SlideShare a Scribd company logo
OMA LwM2M
Architectural model and system specification
briefly
Hamdamboy Urunov, Ph.D. student.
Special Communication Research Center.,
Kookmin University
Seoul, South Korea
1
Contents
1. LwM2M related standard activity
2. Specification and architectural model
3. TEST FEST 2018 proceeding result
4. Implementation solutions
2
1. LwM2M related standard activity (1/)
IETF Applications OMA LwM2M oneM2M ZigBee & WiSUN
Wed, RESTFul
(HTTP, CoAP)
RESTFul/CoAP
(Smart Objects)
Application Entity (AE)
(Tracking, Metering, R
emote)
(HAN & LAN)
Home & Large
Internet resource : https://connect2.io/open-mobile-alliance-lightweightm2m-oma-lwm2m/
• Until recently, there was no industry standard for the remote management of M2M or IoT devices.
• This contrasts with the established industry standards that cater for the remote management
requirements of fixed network broadband DSL routers (TR-69), enterprise IP networks (SNMP) and
mobile phones (OMA DM).
http://www.openmobilealliance.org/wp/OMA Specifications :
3
1. LwM2M related standard activity (2/)
Physical Layer OMA LwM2M Client Dedicated Node Devices
IPv6 Protocol
Transport & Security
(OMA Web Objects) (ADN)
Sensors / Actuators
ZigBee
WiSUN
Communication Network Networks Services Network
Connectivity &
Security
Interworking
(Cellular Capacity)
Device Triggering, QoS Sec.
(NSE)
Sub-GHz.
802.15.4g/e
IETF Processing OMA LwM2M Server Common Services Large Area
Data Centers
(Servers, Cloud)
Device Management Data & Device Management
(Directory, Server, Security) (CSE)
6LoWPAN
Stack
IETF Applications OMA LwM2M oneM2M ZigBee & WiSUN
Wed, RESTFul
(HTTP, CoAP)
RESTFul/CoAP
(Smart Objects)
Application Entity (AE) (HAN & LAN)
(Tracking, Metering, Remote) Home & Large
4
2. Specification and architectural model (1/)
• OMA LWM2M is a good fit for ‘Over-The-Air’ (OTA) management of IoT wireless sensor platforms because it utili
zes a simpler protocol and COAP over UDP with a very small overhead (10s of bytes) and the device client is a l
ot smaller.
LWM2M Architecture
• Bootstrap
• Device Discovery and Registration
• Device Management and Service Enablemen
t
• Information Reporting
OMA LWM2M defines the application layer communicatio
n protocol between a server and a client.
Four logical interfaces are defined between server an
d client namely:
5
2. Specification and architectural model (2/)
LWM2M Architecture 6
What are OBJECTS and RESOURCES ?!
7
2. Specification and architectural model (3/)
OBJECTS and RESOURCES with real implementation solutions
8
2. Specification and architectural model (4/)
• The LWM2M Client resides on the device and is typically integrated as a software library or a built-in functi
on of a module or device.
• The LWM2M standard defines provisioning and bootstrapping fu
nctionality that allows a LWM2M Bootstrap Server to manage the
keying, access control and configuration of a device to enroll
with a LWM2M Server.
BOOTSTRAPPING
9
2. Specification and architectural model (5/)
• CoAP messages are encoded in a simple binary format, allowing this functionality starting with just a 4-byte overhead.
LWM2M defines the UDP Binding with CoAP as mandatory whereas the SMS Binding with CoAP is optional.
CoAP
• coaps://leshan.eclipse.org:5683
• Port number: 5683
10
2. Specification and architectural model (6/)
• LWM2M includes security to secure communications between client and server using Datagram Transport
Layer Security (DTLS). DTLS is used to provide a secure channel between the LWM2M Server and the LWM2
M Client for all the messages interchanged.
Security model and DTLS
• coaps://leshan.eclipse.org:5684
• Port number: 5684
11
2. Specification and architectural model (7/)
• Resource is defined to have one or more operations that it supports.
