SlideShare a Scribd company logo
1 of 24
Download to read offline
© 2014 oneM2M© 2014 oneM2M
Nicolas Damour
Senior Manager for Business and Innovation Development, Sierra Wireless
ndamour@sierrawireless.com
oneM2M www.oneM2M.org
TAKING A LOOK INSIDE
© 2014 oneM2M30-Oct-14 2
Agenda
• The Partnership Project
• The Common Service Layer
• The Technical Reports and Specifications
• Use Cases and Requirements
• Architecture and Information Modelling
• Communication Protocols
• Security
• Device Management & Interworking with OMA/BBF
• Interworking with 3GPP/3GPP2 and with AllJoyn
© 2014 oneM2M30-Oct-14 3
Over 200 member organizations in oneM2M
The Partnership Project
© 2014 oneM2M30-Oct-14 4
Purpose
To specify and promote an
M2M Common Service Layer
Work
Six physical 1-week meetings per year
About 5 conference calls per week between the meetings
200+ documents produced and discussed at each meeting
3800 docs in 2013 4200 docs in 2014 so far
Deliverables
Technical Reports and Technical Specifications
Purpose, Work & Deliverables
© 2014 oneM2M30-Oct-14 5
Home EnergyAutomotive Health
Automotive
Application
Health
Application
Energy
Application
Home
Application
The Common Service Layer
© 2014 oneM2M30-Oct-14 6
Home Energy HealthAutomotive
Automotive
Application
Health
Application
Energy
Application
Home
Application
Communication Networks
The Common Service Layer
© 2014 oneM2M30-Oct-14 7
Home Energy HealthAutomotive
Communication Devices & Hardware
Communication Technologies & Protocols
Automotive
Application
Health
Application
Energy
Application
Home
Application
Common Service Layer
Common functions applicable to different application domains
Communication Networks
The Common Service Layer
© 2014 oneM2M30-Oct-14 8
Registration
Group
Management
SecurityDiscovery
Data
Management &
Repository
Application &
Service
Management
Device
Management
Subscription &
Notification
Communication
Management
Service
Charging &
Accounting
Location
Network
Service
Exposure
Common Service Functions
© 2014 oneM2M30-Oct-14 9
Architecture
Analysis 1
TR-0002
(WI-0002)
Architecture
Analysis 2
TR-0003
(WI-0002)
Use
Cases
TR-0001
(WI-0001)
Protocol
Analysis
TR-0009
(WI-0008)
Security
Analysis
TR-0008
(WI-0007)
Abstraction &
Semantics
TR-0007
(WI-0005)
Study of Mgt
Capab. Enablnt
TR-0006
(WI-0004)
E2E Security &
Group Authent.
TR-0012
(WI-0011)
Use
Cases v2
TR-0011
(WI-0014)
Roles &
Focus Areas
TR-0005
(WI-0003)
Technical Reports
ftp://ftp.onem2m.org/Work Programme/
© 2014 oneM2M30-Oct-14 10
Service
Components
TS-0007
(WI-0011)
Security
Solutions
TS-0003
(WI-0007)
MQTT Protocol
Binding
TS-0010
(WI-0014)
Service Layer
Core Protocols
TS-0004
(WI-0009)
Functional
Architecture
TS-0001
(WI-0002)
Definitions
& Acronyms
TS-0011
(WI-0003)
Requirements
TS-0002
(WI-0001)
Technical Specifications
ftp://ftp.onem2m.org/Work Programme/
Management
Enablnt - BBF
TS-0006
(WI-0010)
Management
Enablnt - OMA
TS-0005
(WI-0010)
CoAP Protocol
Binding
TS-0008
(WI-0012)
HTTP Protocol
Binding
TS-0009
(WI-0013)
© 2014 oneM2M30-Oct-14 11
Use Cases & Requirements
Public ServicesEnterprise HealthcareEnergy
TransportationOtherResidential
USE CASES
REQUIREMENTS
TS-0003
© 2014 oneM2M30-Oct-14 12
Patient
E-Health
Web-application
Medicalized support
M2M Platform
Blood Pressure
Meter
Scales
Bluetooth Smart
Network
Tech support
Application
Doctor
Cellular
Network
Pill dispenser
with integrated
comm. gateway
Example Scenario – E-Health
© 2014 oneM2M30-Oct-14 13
Underlying
Network
Underlying
Network
AE
NSE
AE
NSE NSENSE
Application Service Node Middle Node Infrastructure Node
Application
Layer
Network
Layer
Architecture
AE
Application Entity Provides application logic for the end-to-end M2M solutions
Network Services Entity Provides services to the CSEs besides the pure data transport
Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
© 2014 oneM2M30-Oct-14 14
Underlying
Network
Underlying
Network
CSE
AE
NSE
CSE
AE
NSE
CSE
AE
NSENSE
Application Service Node Middle Node Infrastructure Node
Application
Layer
Service
Layer
Network
Layer
Mca
Mcn
Mca Mca
McnMcnMcnMcc Mcc
Reference Point One or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers)
Common Services Entity Provides the set of "service functions" that are common to the M2M environments
