SlideShare a Scribd company logo
1 of 24
Download to read offline
© 2014 oneM2M© 2014 oneM2M
Nicolas Damour
Senior Manager for Business and Innovation Development, Sierra Wireless
ndamour@sierrawireless.com
oneM2M www.oneM2M.org
TAKING A LOOK INSIDE
© 2014 oneM2M30-Oct-14 2
Agenda
• The Partnership Project
• The Common Service Layer
• The Technical Reports and Specifications
• Use Cases and Requirements
• Architecture and Information Modelling
• Communication Protocols
• Security
• Device Management & Interworking with OMA/BBF
• Interworking with 3GPP/3GPP2 and with AllJoyn
© 2014 oneM2M30-Oct-14 3
Over 200 member organizations in oneM2M
The Partnership Project
© 2014 oneM2M30-Oct-14 4
Purpose
To specify and promote an
M2M Common Service Layer
Work
Six physical 1-week meetings per year
About 5 conference calls per week between the meetings
200+ documents produced and discussed at each meeting
3800 docs in 2013 4200 docs in 2014 so far
Deliverables
Technical Reports and Technical Specifications
Purpose, Work & Deliverables
© 2014 oneM2M30-Oct-14 5
Home EnergyAutomotive Health
Automotive
Application
Health
Application
Energy
Application
Home
Application
The Common Service Layer
© 2014 oneM2M30-Oct-14 6
Home Energy HealthAutomotive
Automotive
Application
Health
Application
Energy
Application
Home
Application
Communication Networks
The Common Service Layer
© 2014 oneM2M30-Oct-14 7
Home Energy HealthAutomotive
Communication Devices & Hardware
Communication Technologies & Protocols
Automotive
Application
Health
Application
Energy
Application
Home
Application
Common Service Layer
Common functions applicable to different application domains
Communication Networks
The Common Service Layer
© 2014 oneM2M30-Oct-14 8
Registration
Group
Management
SecurityDiscovery
Data
Management &
Repository
Application &
Service
Management
Device
Management
Subscription &
Notification
Communication
Management
Service
Charging &
Accounting
Location
Network
Service
Exposure
Common Service Functions
© 2014 oneM2M30-Oct-14 9
Architecture
Analysis 1
TR-0002
(WI-0002)
Architecture
Analysis 2
TR-0003
(WI-0002)
Use
Cases
TR-0001
(WI-0001)
Protocol
Analysis
TR-0009
(WI-0008)
Security
Analysis
TR-0008
(WI-0007)
Abstraction &
Semantics
TR-0007
(WI-0005)
Study of Mgt
Capab. Enablnt
TR-0006
(WI-0004)
E2E Security &
Group Authent.
TR-0012
(WI-0011)
Use
Cases v2
TR-0011
(WI-0014)
Roles &
Focus Areas
TR-0005
(WI-0003)
Technical Reports
ftp://ftp.onem2m.org/Work Programme/
© 2014 oneM2M30-Oct-14 10
Service
Components
TS-0007
(WI-0011)
Security
Solutions
TS-0003
(WI-0007)
MQTT Protocol
Binding
TS-0010
(WI-0014)
Service Layer
Core Protocols
TS-0004
(WI-0009)
Functional
Architecture
TS-0001
(WI-0002)
Definitions
& Acronyms
TS-0011
(WI-0003)
Requirements
TS-0002
(WI-0001)
Technical Specifications
ftp://ftp.onem2m.org/Work Programme/
Management
Enablnt - BBF
TS-0006
(WI-0010)
Management
Enablnt - OMA
TS-0005
(WI-0010)
CoAP Protocol
Binding
TS-0008
(WI-0012)
HTTP Protocol
Binding
TS-0009
(WI-0013)
© 2014 oneM2M30-Oct-14 11
Use Cases & Requirements
Public ServicesEnterprise HealthcareEnergy
TransportationOtherResidential
USE CASES
REQUIREMENTS
TS-0003
© 2014 oneM2M30-Oct-14 12
Patient
E-Health
Web-application
Medicalized support
M2M Platform
Blood Pressure
Meter
Scales
Bluetooth Smart
Network
Tech support
Application
Doctor
Cellular
Network
Pill dispenser
with integrated
comm. gateway
Example Scenario – E-Health
© 2014 oneM2M30-Oct-14 13
Underlying
Network
Underlying
Network
AE
NSE
AE
NSE NSENSE
Application Service Node Middle Node Infrastructure Node
Application
Layer
Network
Layer
Architecture
AE
Application Entity Provides application logic for the end-to-end M2M solutions
Network Services Entity Provides services to the CSEs besides the pure data transport
Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
© 2014 oneM2M30-Oct-14 14
Underlying
Network
Underlying
Network
CSE
AE
NSE
CSE
AE
NSE
CSE
AE
NSENSE
Application Service Node Middle Node Infrastructure Node
Application
Layer
Service
Layer
Network
Layer
Mca
Mcn
Mca Mca
McnMcnMcnMcc Mcc
Reference Point One or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers)
Common Services Entity Provides the set of "service functions" that are common to the M2M environments