• A Resource MAY consist of multiple instances called a Resource Instance as defined in the Object specification
• The LWM2M Server can send “Write” operation with JSON or TLV format to Resource to instantiate a Resource Instance.
• The LWM2M Client also has the capability to instantiate a Resource Instance..
12
Test Fests 2018
July, Seoul
https://www.omaspecworks.org/events/testfests/event/v4xr/ 13
3. TEST FEST 2018 proceeding result (1/)
OMA TestFests are designed to achieve a number of goals, including:
• Ensuring the quality of OMA SpecWorks specifications
• Enabling vendors to verify and test the interoperability of their product implementations in a multi-vendor
environment
• Provide a peer-to-peer networking environment for participants
TestFests
14
3. TEST FEST 2018 proceeding result (2/)
1. Ensuring the quality of OMA SpecWorks specifications
Internet source : http://openmobilealliance.org/release/LightweightM2M/V1_1-20180612-C/OMA-TS-LightweightM2M_Transport-V1_1-20180612-C.pdf 15
3. TEST FEST 2018 proceeding result (3/)
Internet source : http://openmobilealliance.org/release/LightweightM2M/V1_1-20180612-C/OMA-TS-LightweightM2M_Transport-V1_1-20180612-C.pdf
The Protocol Stack of the LwM2M Enabler
• This specification defines the transport bindings for the LwM2M messaging protocol used between
LwM2M Clients, LwM2M Bootstrap Servers and LwM2M Servers
• In particular, this specification defines the following transport bindings: CoAP over UDP CoAP over DTLS
(over UDP) CoAP over SMS CoAP over DTLS over SMS CoAP over TCP CoAP over TLS (over TCP)
CoAP over Non-IP (includes 3GPP CIoT and LoRaWAN)
More details (see Page 11)
16
3. TEST FEST 2018 proceeding result (4/)
Internet source : http://openmobilealliance.org/release/LightweightM2M/V1_1-20180612-C/OMA-TS-LightweightM2M_Transport-V1_1-20180612-C.pdf
More details (see Page 34)
Bootstrap Interface
Example of Client initiated Bootstrap exchange
• The client bootstrap operation is performed by sending a
CoAP POST request to the LwM2M Bootstrap-Server at
the "/bs" path including the Endpoint Client Name as a
query string parameter.
• When the bootstrap operation is terminated the Bootstrap
-Server MUST send a Bootstrap-Finish indication.
17
3. TEST FEST 2018 proceeding result (5/)
https://github.com/eclipse/leshanEclipse Leshan™ is an OMA Lightweight M2M server and client Java implementation.
Enabling vendors to verify and test the interoperability of their product implementations in a multi-
vendor environment
Product implementations
server client
CoAP, etc.
Open source
Your source code
18
3. TEST FEST 2018 proceeding result (6/)
https://github.com/eclipse/leshan
Test Server Sandbox
Basically start to installing process
•The lwm2m server at https://leshan.eclipse.org/
(coap://leshan.eclipse.org:5683 and coaps://leshan.eclipse.org:5684)
• The bootstrap server at https://leshan.eclipse.org/bs/
(coap://leshan.eclipse.org:5783 and coaps://leshan.eclipse.org:5784)
19
3. TEST FEST 2018 proceeding result (7/)
https://github.com/eclipse/leshan
(Automatic deployment of master branch)
Result of client connection to server
20
3. TEST FEST 2018 proceeding result (8/)
https://github.com/eclipse/leshan
Test Leshan Demos locally
Get and run the last binary of our demo server :
wget https://hudson.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-server-demo.jar java -jar ./leshan-server-demo.jar
21
Implementation
• LWM2M FOTA and Data Demonstration System
https://ltd-docs.readthedocs.io/en/osf-17.10/iotfoundry/lwm2m-howto.html
• The system contains Zephyr-based IoT devices, an IoT
gateway, and a web application, Leshan, that is used as
the LWM2M server.
• With Leshan you can issue commands, query data and
perform firmware over the air (FOTA) updates on the
IoT device(s).
22
Firmware over the air (FOTA)
Continue…
23
Thank You
hamdamboy.urunov@gmail.com

