SlideShare a Scribd company logo
1 of 24
Download to read offline
© 2014 oneM2M© 2014 oneM2M
Nicolas Damour
Senior Manager for Business and Innovation Development, Sierra Wireless
ndamour@sierrawireless.com
oneM2M www.oneM2M.org
TAKING A LOOK INSIDE
© 2014 oneM2M30-Oct-14 2
Agenda
• The Partnership Project
• The Common Service Layer
• The Technical Reports and Specifications
• Use Cases and Requirements
• Architecture and Information Modelling
• Communication Protocols
• Security
• Device Management & Interworking with OMA/BBF
• Interworking with 3GPP/3GPP2 and with AllJoyn
© 2014 oneM2M30-Oct-14 3
Over 200 member organizations in oneM2M
The Partnership Project
© 2014 oneM2M30-Oct-14 4
Purpose
To specify and promote an
M2M Common Service Layer
Work
Six physical 1-week meetings per year
About 5 conference calls per week between the meetings
200+ documents produced and discussed at each meeting
3800 docs in 2013 4200 docs in 2014 so far
Deliverables
Technical Reports and Technical Specifications
Purpose, Work & Deliverables
© 2014 oneM2M30-Oct-14 5
Home EnergyAutomotive Health
Automotive
Application
Health
Application
Energy
Application
Home
Application
The Common Service Layer
© 2014 oneM2M30-Oct-14 6
Home Energy HealthAutomotive
Automotive
Application
Health
Application
Energy
Application
Home
Application
Communication Networks
The Common Service Layer
© 2014 oneM2M30-Oct-14 7
Home Energy HealthAutomotive
Communication Devices & Hardware
Communication Technologies & Protocols
Automotive
Application
Health
Application
Energy
Application
Home
Application
Common Service Layer
Common functions applicable to different application domains
Communication Networks
The Common Service Layer
© 2014 oneM2M30-Oct-14 8
Registration
Group
Management
SecurityDiscovery
Data
Management &
Repository
Application &
Service
Management
Device
Management
Subscription &
Notification
Communication
Management
Service
Charging &
Accounting
Location
Network
Service
Exposure
Common Service Functions
© 2014 oneM2M30-Oct-14 9
Architecture
Analysis 1
TR-0002
(WI-0002)
Architecture
Analysis 2
TR-0003
(WI-0002)
Use
Cases
TR-0001
(WI-0001)
Protocol
Analysis
TR-0009
(WI-0008)
Security
Analysis
TR-0008
(WI-0007)
Abstraction &
Semantics
TR-0007
(WI-0005)
Study of Mgt
Capab. Enablnt
TR-0006
(WI-0004)
E2E Security &
Group Authent.
TR-0012
(WI-0011)
Use
Cases v2
TR-0011
(WI-0014)
Roles &
Focus Areas
TR-0005
(WI-0003)
Technical Reports
ftp://ftp.onem2m.org/Work Programme/
© 2014 oneM2M30-Oct-14 10
Service
Components
TS-0007
(WI-0011)
Security
Solutions
TS-0003
(WI-0007)
MQTT Protocol
Binding
TS-0010
(WI-0014)
Service Layer
Core Protocols
TS-0004
(WI-0009)
Functional
Architecture
TS-0001
(WI-0002)
Definitions
& Acronyms
TS-0011
(WI-0003)
Requirements
TS-0002
(WI-0001)
Technical Specifications
ftp://ftp.onem2m.org/Work Programme/
Management
Enablnt - BBF
TS-0006
(WI-0010)
Management
Enablnt - OMA
TS-0005
(WI-0010)
CoAP Protocol
Binding
TS-0008
(WI-0012)
HTTP Protocol
Binding
TS-0009
(WI-0013)
© 2014 oneM2M30-Oct-14 11
Use Cases & Requirements
Public ServicesEnterprise HealthcareEnergy
TransportationOtherResidential
USE CASES
REQUIREMENTS
TS-0003
© 2014 oneM2M30-Oct-14 12
Patient
E-Health
Web-application
Medicalized support
M2M Platform
Blood Pressure
Meter
Scales
Bluetooth Smart
Network
Tech support
Application
Doctor
Cellular
Network
Pill dispenser
with integrated
comm. gateway
Example Scenario – E-Health
© 2014 oneM2M30-Oct-14 13
Underlying
Network
Underlying
Network
AE
NSE
AE
NSE NSENSE
Application Service Node Middle Node Infrastructure Node
Application
Layer
Network
Layer
Architecture
AE
Application Entity Provides application logic for the end-to-end M2M solutions
Network Services Entity Provides services to the CSEs besides the pure data transport
Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
© 2014 oneM2M30-Oct-14 14
Underlying
Network
Underlying
Network
CSE
AE
NSE
CSE
AE
NSE
CSE
AE
NSENSE
Application Service Node Middle Node Infrastructure Node
Application
Layer
Service
Layer
Network
Layer
Mca
Mcn
Mca Mca
McnMcnMcnMcc Mcc
Reference Point One or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers)
Common Services Entity Provides the set of "service functions" that are common to the M2M environments
