The document discusses OneM2M, an organization that is developing technical specifications for a common M2M Service Layer that can connect various devices worldwide. It describes OneM2M's founding partners and provides an overview of the functions and architecture proposed for the common M2M service layer, including device management, policy/resource management, API services, and data/metadata management. It also outlines the structure and resources in the service capability layer, such as the sclBase resource and its child resources like scls, applications, containers and groups.
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
The Slides include a brief description of what is a Wireless LAN, some benefits over a wired network connection, where is WLAN mainly applied, how is the infrastructure of a Wireless LAN, the architecture of an ad-hoc Network, the range & throughput of the wireless ethernet and how to secure the wireless LAN.
Here you will learn:
How to Connect two or more devices to share data and information.
What is OSI Model?
Introduction to OSI Model
What is Physical Layer?
Devices used Physical Layer
What is Signal?
Types of Signals?
Analog Signals
Digital SIgnals
What is Transmission Medium?
What Is Switch in Networking?
Networking 7 Layers.
.
Please like and comments your Question and suggestion?
Learn Advanced Networking Course At PSK Technologies It Company Nagpur Download free syllabus :-https://www.pskitservices.com/free-internship-company-in-nagpur/
The Slides include a brief description of what is a Wireless LAN, some benefits over a wired network connection, where is WLAN mainly applied, how is the infrastructure of a Wireless LAN, the architecture of an ad-hoc Network, the range & throughput of the wireless ethernet and how to secure the wireless LAN.
Here you will learn:
How to Connect two or more devices to share data and information.
What is OSI Model?
Introduction to OSI Model
What is Physical Layer?
Devices used Physical Layer
What is Signal?
Types of Signals?
Analog Signals
Digital SIgnals
What is Transmission Medium?
What Is Switch in Networking?
Networking 7 Layers.
.
Please like and comments your Question and suggestion?
Machine to Machine (M2M) Communication is an integral part of IoT. While it's being widely discussed today, this subject has over a half a century history of evolution. This session is about the how M2M communication evolved, method & techniques, applications and the opportunities made possible.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
5G Network Architecture, Design and Optimisation3G4G
Presented by Prof. Andy Sutton, Principal Network Architect, Architecture & Strategy, TSO, BT at The IET '5G - State of Play' conference on 24th January 2018
*** SHARED WITH PERMISSION ***
Machine to Machine (M2M) Communication is an integral part of IoT. While it's being widely discussed today, this subject has over a half a century history of evolution. This session is about the how M2M communication evolved, method & techniques, applications and the opportunities made possible.
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
5G Network Architecture, Design and Optimisation3G4G
Presented by Prof. Andy Sutton, Principal Network Architect, Architecture & Strategy, TSO, BT at The IET '5G - State of Play' conference on 24th January 2018
*** SHARED WITH PERMISSION ***
OMA Seminar/Webinar, October 27, 2016, "How Developers Can Get the Most Out of IoT Standards and Tools" - Presentation #3 from Nicolas Damour, Senior Manager, Business and Innovation, Sierra Wireless
"Combining LightweightM2M and oneM2M for Developers"
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...Open Mobile Alliance
Slides from the OMA and oneM2M IoT Seminar on January 21, 2016
Speaker 1:
Dr. Omar Elloumi, Alcatel-Lucent Bell Labs (ATIS), Technical Plenary Chair
Presentation Title: “oneM2M interworking and semantics framework”
Dr. Omar Elloumi is a Head of M2M and Smart Grid standards within Alcatel-Lucent CTO. He is the recently elected chair of oneM2M Technical Plenary after having led the oneM2M Architecture group delivering the first release of specifications.
Omar joined Alcatel-Lucent in 1999 and held several positions including research, strategy and system architecture. He holds a Ph. D. degree in computer science and served on the ATM Forum and IPSphere Forum Board of Directors. Omar Elloumi is coeditor of books on M2M communications and Internet of Things published in 2012. He is also involved in program committees of several international conferences on M2M and IoT.
SysDB — The system management and inventory collection serviceSysDB Project
“System Datebase” (SysDB, https://sysdb.io/) is an Open Source daemon which aggregates system management and inventory information and stores them in a central, graph-like database. All information is (continuously) retrieved from other hardware or software systems (inventory services, monitoring services, etc. like Icinga, Puppet, collectd) and may be queried through a generic interface. SysDB focuses on meta-data like host-attributes, services and their attributes, and lists of available metrics and provides means to query data from back-end data-stores (e.g. time-series data). This way, all important information about your systems is accessible from a central location allowing for use-cases such as central dashboards, cross-link monitoring or inventory information, identify missing pieces in your system configuration, advanced monitoring configuration, and much more.