Application Entity Provides application logic for the end-to-end M2M solutions
Network Services Entity Provides services to the CSEs besides the pure data transport
Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
Architecture
CSE
Mcc’
Inf. Node
© 2014 oneM2M30-Oct-14 15
Resource-based information model
• Information is stored in the system as Resources
• A given Resource can be identified with a Uniform Resource Identifier
• A given Resource is of one of the defined Resource Types
• The Resource Type determines the semantics of the information in the Resource
• Resources can be Created, Read, Updated or Deleted to manipulate the information
• Resources are organized in a tree-like structure and connected by links
• Links either as the tree hierarchy or to another part or the tree
Information Modelling
© 2014 oneM2M30-Oct-14 16
Defined resource types
• The System (nodes, CSEs, AEs…): node, CSEBase, AE, mgmtObj…
• M2M Service subscriptions: m2mServiceSubscriptionProfile…
• Security: accessControlPolicy…
• Entity groups and memberships: group, members…
• Application data: container, contentInstance…
• Information dispatch and flows: subscription, delivery, request, schedule…
• Location services: locationPolicy…
• Service charging & accounting: statsConfig, eventConfig, statsCollect…
Defined communication schemes
• Direct communication and subscriptions/notifications
• Synchronous (blocking or non-blocking with regular polling) communications
• Asynchronous (non-blocking, with callback) communications
Resource Types & Flows
© 2014 oneM2M30-Oct-14 17
Communication Protocols
Reuse IP-based existing protocols
Service Layer
Core Protocols
TS-0004
CoAP Binding
TS-0008
MQTT Binding
TS-0010
HTTP Binding
TS-0009
XML or JSON Content serialization
HTTP Example
REQUEST
GET http://provider.net/home/temperature HTTP/1.1
Host: provider.net
From: //provider.net/CSE-1234/WeatherApp42
X-M2M-RI: 56398096
Accept: application/onem2m-resource+json
RESPONSE
HTTP/1.1 200 OK
X-M2M-RI: 56398096
Content-Type: application/onem2m-resource+json
Content-Length: 107
{"typeOfContent":"application/json",
"encoding":1,
"content": "{'timestamp':1413405177000,'value':25.32}"
}
© 2014 oneM2M30-Oct-14 18
Enrolment
Provisioning/Configuration of the M2M System (Devices, Applications…)
Secure communications
Protocols (TLS/DTLS), credentials and authentication (PSK/PKI/MAF)
Access Control
Defined in accessControlPolicy resources
Which SUBJECT can perform which ACTIONS
on which OBJECT under which CIRCUMSTANCES
More details
in the oneM2M webinar#3
November 14th 2014
Security
Reuse existing mechanisms
Security
Solutions
TS-0003
© 2014 oneM2M30-Oct-14 19
oneM2M
Domain
DM
Domain
More details
in the oneM2M webinar#4
November 27th 2014
Interworking – OMA & BBF
Reuse existing Device Management technologies
Application
Entity
IN-CSE
Mca
OMA DM 2.0OMA DM 1.3 OMA LWM2M
BBF TR-069
BBF Server
BBF CPE
BBF Device
DM Server
DM Client
© 2014 oneM2M30-Oct-14 20
Interworking – 3GPP/3GPP2
AE
(App Server)
(M2M App)
MTC/M2M
IWF
GGSN
P-GW
S-GW
MSC
MME
SGSN
PDSNRadio
Access
Network
IN-CSE
(SCS)
(M2M Srv)
NSE
(UE)
ASN-CSE
AE
3GPP MTC / 3GPP2 M2M
Architecture Models
© 2014 oneM2M30-Oct-14 21
FridgeVacuum
Vital Checker
Thermostat
TV
Home
G/W
TV
Vital
Checker Fridge
Server
Application in the
Smartphone
Hospital
Application
Smartphone
AllJoyn oneM2M
Network Architecture Peer-to-Peer in LAN Server-to-Client in WAN
API Style RPC(RMI) API Resource-based API
Discovery Style Proactive Discovery Passive Discovery
Interworking – AllJoyn
© 2014 oneM2M30-Oct-14 22
Join us for the next webinar
14 November 2014 at 1PM AEDT = 2AM UTC
Facing the Challenges
of M2M Security and Privacy
by Philip Hawkes
Principal Engineer
at Qualcomm Incorporated
http://www.onem2m.org/btchannel.cfm
© 2014 oneM2M30-Oct-14 23
Join us at the
oneM2M showcase event
9 December 2014, Sophia-Antipolis, France
(free of charge, but online registration is required)
• OneM2M project partners, rationale and goals
• OneM2M Service Layer Specification release
• Showcase demos that demonstrate oneM2M “live"
http://www.onem2m.org/Showcase
Followed by the ETSI M2M workshop
© 2014 oneM2M30-Oct-14 24
Thank You!
Q&A

