SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
The communications technology journal since 1924 2014 • 8 
Capillary networks – a smart way 
to get things connected 
September 9, 2014
Capillary networks – a smart 
way to get things connected 
A capillary network is a local network that uses short-range radio-access technologies to provide 
groups of devices with connectivity. By leveraging the key capabilities of cellular networks – ubiquity, 
integrated security, network management and advanced backhaul connectivity – capillary networks 
will become a key enabler of the Networked Society. 
requirements is a prerequisite for the 
MTC business case. 
Cellular communication technolo-gies 
are being enhanced to meet these 
new service requirements3,4. The power-save 
mode for example, introduced in 
the most recent release (Rel‑12) of LTE, 
allows a sensor that sends hourly reports 
to run on two AA batteries for more 
than 10 years, and simplified signaling 
procedures can provide additional bat-tery 
savings5. Rel-12 also introduces a 
new LTE device category, which allows 
LTE modems for connected devices to be 
significantly less complex and cheaper 
than they are today – the LTE features 
proposed in 3GPP reach complexity lev-els 
below those of a 2G EGPRS modem6. 
In addition, 3GPP has identified ways to 
increase the coverage of LTE by 15-20dB. 
This extension helps to reach devices in 
remote or challenging locations, like a 
smart meter in a basement 6. 
Capillary networks and the short-range 
communications technologies 
that enable them are another key devel-opment 
in the Networked Society: they 
play an important role providing con-nectivity 
for billions of devices in many 
use cases. Examples of the technologies 
include Bluetooth Low Energy, IEEE 
802.15.4, and IEEE 802.11ah. 
This article gives an overview of the 
significant functionality that is needed 
to connect capillary networks, includ-ing 
how to automatically configure and 
manage them, and how to provide end-to- 
end connectivity in a secure manner. 
Capillary networks 
The beauty of short-range radio technol-ogies 
lies in their ability to provide con-nectivity 
efficiently to devices within a 
and the elderly can get assistance 
through remote monitoring – again 
using resources in an intelligent way 
– which improves the reach of health 
care services, reduces the need for, say, 
physical day clinics and cuts the need for 
patients to travel. 
As a whole, communication is pro-gressively 
shifting from being human-centric 
to catering for things as well as 
people. The world is moving toward 
machine-type communication (MTC), 
where anything from a smart device 
to a cereal packet will be connected; a 
shift that is to some extent illustrated 
by the explosive growth of the Internet 
of Things (IoT). 
However, the requirements created 
by object-to-object communication are 
quite different from those of current 
systems – which have primarily been 
built for people and systems to com-municate 
with each other. In scenar-ios 
where objects communicate with 
each other, some use cases require bat-tery- 
operated devices; therefore, low 
energy consumption is vital. Bare-bones 
device architecture is essential 
for mass deployment; typically the data 
rate requirements for small devices are 
low, and the cost of connectivity needs 
to be minimal when billions of devices 
are involved. Meeting all of these new 
JOACHIM SACHS, NICKLAS BEIJAR, PER ELMDAHL, JAN MELEN, FRANCESCO MILITANO AND PATRIK SALMELA 
BOX A Terms and abbreviations 
CoAP Constrained Application Protocol 
EGPRS enhanced general packet radio service 
eSIM embedded SIM card 
GBA Generic Bootstrapping Architecture 
IoT Internet of Things 
MTC machine-type communication 
M2M machine-to-machine 
OSPF Open Shortest Path First 
SLA Service Level Agreement 
TLS transport layer security 
People and businesses 
everywhere are becoming 
increasingly dependent on the 
digital platform. Computing and 
communication are spreading 
into every facet of life with ICT 
functionality providing a way 
to manage and operate assets, 
infrastructure, and commercial 
processes more efficiently. The 
broad reach of ICT is at the heart 
of the Networked Society, in 
which everything will become 
connected wherever connectivity 
provides added value1,2. 
Ubiquitous connectivity and the 
Networked Society 
Connectivity in the Networked Society 
is about increasing efficiency, doing 
more with existing resources, provid-ing 
services to more people, reducing 
the need for additional physical infra-structure, 
and developing new services 
that go beyond human interaction. For 
example, smart agricultural systems 
monitor livestock and crops so that irri-gation, 
fertilization, feeding and water 
levels can be automatically controlled, 
which ensures that crops and livestock 
remain healthy and resources are used 
wisely. In smart health care, patients 
Connectivity for billions of things 
2 
E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
specific local area. Typically, these local 
– or capillary – networks need to be con-nected 
to the edge of a communication 
infrastructure to, for example, reach 
service functions that are hosted some-where 
on the internet or in a cloud. 
Connecting a capillary network to the 
global communication infrastructure 
can be achieved through a cellular net-work, 
which can be a wide-area network 
or an indoor cellular solution. The gate-way 
between the cellular network and 
the capillary network acts just like any 
other user equipment. 
The architecture, illustrated in 
Figure 1, comprises three domains: the 
capillary connectivity domain, the cel-lular 
connectivity domain, and the data 
domain. The first two domains span the 
nodes that provide connectivity in the 
capillary network and in the cellular 
network respectively. The data domain 
spans the nodes that provide data pro-cessing 
functionality for a desired ser-vice. 
These nodes are primarily the 
connected devices themselves, as they 
generate and use service data though 
an intermediate node, which like a cap-illary 
gateway, would also be included in 
the data domain if it provides data pro-cessing 
functionality (for example, if it 
acts as a CoAP mirror 
server). 
All three domains are independent 
from a security perspective, and so 
end-to-end security can be provided by 
linking security relationships in the dif-ferent 
domains to one another. 
The ownership roles and business 
scenarios for each domain may differ 
from one case to the next. For exam-ple, 
to monitor the building sensors of a 
real estate company, a cellular operator 
might operate a wide-area network and 
possibly an indoor cellular network, as 
well as owning and managing the cap-illary 
network that provides the sensors 
with connectivity. The same operator 
may also own and manage the services 
provided by the data domain and, if so, 
would be in control of all three domains. 
Alternatively, the real estate company 
might own the capillary network, and 
partner with an operator for connectiv-ity 
and provision of the data domain. Or 
the real estate company might own and 
manage both the capillary network and 
the data domain with the operator pro-viding 
connectivity. In all of these sce-narios, 
different service agreements are 
needed to cover the interfaces between 
the domains, specifying what function-ality 
will be provided. 
Like most telecom networks, a capil-lary 
network needs a backhaul connec-tion, 
which is best provided by a cellular 
network. Their quasi-ubiquitous cover-age 
allows backhaul connectivity to be 
provided practically anywhere; simply 
and, more significantly, without instal-lation 
of additional network equipment. 
Factoring in that a capillary network 
might be on the move, as is the case for 
monitoring goods in transit, leads to the 
natural conclusion that cellular is an 
excellent choice for backhaul. 
In large-scale deployments, some 
devices will connect through a capil-lary 
gateway, while others will con-nect 
to the cellular network directly. 
Regardless of how connectivity is pro-vided, 
the bootstrapping and man-agement 
mechanisms used should be 
homogeneous to reduce implementa-tion 
complexity and improve usability. 
Smart capillary gateway selection 
Ideally, any service provider should 
be able to deploy a capillary network, 
including device and gateway configura-tion. 
For this to be possible, deployment 
needs to be simple and use basic rules 
– circumventing the need for in-depth 
network planning. To achieve this, a 
way to automatically configure connec-tivity 
is needed. 
When deploying a capillary network, 
a sufficient number of capillary gate-ways 
need to be installed to provide a 
satisfactory level of local connectivity. 
Doing so should result in a certain level 
of connectivity redundancy – a device 
can get connected through several dif-ferent 
gateways. Some systems (such as 
electricity meter monitoring) need to be 
in operation for years at a time, during 
which the surrounding environment 
may change; nodes may fail, additional 
network elements may be added, and 
even the surrounding physical infra-structure 
can change. But, by allowing 
the capillary network configuration to 
change, some slack in maintaining con-stant 
connectivity is built into the sys-tem, 
which allows it to adapt over time. 
The key to maintaining connectiv-ity 
and building flexibility into con-nected 
systems lies in optimal gateway 
selection. The decision-making process 
– what gateway a device chooses for con-nectivity 
– needs to be fully automated 
and take into consideration a number 
of network and gateway properties. 
Network parameters – such as the 
Cellular access 
Mobile 
network 
M2M/IoT 
cloud 
Capillary network 
Capillary gateway 
Data domain 
Capillary connectivity domain Cellular connectivity domain 
Connected 
devices 
FIGURE 1 System architecture for capillary network connectivity 
3 
E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
requires all of the capillary gateways to communicate with a single point. 
Managing QoS across domains 
The QoS requirements for machine- type communication are typically different from those used for traditional multimedia communication in terms of bandwidth, latency and jitter. For MTC, the requirement is often for guaranteed network connectivity with a minimum throughput, and some use cases may include stricter constraints for extremely low latency. 
For example, a sensor should be able to reliably transmit an alarm within a specified period of time after the detection of an anomaly – even if the network is congested. To achieve this, low latencies are needed for real-time monitoring and control, while the bandwidth requirements for this type of scenario tend to be low. That said, QoS requirements for machine-type communication can vary tremendously from one service to another. In some cases, like surveillance, the QoS requirements are comparable to those of personal multimedia communication. 
QoS needs to be provided end-to-end. So for the capillary network case, the distinct QoS methods of both the short- range network and the cellular network need to be considered. Each type of short-range radio technology provides different methods for QoS, which can be divided into two main groups: prioritized packet transmission (for example, in 802.11) and bandwidth reservation (for example, in 802.15.4 and Bluetooth Low Energy). As short-range technologies work in unlicensed spectrum, the level of interference at any given time is uncertain, which limits the level of QoS that can be guaranteed. QoS methods for the cellular networks that provide connectivity, however, are well established and are based on traffic separation with customized traffic handling. 