Application Entity Provides application logic for the end-to-end M2M solutions
Network Services Entity Provides services to the CSEs besides the pure data transport
Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
Architecture
CSE
Mcc’
Inf. Node
© 2014 oneM2M30-Oct-14 15
Resource-based information model
• Information is stored in the system as Resources
• A given Resource can be identified with a Uniform Resource Identifier
• A given Resource is of one of the defined Resource Types
• The Resource Type determines the semantics of the information in the Resource
• Resources can be Created, Read, Updated or Deleted to manipulate the information
• Resources are organized in a tree-like structure and connected by links
• Links either as the tree hierarchy or to another part or the tree
Information Modelling
© 2014 oneM2M30-Oct-14 16
Defined resource types
• The System (nodes, CSEs, AEs…): node, CSEBase, AE, mgmtObj…
• M2M Service subscriptions: m2mServiceSubscriptionProfile…
• Security: accessControlPolicy…
• Entity groups and memberships: group, members…
• Application data: container, contentInstance…
• Information dispatch and flows: subscription, delivery, request, schedule…
• Location services: locationPolicy…
• Service charging & accounting: statsConfig, eventConfig, statsCollect…
Defined communication schemes
• Direct communication and subscriptions/notifications
• Synchronous (blocking or non-blocking with regular polling) communications
• Asynchronous (non-blocking, with callback) communications
Resource Types & Flows
© 2014 oneM2M30-Oct-14 17
Communication Protocols
Reuse IP-based existing protocols
Service Layer
Core Protocols
TS-0004
CoAP Binding
TS-0008
MQTT Binding
TS-0010
HTTP Binding
TS-0009
XML or JSON Content serialization
HTTP Example
REQUEST
GET http://provider.net/home/temperature HTTP/1.1
Host: provider.net
From: //provider.net/CSE-1234/WeatherApp42
X-M2M-RI: 56398096
Accept: application/onem2m-resource+json
RESPONSE
HTTP/1.1 200 OK
X-M2M-RI: 56398096
Content-Type: application/onem2m-resource+json
Content-Length: 107
{"typeOfContent":"application/json",
"encoding":1,
"content": "{'timestamp':1413405177000,'value':25.32}"
}
© 2014 oneM2M30-Oct-14 18
Enrolment
Provisioning/Configuration of the M2M System (Devices, Applications…)
Secure communications
Protocols (TLS/DTLS), credentials and authentication (PSK/PKI/MAF)
Access Control
Defined in accessControlPolicy resources
Which SUBJECT can perform which ACTIONS
on which OBJECT under which CIRCUMSTANCES
More details
in the oneM2M webinar#3
November 14th 2014
Security
Reuse existing mechanisms
Security
Solutions
TS-0003
© 2014 oneM2M30-Oct-14 19
oneM2M
Domain
DM
Domain
More details
in the oneM2M webinar#4
November 27th 2014
Interworking – OMA & BBF
Reuse existing Device Management technologies
Application
Entity
IN-CSE
Mca
OMA DM 2.0OMA DM 1.3 OMA LWM2M
BBF TR-069
BBF Server
BBF CPE
BBF Device
DM Server
DM Client
© 2014 oneM2M30-Oct-14 20
Interworking – 3GPP/3GPP2
AE
(App Server)
(M2M App)
MTC/M2M
IWF
GGSN
P-GW
S-GW
MSC
MME
SGSN
PDSNRadio
Access
Network
IN-CSE
(SCS)
(M2M Srv)
NSE
(UE)
ASN-CSE
AE
3GPP MTC / 3GPP2 M2M
Architecture Models
© 2014 oneM2M30-Oct-14 21
FridgeVacuum
Vital Checker
Thermostat
TV
Home
G/W
TV
Vital
Checker Fridge
Server
Application in the
Smartphone
Hospital
Application
Smartphone
AllJoyn oneM2M
Network Architecture Peer-to-Peer in LAN Server-to-Client in WAN
API Style RPC(RMI) API Resource-based API
Discovery Style Proactive Discovery Passive Discovery
Interworking – AllJoyn
© 2014 oneM2M30-Oct-14 22
Join us for the next webinar
14 November 2014 at 1PM AEDT = 2AM UTC
Facing the Challenges
of M2M Security and Privacy
by Philip Hawkes
Principal Engineer
at Qualcomm Incorporated
http://www.onem2m.org/btchannel.cfm
© 2014 oneM2M30-Oct-14 23
Join us at the
oneM2M showcase event
9 December 2014, Sophia-Antipolis, France
(free of charge, but online registration is required)
• OneM2M project partners, rationale and goals
• OneM2M Service Layer Specification release
• Showcase demos that demonstrate oneM2M “live"
http://www.onem2m.org/Showcase
Followed by the ETSI M2M workshop
© 2014 oneM2M30-Oct-14 24
Thank You!
Q&A