More Related Content

What's hot

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?Bhavin Shah
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.pptZaheer720515
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Ahmed Banafa
 

What's hot (20)

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Cs8791 cloud computing introduction new
Cs8791  cloud computing introduction newCs8791  cloud computing introduction new
Cs8791 cloud computing introduction new
 
Network Security
Network SecurityNetwork Security
Network Security
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Soc
SocSoc
Soc
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
What is Penetration & Penetration test ?
What is Penetration & Penetration test ?What is Penetration & Penetration test ?
What is Penetration & Penetration test ?
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Firewall
FirewallFirewall
Firewall
 
introduction to Botnet
introduction to Botnetintroduction to Botnet
introduction to Botnet
 
Basic Concepts of information security.ppt
Basic Concepts of information security.pptBasic Concepts of information security.ppt
Basic Concepts of information security.ppt
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?Why IoT needs Fog Computing ?
Why IoT needs Fog Computing ?
 
Firewall Basing
Firewall BasingFirewall Basing
Firewall Basing
 

Viewers also liked

oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and securityJongseok Choi
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...AllSeen Alliance
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...Open Mobile Alliance
 

Viewers also liked (6)

oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and security
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and Semantics
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
 
How to build oneM2M application solution based on open source
How to build oneM2M application solution based on open sourceHow to build oneM2M application solution based on open source
How to build oneM2M application solution based on open source
 

Similar to oneM2M - taking a look inside

OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityAALForum
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsNicolas Damour
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxSahanaMk2
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Infrastructure Facility
 
oneM2M – Open standard enables interoperability for IoT
oneM2M  – Open standard enables interoperability for IoToneM2M  – Open standard enables interoperability for IoT
oneM2M – Open standard enables interoperability for IoToneM2M
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership ProjectNicolas Damour
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer EvolutiononeM2M
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machineCisco Canada
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Real-Time Innovations (RTI)
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computingTarek Nader
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network ReadinessrAVe [PUBS]
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssuranceSteve Bowker
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE
 

Similar to oneM2M - taking a look inside (20)

OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform Interoperability
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery Platforms
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptx
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
 
oneM2M – Open standard enables interoperability for IoT
oneM2M  – Open standard enables interoperability for IoToneM2M  – Open standard enables interoperability for IoT
oneM2M – Open standard enables interoperability for IoT
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacy
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership Project
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computing
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network Readiness
 
Notes
NotesNotes
Notes
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service Assurance
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