To provide QoS end-to-end, a bridge is needed between the QoS domains of the capillary and cellular networks. This bridge specifies how traffic from one domain (through a domain specific QoS treatment) is mapped to a specific QoS level in the other. The specifics of the QoS bridge are determined in a Service Level Agreement (SLA) established between the providers of the capillary 
quality of the cellular radio link and the load in the cellular cell that a gateway is connected to – fluctuate, and so a given capillary gateway will provide different levels of backhaul connectivity at different times. Other considerations, like the amount of power a battery-operated gateway has left, have an impact on which gateway is optimal for a given device at a specific point in time. Consequently, optimal gateway selection should not be designed to balance load alone, but also to minimize delays, maximize availability and conserve power. The gateway selection mechanism should support device reallocation to another gateway when the properties or the connectivity to a gateway change. By designing gateway selection to be smart, flexibility in connectivity is inbuilt, allowing systems to continue to function as the environments around them evolve. 
As illustrated in Figure 2, gateway selection relies on three different types of information: connectivity, constraints and policy. 
Connectivity information describes the dynamic radio connectivity between devices and gateways. Devices typically detect connectivity by listening to the beacon signals that gateways transmit. Some capillary short-range radio technologies allow connectivity to be detected by the gateway. 
Constraint information describes the dynamic and static properties of the network and the gateways that are included in the selection process. Properties such as battery level, load level (which can be described by the number of connected devices per gateway), support for QoS, cost of use, and sleep schedule are all included. The cellular backhaul connectivity of a gateway, such as link quality, can also be included, and future enhancements might include properties such as cell load – obtained from the management system of the cellular network. Devices may provide additional constraint information, such as device type, battery level, QoS requirements and capillary network signal strength. 
Policy information determines the goal of gateway selection. A policy might be a set of weightings or priorities that determine how the various constraint parameters affect the best choice of gateway. Policy information may also include requirements set by the management system, such as allowing certain types of device to always connect to given gateways. Policies are static and are defined by network management. 
The process of gateway selection includes the following phases: the information regarding connectivity, constraints, and policy is gathered by the element making the selection; the gateway selection algorithm applies the policies to the constraints while taking connectivity into consideration and determines the optimal gateway; once a gateway has been selected for each device, the selection is implemented, which may imply that a device needs to switch gateway; andwhen a device moves to another gateway, new routes to the device must be set up in the cellular network so that the incoming traffic is routed correctly. 
The selection process can be controlled at various locations in the network. The location of control in turn affects the need to transport information concerning constraints, policies and connectivity to the control point and to signal the selection to devices. 
If the control point is located in the connected device, the device performs the selection autonomously through local computation based on information sent by the gateway. As devices have just a local view of the network, it may not always be possible to optimize resources globally and balance load across a group of gateways. 
If the control point is located in the capillary gateways, the gateways need to communicate with each other and run the selection algorithm in a distributed manner. This implies that gateways are either connected via the capillary network, via the mobile network or via a third network such as Wi-Fi, and use a common protocol, like OSPF, for data distribution. The main challenge here is to reach convergence quickly and avoid unnecessary iteration due to changes in topology. 
Alternatively the control point could be a single node in the network that collects the entire set of available information. This centralized method enables resource usage to be optimized globally across the entire network. However, it increases communication needs, as it Connectivity for billions of things 
4 
ERICSSON REVIEW • SEPTEMBER 9, 2014Connectivity
network domain and the cellular connectivity domain, or between the service owner (in the data domain) and the connectivity domain providers. 
Security for connected devices 
The devices deployed in capillary networks are likely to vary significantly in terms of size, computational resources, power consumption and energy source. This variation makes implementing and deploying security measures challenging. Security in capillary networks, or within MTC in general, does not follow a one-size-fits-all model because the constrained devices in the capillary network are just that: constrained. It is probably not possible to apply a generic security solution: even if such a solution ensures security in the most demanding of scenarios, highly- constrained devices will probably not have the resources to implement it. What is needed is a security solution that fulfills the security requirements of the use case at hand. 
For example, a temperature sensor installed in a home is unlikely to have the same strict security requirements as, say, a pacemaker or a sensor in a power plant. A successful attack on any one of these three use cases is likely to yield drastically different consequences. So risk needs to be assessed in the development of security requirements for the specific scenario, which in turn determines what security solutions are suitable. The choice of a suitable security solution may then impact the choice of device hardware, as it needs to be capable of implementing the selected security solution. 
For end-to-end protection of traffic between authenticated end-points, widely used security mechanisms such as TLS would improve interoperability between constrained devices and services that are already deployed. In some cases, there might be a need for more optimized security solutions to be deployed, such as by using a protocol that entails fewer round-trips or incurs less overhead than legacy solutions. 
Identification 
When a device is installed in a capillary network, in most cases it needs to possess some credentials – that is to say an identity and something it can use to prove it owns the identity, such as a key. Typical solutions include public key certificates, raw public keys or a shared secret. With its stored credentials, the device needs to be able to authenticate itself to the services it wants to use – such as a management portal through which the device is managed, a data aggregation service where the device stores its data, as well as the capillary gateway, which provides the device with global connectivity. 
One way to implement device identification and credentials is to use the same method used in 3GPP networks – basically the 3GPP subscription credentials. The subscription identity and a shared secret that can be used for authentication in 3GPP networks are stored on the SIM card of the device. In addition to using the credentials to get network access, they can also be used for authenticating the device to various services in the network. This can be done using the 3GPP-standardized Generic Bootstrapping Architecture (GBA). For MTC scenarios, GBA is a good solution, as it provides strong identification and communication security without requiring any user interaction or configuration at the device end; the security is based on the 3GPP credentials stored in a tamper-resistant environment, to which not even the user has direct access. 
To apply GBA, first of all the device needs to have 3GPP credentials; and then the 3GPP network, the desired service as well as the device itself all need to support GBA. Unfortunately, many capillary network devices do not possess 3GPP credentials, which limits the use of GBA to capillary gateways. In such cases, the gateway can provide GBA- based authentication and security for services on behalf of the entire capillary network, but device authentication 
FIGURE 2 Smart capillary gateway selection 
M2M/IoTcloud3. Policies1. Constraints2. Radio connectivity4. (Re-) select gateway andcontrol communication pathCapillarygatewayselectionCapillarygatewayselectionMobilenetworkMobilenetworkNew communication pathOld communication pathCapillarygatewaysConnecteddevicesM2M/IoTcloudCapillarygatewaysConnecteddevices 
5 
ERICSSON REVIEW • SEPTEMBER 9, 2014
still needs to be performed between 
the device and the service. 
Security domains 
Capillary networks have two distinct 
security domains, as illustrated in 
Figure 3: the capillary devices and the 
capillary gateway that provides wide-area 
connectivity. The security domain 
for devices can further be split into con-nectivity 
and data domains. The data 
domain incorporates the device and 
the services it uses, such as manage-ment 
and data storage, and the connec-tivity 
domain handles the interaction 
between the device and the capillary 
gateway. 
The security domain for the capillary 
gateway is based on the 3GPP subscrip-tion 
and the security that the subscrip-tion 
credentials can provide for access 
services and 3GPP-aware services; for 
example, through the use of GBA. 
The two security domains intersect 
at the capillary gateway; there is a need 
for mutual trust and communication 
security between the device and the 
gateway. At this intersection there is an 
opportunity to apply the strong identifi-cation 
and security features of the 3GPP 
network for the benefit of the capillary 
device. If strong trust exists between 
the device and the capillary gateway, 
the security domains can be partially 
merged to provide the device with 3GPP-based 
security for the GBA-enabled ser-vices 
it uses. 
Bootstrapping 
When a device is switched on or wakes 
up, it may be able to connect to a num-ber 
of capillary gateways, possibly pro-vided 
by different gateway operators. 
The device needs to know which gate-way 
it has a valid association with and 
which it can trust. Once global connec-tivity 
has been established, the device 
also needs to know which services to 
connect to. Capillary devices will be 
deployed in the thousands, and as a con-sequence 
of their bare-boned architec-ture, 
they do not tend to be designed 
with easy-to-use user interfaces. Manual 
configuration of massive numbers of 
capillary devices has the potential to 
be extremely time consuming, which 
could cause costs to rise. 
Bootstrapping devices to their ser-vices 
using a bootstrap server is one 
way of automating configuration and 
avoiding the manual overhead. Such a 
service, which could be operated by the 
device manufacturer, would ensure that 
the device is redirected to the selected 
management service of the device 
owner. During the manufacturing 
process, devices can be pre-configured 
with information about the bootstrap 
server, such as how to reach it and how 
to authenticate it. When switched on or 
upon waking up, the device will connect 
to the bootstrap server, which helps it to 
find its current home. 
If a device gets corrupted, or for 
some reason resets itself, it can – once 
rebooted – use the bootstrap server to 
reach its current management portal. 
From the management portal, either 
the device owner or an assigned man-ager 
can configure the device with the 
services it should use – and possibly even 
provide the service specific credentials 