More Related Content

What's hot

Micro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollersMicro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollerseProsima
 
Network slicing: A key technology for 5G and its impact on mobile virtual net...
Network slicing: A key technology for 5G and its impact on mobile virtual net...Network slicing: A key technology for 5G and its impact on mobile virtual net...
Network slicing: A key technology for 5G and its impact on mobile virtual net...Athanasios Lioumpas
 
Tutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesTutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesVinayagam D
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsAngelo Corsaro
 
Cloud Platform for IoT
Cloud Platform for IoTCloud Platform for IoT
Cloud Platform for IoTNaoto Umemori
 
WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...
WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...
WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...Antonio Marcos Alberti
 
LoRaWAN and 3GPP technologies cover all Industrial IoT use cases
LoRaWAN and 3GPP technologies cover all Industrial IoT use casesLoRaWAN and 3GPP technologies cover all Industrial IoT use cases
LoRaWAN and 3GPP technologies cover all Industrial IoT use casesErika Gelinard
 
Dna data storage
Dna data storageDna data storage
Dna data storageRavi Vaniya
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversAnkit Anand
 
IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16Mark Goldstein
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)Apigee | Google Cloud
 

What's hot (20)

Apache Servicemix
Apache ServicemixApache Servicemix
Apache Servicemix
 
Micro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollersMicro XRCE-DDS: Bringing DDS into microcontrollers
Micro XRCE-DDS: Bringing DDS into microcontrollers
 
IoT Networking Part 2
IoT Networking Part 2IoT Networking Part 2
IoT Networking Part 2
 
Network slicing: A key technology for 5G and its impact on mobile virtual net...
Network slicing: A key technology for 5G and its impact on mobile virtual net...Network slicing: A key technology for 5G and its impact on mobile virtual net...
Network slicing: A key technology for 5G and its impact on mobile virtual net...
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Iot rpl
Iot rplIot rpl
Iot rpl
 
Ppt 11 - netopeer
Ppt   11 - netopeerPpt   11 - netopeer
Ppt 11 - netopeer
 
Tutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesTutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slides
 
OMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time SystemsOMG DDS: The Data Distribution Service for Real-Time Systems
OMG DDS: The Data Distribution Service for Real-Time Systems
 
IoT transport protocols
IoT transport protocolsIoT transport protocols
IoT transport protocols
 
Cloud Platform for IoT
Cloud Platform for IoTCloud Platform for IoT
Cloud Platform for IoT
 
WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...
WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...
WIMAX – IEEE 802.16: ESTUDO DA TECNOLOGIA E REQUISTOS PARA MODELAMENTO E SIMU...
 
LoRaWAN and 3GPP technologies cover all Industrial IoT use cases
LoRaWAN and 3GPP technologies cover all Industrial IoT use casesLoRaWAN and 3GPP technologies cover all Industrial IoT use cases
LoRaWAN and 3GPP technologies cover all Industrial IoT use cases
 
Dna data storage
Dna data storageDna data storage
Dna data storage
 
One m2m
One m2mOne m2m
One m2m
 
Unit 4 -IOT5.pptx
Unit 4 -IOT5.pptxUnit 4 -IOT5.pptx
Unit 4 -IOT5.pptx
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16IEEE SusTech IoT Keynote Presentation 10/10/16
IEEE SusTech IoT Keynote Presentation 10/10/16
 
API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)API Management for Software Defined Network (SDN)
API Management for Software Defined Network (SDN)
 

Viewers also liked

oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and securityJongseok Choi
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...AllSeen Alliance
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...Open Mobile Alliance
 

Viewers also liked (6)

oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and security
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and Semantics
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
 
How to build oneM2M application solution based on open source
How to build oneM2M application solution based on open sourceHow to build oneM2M application solution based on open source
How to build oneM2M application solution based on open source
 

Similar to oneM2M - taking a look inside

OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityAALForum
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsNicolas Damour
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxSahanaMk2
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Infrastructure Facility
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership ProjectNicolas Damour
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer EvolutiononeM2M
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machineCisco Canada
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Real-Time Innovations (RTI)
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computingTarek Nader
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network ReadinessrAVe [PUBS]
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssuranceSteve Bowker
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE
 
Data-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureData-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureRick Warren
 

Similar to oneM2M - taking a look inside (20)

OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform Interoperability
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery Platforms
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptx
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacy
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership Project
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computing
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network Readiness
 
Notes
NotesNotes
Notes
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service Assurance
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 
Data-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System ArchitectureData-Centric and Message-Centric System Architecture
Data-Centric and Message-Centric System Architecture
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