More Related Content

What's hot

The constrained application protocol (co ap) part 2
The constrained application protocol (co ap)  part 2The constrained application protocol (co ap)  part 2
The constrained application protocol (co ap) part 2
Hamdamboy (함담보이)
 
IBM MQ Online Tutorials
IBM MQ Online TutorialsIBM MQ Online Tutorials
IBM MQ Online Tutorials
BigClasses.com
 
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
Matt Leming
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
Matt Leming
 
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online TrainingWebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
ecorptraining2
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performance
MarkTaylorIBM
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 level
MarkTaylorIBM
 
Ibm websphere mq
Ibm websphere mqIbm websphere mq
Ibm websphere mqRakeshtoodi
 
websphere MQ training Online
websphere MQ training Onlinewebsphere MQ training Online
websphere MQ training Online
Divya Angel
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
Robert Parker
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
MarkTaylorIBM
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and Tomorrow
Prolifics
 
IBM Web Shpere MQ ppt
IBM Web Shpere MQ pptIBM Web Shpere MQ ppt
IBM Web Shpere MQ ppt
Parth Shah
 
IBM MQ Series For ZOS
IBM MQ Series For ZOSIBM MQ Series For ZOS
IBM MQ Series For ZOS
Srinimf-Slides
 
Virtual migration cloud
Virtual migration cloudVirtual migration cloud
Virtual migration cloud
Shalini Toluchuri
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
Ahmar Hashmi
 
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQAn Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
Ravi Yogesh
 
IBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityIBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - Security
Damon Cross
 

What's hot (20)

The constrained application protocol (co ap) part 2
The constrained application protocol (co ap)  part 2The constrained application protocol (co ap)  part 2
The constrained application protocol (co ap) part 2
 
IBM MQ Online Tutorials
IBM MQ Online TutorialsIBM MQ Online Tutorials
IBM MQ Online Tutorials
 
WebSphere MQ tutorial
WebSphere MQ tutorialWebSphere MQ tutorial
WebSphere MQ tutorial
 
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
HHM-2833: Where is My Message?: Using IBM MQ Tools to Work Out What Applicati...
 
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ... HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
HHM-3481: IBM MQ for z/OS: Enhancing Application and Messaging Connectivity ...
 
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online TrainingWebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
WebSphere Message Broker Training | IBM WebSphere Message Broker Online Training
 
IBM MQ - better application performance
IBM MQ - better application performanceIBM MQ - better application performance
IBM MQ - better application performance
 
WebSphere MQ introduction
WebSphere MQ introductionWebSphere MQ introduction
WebSphere MQ introduction
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 level
 
Ibm websphere mq
Ibm websphere mqIbm websphere mq
Ibm websphere mq
 
websphere MQ training Online
websphere MQ training Onlinewebsphere MQ training Online
websphere MQ training Online
 
3429 How to transform your messaging environment to a secure messaging envi...
3429   How to transform your messaging environment to a secure messaging envi...3429   How to transform your messaging environment to a secure messaging envi...
3429 How to transform your messaging environment to a secure messaging envi...
 
What's new in IBM MQ Messaging
What's new in IBM MQ MessagingWhat's new in IBM MQ Messaging
What's new in IBM MQ Messaging
 
MQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and TomorrowMQ Infrastructure of Today and Tomorrow
MQ Infrastructure of Today and Tomorrow
 
IBM Web Shpere MQ ppt
IBM Web Shpere MQ pptIBM Web Shpere MQ ppt
IBM Web Shpere MQ ppt
 
IBM MQ Series For ZOS
IBM MQ Series For ZOSIBM MQ Series For ZOS
IBM MQ Series For ZOS
 