This talk provides an overview over SysDB and its features as well as sample use-cases. The project is still in an early development stage but already usable. The talk also covers future directions and further integration with existing services.
The NECOS project addresses the limitations of current cloud computing infrastructures to respond to the demand of new services, as presented in two use-cases, that will drive the whole execution of the project.
The NECOS platform will be based on state of the art open software platforms, which will be carefully selected, rather than start from scratch. This baseline platform will be enhanced with the management and orchestration algorithms and the APIs that will constitute the research activity of the project. Finally, the NECOS platform will be validated, in the context of the two proposed use cases, using the 5TONIC and FIBRE testing frameworks.
Abstract. Enterprise adoption of AI/ML services has significantly accelerated in the last few years. However, the majority of ML models are still developed with the goal of solving a single task, e.g., predictiction, classification. In this talk, Debmalya Biswas will present the emerging paradigm of Compositional AI, also known as, Compositional Learning. Compositional AI envisions seamless composition of existing AI/ML services, to provide a new (composite) AI/ML service, capable of addressing complex multi-domain use-cases. In an enterprise context, this enables reuse, agility, and efficiency in development and maintenance efforts.
This presentation gives details on technologies and approaches towards exploiting Linked Data by building LD applications. In particular, it gives an overview of popular existing applications and introduces the main technologies that support implementation and development. Furthermore, it illustrates how data exposed through common Web APIs can be integrated with Linked Data in order to create mashups.
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
A SURVEY ON RESOURCE ALLOCATION IN CLOUD COMPUTINGijccsa
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
A Survey on Resource Allocation in Cloud Computingneirew J
Cloud computing is an on-demand service resource which includes applications to data centers on a
pay-per-use basis. In order to allocate these resources properly and satisfy users’ demands, an efficient
and flexible resource allocation mechanism is needed. Due to increasing user demand, the resource
allocating process has become more challenging and difficult. One of the main focuses of research
scholars is how to develop optimal solutions for this process. In this paper, a literature review on proposed
dynamic resource allocation techniques is introduced.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
3. Main goal
The purpose and goal of oneM2M is to develop technical
specifications which address the need for a common M2M Service
Layer that can be readily embedded within various hardware and
software, and relied upon to connect the myriad of devices in the
field with M2M application servers worldwide.
3
4. OneM2M Founding Partners
• TTA (Telecommunications Technology Association) – Korea
• ARIB (Association of Radio Industries and Businesses) - Japan
• TTC (Telecommunications Technology Committee) - Japan
• CCSA (China Communications Standards Association) – China
• ATIS (Alliance for Telecommunications Industry Standards) – USA
• TIA (Telecommunications Industry Association) – USA
• ETSI (European Telecommunications Standards Institute) – Europe
4
15. The functions proposed for a Common M2M Service Layer are (1):
Device Management
• Provision/Activate (Individual and bulk) and Bootstrap
• Suspend/Resume
• Configuration Management
• Firmware/Software Management
• Inventory Management
• Diagnostics (resource information, status)
Policy & Resource Management
• Authentication and Registration (Identity Management)
• Establish communications session (Add/Delete/Modify)
• QoS/SLA for communication session
• Billing, Charging, and Rating rules
• Group Management
• Security Management (Data confidentiality, integrity, abuse prevention, privacy)
15
16. API Services
• Definition, Authentication/Authorization and Security
• Service to Device (Management, Establish/Teardown Communication Flows)
• Service to Policy/Resource Management (Rx Extensions for Group Management)
• Service to Data/Metadata Management (Storage/Retrieval)
• Service to Applications (Management, Communications Flows)
Data/Metadata Management
• Data processing and append (location, timestamp)
• Data storage/retrieval
16
The functions proposed for a Common M2M Service Layer are (2):
http://cn.openmobilealliance.org/wp-content/uploads/2012/11/Broadband-Forum-Machine-to-Machine-M2M-Solutions1.pdf
17. Functions proposed for Common M2M Service Layer
17
* ATIS (Alliance for Telecommunications Industry Solutions (USA))
User/Client
M2M service
provider
19. Functions and reference points
19
M2M functional architecture framework
mIa
Device/Gateway Domain
DA / GA
D/G M2M Node
Communication modules
dIa
NSCL
mId
MSBFMAS
Network M2M Node
Core Network Connection
Core Network A Core Network B
D/GSCL
NA
Network Domain
Figure 8.2: M2M Functional Architecture Framework
NSCL: Network Service Capabilities Layer refers to M2M Service Capabilities in the Network Domain.
