1 / 5

Background

Background. Discovery was mentioned by a number of companies and ranked high in ETSI M2M R2 priorities At the conference call of Feb. 3 rd , the following points were raised regarding this item What is the scope of discovery, i.e. what to be discovered Define requirements Define solutions.

Download Presentation

Background

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Background • Discovery was mentioned by a number of companies and ranked high in ETSI M2M R2 priorities • At the conference call of Feb. 3rd, the following points were raised regarding this item • What is the scope of discovery, i.e. what to be discovered • Define requirements • Define solutions

  2. What to be Discovered • M2M Service Provider Discovery and Bootstrapping • Discover available M2M service providers • Service provider to distribute security credentials and security entities used for M2M service bootstrapping • M2M SCL Discovery: • IP address of the host of SCLs • SCL base URI • M2M Services Discovery • Here are examples of services to be discovered • e.g. protocols supported (CoAP, HTTP); bootstrapping methods supported; DM protocols supported; charging (rate); interworking profiles, device types … • Service capabilities: e.g. rem, toe … • Contents Increasingly dynamic and request automated discovery

  3. Discovery in Flow of Events Network bootstrapping and registration M2M Service Bootstrap M2M Service Provider Discovery M2M Service Connection M2M Service Provider Bootstrap (authenticate, security credentials) M2M SCL Registration M2M SCL Discovery (and maybe initial M2M services discovery) M2M Services Discovery Note: These are conceptual steps and some steps can be combined

  4. Requirements & Next Steps • Requirements • The M2M system shall support automated discovery of M2M service providers, service layers and services. • Next steps are: • Clearly define Stage 2 procedures • Upon review and agreements of Stage 2, complete Stage 3 definitions

More Related