Virtual migration cloud
Virtual migration cloudVirtual migration cloud
Virtual migration cloud
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQAn Introduction to the Message Queuing Technology & IBM WebSphere MQ
An Introduction to the Message Queuing Technology & IBM WebSphere MQ
 
IBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - SecurityIBM WebSphere MQ for z/OS - Security
IBM WebSphere MQ for z/OS - Security
 

Similar to OMA Lightweight M2M

Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
Hannes Tschofenig
 
OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
Open Mobile Alliance
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
Leo Dumov
 
Cloud-based performance testing
Cloud-based performance testingCloud-based performance testing
Cloud-based performance testing
abhinavm
 
Test Strategy For Future Cloud Architecture
Test Strategy For Future Cloud ArchitectureTest Strategy For Future Cloud Architecture
Test Strategy For Future Cloud Architecture
MaheshShri1
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
WSO2
 
Service oriented online architecture using mule
Service oriented online architecture using muleService oriented online architecture using mule
Service oriented online architecture using mule
mdfkhan625
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
WSO2
 
Ipso smart object seminar
Ipso smart object seminarIpso smart object seminar
Ipso smart object seminar
Michael Koster
 
6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF
Dr Sandeep Kumar Poonia
 
OMG CORBA Component Model tutorial
OMG CORBA Component Model tutorialOMG CORBA Component Model tutorial
OMG CORBA Component Model tutorial
Johnny Willemsen
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration system
Conference Papers
 
WS-VLAM workflow
WS-VLAM workflowWS-VLAM workflow
WS-VLAM workflowguest6295d0
 
Cloud compiler - Minor Project by students of CBPGEC
Cloud compiler - Minor Project by students of CBPGEC  Cloud compiler - Minor Project by students of CBPGEC
Cloud compiler - Minor Project by students of CBPGEC
vipin kumar
 
Monitoring in Big Data Platform - Albert Lewandowski, GetInData
Monitoring in Big Data Platform - Albert Lewandowski, GetInDataMonitoring in Big Data Platform - Albert Lewandowski, GetInData
Monitoring in Big Data Platform - Albert Lewandowski, GetInData
GetInData
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipso
Michael Koster
 
OMA Developer Tool Kit - Mobile World Congress
OMA Developer Tool Kit - Mobile World CongressOMA Developer Tool Kit - Mobile World Congress
OMA Developer Tool Kit - Mobile World Congress
Open Mobile Alliance
 
IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...
IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...
IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...
Peter Broadhurst
 
Central Office ReArchitected as a Data Center
Central Office ReArchitected  as a Data CenterCentral Office ReArchitected  as a Data Center
Central Office ReArchitected as a Data Center
Meng-Ze Lee
 

Similar to OMA Lightweight M2M (20)

Device Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2MDevice Management with OMA Lightweight M2M
Device Management with OMA Lightweight M2M
 
OMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACEOMA LWM2M Tutorial by ARM to IETF ACE
OMA LWM2M Tutorial by ARM to IETF ACE
 
Movimento Management Protocols
Movimento Management ProtocolsMovimento Management Protocols
Movimento Management Protocols
 
Cloud-based performance testing
Cloud-based performance testingCloud-based performance testing
Cloud-based performance testing
 
Test Strategy For Future Cloud Architecture
Test Strategy For Future Cloud ArchitectureTest Strategy For Future Cloud Architecture
Test Strategy For Future Cloud Architecture
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
 
Service oriented online architecture using mule
Service oriented online architecture using muleService oriented online architecture using mule
Service oriented online architecture using mule
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
 
Ipso smart object seminar
Ipso smart object seminarIpso smart object seminar
Ipso smart object seminar
 
6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF6. The grid-COMPUTING OGSA and WSRF
6. The grid-COMPUTING OGSA and WSRF
 
OMG CORBA Component Model tutorial
OMG CORBA Component Model tutorialOMG CORBA Component Model tutorial
OMG CORBA Component Model tutorial
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration system
 
Cloud APIs Overview Tucker
Cloud APIs Overview   TuckerCloud APIs Overview   Tucker
Cloud APIs Overview Tucker
 