oneM2M - taking a look inside

  • 1. © 2014 oneM2M© 2014 oneM2M Nicolas Damour Senior Manager for Business and Innovation Development, Sierra Wireless ndamour@sierrawireless.com oneM2M www.oneM2M.org TAKING A LOOK INSIDE
  • 2. © 2014 oneM2M30-Oct-14 2 Agenda • The Partnership Project • The Common Service Layer • The Technical Reports and Specifications • Use Cases and Requirements • Architecture and Information Modelling • Communication Protocols • Security • Device Management & Interworking with OMA/BBF • Interworking with 3GPP/3GPP2 and with AllJoyn
  • 3. © 2014 oneM2M30-Oct-14 3 Over 200 member organizations in oneM2M The Partnership Project
  • 4. © 2014 oneM2M30-Oct-14 4 Purpose To specify and promote an M2M Common Service Layer Work Six physical 1-week meetings per year About 5 conference calls per week between the meetings 200+ documents produced and discussed at each meeting 3800 docs in 2013 4200 docs in 2014 so far Deliverables Technical Reports and Technical Specifications Purpose, Work & Deliverables
  • 5. © 2014 oneM2M30-Oct-14 5 Home EnergyAutomotive Health Automotive Application Health Application Energy Application Home Application The Common Service Layer
  • 6. © 2014 oneM2M30-Oct-14 6 Home Energy HealthAutomotive Automotive Application Health Application Energy Application Home Application Communication Networks The Common Service Layer
  • 7. © 2014 oneM2M30-Oct-14 7 Home Energy HealthAutomotive Communication Devices & Hardware Communication Technologies & Protocols Automotive Application Health Application Energy Application Home Application Common Service Layer Common functions applicable to different application domains Communication Networks The Common Service Layer
  • 8. © 2014 oneM2M30-Oct-14 8 Registration Group Management SecurityDiscovery Data Management & Repository Application & Service Management Device Management Subscription & Notification Communication Management Service Charging & Accounting Location Network Service Exposure Common Service Functions
  • 9. © 2014 oneM2M30-Oct-14 9 Architecture Analysis 1 TR-0002 (WI-0002) Architecture Analysis 2 TR-0003 (WI-0002) Use Cases TR-0001 (WI-0001) Protocol Analysis TR-0009 (WI-0008) Security Analysis TR-0008 (WI-0007) Abstraction & Semantics TR-0007 (WI-0005) Study of Mgt Capab. Enablnt TR-0006 (WI-0004) E2E Security & Group Authent. TR-0012 (WI-0011) Use Cases v2 TR-0011 (WI-0014) Roles & Focus Areas TR-0005 (WI-0003) Technical Reports ftp://ftp.onem2m.org/Work Programme/
  • 10. © 2014 oneM2M30-Oct-14 10 Service Components TS-0007 (WI-0011) Security Solutions TS-0003 (WI-0007) MQTT Protocol Binding TS-0010 (WI-0014) Service Layer Core Protocols TS-0004 (WI-0009) Functional Architecture TS-0001 (WI-0002) Definitions & Acronyms TS-0011 (WI-0003) Requirements TS-0002 (WI-0001) Technical Specifications ftp://ftp.onem2m.org/Work Programme/ Management Enablnt - BBF TS-0006 (WI-0010) Management Enablnt - OMA TS-0005 (WI-0010) CoAP Protocol Binding TS-0008 (WI-0012) HTTP Protocol Binding TS-0009 (WI-0013)
  • 11. © 2014 oneM2M30-Oct-14 11 Use Cases & Requirements Public ServicesEnterprise HealthcareEnergy TransportationOtherResidential USE CASES REQUIREMENTS TS-0003
  • 12. © 2014 oneM2M30-Oct-14 12 Patient E-Health Web-application Medicalized support M2M Platform Blood Pressure Meter Scales Bluetooth Smart Network Tech support Application Doctor Cellular Network Pill dispenser with integrated comm. gateway Example Scenario – E-Health
  • 13. © 2014 oneM2M30-Oct-14 13 Underlying Network Underlying Network AE NSE AE NSE NSENSE Application Service Node Middle Node Infrastructure Node Application Layer Network Layer Architecture AE Application Entity Provides application logic for the end-to-end M2M solutions Network Services Entity Provides services to the CSEs besides the pure data transport Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
  • 14. © 2014 oneM2M30-Oct-14 14 Underlying Network Underlying Network CSE AE NSE CSE AE NSE CSE AE NSENSE Application Service Node Middle Node Infrastructure Node Application Layer Service Layer Network Layer Mca Mcn Mca Mca McnMcnMcnMcc Mcc Reference Point One or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers) Common Services Entity Provides the set of "service functions" that are common to the M2M environments Application Entity Provides application logic for the end-to-end M2M solutions Network Services Entity Provides services to the CSEs besides the pure data transport Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device Architecture CSE Mcc’ Inf. Node
