauskas Qualcomm Incorporated Motivation for this Presentation Many of the features envisioned for the TR-50 Smart Device Communications
More informationBES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
More informationConfiguring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
More informationReduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects
Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects Fabien Castanier STMicroelectronics IPSO Promoter M2M Forum - Milan, May 20,
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationThe basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
More informationcongatec AG How to come around the IoT data security challenges
congatec AG How to come around the IoT data security challenges Christian Eder Director Marketing We simplify the use of embedded technology fast, dedicated and reliable Technology Driven Products Customer
More informationBroadband Forum - Remote Management Work
Broadband Forum - Remote Management Work Why Standardize Management Protocols? 2 BroadbandHome Remote Management Framework OSS/BSS Policy Call Center WT-131, WT-132: ACS Northbound Interface Auto-Configuration
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationZenprise Device Manager 6.1.5
Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in
More informationSyncML Device Management
SyncML Device Management An overview and toolkit implementation Radu State Ph.D. The MADYNES Research Team LORIA INRIA Lorraine 615, rue du Jardin Botanique 54602 Villers-lès-Nancy France Radu.State@loria.fr
More informationSoftware Life-Cycle Management
Ingo Arnold Department Computer Science University of Basel Theory Software Life-Cycle Management Architecture Styles Overview An Architecture Style expresses a fundamental structural organization schema
More informationWIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
More informationHow To Make A Desktop Operating System (Daas) Available To Aaas (Aas) Service Provider
Desktop as a Service So much more than virtual desktops!!! Desktop Management & Delivery Desktop OS Patching & Update Desktop & User Support Options Traditional Desktops Virtual Desktops Application Packaging
More informationManagement and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications Musa Unmehopa Technical Plenary Chairman, OMA Director of Standards, Alcatel-Lucent M2M devices outnumber mobile devices by an order of magnitude
More informationMigrating your custom settings to version 7.6
Migrating your custom settings to version 7.6 Webinar July 2011 web security data security email security 2009, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
More informationIt is highly recommended to view in full screen mode
It is highly recommended to view in full screen mode Smart Phone Connectivity Use your phone s Settings to toggle between Wi-Fi networks During the set up process, you ll see in the guide on of two messages:
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationStorage Virtualization. Andreas Joachim Peters CERN IT-DSS
Storage Virtualization Andreas Joachim Peters CERN IT-DSS Outline What is storage virtualization? Commercial and non-commercial tools/solutions Local and global storage virtualization Scope of this presentation
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationMeraki as Cisco Cloud Services Manage your network Where ever you are!
Meraki as Cisco Cloud Services Manage your network Where ever you are! Marketing/Technical description for services Scope of the Service Cloud services can deliver big technology benefits to midsized and
More informationHow To Use Blackberry Mobile Voice System On A Blackberry Phone
B l a c k B e r r y M o b i l e Vo i c e S y s t e m BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and
More informationHow To Build An Internet Of Things (Iot)
The Internet of Things: Devices, Avatars, Worlds, and APPs Tom Berarducci Director, Platform Product Mgmt Zebra Technologies Corp. Zebra Technologies Corp. Goal of the Internet of Things (IoT) A key goal
More informationNokia Call Connect v1.1 for Cisco User s Guide. Part Number: N450000431 Rev 003 Issue 1
Nokia Call Connect v1.1 for Cisco User s Guide Part Number: N450000431 Rev 003 Issue 1 Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without
More information3GPP Femtocells: Architecture and Protocols. by Gavin Horn
3GPP Femtocells: Architecture and Protocols by Gavin Horn QUALCOMM Incorporated 5775 Morehouse Drive San Diego, CA 92121-1714 U.S.A. 3GPP Femtocells: Architecture and Protocols September 2010-2 - Contents
More informationForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
More informationHow To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
More informationLicensing Guide BES12. Version 12.1
Licensing Guide BES12 Version 12.1 Published: 2015-04-02 SWD-20150402115554403 Contents Introduction... 5 About this guide...5 What is BES12?...5 Key features of BES12... 5 About licensing...7 Steps to
More informationMessaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions
Messaging over IP (MoIP) 6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 MESSAGING-OVER-IP (MOIP) 6.1 SYSTEM SURVEY... 4 MESSAGING-OVER-IP (MOIP)
More informationNote: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for
More informationM2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.