WS-VLAM workflow
WS-VLAM workflowWS-VLAM workflow
WS-VLAM workflow
 
Cloud compiler - Minor Project by students of CBPGEC
Cloud compiler - Minor Project by students of CBPGEC  Cloud compiler - Minor Project by students of CBPGEC
Cloud compiler - Minor Project by students of CBPGEC
 
Monitoring in Big Data Platform - Albert Lewandowski, GetInData
Monitoring in Big Data Platform - Albert Lewandowski, GetInDataMonitoring in Big Data Platform - Albert Lewandowski, GetInData
Monitoring in Big Data Platform - Albert Lewandowski, GetInData
 
Ietf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipsoIetf91 ad hoc-coap-lwm2m-ipso
Ietf91 ad hoc-coap-lwm2m-ipso
 
OMA Developer Tool Kit - Mobile World Congress
OMA Developer Tool Kit - Mobile World CongressOMA Developer Tool Kit - Mobile World Congress
OMA Developer Tool Kit - Mobile World Congress
 
IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...
IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...
IBM IMPACT 2014 - AMC-1882 Building a Scalable & Continuously Available IBM M...
 
Central Office ReArchitected as a Data Center
Central Office ReArchitected  as a Data CenterCentral Office ReArchitected  as a Data Center
Central Office ReArchitected as a Data Center
 

More from Hamdamboy (함담보이)

Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1
Hamdamboy (함담보이)
 
The constrained application protocol (co ap) part 3
The constrained application protocol (co ap)  part 3The constrained application protocol (co ap)  part 3
The constrained application protocol (co ap) part 3
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launchMessage queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launch
Hamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
Hamdamboy (함담보이)
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
Hamdamboy (함담보이)
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
Hamdamboy (함담보이)
 
One m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structureOne m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structure
Hamdamboy (함담보이)
 
One m2m 2. requirements
One m2m 2. requirements One m2m 2. requirements
One m2m 2. requirements
Hamdamboy (함담보이)
 
One m2m 3- managment_capability
One m2m 3- managment_capabilityOne m2m 3- managment_capability
One m2m 3- managment_capability
Hamdamboy (함담보이)
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
Hamdamboy (함담보이)
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
Hamdamboy (함담보이)
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
Hamdamboy (함담보이)
 
Internet of things
Internet of thingsInternet of things
Internet of things
Hamdamboy (함담보이)
 

More from Hamdamboy (함담보이) (16)

Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1The constrained application protocol (co ap) implementation-part4-1
The constrained application protocol (co ap) implementation-part4-1
 
The constrained application protocol (co ap) part 3
The constrained application protocol (co ap)  part 3The constrained application protocol (co ap)  part 3
The constrained application protocol (co ap) part 3
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
 
Message queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message formatMessage queuing telemetry transport (mqtt) message format
Message queuing telemetry transport (mqtt) message format
 
Message queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launchMessage queuing telemetry transport (mqtt) launch
Message queuing telemetry transport (mqtt) launch
 
Message queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parametersMessage queuing telemetry transport (mqtt) id and other type parameters
Message queuing telemetry transport (mqtt) id and other type parameters
 
007 nms smi, oid, snmp method
007 nms smi, oid, snmp method007 nms smi, oid, snmp method
007 nms smi, oid, snmp method
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
One m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structureOne m2m 4- identifier_resoruce structure
One m2m 4- identifier_resoruce structure
 
One m2m 2. requirements
One m2m 2. requirements One m2m 2. requirements
One m2m 2. requirements
 
One m2m 3- managment_capability
One m2m 3- managment_capabilityOne m2m 3- managment_capability
One m2m 3- managment_capability
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
 
The constrained application protocol (coap) part 2
The constrained application protocol (coap)  part 2The constrained application protocol (coap)  part 2
The constrained application protocol (coap) part 2
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

