欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T Y 4500 22-2018 oneM2M C Field device configuration (Study Group 20).pdf

    • 资源ID:806554       资源大小:1.48MB        全文页数:50页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T Y 4500 22-2018 oneM2M C Field device configuration (Study Group 20).pdf

    1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4500.22 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2018) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES Internet of things an

    2、d smart cities and communities Frameworks, architectures and protocols oneM2M Field device configuration Recommendation ITU-T Y.4500.22 ITU-T Y-SERIES RECOMMENDATIONS GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES GLOBAL IN

    3、FORMATION INFRASTRUCTURE General Y.100Y.199 Services, applications and middleware Y.200Y.299 Network aspects Y.300Y.399 Interfaces and protocols Y.400Y.499 Numbering, addressing and naming Y.500Y.599 Operation, administration and maintenance Y.600Y.699 Security Y.700Y.799 Performances Y.800Y.899 INT

    4、ERNET PROTOCOL ASPECTS General Y.1000Y.1099 Services and applications Y.1100Y.1199 Architecture, access, network capabilities and resource management Y.1200Y.1299 Transport Y.1300Y.1399 Interworking Y.1400Y.1499 Quality of service and network performance Y.1500Y.1599 Signalling Y.1600Y.1699 Operatio

    5、n, administration and maintenance Y.1700Y.1799 Charging Y.1800Y.1899 IPTV over NGN Y.1900Y.1999 NEXT GENERATION NETWORKS Frameworks and functional architecture models Y.2000Y.2099 Quality of Service and performance Y.2100Y.2199 Service aspects: Service capabilities and service architecture Y.2200Y.2

    6、249 Service aspects: Interoperability of services and networks in NGN Y.2250Y.2299 Enhancements to NGN Y.2300Y.2399 Network management Y.2400Y.2499 Network control architectures and protocols Y.2500Y.2599 Packet-based Networks Y.2600Y.2699 Security Y.2700Y.2799 Generalized mobility Y.2800Y.2899 Carr

    7、ier grade open environment Y.2900Y.2999 FUTURE NETWORKS Y.3000Y.3499 CLOUD COMPUTING Y.3500Y.3999 INTERNET OF THINGS AND SMART CITIES AND COMMUNITIES General Y.4000Y.4049 Definitions and terminologies Y.4050Y.4099 Requirements and use cases Y.4100Y.4249 Infrastructure, connectivity and networks Y.42

    8、50Y.4399 Frameworks, architectures and protocols Y.4400Y.4549 Services, applications, computation and data processing Y.4550Y.4699 Management, control and performance Y.4700Y.4799 Identification and security Y.4800Y.4899 Evaluation and assessment Y.4900Y.4999 For further details, please refer to the

    9、 list of ITU-T Recommendations. Rec. ITU-T Y.4500.22 (03/2018) i Recommendation ITU-T Y.4500.22 oneM2M Field device configuration Summary Recommendation ITU-T Y.4500.22 specifies the architectural options, resources and procedures needed to provision and maintain devices in the field domain in order

    10、 to establish M2M service layer operation. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T Y.4500.22 2018-03-01 20 11.1002/1000/13512 Keywords Device management, device configuration, oneM2M. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address f

    11、ield of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T Y.4500.22 (03/2018) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, inform

    12、ation and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worl

    13、dwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in W

    14、TSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication admini

    15、stration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provi

    16、sions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. NOTE This Recommendation departs slightly from the

    17、 usual editorial style of ITU-T Recommendations to preserve existing cross-referencing from external documents. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right.

    18、ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectua

    19、l property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2018 All rights re

    20、served. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T Y.4500.22 (03/2018) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation .

    21、 2 4 Abbreviations and acronyms 2 5 Conventions 2 6 Introduction . 3 7 Architectural aspects . 4 7.1 Introduction 4 7.2 Information needed for M2M service layer operation . 5 8 Resource type and data format definitions . 7 8.1 Resource type specializations 7 8.2 Resource-type specific procedures and

    22、 definitions 25 8.3 Data formats for device configuration 34 9 Procedures . 35 9.1 life cycle procedures 35 9.2 Obtaining authentication credential procedure . 38 9.3 AE and CSE registration procedure . 39 9.4 Enabling data collection by dataCollection resource . 39 Annex A oneM2M Specification upda

    23、te and maintenance control procedure . 41 Bibliography. 42 Rec. ITU-T Y.4500.22 (03/2018) 1 Recommendation ITU-T Y.4500.22 oneM2M Field device configuration 1 Scope This Recommendation specifies the architectural options, resources and procedures needed to pre-provision and maintain devices in the f