to the device. This approach removes 
the need to individually configure each 
device, and can instead provide a cen-tralized 
point for managing all devices, 
possibly via batch management. 
The ability to remotely manage 
devices becomes significant when, for 
example, 3GPP subscription informa-tion 
needs to be updated in thousands 
of deployed devices. Today, 3GPP creden-tials 
tend to be stored on a SIM card, 
and updating this information typi-cally 
requires replacing the SIM card 
itself. Embedded SIM cards (eSIM) and 
SIM-less alternatives are now being 
researched. While eSIM is a more MTC-friendly 
option, as it allows for remote 
management of subscription informa-tion, 
SIM-less is of most benefit to con-strained 
devices, to which adding a SIM 
is an issue simply because they tend to 
be quite small. 
Network management 
A range of tasks, such as ensuring auto-matic 
configuration and connectivity 
– for devices connected through a capil-lary 
network – are fulfilled by network 
management. In addition, network 
management needs to establish access 
control restrictions and data treatment 
Mobile 
network 
Alternative 
M2M/IoT 
cloud 
Capillary network 
Capillary gateway 
Capillary gateway security domain 
Capillary device security domain 
Connectivity security domain 
Data security domain 
Connected 
devices 
Trust/business relationship GBA-based security 
End-to-end security solution 
FIGURE 3 Security domains – bootstrapping and management 
Connectivity for billions of things 
6 
E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
rules for QoS based on SLAs, subscrip-tions 
and security policies. In addition, 
a service provider should be able to use 
the management function to adapt ser-vice 
policies and add or remove devices. 
By nature, connected devices are rudi-mentary 
when it comes to manual inter-action 
capabilities. Additionally, the fact 
that service providers tend to have no 
field personnel for device management 
implies that a remote management and 
configuration interface is needed to be 
able to interact with deployed devices. 
Network management of connected 
devices in capillary networks poses new 
challenges compared with, for example, 
the management of cellular networks. 
This is partly due to the vast number of 
devices, which are orders of magnitude 
larger than the number of elements 
handled by today’s network manage-ment 
systems. Instead of handling 
devices as individual nodes, economy of 
scale can be achieved by handling them 
in groups that use policies and managed 
parameters that are more abstract and 
also fewer in number. 
Consider the case of a service provider 
that wants to reduce costs by replac-ing 
sensor batteries less frequently. 
To achieve this, the service provider 
increases the life length policy of the 
node in the management system. The 
management system interprets this pol-icy 
and sets the reporting frequency to 
every two hours, instead of every hour, 
for a group of sensors in a particular geo-graphical 
region. 
Connected devices will often be bat-tery 
powered, and so all operations, 
including management, need to be 
energy optimized to reduce the impact 
on battery usage. Additionally, con-nected 
devices tend to sleep during 
extended periods of time, and so man-agement 
operations cannot be expected 
to provide results instantly, but only 
after the device wakes up. 
A significant challenge for network 
management is the provision of full end-to- 
end scope, an issue that is particu-larly 
evident when different domains 
in the end-to-end chain are provided 
by different business entities – as dis-cussed 
and indicated in Figure 1. Based 
on analysis of the connectivity infor-mation 
provided just by the devices, 
the connectivity state can only be esti-mated 
at a high level, extracted from 
the information available at each end 
of the communication path. Estimating 
the connectivity in this way can lead 
to a significant overhead to obtain and 
maintain such information; it is also 
limits the configuration possibilities of 
the connectivity layer. 
The best way to overcome this limi-tation 
is to interconnect the network 
management systems in the differ-ent 
domains. In this way, connectiv-ity 
information from the nodes along 
the communication path, between the 
end points, can also be included. If the 
domains are operated by separate enti-ties, 
this can be achieved through SLAs 
specifying the usage and exchange 
of information. The resulting cross-domain 
management provides end-to-end 
management opportunities. For 
example, QoS in both the capillary and 
the 3GPP domains can be matched, and 
alarms from both domains can be cor-related 
to pinpoint faults. 
Summary 
As the Networked Society starts to take 
shape, a vast range of devices, objects 
and systems will be connected, creating 
1. Morgan Stanley, April 2014, Blue Paper, The ‘Internet of Things’ Is Now: 
Connecting The Real Economy, available at: 
http://www.morganstanley.com/views/perspectives/ 
2. J. Höller, V. Tsiatsis, C. Mulligan, S Avesand, S. Karnouskos, D. Boyle, 1st edition, 
2014, From Machine-to-Machine to the Internet of Things: Introduction to a New 
Age of Intelligence, Elsevier, available at: 
http://www.ericsson.com/article/from_m2m_to_iot_2026626967_c 
3. Alcatel Lucent, Ericsson, Huawei, Neul, NSN, Sony, TU Dresden, u-blox, Verizon 
Wireless, White Paper, March 2014, A Choice of Future m2m Access Technologies 
for Mobile Network Operators, available at: http://www.cambridgewireless. 
co.uk/docs/Cellular%20IoT%20White%20Paper.pdf 
4. Ericsson, NSN, April 2014, LTE Evolution for Cellular IoT, available at: http://www. 
cambridgewireless.co.uk/docs/LTE%20Evolution%20for%20Cellular%20 
IoT%2010.04.14.pdf 
5. Emerging Telecommunications Technologies, April 2014, T. Tirronen, A. Larmo, J. 
Sachs, B. Lindoff, N. Wiberg, Machine-to-machine communication with long-term 
evolution with reduced device energy consumption, available at: 
http://onlinelibrary.wiley.com/doi/10.1002/ett.2643/abstract 
6. 3GPP, TR 36.888, June 2013, Study on provision of low-cost Machine-Type 
Communications (MTC) User Equipments (UEs) based on LTE, available at: 
http://www.3gpp.org/DynaReport/36888.htm 
References 
the Internet of Things (IoT). Within this 
context, cellular networks have a signif-icant 
role to play as connectivity provid-ers, 
to which some things will connect 
directly, and another significant por-tion 
will connect using short-range 
radio technologies through a capillary 
network. 
Cellular networks can provide global 
connectivity both outdoors and indoors 
by connecting capillary networks 
through special gateways. However, 
achieving this will require some new 
functionality. 
Due to the massive numbers of con-nected 
things, functionalities – such as 
self-configuring connectivity manage-ment 
and automated gateway selection 
– are critical for providing everything 
in the capillary network with a reliable 
connection. 
To ensure that communication 
remains secure and trustworthy, a secu-rity 
bridge is needed between the capil-lary 
and the cellular domains. With this 
functionality in place, a future network 
can provide optimized connectivity for 
all connected things anywhere no mat-ter 
how they are connected. 
7 
E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
Ericsson 
SE-164 83 Stockholm, Sweden 
Phone: + 46 10 719 0000 
ISSN 0014-0171 
284 23-3239 | Uen 
© Ericsson AB 2014 
To bring you the best of Ericsson’s research world, our employees have been writing articles for Ericsson Review – our communications technology journal – since 1924. Today, Ericsson Review articles have a two-to- five year perspective and our objective is to provide you with up-to-date insights on how things are shaping up for the Networked Society. 
Address : 
Ericsson 
SE-164 83 Stockholm, Sweden 
Phone: +46 8 719 00 00 
Publishing: 
Ericsson Review articles and additional material are published on: www.ericsson.com/review. Use the RSS feed to stay informed of the latest updates. 
Ericsson Technology Insights 
All Ericsson Review articles are available on the Ericsson Technology Insights app available for Android and iOS devices. The link for your device is on the Ericsson Review website:www.ericsson.com/ review. If you are viewing this digitally, you can: 
download from Google Play or 
download from the App Store 
Publisher: Ulf Ewaldsson 
Editorial board: 
Hans Antvik, Ulrika Bergström, Joakim Cerwall, 
Stefan Dahlfort, Åsa Degermark, 
Deirdre P. Doyle, Dan Fahrman, Anita Frisell, 
Geoff Hollingworth, Jonas Högberg, 
Patrick Jestin, Cenk Kirbas, Sara Kullman, 
Börje Lundwall, Hans Mickelsson, Ulf Olsson, 
Patrik Regårdh, Patrik Roséen, Gunnar Thyrsin 
and Tonny Uhlin. 
Editor: 
Deirdre P. Doyle 
deirdre.doyle@jgcommunication.se 
Subeditors: 
Paul Eade, Nathan Hegedus 
and Ian Nicholson 
Art director and layout: 
Carola Pilarz 
Illustrations: 
Claes-Göran Andersson 
ISSN: 0014-0171 
Volume: 91, 2014 
Francesco Militano is an experienced researcher at Ericsson Research in the Wireless Access Networks department. He joined Ericsson in 2011 to work with radio architecture and protocols. At present, he is investigating the field of M2M communications with LTE and capillary networks. He holds an M.Sc. in telecommunications engineering from University of Siena, Italy, and a post- graduate degree in networks innovation and ICT sector services from the Polytechnic University of Turin (Politecnico di Torino), Italy. 
Per Elmdahl is a senior researcher at Wireless Access Networks, Ericsson Research. He holds an M.Sc. in computer science and technology from Linköping University, Sweden. He joined Ericsson in 1990 researching network management and network security. He served as an Ericsson 3GPP SA5 delegate for seven years, working on network management. While his interest in the IoT began privately, he has worked on the subject professionally for the last two years, specifically on network management and Bluetooth Low Energy. 
Jan Melen is a master researcher at Ericsson Research in the Services Media and Network Features research area. He joined Ericsson in 1997 and has worked with several 3GPP and IP related technologies. He studied at the electrical engineering department at Helsinki University of Technology, Finland. He has been involved in several EU projects, IETF and 3GPP standardization. He has been leading the IoT related research project at Ericsson Research since 2011. 
Patrik Salmela is a senior researcher at Ericsson Research focusing on security. He joined Ericsson in 2003 to work for Ericsson Network Security and moved one year later to Ericsson Research, where he focused for several years on the Host Identity Protocol. He has since been working on security topics related to 3GPP, Deep Packet Inspection, and most recently, the Internet of Things. He holds an M.Sc. in communications engineering from Helsinki University of Technology, Finland. 
Nicklas Beijar is a guest researcher at Ericsson Research in the Cloud Technologies research area. He joined Ericsson in 2013 to work with the Internet of Things and, in particular, he has been working on the capillary network prototype demonstrated at Mobile Word Congress 2014. His current focus is on cloud-based solutions supporting the IoT. He holds a D.Sc. in networking technology from Aalto University and an M.Sc. from the Helsinki University of Technology, both in Finland. 
Joachim Sachs is a principal researcher at Ericsson Research. He joined Ericsson in 1997 and has worked on a variety of topics in the area of wireless communication systems. He holds a diploma in electrical engineering from Aachen University (RWTH), and a doctorate in electrical engineering from the Technical University of Berlin, Germany. Since 1995 he has been active in the IEEE and the German VDE Information Technology Society (ITG), where he is currently co-chair of the technical committee on communication.

