OVERVIEW OF ETSI M2M ARCHITECTURE Presented by: Barbara Pareglio, Ericsson. ETSI 2011. All rights reserved



Similar documents
ETSI M2M application developers guideline

Yassine Banouar Thierry Monteil Mahdi Ben Alaya Christophe Chassot Khalil Drira

M2M Service Architecture: Delivering M2M Services Over Heterogeneous Networks

ETSI M2M / onem2m and the need for semantics. Joerg Swetina (NEC) (joerg.swetina@neclab.eu)

Standardized Machine-to-Machine (M2M) Software Development Platform

OpenMTC. M2M Solutions for Smart Cities and the Internet of Things.

! Context: IoT, CPS and M2M! Challenges in M2M! Evolutionary M2M the FiDM way! Focus on: ! Conclusion 2

ONEM2M SERVICE LAYER PLATFORM

ETSI Machine-to-Machine (M2M) Standardization

MASHUPS FOR THE INTERNET OF THINGS

ASTRI s Internet-of-Things (IoT) Gateway and Management Platform

ONEM2M SERVICE LAYER PLATFORM INITIAL RELEASE

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

3G/Wi-Fi Seamless Offload

Mobile Devices: Server and Management Lesson 06 Device Management

W52P IP DECT Phones (with firmware version 30 or later)

SERVICE ORIENTED ARCHITECTURE

Broadband Forum Machine-to-Machine (M2M) Solutions

TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version Release 1)

SOA REFERENCE ARCHITECTURE: WEB TIER

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

ETSI M2M Release 2 Numbering IP Address Ranges Radio Spectrum Raymond Forbes LM Ericsson ETSI TC Smart M2M Vice Chairman BEREC MACHINE-2-MACHINE

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI

MACHINE TO MACHINE COMMUNICATIONS. ETSI TC M2M Overview June 2011

MDM and Telco Service Development OMA Device Management and Platforms

IBM API Management Overview IBM Corporation

Nimble out-out-of-band authentication for EAP

XML Document Management Architecture

M2M/IoT standards in ETSI and onem2m

SMART IoT PROTOCOLS. Creating the Living Network. Chonggang Wang Innovation Lab, InterDigital Communications. December 8, 2014

Websense Content Gateway HTTPS Configuration

A Comparison of Protocols for Device Management and Software Updates

Mobile Device Management A Functional Overview

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Key requirements for Interoperable IoT systems

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

The Way to SOA Concept, Architectural Components and Organization

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Open Mobile Alliance (OMA) Device Management Overview. Peter Thompson Mark Staskauskas Qualcomm Incorporated

BES10 Cloud architecture and data flows

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Reduce Cost and Complexity of M2M and IoT Solutions via Embedded IP and Application Layer Interoperability for Smart Objects

introducing The BlackBerry Collaboration Service

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

congatec AG How to come around the IoT data security challenges

Broadband Forum - Remote Management Work

In the pursuit of becoming smart

Zenprise Device Manager 6.1.5

SyncML Device Management

Software Life-Cycle Management

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

Management and Provisioning of M2M Devices and Applications

Migrating your custom settings to version 7.6

It is highly recommended to view in full screen mode

Centrify Cloud Connector Deployment Guide

Service-Oriented Architecture and Software Engineering

Meraki as Cisco Cloud Services Manage your network Where ever you are!

How To Use Blackberry Mobile Voice System On A Blackberry Phone

How To Build An Internet Of Things (Iot)

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

How To Set Up Egnyte For Netapp Sync For Netapp

Licensing Guide BES12. Version 12.1

Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions


M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept.

Metastorm BPM Interwoven Integration. Process Mapping solutions. Metastorm BPM Interwoven Integration. Introduction. The solution

Bluetooth Health Device Profile and the IEEE Medical Device Frame Work

13 Ways Through A Firewall

Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL -

The OMA Perspective On SOA in Telecoms

Personalisation through the use of personal profile

SmartSantander Open Data access using FI-WARE G.E. [ORION]

PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication

An Open Source SCADA Toolkit

User and Iot Data Analytics. Empowered by Ericsson User Data Consolidation (UDC)

M2M: EE Connectivity. 22 July , EE LIMITED 1

Securing Corporate on Personal Mobile Devices

Connect for new business opportunities

Marko Hännikäinen Tampere University of Technology IoT week CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Software Defined Network

Presence SIMPLE Architecture

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

GSM services over wireless LAN

SpiderCloud E-RAN Security Overview

Network Data Management Protocol (NDMP) White Paper

Standard of the Camera & Imaging Products Association. White Paper. of CIPA DC Picture Transfer Protocol over TCP/IP networks

Transcription:

OVERVIEW OF ETSI M2M ARCHITECTURE Presented by: Barbara Pareglio, Ericsson ETSI 2011. All rights reserved October 2011

Why ETSI M2M Provide an M2M architecture with a generic set of capabilities for M2M services Provide a framework for developing services independently of the underlying network Facilitate deployment of vertical applications Facilitate innovation across industries by exposing data and information and providing services. 2