Application Entity Provides application logic for the end-to-end M2M solutions
Network Services Entity Provides services to the CSEs besides the pure data transport
Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
Architecture
CSE
Mcc’
Inf. Node
© 2014 oneM2M30-Oct-14 15
Resource-based information model
• Information is stored in the system as Resources
• A given Resource can be identified with a Uniform Resource Identifier
• A given Resource is of one of the defined Resource Types
• The Resource Type determines the semantics of the information in the Resource
• Resources can be Created, Read, Updated or Deleted to manipulate the information
• Resources are organized in a tree-like structure and connected by links
• Links either as the tree hierarchy or to another part or the tree
Information Modelling
© 2014 oneM2M30-Oct-14 16
Defined resource types
• The System (nodes, CSEs, AEs…): node, CSEBase, AE, mgmtObj…
• M2M Service subscriptions: m2mServiceSubscriptionProfile…
• Security: accessControlPolicy…
• Entity groups and memberships: group, members…
• Application data: container, contentInstance…
• Information dispatch and flows: subscription, delivery, request, schedule…
• Location services: locationPolicy…
• Service charging & accounting: statsConfig, eventConfig, statsCollect…
Defined communication schemes
• Direct communication and subscriptions/notifications
• Synchronous (blocking or non-blocking with regular polling) communications
• Asynchronous (non-blocking, with callback) communications
Resource Types & Flows
© 2014 oneM2M30-Oct-14 17
Communication Protocols
Reuse IP-based existing protocols
Service Layer
Core Protocols
TS-0004
CoAP Binding
TS-0008
MQTT Binding
TS-0010
HTTP Binding
TS-0009
XML or JSON Content serialization
HTTP Example
REQUEST
GET http://provider.net/home/temperature HTTP/1.1
Host: provider.net
From: //provider.net/CSE-1234/WeatherApp42
X-M2M-RI: 56398096
Accept: application/onem2m-resource+json
RESPONSE
HTTP/1.1 200 OK
X-M2M-RI: 56398096
Content-Type: application/onem2m-resource+json
Content-Length: 107
{"typeOfContent":"application/json",
"encoding":1,
"content": "{'timestamp':1413405177000,'value':25.32}"
}
© 2014 oneM2M30-Oct-14 18
Enrolment
Provisioning/Configuration of the M2M System (Devices, Applications…)
Secure communications
Protocols (TLS/DTLS), credentials and authentication (PSK/PKI/MAF)
Access Control
Defined in accessControlPolicy resources
Which SUBJECT can perform which ACTIONS
on which OBJECT under which CIRCUMSTANCES
More details
in the oneM2M webinar#3
November 14th 2014
Security
Reuse existing mechanisms
Security
Solutions
TS-0003
© 2014 oneM2M30-Oct-14 19
oneM2M
Domain
DM
Domain
More details
in the oneM2M webinar#4
November 27th 2014
Interworking – OMA & BBF
Reuse existing Device Management technologies
Application
Entity
IN-CSE
Mca
OMA DM 2.0OMA DM 1.3 OMA LWM2M
BBF TR-069
BBF Server
BBF CPE
BBF Device
DM Server
DM Client
© 2014 oneM2M30-Oct-14 20
Interworking – 3GPP/3GPP2
AE
(App Server)
(M2M App)
MTC/M2M
IWF
GGSN
P-GW
S-GW
MSC
MME
SGSN
PDSNRadio
Access
Network
IN-CSE
(SCS)
(M2M Srv)
NSE
(UE)
ASN-CSE
AE
3GPP MTC / 3GPP2 M2M
Architecture Models
© 2014 oneM2M30-Oct-14 21
FridgeVacuum
Vital Checker
Thermostat
TV
Home
G/W
TV
Vital
Checker Fridge
Server
Application in the
Smartphone
Hospital
Application
Smartphone
AllJoyn oneM2M
Network Architecture Peer-to-Peer in LAN Server-to-Client in WAN
API Style RPC(RMI) API Resource-based API
Discovery Style Proactive Discovery Passive Discovery
Interworking – AllJoyn
© 2014 oneM2M30-Oct-14 22
Join us for the next webinar
14 November 2014 at 1PM AEDT = 2AM UTC
Facing the Challenges
of M2M Security and Privacy
by Philip Hawkes
Principal Engineer
at Qualcomm Incorporated
http://www.onem2m.org/btchannel.cfm
© 2014 oneM2M30-Oct-14 23
Join us at the
oneM2M showcase event
9 December 2014, Sophia-Antipolis, France
(free of charge, but online registration is required)
• OneM2M project partners, rationale and goals
• OneM2M Service Layer Specification release
• Showcase demos that demonstrate oneM2M “live"
http://www.onem2m.org/Showcase
Followed by the ETSI M2M workshop
© 2014 oneM2M30-Oct-14 24
Thank You!
Q&A