Contenu connexe

Tendances

“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...
“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...
“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...Edge AI and Vision Alliance
 
Telco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 ExcerptTelco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 ExcerptSadiq Malik
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computingSyam Madanapalli
 
Ericsson Technology Review: Cognitive technologies in network and business au...
Ericsson Technology Review: Cognitive technologies in network and business au...Ericsson Technology Review: Cognitive technologies in network and business au...
Ericsson Technology Review: Cognitive technologies in network and business au...Ericsson
 
Anticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented RealityAnticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented RealityDavid Wood
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613domenico di mola
 
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...Dell Technologies
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloudEricsson Latin America
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid Rajesh Sawale
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technologyMH Shihab
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspectiveRichard Scott
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Rick Lievano
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A AnalysisNetscribes
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...Dell Technologies
 
Enterprise Architecture Networking
Enterprise Architecture Networking Enterprise Architecture Networking
Enterprise Architecture Networking Cohesive Networks
 

Tendances (20)

“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...
“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...
“5G and AI Transforming the Next Generation of Robotics,” a Presentation from...
 
Telco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 ExcerptTelco Global Connect Vol3 Excerpt
Telco Global Connect Vol3 Excerpt
 
The role of edge computing
The role of edge computingThe role of edge computing
The role of edge computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Ericsson Technology Review: Cognitive technologies in network and business au...
Ericsson Technology Review: Cognitive technologies in network and business au...Ericsson Technology Review: Cognitive technologies in network and business au...
Ericsson Technology Review: Cognitive technologies in network and business au...
 
Anticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented RealityAnticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented Reality
 
Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613Domenico di mola_2023 i_iot_whole_190613
Domenico di mola_2023 i_iot_whole_190613
 
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
DELL Technologies - The IoT Value Chain - Solutions for the Smart World - Del...
 
