1 / 16

Consideration and discussion about “overview of ioT ”

Consideration and discussion about “overview of ioT ”. China Communications Standards Association. Haihua Li lihaihua@catr.cn Tel: +86-10-62300013 Fax: +86-10-62300034. 21th CJK UNIOT-WG meeting July 11th ~ 13th , 2011 Beijing, China. Table of Contents.

noah
Download Presentation

Consideration and discussion about “overview of ioT ”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Consideration and discussion about “overview of ioT” China Communications Standards Association Haihua Li lihaihua@catr.cn Tel: +86-10-62300013 Fax: +86-10-62300034 21th CJK UNIOT-WG meeting July 11th ~ 13th, 2011 Beijing, China

  2. Table of Contents 1、General introduction and analysis about IoT 2、Some views about IoT

  3. IoT application domains IoT is a very big umbrella and covers lots of technologies. These technologies not only could be used in the telecommunication domain, but also could be used in the industrial application domains The main identified IoT application domains are: •  Aerospace and aviation, •  Automotive, •  Telecommunications, •  Intelligent Buildings, •  Medical Technology, Healthcare, •  Independent Living, •  Pharmaceutical, •  Retail, Logistics, Supply Chain Management, •  Manufacturing, Product Lifecycle Management, •  Oil and Gas •  Safety, Security and Privacy, •  Environment Monitoring, •  People and Goods Transportation, •  Food traceability, •  Agriculture and Breeding, •  Media, entertainment and Ticketing, •  Insurance, •  Recycling (Reference:Internet of Things strategic research Roadmap,2009)

  4. Example: Smart Grid In TSAG meeting held in February 2011, it suggests that Smart Grid-related things can be considered by JCA-IoT and JCA-HN in their ToR

  5. Example: Smart Grid Power Utility application systems Interaction &openness of Information & Service Power Utility equipments Reference architecture for Smart Grid (Reference:“Smart Grid overview” deliverable of FG Smart)

  6. Example: ITS(Intelligent Transport Systems ) ETSI TC ITS ISO TC 204 C2C CC R&D projects CVIS/SAFESPOTCOOPERS/GeoNet IEEE 802.11 and 1609 ITS IETF MEXT COMeSafety ITU Telemov Pre-Drive iTETRIS ERTICO CEN TC 278 TISA Other ETSI TC LI – HF-ERM

  7. ITS station reference architecture • ‘Access’ representing OSI layers 1 and 2 • ‘Networking & Transport’ representing layers 3 and 4 • ‘Facilities’ representing layers 5, 6 and 7 • ‘Applications’ • ‘Security’ • ‘Management’ (Reference:ETSI EN 302 665 )

  8. Cooperation of CEN/ETSI The Contents: • in blue font belong to ETSI ToR • In red font belong to CEN ToR • In green font belong to ETSI&CEN together This part is unique to the standardization of ITS areas, which need to be defined by ETSI ITS TC &CEN TC278 This part (such as 3G, WiFi, Blue Tooth, IPv6 ,etc) can be defined by other SDOs, specific protocols and interfaces could be selected while developing and deploying ITS facilities

  9. Example: IoT application provided by operator “Elevator Bodyguard” service Elevator Bodyguard service platform Terminals status monitoring data collecting related to elevator Elevator Operator Server internet GPRS network Elevator monitoring terminal Subscribers accessing using mobile phone Subscribers accessing from internet

  10. Table of Contents 1、General introduction and analysis about IoT 2、Some views about IoT

  11. Some Considerations and views of IoT • For specific applications domains, the relevant industrial roles will deploy their own facilities (for data collecting and device controlling) and application systems (for data processing, internal services and applications). As different application domains have different requirements and service features, special standardizations for these applications are usually required. • The industry specific facilities and application systems can be deployed by industrial roles directly, such as power utility, or be deployed by telecom operators or service providers, depending on the business models, • Even though these facilities and application systems are deployedby telecom operators, the industrial roles will be in charge of the data processing, controlling, applications and services, while considering security, professional knowledge and so on. • Telecom operators generally provide basic capabilities such as data transmission, storage, facilities status monitoring. • Telecom operators can also deploy some facilities in order to collect information for IoT applications, such as video surveillance equipments at home, Vehicle gateways, Personal equipments with extended information collection capabilities. • For access, transport and networking technologies, they can be used in different application domains to provide information transmission path.

  12. service integration and delivery environment NGN-SIDE is aimed to support Ubiquitous Network (UN) applications including M2M applications. (Reference: CJK-UNIOT19-014_CCSA_NGN-SIDE_Features) • main functionalities provided by SIDE: • integration of resources from different domains (e.g. telecommunication domain (fixed and mobile networks), broadcasting domain, internet domain, content provider domain etc.) over NGN • provision of mechanisms for the support of diverse applications including cloud services, machine to machine, and ubiquitous sensor network applications; • ….

  13. IDM: Identity Management IdM enables various applications to be developed. Example applications are, but not limited to: • business applications –single sign-on and sign-off (e.g., access to multiple applications and services without having to individually authenticate each application or service platform) –federated services (e.g., access to services across different service providers or NGN providers) • identity-based services • security applications • –role-based access control to information, resources and assets IdM overview (Reference:Y.2720)

  14. Some Considerations about IoT • under the umbrella of IoT, there’re lots of applications and resources belonging to different application domains. In order to support service discovery, service component, and etc, the functional component like SIDE is required • Identifiers can be used by different application domains, to support access to services across different domains, role-based access control and etc, the functional component like IDM is required. We can call these kinds of functional components as collaboration components, which support the interaction between applications, the interaction between application and diverse resources in networks, devices.

  15. Vision of IoT

  16. Thanks for your Attention!

More Related