More Related Content

What's hot

103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network conceptsSsendiSamuel
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networksRushin Shah
 
Unit IOT NETCONF.pptx
Unit IOT NETCONF.pptxUnit IOT NETCONF.pptx
Unit IOT NETCONF.pptxsridharan83
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocolGouasmia Zakaria
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksparuvathavardhinipra
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)sankcomp
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Io t system management with
Io t system management withIo t system management with
Io t system management withxyxz
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGodspowerAgbulu
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor networkrasyidi usman
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
LTE- Long Term Evolution
LTE- Long Term EvolutionLTE- Long Term Evolution
LTE- Long Term EvolutionRazib Bondu
 
Noma-5G technology
Noma-5G  technologyNoma-5G  technology
Noma-5G technologygouthami3616
 

What's hot (20)

Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
103 Basic network concepts
103 Basic network concepts103 Basic network concepts
103 Basic network concepts
 
oneM2M overview
oneM2M overviewoneM2M overview
oneM2M overview
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Localization & management of sensor networks
Localization & management of sensor networksLocalization & management of sensor networks
Localization & management of sensor networks
 
Security in GSM
Security in GSMSecurity in GSM
Security in GSM
 
Unit IOT NETCONF.pptx
Unit IOT NETCONF.pptxUnit IOT NETCONF.pptx
Unit IOT NETCONF.pptx
 
(Snmp) simple network management protocol
(Snmp)   simple network management protocol(Snmp)   simple network management protocol
(Snmp) simple network management protocol
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
TinyOS
TinyOSTinyOS
TinyOS
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Io t system management with
Io t system management withIo t system management with
Io t system management with
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
LTE- Long Term Evolution
LTE- Long Term EvolutionLTE- Long Term Evolution
LTE- Long Term Evolution
 
Noma-5G technology
Noma-5G  technologyNoma-5G  technology
Noma-5G technology
 

Viewers also liked

oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and securityJongseok Choi
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...AllSeen Alliance
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...Open Mobile Alliance
 

Viewers also liked (6)

oneM2M Introduction and security
oneM2M Introduction and securityoneM2M Introduction and security
oneM2M Introduction and security
 
oneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and SemanticsoneM2M - Management, Abstraction and Semantics
oneM2M - Management, Abstraction and Semantics
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...Standards and Interoperability: Creating a whole that is bigger than the sum ...
Standards and Interoperability: Creating a whole that is bigger than the sum ...
 
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
IoT Seminar (Jan. 2016) - (1) dr omar elloumi - onem2m interworking and seman...
 