New business opportunities with 5G and cloud
New business opportunities with 5G and cloudNew business opportunities with 5G and cloud
New business opportunities with 5G and cloud
 
Cybersecurity of powergrid
Cybersecurity of powergrid Cybersecurity of powergrid
Cybersecurity of powergrid
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technology
 
Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)Inria | White paper Internet of Things (November 2021)
Inria | White paper Internet of Things (November 2021)
 
Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective5G and edge computing - CORAL perspective
5G and edge computing - CORAL perspective
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020
 
Edge Computing M&A Analysis
Edge Computing M&A AnalysisEdge Computing M&A Analysis
Edge Computing M&A Analysis
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (Hando...
 
Enterprise Architecture Networking
Enterprise Architecture Networking Enterprise Architecture Networking
Enterprise Architecture Networking
 
A Tour of RTI Applications
A Tour of RTI ApplicationsA Tour of RTI Applications
A Tour of RTI Applications
 

Similaire à Ericsson Review: Capillary networks – a smart way to get things connected

Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksEricsson
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundanKundan Kumar
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteAviat Networks
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetMeshDynamics
 
Creating The Future Economically-Viable Networks_JAN17
Creating The Future Economically-Viable Networks_JAN17Creating The Future Economically-Viable Networks_JAN17
Creating The Future Economically-Viable Networks_JAN17Emre Yilmaz
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
27859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 201327859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 2013Benjamin Kyalo
 
Te 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedTe 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedShohan Ean
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communicationijtsrd
 

Similaire à Ericsson Review: Capillary networks – a smart way to get things connected (20)

Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT Worlds
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary Networks
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
Wide area network in smart grid kundan
Wide area network in smart grid kundanWide area network in smart grid kundan
Wide area network in smart grid kundan
 
ece1543_project
ece1543_projectece1543_project
ece1543_project
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
Case for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell SiteCase for Layer 3 Intelligence at the Mobile Cell Site
Case for Layer 3 Intelligence at the Mobile Cell Site
 
The Abstracted Network for Industrial Internet
The Abstracted Network for Industrial InternetThe Abstracted Network for Industrial Internet
The Abstracted Network for Industrial Internet
 
Creating The Future Economically-Viable Networks_JAN17
Creating The Future Economically-Viable Networks_JAN17Creating The Future Economically-Viable Networks_JAN17
Creating The Future Economically-Viable Networks_JAN17
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
5G design concepts
5G design concepts5G design concepts
5G design concepts
 
27859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 201327859 a new distributed architecture for remote communications 2013
27859 a new distributed architecture for remote communications 2013
 
Te 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedTe 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updated
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
 

Plus de Ericsson

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020Ericsson
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN OrchestrationEricsson
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson
 

Plus de Ericsson (20)

Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...Ericsson Technology Review: Versatile Video Coding explained – the future of ...
Ericsson Technology Review: Versatile Video Coding explained – the future of ...
 
Ericsson Technology Review: issue 2, 2020
 Ericsson Technology Review: issue 2, 2020 Ericsson Technology Review: issue 2, 2020
Ericsson Technology Review: issue 2, 2020
 
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
Ericsson Technology Review: Integrated access and backhaul – a new type of wi...
 
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
Ericsson Technology Review: Critical IoT connectivity: Ideal for time-critica...
 
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
Ericsson Technology Review: 5G evolution: 3GPP releases 16 & 17 overview (upd...
 
Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson Technology Review: The future of cloud computing: Highly distributed...
Ericsson Technology Review: The future of cloud computing: Highly distributed...
 
Ericsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson Technology Review: Optimizing UICC modules for IoT applications
Ericsson Technology Review: Optimizing UICC modules for IoT applications
 
Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020Ericsson Technology Review: issue 1, 2020
Ericsson Technology Review: issue 1, 2020
 
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economy
 
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G systemEricsson Technology Review: 5G migration strategy from EPS to 5G system
Ericsson Technology Review: 5G migration strategy from EPS to 5G system
 
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson Technology Review: Creating the next-generation edge-cloud ecosystem
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystem
 
Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019Ericsson Technology Review: Issue 2/2019
Ericsson Technology Review: Issue 2/2019
 
Ericsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of ThingsEricsson Technology Review: Spotlight on the Internet of Things
Ericsson Technology Review: Spotlight on the Internet of Things
 
Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019Ericsson Technology Review - Technology Trends 2019
Ericsson Technology Review - Technology Trends 2019
 
Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...Ericsson Technology Review: Driving transformation in the automotive and road...
Ericsson Technology Review: Driving transformation in the automotive and road...
 
SD-WAN Orchestration
SD-WAN OrchestrationSD-WAN Orchestration
SD-WAN Orchestration
 
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
Ericsson Technology Review: 5G-TSN integration meets networking requirements ...
 
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive stateEricsson Technology Review: Meeting 5G latency requirements with inactive state
Ericsson Technology Review: Meeting 5G latency requirements with inactive state
 
Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...Ericsson Technology Review: Cloud-native application design in the telecom do...
Ericsson Technology Review: Cloud-native application design in the telecom do...
 
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
Ericsson Technology Review: Service exposure: a critical capability in a 5G w...
 

Dernier

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Ericsson Review: Capillary networks – a smart way to get things connected