oneM2M - taking a look inside

  • 1. © 2014 oneM2M© 2014 oneM2M Nicolas Damour Senior Manager for Business and Innovation Development, Sierra Wireless ndamour@sierrawireless.com oneM2M www.oneM2M.org TAKING A LOOK INSIDE
  • 2. © 2014 oneM2M30-Oct-14 2 Agenda • The Partnership Project • The Common Service Layer • The Technical Reports and Specifications • Use Cases and Requirements • Architecture and Information Modelling • Communication Protocols • Security • Device Management & Interworking with OMA/BBF • Interworking with 3GPP/3GPP2 and with AllJoyn
  • 3. © 2014 oneM2M30-Oct-14 3 Over 200 member organizations in oneM2M The Partnership Project
  • 4. © 2014 oneM2M30-Oct-14 4 Purpose To specify and promote an M2M Common Service Layer Work Six physical 1-week meetings per year About 5 conference calls per week between the meetings 200+ documents produced and discussed at each meeting 3800 docs in 2013 4200 docs in 2014 so far Deliverables Technical Reports and Technical Specifications Purpose, Work & Deliverables
  • 5. © 2014 oneM2M30-Oct-14 5 Home EnergyAutomotive Health Automotive Application Health Application Energy Application Home Application The Common Service Layer
  • 6. © 2014 oneM2M30-Oct-14 6 Home Energy HealthAutomotive Automotive Application Health Application Energy Application Home Application Communication Networks The Common Service Layer
  • 7. © 2014 oneM2M30-Oct-14 7 Home Energy HealthAutomotive Communication Devices & Hardware Communication Technologies & Protocols Automotive Application Health Application Energy Application Home Application Common Service Layer Common functions applicable to different application domains Communication Networks The Common Service Layer
  • 8. © 2014 oneM2M30-Oct-14 8 Registration Group Management SecurityDiscovery Data Management & Repository Application & Service Management Device Management Subscription & Notification Communication Management Service Charging & Accounting Location Network Service Exposure Common Service Functions
  • 9. © 2014 oneM2M30-Oct-14 9 Architecture Analysis 1 TR-0002 (WI-0002) Architecture Analysis 2 TR-0003 (WI-0002) Use Cases TR-0001 (WI-0001) Protocol Analysis TR-0009 (WI-0008) Security Analysis TR-0008 (WI-0007) Abstraction & Semantics TR-0007 (WI-0005) Study of Mgt Capab. Enablnt TR-0006 (WI-0004) E2E Security & Group Authent. TR-0012 (WI-0011) Use Cases v2 TR-0011 (WI-0014) Roles & Focus Areas TR-0005 (WI-0003) Technical Reports ftp://ftp.onem2m.org/Work Programme/
  • 10. © 2014 oneM2M30-Oct-14 10 Service Components TS-0007 (WI-0011) Security Solutions TS-0003 (WI-0007) MQTT Protocol Binding TS-0010 (WI-0014) Service Layer Core Protocols TS-0004 (WI-0009) Functional Architecture TS-0001 (WI-0002) Definitions & Acronyms TS-0011 (WI-0003) Requirements TS-0002 (WI-0001) Technical Specifications ftp://ftp.onem2m.org/Work Programme/ Management Enablnt - BBF TS-0006 (WI-0010) Management Enablnt - OMA TS-0005 (WI-0010) CoAP Protocol Binding TS-0008 (WI-0012) HTTP Protocol Binding TS-0009 (WI-0013)
  • 11. © 2014 oneM2M30-Oct-14 11 Use Cases & Requirements Public ServicesEnterprise HealthcareEnergy TransportationOtherResidential USE CASES REQUIREMENTS TS-0003
  • 12. © 2014 oneM2M30-Oct-14 12 Patient E-Health Web-application Medicalized support M2M Platform Blood Pressure Meter Scales Bluetooth Smart Network Tech support Application Doctor Cellular Network Pill dispenser with integrated comm. gateway Example Scenario – E-Health
  • 13. © 2014 oneM2M30-Oct-14 13 Underlying Network Underlying Network AE NSE AE NSE NSENSE Application Service Node Middle Node Infrastructure Node Application Layer Network Layer Architecture AE Application Entity Provides application logic for the end-to-end M2M solutions Network Services Entity Provides services to the CSEs besides the pure data transport Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
  • 14. © 2014 oneM2M30-Oct-14 14 Underlying Network Underlying Network CSE AE NSE CSE AE NSE CSE AE NSENSE Application Service Node Middle Node Infrastructure Node Application Layer Service Layer Network Layer Mca Mcn Mca Mca McnMcnMcnMcc Mcc Reference Point One or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers) Common Services Entity Provides the set of "service functions" that are common to the M2M environments Application Entity Provides application logic for the end-to-end M2M solutions Network Services Entity Provides services to the CSEs besides the pure data transport Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device Architecture CSE Mcc’ Inf. Node