How to build oneM2M application solution based on open source
How to build oneM2M application solution based on open sourceHow to build oneM2M application solution based on open source
How to build oneM2M application solution based on open source
 

Similar to oneM2M - taking a look inside

OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityAALForum
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsNicolas Damour
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxSahanaMk2
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Infrastructure Facility
 
oneM2M – Open standard enables interoperability for IoT
oneM2M  – Open standard enables interoperability for IoToneM2M  – Open standard enables interoperability for IoT
oneM2M – Open standard enables interoperability for IoToneM2M
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5GDirk Kutscher
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership ProjectNicolas Damour
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer EvolutiononeM2M
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machineCisco Canada
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Real-Time Innovations (RTI)
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computingTarek Nader
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud ComputingPeter R. Egli
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network ReadinessrAVe [PUBS]
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Gerardo Pardo-Castellote
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssuranceSteve Bowker
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE
 

Similar to oneM2M - taking a look inside (20)

OneM2M - Views on Platform Interoperability
OneM2M - Views on Platform InteroperabilityOneM2M - Views on Platform Interoperability
OneM2M - Views on Platform Interoperability
 
IoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery PlatformsIoT/M2M Service Delivery Platforms
IoT/M2M Service Delivery Platforms
 
Industry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptxIndustry_Day-2019-0001-oneM2M_Overview.pptx
Industry_Day-2019-0001-oneM2M_Overview.pptx
 
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
SMART Seminar Series: "OneM2M – Towards end-to-end interoperability of the IoT"
 
oneM2M – Open standard enables interoperability for IoT
oneM2M  – Open standard enables interoperability for IoToneM2M  – Open standard enables interoperability for IoT
oneM2M – Open standard enables interoperability for IoT
 
Security and Transport Performance in 5G
Security and Transport Performance in 5GSecurity and Transport Performance in 5G
Security and Transport Performance in 5G
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
oneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacyoneM2M - Facing the challenges of M2M security and privacy
oneM2M - Facing the challenges of M2M security and privacy
 
oneM2M Partnership Project
oneM2M Partnership ProjectoneM2M Partnership Project
oneM2M Partnership Project
 
Iot Service Layer Evolution
Iot Service Layer EvolutionIot Service Layer Evolution
Iot Service Layer Evolution
 
Hope, fear, and the data center time machine
Hope, fear, and the data center time machineHope, fear, and the data center time machine
Hope, fear, and the data center time machine
 
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
Build Safe & Secure Distributed Systems - RTI Huntsville Roadshow- 2014 09 25
 
Overview of cloud computing
Overview of cloud computingOverview of cloud computing
Overview of cloud computing
 
Overview of Cloud Computing
Overview of Cloud ComputingOverview of Cloud Computing
Overview of Cloud Computing
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
Assessing Network Readiness
Assessing Network ReadinessAssessing Network Readiness
Assessing Network Readiness
 
Notes
NotesNotes
Notes
 
Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.Introduction to DDS: Context, Information Model, Security, and Applications.
Introduction to DDS: Context, Information Model, Security, and Applications.
 
Public Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service AssurancePublic Safety LTE Broadband - Service Assurance
Public Safety LTE Broadband - Service Assurance
 
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M MiddlewareFIWARE Tech Summit - OpenMTC – OneM2M Middleware
FIWARE Tech Summit - OpenMTC – OneM2M Middleware
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