  • 1. The communications technology journal since 1924 2014 • 8 Capillary networks – a smart way to get things connected September 9, 2014
  • 2. Capillary networks – a smart way to get things connected A capillary network is a local network that uses short-range radio-access technologies to provide groups of devices with connectivity. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society. requirements is a prerequisite for the MTC business case. Cellular communication technolo-gies are being enhanced to meet these new service requirements3,4. The power-save mode for example, introduced in the most recent release (Rel‑12) of LTE, allows a sensor that sends hourly reports to run on two AA batteries for more than 10 years, and simplified signaling procedures can provide additional bat-tery savings5. Rel-12 also introduces a new LTE device category, which allows LTE modems for connected devices to be significantly less complex and cheaper than they are today – the LTE features proposed in 3GPP reach complexity lev-els below those of a 2G EGPRS modem6. In addition, 3GPP has identified ways to increase the coverage of LTE by 15-20dB. This extension helps to reach devices in remote or challenging locations, like a smart meter in a basement 6. Capillary networks and the short-range communications technologies that enable them are another key devel-opment in the Networked Society: they play an important role providing con-nectivity for billions of devices in many use cases. Examples of the technologies include Bluetooth Low Energy, IEEE 802.15.4, and IEEE 802.11ah. This article gives an overview of the significant functionality that is needed to connect capillary networks, includ-ing how to automatically configure and manage them, and how to provide end-to- end connectivity in a secure manner. Capillary networks The beauty of short-range radio technol-ogies lies in their ability to provide con-nectivity efficiently to devices within a and the elderly can get assistance through remote monitoring – again using resources in an intelligent way – which improves the reach of health care services, reduces the need for, say, physical day clinics and cuts the need for patients to travel. As a whole, communication is pro-gressively shifting from being human-centric to catering for things as well as people. The world is moving toward machine-type communication (MTC), where anything from a smart device to a cereal packet will be connected; a shift that is to some extent illustrated by the explosive growth of the Internet of Things (IoT). However, the requirements created by object-to-object communication are quite different from those of current systems – which have primarily been built for people and systems to com-municate with each other. In scenar-ios where objects communicate with each other, some use cases require bat-tery- operated devices; therefore, low energy consumption is vital. Bare-bones device architecture is essential for mass deployment; typically the data rate requirements for small devices are low, and the cost of connectivity needs to be minimal when billions of devices are involved. Meeting all of these new JOACHIM SACHS, NICKLAS BEIJAR, PER ELMDAHL, JAN MELEN, FRANCESCO MILITANO AND PATRIK SALMELA BOX A Terms and abbreviations CoAP Constrained Application Protocol EGPRS enhanced general packet radio service eSIM embedded SIM card GBA Generic Bootstrapping Architecture IoT Internet of Things MTC machine-type communication M2M machine-to-machine OSPF Open Shortest Path First SLA Service Level Agreement TLS transport layer security People and businesses everywhere are becoming increasingly dependent on the digital platform. Computing and communication are spreading into every facet of life with ICT functionality providing a way to manage and operate assets, infrastructure, and commercial processes more efficiently. The broad reach of ICT is at the heart of the Networked Society, in which everything will become connected wherever connectivity provides added value1,2. Ubiquitous connectivity and the Networked Society Connectivity in the Networked Society is about increasing efficiency, doing more with existing resources, provid-ing services to more people, reducing the need for additional physical infra-structure, and developing new services that go beyond human interaction. For example, smart agricultural systems monitor livestock and crops so that irri-gation, fertilization, feeding and water levels can be automatically controlled, which ensures that crops and livestock remain healthy and resources are used wisely. In smart health care, patients Connectivity for billions of things 2 E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
  • 3. specific local area. Typically, these local – or capillary – networks need to be con-nected to the edge of a communication infrastructure to, for example, reach service functions that are hosted some-where on the internet or in a cloud. Connecting a capillary network to the global communication infrastructure can be achieved through a cellular net-work, which can be a wide-area network or an indoor cellular solution. The gate-way between the cellular network and the capillary network acts just like any other user equipment. The architecture, illustrated in Figure 1, comprises three domains: the capillary connectivity domain, the cel-lular connectivity domain, and the data domain. The first two domains span the nodes that provide connectivity in the capillary network and in the cellular network respectively. The data domain spans the nodes that provide data pro-cessing functionality for a desired ser-vice. These nodes are primarily the connected devices themselves, as they generate and use service data though an intermediate node, which like a cap-illary gateway, would also be included in the data domain if it provides data pro-cessing functionality (for example, if it acts as a CoAP mirror server). All three domains are independent from a security perspective, and so end-to-end security can be provided by linking security relationships in the dif-ferent domains to one another. The ownership roles and business scenarios for each domain may differ from one case to the next. For exam-ple, to monitor the building sensors of a real estate company, a cellular operator might operate a wide-area network and possibly an indoor cellular network, as well as owning and managing the cap-illary network that provides the sensors with connectivity. The same operator may also own and manage the services provided by the data domain and, if so, would be in control of all three domains. Alternatively, the real estate company might own the capillary network, and partner with an operator for connectiv-ity and provision of the data domain. Or the real estate company might own and manage both the capillary network and the data domain with the operator pro-viding connectivity. In all of these sce-narios, different service agreements are needed to cover the interfaces between the domains, specifying what function-ality will be provided. Like most telecom networks, a capil-lary network needs a backhaul connec-tion, which is best provided by a cellular network. Their quasi-ubiquitous cover-age allows backhaul connectivity to be provided practically anywhere; simply and, more significantly, without instal-lation of additional network equipment. Factoring in that a capillary network might be on the move, as is the case for monitoring goods in transit, leads to the natural conclusion that cellular is an excellent choice for backhaul. In large-scale deployments, some devices will connect through a capil-lary gateway, while others will con-nect to the cellular network directly. Regardless of how connectivity is pro-vided, the bootstrapping and man-agement mechanisms used should be homogeneous to reduce implementa-tion complexity and improve usability. Smart capillary gateway selection Ideally, any service provider should be able to deploy a capillary network, including device and gateway configura-tion. For this to be possible, deployment needs to be simple and use basic rules – circumventing the need for in-depth network planning. To achieve this, a way to automatically configure connec-tivity is needed. When deploying a capillary network, a sufficient number of capillary gate-ways need to be installed to provide a satisfactory level of local connectivity. Doing so should result in a certain level of connectivity redundancy – a device can get connected through several dif-ferent gateways. Some systems (such as electricity meter monitoring) need to be in operation for years at a time, during which the surrounding environment may change; nodes may fail, additional network elements may be added, and even the surrounding physical infra-structure can change. But, by allowing the capillary network configuration to change, some slack in maintaining con-stant connectivity is built into the sys-tem, which allows it to adapt over time. The key to maintaining connectiv-ity and building flexibility into con-nected systems lies in optimal gateway selection. The decision-making process – what gateway a device chooses for con-nectivity – needs to be fully automated and take into consideration a number of network and gateway properties. Network parameters – such as the Cellular access Mobile network M2M/IoT cloud Capillary network Capillary gateway Data domain Capillary connectivity domain Cellular connectivity domain Connected devices FIGURE 1 System architecture for capillary network connectivity 3 E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
  • 4. requires all of the capillary gateways to communicate with a single point. Managing QoS across domains The QoS requirements for machine- type communication are typically different from those used for traditional multimedia communication in terms of bandwidth, latency and jitter. For MTC, the requirement is often for guaranteed network connectivity with a minimum throughput, and some use cases may include stricter constraints for extremely low latency. For example, a sensor should be able to reliably transmit an alarm within a specified period of time after the detection of an anomaly – even if the network is congested. To achieve this, low latencies are needed for real-time monitoring and control, while the bandwidth requirements for this type of scenario tend to be low. That said, QoS requirements for machine-type communication can vary tremendously from one service to another. In some cases, like surveillance, the QoS requirements are comparable to those of personal multimedia communication. QoS needs to be provided end-to-end. So for the capillary network case, the distinct QoS methods of both the short- range network and the cellular network need to be considered. Each type of short-range radio technology provides different methods for QoS, which can be divided into two main groups: prioritized packet transmission (for example, in 802.11) and bandwidth reservation (for example, in 802.15.4 and Bluetooth Low Energy). As short-range technologies work in unlicensed spectrum, the level of interference at any given time is uncertain, which limits the level of QoS that can be guaranteed. QoS methods for the cellular networks that provide connectivity, however, are well established and are based on traffic separation with customized traffic handling. To provide QoS end-to-end, a bridge is needed between the QoS domains of the capillary and cellular networks. This bridge specifies how traffic from one domain (through a domain specific QoS treatment) is mapped to a specific QoS level in the other. The specifics of the QoS bridge are determined in a Service Level