M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication
More informationMetastorm BPM Interwoven Integration. Process Mapping solutions. Metastorm BPM Interwoven Integration. Introduction. The solution
Metastorm BPM Interwoven Integration Introduction A proven and cost effective solution for companies that need to create and maintain high volumes of Interwoven WorkSpaces and their associated documents
More informationBluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work
Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very
More information13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
More informationInternet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.
Internet of Things (IoT): Middleware Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ A Fence Surveillance System Y. Kim et al, Autonomics
More informationThe OMA Perspective On SOA in Telecoms
The OMA Perspective On SOA in Telecoms Adopting SOA for Telecom Workshop, Open Standards Forum 2008 Ditton Manor, 30 September 3 October 2008 Musa Unmehopa» Chairman OMA Architecture Working Group» Distinguished
More informationPersonalisation through the use of personal profile
Personalisation through the use of personal profile Alf Sollund, Telenor IST project eperspace N 506775 1 IST project eperspace N 506775 2 Outline Introduction Personalisation Personal profile Architecture
More informationAustralasian Information Security Evaluation Program
Australasian Information Security Evaluation Program Certification Report Certificate Number: 2009/58 17 September 2009 Version 1.0 Commonwealth of Australia 2009. Reproduction is authorised provided that
More informationSmartSantander Open Data access using FI-WARE G.E. [ORION]
SmartSantander Open Data access using FI-WARE G.E. [ORION What to find in this doc FI-WARE is an open cloud-based infrastructure for Future Internet applications and services, composed by different building
More informationPrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using
More informationAn Open Source SCADA Toolkit
An Open Source SCADA Toolkit Stanley A. Klein Open Secure Energy Control Systems, LLC (301) 565 4025 sklein@cpcug.org This work was supported by the United States Department of Homeland Security Agenda
More informationUser and Iot Data Analytics. Empowered by Ericsson User Data Consolidation (UDC)
User and Iot Data Analytics Empowered by Ericsson User Data Consolidation (UDC) content Market trends Opportunities Ericsson solution Benefits Extended view Values from insights Use cases Conclusion Ericsson
More informationBuilding Connected Businesses with Internet of Things Services
Building Connected Businesses with Internet of Things Services Connecting systems, assets, and users is the starting point for creating new services and optimising enterprise processes. The rapidly evolving
More informationAsynchronous Provisioning Platform (APP)
Service Catalog Manager - IaaS Integration Asynchronous Provisioning Platform (APP) 0 Overview Implementing an asynchronous provisioning service (e.g. for IaaS) most often requires complex implementation
More informationM2M: EE Connectivity. 22 July 2015 2015, EE LIMITED 1
M2M: EE Connectivity 22 July 2015 2015, EE LIMITED 1 EE network and service access Our M2M service gives you access to our mobile network, to facilitate communication between devices and application servers,
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationConnect for new business opportunities
Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine
More informationMarko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS
Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks
More informationSoftware Defined Network
Software Defined Network Jerry Holland Vice President Proprietary Statement This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate
More informationPresence SIMPLE Architecture
Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationMobile@Home GSM services over wireless LAN
Mobile@Home GSM services over wireless LAN Martin Bäckström, Andreas Havdrup, Tomas Nylander, Jari Vikberg and Peter Öhman What do you get when you combine mobile telephony with voice over IP (VoIP)? Mobile@Home.
More informationSpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
More informationNetwork Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
More informationStandard of the Camera & Imaging Products Association. White Paper. of CIPA DC-005-2005. Picture Transfer Protocol over TCP/IP networks
Standard of the Camera & Imaging Products Association White Paper of CA DC-005-2005 Picture Transfer Protocol over / networks 8. November. 2005 Published by Camera & Imaging Products Association (portions
More information