OMA Lightweight M2M

  • 1. OMA LwM2M Architectural model and system specification briefly Hamdamboy Urunov, Ph.D. student. Special Communication Research Center., Kookmin University Seoul, South Korea 1
  • 2. Contents 1. LwM2M related standard activity 2. Specification and architectural model 3. TEST FEST 2018 proceeding result 4. Implementation solutions 2
  • 3. 1. LwM2M related standard activity (1/) IETF Applications OMA LwM2M oneM2M ZigBee & WiSUN Wed, RESTFul (HTTP, CoAP) RESTFul/CoAP (Smart Objects) Application Entity (AE) (Tracking, Metering, R emote) (HAN & LAN) Home & Large Internet resource : https://connect2.io/open-mobile-alliance-lightweightm2m-oma-lwm2m/ • Until recently, there was no industry standard for the remote management of M2M or IoT devices. • This contrasts with the established industry standards that cater for the remote management requirements of fixed network broadband DSL routers (TR-69), enterprise IP networks (SNMP) and mobile phones (OMA DM). http://www.openmobilealliance.org/wp/OMA Specifications : 3
  • 4. 1. LwM2M related standard activity (2/) Physical Layer OMA LwM2M Client Dedicated Node Devices IPv6 Protocol Transport & Security (OMA Web Objects) (ADN) Sensors / Actuators ZigBee WiSUN Communication Network Networks Services Network Connectivity & Security Interworking (Cellular Capacity) Device Triggering, QoS Sec. (NSE) Sub-GHz. 802.15.4g/e IETF Processing OMA LwM2M Server Common Services Large Area Data Centers (Servers, Cloud) Device Management Data & Device Management (Directory, Server, Security) (CSE) 6LoWPAN Stack IETF Applications OMA LwM2M oneM2M ZigBee & WiSUN Wed, RESTFul (HTTP, CoAP) RESTFul/CoAP (Smart Objects) Application Entity (AE) (HAN & LAN) (Tracking, Metering, Remote) Home & Large 4
  • 5. 2. Specification and architectural model (1/) • OMA LWM2M is a good fit for ‘Over-The-Air’ (OTA) management of IoT wireless sensor platforms because it utili zes a simpler protocol and COAP over UDP with a very small overhead (10s of bytes) and the device client is a l ot smaller. LWM2M Architecture • Bootstrap • Device Discovery and Registration • Device Management and Service Enablemen t • Information Reporting OMA LWM2M defines the application layer communicatio n protocol between a server and a client. Four logical interfaces are defined between server an d client namely: 5
  • 6. 2. Specification and architectural model (2/) LWM2M Architecture 6
  • 7. What are OBJECTS and RESOURCES ?! 7
  • 8. 2. Specification and architectural model (3/) OBJECTS and RESOURCES with real implementation solutions 8
  • 9. 2. Specification and architectural model (4/) • The LWM2M Client resides on the device and is typically integrated as a software library or a built-in functi on of a module or device. • The LWM2M standard defines provisioning and bootstrapping fu nctionality that allows a LWM2M Bootstrap Server to manage the keying, access control and configuration of a device to enroll with a LWM2M Server. BOOTSTRAPPING 9
  • 10. 2. Specification and architectural model (5/) • CoAP messages are encoded in a simple binary format, allowing this functionality starting with just a 4-byte overhead. LWM2M defines the UDP Binding with CoAP as mandatory whereas the SMS Binding with CoAP is optional. CoAP • coaps://leshan.eclipse.org:5683 • Port number: 5683 10
  • 11. 2. Specification and architectural model (6/) • LWM2M includes security to secure communications between client and server using Datagram Transport Layer Security (DTLS). DTLS is used to provide a secure channel between the LWM2M Server and the LWM2 M Client for all the messages interchanged. Security model and DTLS • coaps://leshan.eclipse.org:5684 • Port number: 5684 11