  • 15. © 2014 oneM2M30-Oct-14 15 Resource-based information model • Information is stored in the system as Resources • A given Resource can be identified with a Uniform Resource Identifier • A given Resource is of one of the defined Resource Types • The Resource Type determines the semantics of the information in the Resource • Resources can be Created, Read, Updated or Deleted to manipulate the information • Resources are organized in a tree-like structure and connected by links • Links either as the tree hierarchy or to another part or the tree Information Modelling
  • 16. © 2014 oneM2M30-Oct-14 16 Defined resource types • The System (nodes, CSEs, AEs…): node, CSEBase, AE, mgmtObj… • M2M Service subscriptions: m2mServiceSubscriptionProfile… • Security: accessControlPolicy… • Entity groups and memberships: group, members… • Application data: container, contentInstance… • Information dispatch and flows: subscription, delivery, request, schedule… • Location services: locationPolicy… • Service charging & accounting: statsConfig, eventConfig, statsCollect… Defined communication schemes • Direct communication and subscriptions/notifications • Synchronous (blocking or non-blocking with regular polling) communications • Asynchronous (non-blocking, with callback) communications Resource Types & Flows
  • 17. © 2014 oneM2M30-Oct-14 17 Communication Protocols Reuse IP-based existing protocols Service Layer Core Protocols TS-0004 CoAP Binding TS-0008 MQTT Binding TS-0010 HTTP Binding TS-0009 XML or JSON Content serialization HTTP Example REQUEST GET http://provider.net/home/temperature HTTP/1.1 Host: provider.net From: //provider.net/CSE-1234/WeatherApp42 X-M2M-RI: 56398096 Accept: application/onem2m-resource+json RESPONSE HTTP/1.1 200 OK X-M2M-RI: 56398096 Content-Type: application/onem2m-resource+json Content-Length: 107 {"typeOfContent":"application/json", "encoding":1, "content": "{'timestamp':1413405177000,'value':25.32}" }
  • 18. © 2014 oneM2M30-Oct-14 18 Enrolment Provisioning/Configuration of the M2M System (Devices, Applications…) Secure communications Protocols (TLS/DTLS), credentials and authentication (PSK/PKI/MAF) Access Control Defined in accessControlPolicy resources Which SUBJECT can perform which ACTIONS on which OBJECT under which CIRCUMSTANCES More details in the oneM2M webinar#3 November 14th 2014 Security Reuse existing mechanisms Security Solutions TS-0003
  • 19. © 2014 oneM2M30-Oct-14 19 oneM2M Domain DM Domain More details in the oneM2M webinar#4 November 27th 2014 Interworking – OMA & BBF Reuse existing Device Management technologies Application Entity IN-CSE Mca OMA DM 2.0OMA DM 1.3 OMA LWM2M BBF TR-069 BBF Server BBF CPE BBF Device DM Server DM Client
  • 20. © 2014 oneM2M30-Oct-14 20 Interworking – 3GPP/3GPP2 AE (App Server) (M2M App) MTC/M2M IWF GGSN P-GW S-GW MSC MME SGSN PDSNRadio Access Network IN-CSE (SCS) (M2M Srv) NSE (UE) ASN-CSE AE 3GPP MTC / 3GPP2 M2M Architecture Models
  • 21. © 2014 oneM2M30-Oct-14 21 FridgeVacuum Vital Checker Thermostat TV Home G/W TV Vital Checker Fridge Server Application in the Smartphone Hospital Application Smartphone AllJoyn oneM2M Network Architecture Peer-to-Peer in LAN Server-to-Client in WAN API Style RPC(RMI) API Resource-based API Discovery Style Proactive Discovery Passive Discovery Interworking – AllJoyn
  • 22. © 2014 oneM2M30-Oct-14 22 Join us for the next webinar 14 November 2014 at 1PM AEDT = 2AM UTC Facing the Challenges of M2M Security and Privacy by Philip Hawkes Principal Engineer at Qualcomm Incorporated http://www.onem2m.org/btchannel.cfm
  • 23. © 2014 oneM2M30-Oct-14 23 Join us at the oneM2M showcase event 9 December 2014, Sophia-Antipolis, France (free of charge, but online registration is required) • OneM2M project partners, rationale and goals • OneM2M Service Layer Specification release • Showcase demos that demonstrate oneM2M “live" http://www.onem2m.org/Showcase Followed by the ETSI M2M workshop
  • 24. © 2014 oneM2M30-Oct-14 24 Thank You! Q&A