Agreement (SLA) established between the providers of the capillary quality of the cellular radio link and the load in the cellular cell that a gateway is connected to – fluctuate, and so a given capillary gateway will provide different levels of backhaul connectivity at different times. Other considerations, like the amount of power a battery-operated gateway has left, have an impact on which gateway is optimal for a given device at a specific point in time. Consequently, optimal gateway selection should not be designed to balance load alone, but also to minimize delays, maximize availability and conserve power. The gateway selection mechanism should support device reallocation to another gateway when the properties or the connectivity to a gateway change. By designing gateway selection to be smart, flexibility in connectivity is inbuilt, allowing systems to continue to function as the environments around them evolve. As illustrated in Figure 2, gateway selection relies on three different types of information: connectivity, constraints and policy. Connectivity information describes the dynamic radio connectivity between devices and gateways. Devices typically detect connectivity by listening to the beacon signals that gateways transmit. Some capillary short-range radio technologies allow connectivity to be detected by the gateway. Constraint information describes the dynamic and static properties of the network and the gateways that are included in the selection process. Properties such as battery level, load level (which can be described by the number of connected devices per gateway), support for QoS, cost of use, and sleep schedule are all included. The cellular backhaul connectivity of a gateway, such as link quality, can also be included, and future enhancements might include properties such as cell load – obtained from the management system of the cellular network. Devices may provide additional constraint information, such as device type, battery level, QoS requirements and capillary network signal strength. Policy information determines the goal of gateway selection. A policy might be a set of weightings or priorities that determine how the various constraint parameters affect the best choice of gateway. Policy information may also include requirements set by the management system, such as allowing certain types of device to always connect to given gateways. Policies are static and are defined by network management. The process of gateway selection includes the following phases: the information regarding connectivity, constraints, and policy is gathered by the element making the selection; the gateway selection algorithm applies the policies to the constraints while taking connectivity into consideration and determines the optimal gateway; once a gateway has been selected for each device, the selection is implemented, which may imply that a device needs to switch gateway; andwhen a device moves to another gateway, new routes to the device must be set up in the cellular network so that the incoming traffic is routed correctly. The selection process can be controlled at various locations in the network. The location of control in turn affects the need to transport information concerning constraints, policies and connectivity to the control point and to signal the selection to devices. If the control point is located in the connected device, the device performs the selection autonomously through local computation based on information sent by the gateway. As devices have just a local view of the network, it may not always be possible to optimize resources globally and balance load across a group of gateways. If the control point is located in the capillary gateways, the gateways need to communicate with each other and run the selection algorithm in a distributed manner. This implies that gateways are either connected via the capillary network, via the mobile network or via a third network such as Wi-Fi, and use a common protocol, like OSPF, for data distribution. The main challenge here is to reach convergence quickly and avoid unnecessary iteration due to changes in topology. Alternatively the control point could be a single node in the network that collects the entire set of available information. This centralized method enables resource usage to be optimized globally across the entire network. However, it increases communication needs, as it Connectivity for billions of things 4 ERICSSON REVIEW • SEPTEMBER 9, 2014Connectivity
  • 5. network domain and the cellular connectivity domain, or between the service owner (in the data domain) and the connectivity domain providers. Security for connected devices The devices deployed in capillary networks are likely to vary significantly in terms of size, computational resources, power consumption and energy source. This variation makes implementing and deploying security measures challenging. Security in capillary networks, or within MTC in general, does not follow a one-size-fits-all model because the constrained devices in the capillary network are just that: constrained. It is probably not possible to apply a generic security solution: even if such a solution ensures security in the most demanding of scenarios, highly- constrained devices will probably not have the resources to implement it. What is needed is a security solution that fulfills the security requirements of the use case at hand. For example, a temperature sensor installed in a home is unlikely to have the same strict security requirements as, say, a pacemaker or a sensor in a power plant. A successful attack on any one of these three use cases is likely to yield drastically different consequences. So risk needs to be assessed in the development of security requirements for the specific scenario, which in turn determines what security solutions are suitable. The choice of a suitable security solution may then impact the choice of device hardware, as it needs to be capable of implementing the selected security solution. For end-to-end protection of traffic between authenticated end-points, widely used security mechanisms such as TLS would improve interoperability between constrained devices and services that are already deployed. In some cases, there might be a need for more optimized security solutions to be deployed, such as by using a protocol that entails fewer round-trips or incurs less overhead than legacy solutions. Identification When a device is installed in a capillary network, in most cases it needs to possess some credentials – that is to say an identity and something it can use to prove it owns the identity, such as a key. Typical solutions include public key certificates, raw public keys or a shared secret. With its stored credentials, the device needs to be able to authenticate itself to the services it wants to use – such as a management portal through which the device is managed, a data aggregation service where the device stores its data, as well as the capillary gateway, which provides the device with global connectivity. One way to implement device identification and credentials is to use the same method used in 3GPP networks – basically the 3GPP subscription credentials. The subscription identity and a shared secret that can be used for authentication in 3GPP networks are stored on the SIM card of the device. In addition to using the credentials to get network access, they can also be used for authenticating the device to various services in the network. This can be done using the 3GPP-standardized Generic Bootstrapping Architecture (GBA). For MTC scenarios, GBA is a good solution, as it provides strong identification and communication security without requiring any user interaction or configuration at the device end; the security is based on the 3GPP credentials stored in a tamper-resistant environment, to which not even the user has direct access. To apply GBA, first of all the device needs to have 3GPP credentials; and then the 3GPP network, the desired service as well as the device itself all need to support GBA. Unfortunately, many capillary network devices do not possess 3GPP credentials, which limits the use of GBA to capillary gateways. In such cases, the gateway can provide GBA- based authentication and security for services on behalf of the entire capillary network, but device authentication FIGURE 2 Smart capillary gateway selection M2M/IoTcloud3. Policies1. Constraints2. Radio connectivity4. (Re-) select gateway andcontrol communication pathCapillarygatewayselectionCapillarygatewayselectionMobilenetworkMobilenetworkNew communication pathOld communication pathCapillarygatewaysConnecteddevicesM2M/IoTcloudCapillarygatewaysConnecteddevices 5 ERICSSON REVIEW • SEPTEMBER 9, 2014
  • 6. still needs to be performed between the device and the service. Security domains Capillary networks have two distinct security domains, as illustrated in Figure 3: the capillary devices and the capillary gateway that provides wide-area connectivity. The security domain for devices can further be split into con-nectivity and data domains. The data domain incorporates the device and the services it uses, such as manage-ment and data storage, and the connec-tivity domain handles the interaction between the device and the capillary gateway. The security domain for the capillary gateway is based on the 3GPP subscrip-tion and the security that the subscrip-tion credentials can provide for access services and 3GPP-aware services; for example, through the use of GBA. The two security domains intersect at the capillary gateway; there is a need for mutual trust and communication security between the device and the gateway. At this intersection there is an opportunity to apply the strong identifi-cation and security features of the 3GPP network for the benefit of the capillary device. If strong trust exists between the device and the capillary gateway, the security domains can be partially merged to provide the device with 3GPP-based security for the GBA-enabled ser-vices it uses. Bootstrapping When a device is switched on or wakes up, it may be able to connect to a num-ber of capillary gateways, possibly pro-vided by different gateway operators. The device needs to know which gate-way it has a valid association with and which it can trust. Once global connec-tivity has been established, the device also needs to know which services to connect to. Capillary devices will be deployed in the thousands, and as a con-sequence of their bare-boned architec-ture, they do not tend to be designed with easy-to-use user interfaces. Manual configuration of massive numbers of capillary devices has the potential to be extremely time consuming, which could cause costs to rise. Bootstrapping devices to their ser-vices using a bootstrap server is one way of automating configuration and avoiding the manual overhead. Such a service, which could be operated by the device manufacturer, would ensure that the device is redirected to the selected management service of the device owner. During the manufacturing process, devices can be pre-configured with information about the bootstrap server, such as how to reach it and how to authenticate it. When switched on or upon waking up, the device will connect to the bootstrap server, which helps it to find its current home. If a device gets corrupted, or for some reason resets itself, it can – once rebooted – use the bootstrap server to reach its current management portal. From the management portal, either the device owner or an assigned man-ager can configure the device with the services it should use – and possibly even provide the service specific credentials to the device. This approach removes the need to individually configure each device, and can instead provide a cen-tralized point for managing all devices, possibly via batch management. The ability to remotely manage devices becomes significant when, for example, 3GPP subscription informa-tion needs to be updated in thousands of deployed devices. Today, 3GPP creden-tials tend to be stored on a SIM card, and updating this information typi-cally requires replacing the SIM card itself. Embedded SIM cards (eSIM) and SIM-less alternatives are now being researched. While eSIM is a more MTC-friendly option, as it allows for remote management of subscription informa-tion, SIM-less is of most benefit to con-strained devices, to which adding a SIM is an issue simply because they tend to be quite small. Network management A range of tasks, such as ensuring auto-matic configuration and connectivity – for devices connected through a capil-lary network – are fulfilled by network management. In addition, network management needs to establish access control restrictions and data treatment Mobile network Alternative M2M/IoT cloud Capillary network Capillary gateway Capillary gateway security domain Capillary device security domain Connectivity security domain Data security domain Connected devices Trust/business relationship GBA-based security End-to-end security solution FIGURE 3 Security domains – bootstrapping and management Connectivity for billions of things 6 E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