oneM2M - taking a look inside

  • 1. © 2014 oneM2M© 2014 oneM2M Nicolas Damour Senior Manager for Business and Innovation Development, Sierra Wireless ndamour@sierrawireless.com oneM2M www.oneM2M.org TAKING A LOOK INSIDE
  • 2. © 2014 oneM2M30-Oct-14 2 Agenda • The Partnership Project • The Common Service Layer • The Technical Reports and Specifications • Use Cases and Requirements • Architecture and Information Modelling • Communication Protocols • Security • Device Management & Interworking with OMA/BBF • Interworking with 3GPP/3GPP2 and with AllJoyn
  • 3. © 2014 oneM2M30-Oct-14 3 Over 200 member organizations in oneM2M The Partnership Project
  • 4. © 2014 oneM2M30-Oct-14 4 Purpose To specify and promote an M2M Common Service Layer Work Six physical 1-week meetings per year About 5 conference calls per week between the meetings 200+ documents produced and discussed at each meeting 3800 docs in 2013 4200 docs in 2014 so far Deliverables Technical Reports and Technical Specifications Purpose, Work & Deliverables
  • 5. © 2014 oneM2M30-Oct-14 5 Home EnergyAutomotive Health Automotive Application Health Application Energy Application Home Application The Common Service Layer
  • 6. © 2014 oneM2M30-Oct-14 6 Home Energy HealthAutomotive Automotive Application Health Application Energy Application Home Application Communication Networks The Common Service Layer
  • 7. © 2014 oneM2M30-Oct-14 7 Home Energy HealthAutomotive Communication Devices & Hardware Communication Technologies & Protocols Automotive Application Health Application Energy Application Home Application Common Service Layer Common functions applicable to different application domains Communication Networks The Common Service Layer
  • 8. © 2014 oneM2M30-Oct-14 8 Registration Group Management SecurityDiscovery Data Management & Repository Application & Service Management Device Management Subscription & Notification Communication Management Service Charging & Accounting Location Network Service Exposure Common Service Functions
  • 9. © 2014 oneM2M30-Oct-14 9 Architecture Analysis 1 TR-0002 (WI-0002) Architecture Analysis 2 TR-0003 (WI-0002) Use Cases TR-0001 (WI-0001) Protocol Analysis TR-0009 (WI-0008) Security Analysis TR-0008 (WI-0007) Abstraction & Semantics TR-0007 (WI-0005) Study of Mgt Capab. Enablnt TR-0006 (WI-0004) E2E Security & Group Authent. TR-0012 (WI-0011) Use Cases v2 TR-0011 (WI-0014) Roles & Focus Areas TR-0005 (WI-0003) Technical Reports ftp://ftp.onem2m.org/Work Programme/
  • 10. © 2014 oneM2M30-Oct-14 10 Service Components TS-0007 (WI-0011) Security Solutions TS-0003 (WI-0007) MQTT Protocol Binding TS-0010 (WI-0014) Service Layer Core Protocols TS-0004 (WI-0009) Functional Architecture TS-0001 (WI-0002) Definitions & Acronyms TS-0011 (WI-0003) Requirements TS-0002 (WI-0001) Technical Specifications ftp://ftp.onem2m.org/Work Programme/ Management Enablnt - BBF TS-0006 (WI-0010) Management Enablnt - OMA TS-0005 (WI-0010) CoAP Protocol Binding TS-0008 (WI-0012) HTTP Protocol Binding TS-0009 (WI-0013)
  • 11. © 2014 oneM2M30-Oct-14 11 Use Cases & Requirements Public ServicesEnterprise HealthcareEnergy TransportationOtherResidential USE CASES REQUIREMENTS TS-0003
  • 12. © 2014 oneM2M30-Oct-14 12 Patient E-Health Web-application Medicalized support M2M Platform Blood Pressure Meter Scales Bluetooth Smart Network Tech support Application Doctor Cellular Network Pill dispenser with integrated comm. gateway Example Scenario – E-Health
  • 13. © 2014 oneM2M30-Oct-14 13 Underlying Network Underlying Network AE NSE AE NSE NSENSE Application Service Node Middle Node Infrastructure Node Application Layer Network Layer Architecture AE Application Entity Provides application logic for the end-to-end M2M solutions Network Services Entity Provides services to the CSEs besides the pure data transport Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device
  • 14. © 2014 oneM2M30-Oct-14 14 Underlying Network Underlying Network CSE AE NSE CSE AE NSE CSE AE NSENSE Application Service Node Middle Node Infrastructure Node Application Layer Service Layer Network Layer Mca Mcn Mca Mca McnMcnMcnMcc Mcc Reference Point One or more interfaces - Mca, Mcn, Mcc and Mcc’ (between 2 service providers) Common Services Entity Provides the set of "service functions" that are common to the M2M environments Application Entity Provides application logic for the end-to-end M2M solutions Network Services Entity Provides services to the CSEs besides the pure data transport Node Logical equivalent of a physical (or possibly virtualized, especially on the server side) device Architecture CSE Mcc’ Inf. Node