  • 15. © 2014 oneM2M30-Oct-14 15 Resource-based information model • Information is stored in the system as Resources • A given Resource can be identified with a Uniform Resource Identifier • A given Resource is of one of the defined Resource Types • The Resource Type determines the semantics of the information in the Resource • Resources can be Created, Read, Updated or Deleted to manipulate the information • Resources are organized in a tree-like structure and connected by links • Links either as the tree hierarchy or to another part or the tree Information Modelling
  • 16. © 2014 oneM2M30-Oct-14 16 Defined resource types • The System (nodes, CSEs, AEs…): node, CSEBase, AE, mgmtObj… • M2M Service subscriptions: m2mServiceSubscriptionProfile… • Security: accessControlPolicy… • Entity groups and memberships: group, members… • Application data: container, contentInstance… • Information dispatch and flows: subscription, delivery, request, schedule… • Location services: locationPolicy… • Service charging & accounting: statsConfig, eventConfig, statsCollect… Defined communication schemes • Direct communication and subscriptions/notifications • Synchronous (blocking or non-blocking with regular polling) communications • Asynchronous (non-blocking, with callback) communications Resource Types & Flows
  • 17. © 2014 oneM2M30-Oct-14 17 Communication Protocols Reuse IP-based existing protocols Service Layer Core Protocols TS-0004 CoAP Binding TS-0008 MQTT Binding TS-0010 HTTP Binding TS-0009 XML or JSON Content serialization HTTP Example REQUEST GET http://provider.net/home/temperature HTTP/1.1 Host: provider.net From: //provider.net/CSE-1234/WeatherApp42 X-M2M-RI: 56398096 Accept: application/onem2m-resource+json RESPONSE HTTP/1.1 200 OK X-M2M-RI: 56398096 Content-Type: application/onem2m-resource+json Content-Length: 107 {"typeOfContent":"application/json", "encoding":1, "content": "{'timestamp':1413405177000,'value':25.32}" }
  • 18. © 2014 oneM2M30-Oct-14 18 Enrolment Provisioning/Configuration of the M2M System (Devices, Applications…) Secure communications Protocols (TLS/DTLS), credentials and authentication (PSK/PKI/MAF) Access Control Defined in accessControlPolicy resources Which SUBJECT can perform which ACTIONS on which OBJECT under which CIRCUMSTANCES More details in the oneM2M webinar#3 November 14th 2014 Security Reuse existing mechanisms Security Solutions TS-0003
  • 19. © 2014 oneM2M30-Oct-14 19 oneM2M Domain DM Domain More details in the oneM2M webinar#4 November 27th 2014 Interworking – OMA & BBF Reuse existing Device Management technologies Application Entity IN-CSE Mca OMA DM 2.0OMA DM 1.3 OMA LWM2M BBF TR-069 BBF Server BBF CPE BBF Device DM Server DM Client
  • 20. © 2014 oneM2M30-Oct-14 20 Interworking – 3GPP/3GPP2 AE (App Server) (M2M App) MTC/M2M IWF GGSN P-GW S-GW MSC MME SGSN PDSNRadio Access Network IN-CSE (SCS) (M2M Srv) NSE (UE) ASN-CSE AE 3GPP MTC / 3GPP2 M2M Architecture Models
  • 21. © 2014 oneM2M30-Oct-14 21 FridgeVacuum Vital Checker Thermostat TV Home G/W TV Vital Checker Fridge Server Application in the Smartphone Hospital Application Smartphone AllJoyn oneM2M Network Architecture Peer-to-Peer in LAN Server-to-Client in WAN API Style RPC(RMI) API Resource-based API Discovery Style Proactive Discovery Passive Discovery Interworking – AllJoyn
  • 22. © 2014 oneM2M30-Oct-14 22 Join us for the next webinar 14 November 2014 at 1PM AEDT = 2AM UTC Facing the Challenges of M2M Security and Privacy by Philip Hawkes Principal Engineer at Qualcomm Incorporated http://www.onem2m.org/btchannel.cfm
  • 23. © 2014 oneM2M30-Oct-14 23 Join us at the oneM2M showcase event 9 December 2014, Sophia-Antipolis, France (free of charge, but online registration is required) • OneM2M project partners, rationale and goals • OneM2M Service Layer Specification release • Showcase demos that demonstrate oneM2M “live" http://www.onem2m.org/Showcase Followed by the ETSI M2M workshop
  • 24. © 2014 oneM2M30-Oct-14 24 Thank You! Q&A