  • 7. rules for QoS based on SLAs, subscrip-tions and security policies. In addition, a service provider should be able to use the management function to adapt ser-vice policies and add or remove devices. By nature, connected devices are rudi-mentary when it comes to manual inter-action capabilities. Additionally, the fact that service providers tend to have no field personnel for device management implies that a remote management and configuration interface is needed to be able to interact with deployed devices. Network management of connected devices in capillary networks poses new challenges compared with, for example, the management of cellular networks. This is partly due to the vast number of devices, which are orders of magnitude larger than the number of elements handled by today’s network manage-ment systems. Instead of handling devices as individual nodes, economy of scale can be achieved by handling them in groups that use policies and managed parameters that are more abstract and also fewer in number. Consider the case of a service provider that wants to reduce costs by replac-ing sensor batteries less frequently. To achieve this, the service provider increases the life length policy of the node in the management system. The management system interprets this pol-icy and sets the reporting frequency to every two hours, instead of every hour, for a group of sensors in a particular geo-graphical region. Connected devices will often be bat-tery powered, and so all operations, including management, need to be energy optimized to reduce the impact on battery usage. Additionally, con-nected devices tend to sleep during extended periods of time, and so man-agement operations cannot be expected to provide results instantly, but only after the device wakes up. A significant challenge for network management is the provision of full end-to- end scope, an issue that is particu-larly evident when different domains in the end-to-end chain are provided by different business entities – as dis-cussed and indicated in Figure 1. Based on analysis of the connectivity infor-mation provided just by the devices, the connectivity state can only be esti-mated at a high level, extracted from the information available at each end of the communication path. Estimating the connectivity in this way can lead to a significant overhead to obtain and maintain such information; it is also limits the configuration possibilities of the connectivity layer. The best way to overcome this limi-tation is to interconnect the network management systems in the differ-ent domains. In this way, connectiv-ity information from the nodes along the communication path, between the end points, can also be included. If the domains are operated by separate enti-ties, this can be achieved through SLAs specifying the usage and exchange of information. The resulting cross-domain management provides end-to-end management opportunities. For example, QoS in both the capillary and the 3GPP domains can be matched, and alarms from both domains can be cor-related to pinpoint faults. Summary As the Networked Society starts to take shape, a vast range of devices, objects and systems will be connected, creating 1. Morgan Stanley, April 2014, Blue Paper, The ‘Internet of Things’ Is Now: Connecting The Real Economy, available at: http://www.morganstanley.com/views/perspectives/ 2. J. Höller, V. Tsiatsis, C. Mulligan, S Avesand, S. Karnouskos, D. Boyle, 1st edition, 2014, From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence, Elsevier, available at: http://www.ericsson.com/article/from_m2m_to_iot_2026626967_c 3. Alcatel Lucent, Ericsson, Huawei, Neul, NSN, Sony, TU Dresden, u-blox, Verizon Wireless, White Paper, March 2014, A Choice of Future m2m Access Technologies for Mobile Network Operators, available at: http://www.cambridgewireless. co.uk/docs/Cellular%20IoT%20White%20Paper.pdf 4. Ericsson, NSN, April 2014, LTE Evolution for Cellular IoT, available at: http://www. cambridgewireless.co.uk/docs/LTE%20Evolution%20for%20Cellular%20 IoT%2010.04.14.pdf 5. Emerging Telecommunications Technologies, April 2014, T. Tirronen, A. Larmo, J. Sachs, B. Lindoff, N. Wiberg, Machine-to-machine communication with long-term evolution with reduced device energy consumption, available at: http://onlinelibrary.wiley.com/doi/10.1002/ett.2643/abstract 6. 3GPP, TR 36.888, June 2013, Study on provision of low-cost Machine-Type Communications (MTC) User Equipments (UEs) based on LTE, available at: http://www.3gpp.org/DynaReport/36888.htm References the Internet of Things (IoT). Within this context, cellular networks have a signif-icant role to play as connectivity provid-ers, to which some things will connect directly, and another significant por-tion will connect using short-range radio technologies through a capillary network. Cellular networks can provide global connectivity both outdoors and indoors by connecting capillary networks through special gateways. However, achieving this will require some new functionality. Due to the massive numbers of con-nected things, functionalities – such as self-configuring connectivity manage-ment and automated gateway selection – are critical for providing everything in the capillary network with a reliable connection. To ensure that communication remains secure and trustworthy, a secu-rity bridge is needed between the capil-lary and the cellular domains. With this functionality in place, a future network can provide optimized connectivity for all connected things anywhere no mat-ter how they are connected. 7 E R I C S S O N R E V I E W • SEPTEMBER 9, 2014
  • 8. Ericsson SE-164 83 Stockholm, Sweden Phone: + 46 10 719 0000 ISSN 0014-0171 284 23-3239 | Uen © Ericsson AB 2014 To bring you the best of Ericsson’s research world, our employees have been writing articles for Ericsson Review – our communications technology journal – since 1924. Today, Ericsson Review articles have a two-to- five year perspective and our objective is to provide you with up-to-date insights on how things are shaping up for the Networked Society. Address : Ericsson SE-164 83 Stockholm, Sweden Phone: +46 8 719 00 00 Publishing: Ericsson Review articles and additional material are published on: www.ericsson.com/review. Use the RSS feed to stay informed of the latest updates. Ericsson Technology Insights All Ericsson Review articles are available on the Ericsson Technology Insights app available for Android and iOS devices. The link for your device is on the Ericsson Review website:www.ericsson.com/ review. If you are viewing this digitally, you can: download from Google Play or download from the App Store Publisher: Ulf Ewaldsson Editorial board: Hans Antvik, Ulrika Bergström, Joakim Cerwall, Stefan Dahlfort, Åsa Degermark, Deirdre P. Doyle, Dan Fahrman, Anita Frisell, Geoff Hollingworth, Jonas Högberg, Patrick Jestin, Cenk Kirbas, Sara Kullman, Börje Lundwall, Hans Mickelsson, Ulf Olsson, Patrik Regårdh, Patrik Roséen, Gunnar Thyrsin and Tonny Uhlin. Editor: Deirdre P. Doyle deirdre.doyle@jgcommunication.se Subeditors: Paul Eade, Nathan Hegedus and Ian Nicholson Art director and layout: Carola Pilarz Illustrations: Claes-Göran Andersson ISSN: 0014-0171 Volume: 91, 2014 Francesco Militano is an experienced researcher at Ericsson Research in the Wireless Access Networks department. He joined Ericsson in 2011 to work with radio architecture and protocols. At present, he is investigating the field of M2M communications with LTE and capillary networks. He holds an M.Sc. in telecommunications engineering from University of Siena, Italy, and a post- graduate degree in networks innovation and ICT sector services from the Polytechnic University of Turin (Politecnico di Torino), Italy. Per Elmdahl is a senior researcher at Wireless Access Networks, Ericsson Research. He holds an M.Sc. in computer science and technology from Linköping University, Sweden. He joined Ericsson in 1990 researching network management and network security. He served as an Ericsson 3GPP SA5 delegate for seven years, working on network management. While his interest in the IoT began privately, he has worked on the subject professionally for the last two years, specifically on network management and Bluetooth Low Energy. Jan Melen is a master researcher at Ericsson Research in the Services Media and Network Features research area. He joined Ericsson in 1997 and has worked with several 3GPP and IP related technologies. He studied at the electrical engineering department at Helsinki University of Technology, Finland. He has been involved in several EU projects, IETF and 3GPP standardization. He has been leading the IoT related research project at Ericsson Research since 2011. Patrik Salmela is a senior researcher at Ericsson Research focusing on security. He joined Ericsson in 2003 to work for Ericsson Network Security and moved one year later to Ericsson Research, where he focused for several years on the Host Identity Protocol. He has since been working on security topics related to 3GPP, Deep Packet Inspection, and most recently, the Internet of Things. He holds an M.Sc. in communications engineering from Helsinki University of Technology, Finland. Nicklas Beijar is a guest researcher at Ericsson Research in the Cloud Technologies research area. He joined Ericsson in 2013 to work with the Internet of Things and, in particular, he has been working on the capillary network prototype demonstrated at Mobile Word Congress 2014. His current focus is on cloud-based solutions supporting the IoT. He holds a D.Sc. in networking technology from Aalto University and an M.Sc. from the Helsinki University of Technology, both in Finland. Joachim Sachs is a principal researcher at Ericsson Research. He joined Ericsson in 1997 and has worked on a variety of topics in the area of wireless communication systems. He holds a diploma in electrical engineering from Aachen University (RWTH), and a doctorate in electrical engineering from the Technical University of Berlin, Germany. Since 1995 he has been active in the IEEE and the German VDE Information Technology Society (ITG), where he is currently co-chair of the technical committee on communication.