GSCL: Gateway Service Capabilities Layer refers to M2M Service Capabilities in the M2M Gateway.
DSCL: Device Service Capabilities Layer refers to M2M Service Capabilities in the M2M Device.
SCL: Service Capabilities Layer refers to any of the following: NSCL, GSCL, or DSCL.
D/G SCL: refers to any of the following: DSCL, GSCL.
20. Reference points
20
Network
Domain
NA
D
DA
DSCL
dIa
mIa
d (outof scope)
D‘
DA
d
G GA
dIa
GSCL
dIa
mId
mId
Legacycase 1
Case 1
Case 2
Legacycase 2
d
D DA
dIa
DSCL
Legacycase 3 (outof scope)
mId
NSCL
NIP
DIP
(*optionally dIa)
(*dIa)
GIP
(*dIa)(outof scope)
Network
Domain
NA
mIa
NSCL
NIP
mIm
Figure 8.3: Mapping of reference points to
different deployment scenarios
Gateway (G): shall provide M2M Service
Capabilities (GSCL) that communicates to the NSCL
using the mId reference point and to DA or GA using
the dIa reference point.
Device (D): shall provide M2M Service Capability
(DSCL) that communicates to an NSCL using the
mId reference point and to DA using the dIa
reference point.
Device' (D'): shall host DA that communicates to a
GSCL using the dIa reference point. D' does not
implement ETSI M2M Service Capabilities.
mIa
The mIa reference point offers generic
and extendable mechanism for Network
Applications interactions with the
NSCL.
21. Usage of resources in a RESTful architecture
21
DA NA
DSCL NSCL
writ
e
DA NA
DSCL NSCL
notify
DA NA
DSCL NSCL
read
Figure 8.4: Simple example for use of SCL resources to exchange data
When handling resources in a RESTful architecture, there
are four basic methods - so called "verbs" - that could be
applied to resources:
CREATE: Create child resources.
RETRIEVE: Read the content of the resource.
UPDATE: Write the content of the resource.
DELETE: Delete the resource.
23. SclBase Resource
SclBase Resource
The sclBase resource shall contain all other resources of the hosting SCL.
An sclBase resource is the root of all other resources it contains.
The sclBase resource shall represented by an absolute URI.
All other resources hosted in the SCL shall also be identified by a URI.
23
24. SclBase Resource
24
subResource Description
scls Collection of <scl> resources each representing remote SCLs with which the hosting SCL is registered, or that is
registered with the hosting SCL. The collection only contains <scl> resources, representing remote SCLs.
applications Collection of <application> resources which are registered the hosting SCL represented by the <sclBase> resource.
This collection contains only <application> resources, representing local Applications.
containers Collection of <container> resources that do not have a containment relation with a specific remote entity (Application
or SCL). This means that if the entity that created a <container> in this collection is deleted, the <container> shall not
be deleted.
This collection contains local <container> resources (representing local containers created by local or remote entities).
groups Collection of <group> resources that do not have a containment relation with a specific remote entity (Application or
SCL). This means that if the entity that created a <group> in this collection is deleted, the <group> resource shall not
be deleted.
This collection contains local <group> resources (representing local groups created by local or remote entities).
accessRights Collection of <accessRight> resources that do not have a containment relation with a specific remote entity
(Application or SCL). This means that if the entity that created an <accessRight> in this collection is deleted, the
<accessRight> shall not be deleted.
This collection contains local <accessRight> resources created by local or remote entities.
subscriptions Collection containing all active subscriptions for the <sclBase> resource.
discovery Resource used for resource discovery.
27. STEP Class Library
27
Other document
http://www.eclipse.org/proposals/technology.om2m/
https://www.nist.gov/services-resources/software/step-class-library-scl
28. An example Service Capability Layer (SCL) resource tree
28
http://www.mdpi.com/1999-5903/6/2/261/htm
29. Translation of NDN names in the ETSI M2M format in a
smart home
29https://www.researchgate.net/publication/298427056_Information-Centric_Networking_for_M2M_Communications_Design_and_Deployment