  • 12. 2. Specification and architectural model (7/) • Resource is defined to have one or more operations that it supports. • A Resource MAY consist of multiple instances called a Resource Instance as defined in the Object specification • The LWM2M Server can send “Write” operation with JSON or TLV format to Resource to instantiate a Resource Instance. • The LWM2M Client also has the capability to instantiate a Resource Instance.. 12
  • 13. Test Fests 2018 July, Seoul https://www.omaspecworks.org/events/testfests/event/v4xr/ 13
  • 14. 3. TEST FEST 2018 proceeding result (1/) OMA TestFests are designed to achieve a number of goals, including: • Ensuring the quality of OMA SpecWorks specifications • Enabling vendors to verify and test the interoperability of their product implementations in a multi-vendor environment • Provide a peer-to-peer networking environment for participants TestFests 14
  • 15. 3. TEST FEST 2018 proceeding result (2/) 1. Ensuring the quality of OMA SpecWorks specifications Internet source : http://openmobilealliance.org/release/LightweightM2M/V1_1-20180612-C/OMA-TS-LightweightM2M_Transport-V1_1-20180612-C.pdf 15
  • 16. 3. TEST FEST 2018 proceeding result (3/) Internet source : http://openmobilealliance.org/release/LightweightM2M/V1_1-20180612-C/OMA-TS-LightweightM2M_Transport-V1_1-20180612-C.pdf The Protocol Stack of the LwM2M Enabler • This specification defines the transport bindings for the LwM2M messaging protocol used between LwM2M Clients, LwM2M Bootstrap Servers and LwM2M Servers • In particular, this specification defines the following transport bindings: CoAP over UDP CoAP over DTLS (over UDP) CoAP over SMS CoAP over DTLS over SMS CoAP over TCP CoAP over TLS (over TCP) CoAP over Non-IP (includes 3GPP CIoT and LoRaWAN) More details (see Page 11) 16
  • 17. 3. TEST FEST 2018 proceeding result (4/) Internet source : http://openmobilealliance.org/release/LightweightM2M/V1_1-20180612-C/OMA-TS-LightweightM2M_Transport-V1_1-20180612-C.pdf More details (see Page 34) Bootstrap Interface Example of Client initiated Bootstrap exchange • The client bootstrap operation is performed by sending a CoAP POST request to the LwM2M Bootstrap-Server at the "/bs" path including the Endpoint Client Name as a query string parameter. • When the bootstrap operation is terminated the Bootstrap -Server MUST send a Bootstrap-Finish indication. 17
  • 18. 3. TEST FEST 2018 proceeding result (5/) https://github.com/eclipse/leshanEclipse Leshan™ is an OMA Lightweight M2M server and client Java implementation. Enabling vendors to verify and test the interoperability of their product implementations in a multi- vendor environment Product implementations server client CoAP, etc. Open source Your source code 18
  • 19. 3. TEST FEST 2018 proceeding result (6/) https://github.com/eclipse/leshan Test Server Sandbox Basically start to installing process •The lwm2m server at https://leshan.eclipse.org/ (coap://leshan.eclipse.org:5683 and coaps://leshan.eclipse.org:5684) • The bootstrap server at https://leshan.eclipse.org/bs/ (coap://leshan.eclipse.org:5783 and coaps://leshan.eclipse.org:5784) 19
  • 20. 3. TEST FEST 2018 proceeding result (7/) https://github.com/eclipse/leshan (Automatic deployment of master branch) Result of client connection to server 20
  • 21. 3. TEST FEST 2018 proceeding result (8/) https://github.com/eclipse/leshan Test Leshan Demos locally Get and run the last binary of our demo server : wget https://hudson.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-server-demo.jar java -jar ./leshan-server-demo.jar 21
  • 22. Implementation • LWM2M FOTA and Data Demonstration System https://ltd-docs.readthedocs.io/en/osf-17.10/iotfoundry/lwm2m-howto.html • The system contains Zephyr-based IoT devices, an IoT gateway, and a web application, Leshan, that is used as the LWM2M server. • With Leshan you can issue commands, query data and perform firmware over the air (FOTA) updates on the IoT device(s). 22
  • 23. Firmware over the air (FOTA) Continue… 23