  • 15. © 2014 oneM2M30-Oct-14 15 Resource-based information model • Information is stored in the system as Resources • A given Resource can be identified with a Uniform Resource Identifier • A given Resource is of one of the defined Resource Types • The Resource Type determines the semantics of the information in the Resource • Resources can be Created, Read, Updated or Deleted to manipulate the information • Resources are organized in a tree-like structure and connected by links • Links either as the tree hierarchy or to another part or the tree Information Modelling
  • 16. © 2014 oneM2M30-Oct-14 16 Defined resource types • The System (nodes, CSEs, AEs…): node, CSEBase, AE, mgmtObj… • M2M Service subscriptions: m2mServiceSubscriptionProfile… • Security: accessControlPolicy… • Entity groups and memberships: group, members… • Application data: container, contentInstance… • Information dispatch and flows: subscription, delivery, request, schedule… • Location services: locationPolicy… • Service charging & accounting: statsConfig, eventConfig, statsCollect… Defined communication schemes • Direct communication and subscriptions/notifications • Synchronous (blocking or non-blocking with regular polling) communications • Asynchronous (non-blocking, with callback) communications Resource Types & Flows
  • 17. © 2014 oneM2M30-Oct-14 17 Communication Protocols Reuse IP-based existing protocols Service Layer Core Protocols TS-0004 CoAP Binding TS-0008 MQTT Binding TS-0010 HTTP Binding TS-0009 XML or JSON Content serialization HTTP Example REQUEST GET http://provider.net/home/temperature HTTP/1.1 Host: provider.net From: //provider.net/CSE-1234/WeatherApp42 X-M2M-RI: 56398096 Accept: application/onem2m-resource+json RESPONSE HTTP/1.1 200 OK X-M2M-RI: 56398096 Content-Type: application/onem2m-resource+json Content-Length: 107 {"typeOfContent":"application/json", "encoding":1, "content": "{'timestamp':1413405177000,'value':25.32}" }
  • 18. © 2014 oneM2M30-Oct-14 18 Enrolment Provisioning/Configuration of the M2M System (Devices, Applications…) Secure communications Protocols (TLS/DTLS), credentials and authentication (PSK/PKI/MAF) Access Control Defined in accessControlPolicy resources Which SUBJECT can perform which ACTIONS on which OBJECT under which CIRCUMSTANCES More details in the oneM2M webinar#3 November 14th 2014 Security Reuse existing mechanisms Security Solutions TS-0003
  • 19. © 2014 oneM2M30-Oct-14 19 oneM2M Domain DM Domain More details in the oneM2M webinar#4 November 27th 2014 Interworking – OMA & BBF Reuse existing Device Management technologies Application Entity IN-CSE Mca OMA DM 2.0OMA DM 1.3 OMA LWM2M BBF TR-069 BBF Server BBF CPE BBF Device DM Server DM Client
  • 20. © 2014 oneM2M30-Oct-14 20 Interworking – 3GPP/3GPP2 AE (App Server) (M2M App) MTC/M2M IWF GGSN P-GW S-GW MSC MME SGSN PDSNRadio Access Network IN-CSE (SCS) (M2M Srv) NSE (UE) ASN-CSE AE 3GPP MTC / 3GPP2 M2M Architecture Models
  • 21. © 2014 oneM2M30-Oct-14 21 FridgeVacuum Vital Checker Thermostat TV Home G/W TV Vital Checker Fridge Server Application in the Smartphone Hospital Application Smartphone AllJoyn oneM2M Network Architecture Peer-to-Peer in LAN Server-to-Client in WAN API Style RPC(RMI) API Resource-based API Discovery Style Proactive Discovery Passive Discovery Interworking – AllJoyn
  • 22. © 2014 oneM2M30-Oct-14 22 Join us for the next webinar 14 November 2014 at 1PM AEDT = 2AM UTC Facing the Challenges of M2M Security and Privacy by Philip Hawkes Principal Engineer at Qualcomm Incorporated http://www.onem2m.org/btchannel.cfm
  • 23. © 2014 oneM2M30-Oct-14 23 Join us at the oneM2M showcase event 9 December 2014, Sophia-Antipolis, France (free of charge, but online registration is required) • OneM2M project partners, rationale and goals • OneM2M Service Layer Specification release • Showcase demos that demonstrate oneM2M “live" http://www.onem2m.org/Showcase Followed by the ETSI M2M workshop
  • 24. © 2014 oneM2M30-Oct-14 24 Thank You! Q&A