M2M High Level Architecture M2M Device & Gateway Domain M2M Network Domain M2M Device M2M Gateway WIDE AREA NETWORK M2M App. Device Application (DA) Proprietary M2M Device dia M2M AREA NETWORK Proprietary Interface M2M App. dia M2M Gateway Service Capability (GSCL) M2M Device M2M App. dia WIRELESS MOBILE FIXED mid M2M Service Capabilities Layer (M2M NSCL) mia mia mia M2M Application M2M Application M2M Application REFERENCE POINTS M2M Device Service Capability (DSCL).. OTHER mid Network Application (NA) 3

M2M architecture ETSI M2M adopted a RESTful architecture style Information is represented by resources which are structured as a tree ETSI M2M standardizes the resource structure that resides on an M2M Service Capability Layer (SCL) Each SCL contains a resource structure where the information is kept M2M Application and/or M2M Service Capability Layer exchange information by means of these resources over the defined reference points ETSI M2M standardizes the procedure for handling the resources 4

Features offered by ETSI M2M Identification of the M2M Application and the M2M Devices Asynchronous and synchronous communication Store and forward mechanism based on policies for optimising the communication Location information Device management based both on OMA DM (wireless) and BBF TR 69 (wireline) Mutual authentication between Network Service Capability Layer and Device/Gateway Service Capability Layer that are connected Secure channel for transporting data over mid reference point And much more. 5

Security R1 provides standardized security mechanism for the reference point mid The device/gateway needs to have keys for securing the connection. The device/gateway is provisioned with the key M2M Root Key. The high level procedure are to Perform mutual mid end point authentication Perform M2M Connection Key agreement Optionally establish a secure session over mid. Perform RESTful procedures over the mid 6

Example: Connected home Network Application (NA) Wireless or Wired Networks M2M Devices with Device Application (DA) M2M Gateway (GSCL) M2M Network (NSCL)

High level deployment M2M Device & Gateway Domain Heating WIDE AREA NETWORK M2M Network Domain Heating App wifi WIRELESS Example NSCL M2M Gateway Washingmachine Washing App dia myhome GSCL MOBILE mid mia SmartHome App FIXED.. OTHER 8

Flow of events M2M Device & Gateway Domain M2M Network Domain Heating WIDE AREA NETWORK Heating App wifi M2M Gateway WIRELESS Example NSCL Configure & provision Washingmachine Washing App register myhome GSCL MOBILE register register SmartHome App FIXED Configure & provision.. OTHER 9

Network Application registration The Network Application registers to the NSCL Name of the NSCL = examplenscl Network application register with the ID = SmartHome ID examplenscl scls applications SmartHome-ID mgmtobjs containers groups accessrights containers groups accessrights notificationch anel discovery 10

Gateway registration The gateway (GSCL) registers to the NSCL Name of the NSCL = examplenscl Name of the GSCL = myhomegscl Before registration the GSCL and NSCL are authenticated by means of the M2M Communication procedures examplenscl scls myhomegscl mgmtobjs applications containers groups accessrights containers groups applications accessrights mgmtobjs notificationscha nnel m2mpocs attacheddevices discovery 11

Result of Gateway registration As a result of the gateway registration a resource representing the NSCL is created in the GSCL. myhomegscl scls examplenscl containers groups applications accessrights applications containers groups accessrights mgmtobjs notificationscha nnel discovery 12

Device applications registration The device Applications register to the GSCL Name of GSCL = myhomegscl Device application heating register with the ID = Heating App ID Device application washing mashing register with the ID = Washing App ID myhomegscl scls applications Heating-App-ID Washing-App-ID containers groups accessrights containers groups accessrights notificationch anel discovery 13

What s next Appropriate access rights needs to be set up. For example the network application that knows the GSCL and the applications is setting up the accessrights information can now be transferred over the mid. 14

Store information The information from the 2 device applications are stored in the containers in the NSCL examplenscl scls myhomegscl containers heaterinfo washinginfo contentinstances 15

Flow of events: add & read data M2M Device & Gateway Domain M2M Network Domain Heating Heating App M2M Gateway Example NSCL add Washingmachine Washing App add myhome GSCL add read SmartHome App 16

Flow of events: subscribe & notify M2M Device & Gateway Domain M2M Network Domain Heating Heating App M2M Gateway Example NSCL subscribe Washingmachine Washing App myhome GSCL notify SmartHome App 17

What if A new Network Application would like to reuse some of the data produced? For example the device manufacturer that controls the performance and status of the device The utility company that monitors the levels of utilization for each appliances. All you need to do is to develop the Network Application and Ask the owner of the information to give you read permission by updating the access right Retrieve the information and consume it 18

High level deployment M2M Device & Gateway Domain M2M Network Domain Heating WIDE AREA NETWORK Heating App wifi M2M Gateway WIRELESS Example NSCL Utility App Washingmachine Washing App dia myhome GSCL MOBILE FIXED mid mia SmartHome App Manufacturer App.. OTHER 19

Questions Contact details: Barbara Pareglio, barbara.pareglio@ericsson.com 20