    24、ield domain (e.g., ADN, ASN/MN) in order to establish M2M service layer operation between the devices application entity (AE) and/or common services entity (CSE) and a registrar and/or hosting CSE. The resources and procedures include information about the registrar CSE and/or hosting CSE needed by

    25、the AE or CSE to begin machine to machine (M2M) service layer operation. This Recommendation contains oneM2M Release 2 specification oneM2M Field Device Configuration V2.0.0 and is equivalent to standards of oneM2M partners including ARIB, ATIS, CCSA, ETSI b-ETSI TS 118 122, TIA, TSDSI, TTA and TTC.

    26、 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revisi

    27、on; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this R

    28、ecommendation does not give it, as a stand-alone document, the status of a Recommendation. The following referenced documents are necessary for the application of this Recommendation. ITU-T Y.4500.1 Recommendation ITU-T Y.4500.1 (2018), oneM2M Functional architecture. ITU-T Y.4500.4 Recommendation I

    29、TU-T Y.4500.4 (2018), oneM2M Service layer core protocol. ITU-T Y.4500.5 Recommendation ITU-T Y.4500.5 (2018), oneM2M Management enablement (OMA). ITU-T Y.4500.6 Recommendation ITU-T Y.4500.6 (2018), oneM2M Management enablement (BBF). ITU-T Y.4500.11 Recommendation ITU-T Y.4500.11 (2018), oneM2M Co

    30、mmon terminology. ETSI TS 118 103 ETSI TS 118 103 (2016), oneM2M; Security solutions. FIPS 180-4 NIST, FIPS 180-4 (2015), Secure Hash Standard (SHS). IETF RFC 6920 IETF RFC 6920 (2013), Naming Things with Hashes. 3 Definitions For the purposes of this Recommendation, the terms and definitions given

    31、in oneM2M TS-0011 ITU-T Y.4500.11 apply. 3.1 Terms defined elsewhere 3.1.1 application entity (AE) ITU-T Y.4500.11: This represents an instantiation of application logic for end-to-end M2M solutions. 2 Rec. ITU-T Y.4500.22 (03/2018) 3.1.2 common services entity (CSE) ITU-T Y.4500.11: This represents

    32、 an instantiation of a set of common service functions of the M2M environment. Such service functions are exposed to other entities through reference points. 3.1.3 (oneM2M) security principal ITU-T Y.4500.11: CSE or AE or node or M2M device which can be authenticated. NOTE When the security principa

    33、l is a node or M2M device, then the node or M2M device is acting on behalf of the CSE and/or AE executing on the node or M2M device. 3.2 Terms defined in this Recommendation 3.2.1 application configuration: A procedure that configures an AE on an M2M node in the field domain for M2M service layer op

    34、eration. 3.2.2 authentication profile: Security information that is needed to establish mutually-authenticated secure communications. 3.2.3 configuration AE: An AE whose role is to configure the M2M system, including the M2M node in the field domain. 3.2.4 configuration IPE: An IPE that provides the

    35、 capability to configure the M2M node in the field domain by interworking the exchange of information between the M2M node and the M2M system. 3.2.5 service layer configuration: A procedure that configures a CSE on an M2M node in the field domain for M2M service layer operation. 4 Abbreviations and

    36、acronyms For the purposes of this Recommendation, the abbreviations given in oneM2M TS-0011 ITU-T Y.4500.11, oneM2M TS-0001 ITU-T Y.4500.1 and the following apply: AE Application Entity CSE Common Services Entity M2M Machine to Machine MAF M2M Authentication Function MEF M2M Enrolment Function MO Ma

    37、naged Object (BBF specified management) or Management Object (OMA specified management) NP Not Present RSPF Remote Security Provisioning Framework SAEF Security Associated Establishment Framework SUID Security Usage Identifier XML extensible Markup Language XSD XML Schema Definition 5 Conventions Th

    38、e key words “Shall“, “Shall not“, “May“, “Need not“, “Should“, “Should not“ in this Recommendation are to be interpreted as described: Shall/Shall not: Rec. ITU-T Y.4500.22 (03/2018) 3 Requirements: 1) Effect on this Recommendation: This Recommendation needs to describe the required feature (i.e., s

    39、pecify a technical solution for the requirement); 2) Effect on products: Every implementation (M2M solution that complies to this Recommendation) must support it. 3) Effect on deployments: Every deployment (M2M service based on this Recommendation) must use the standardized feature where applicable

    40、otherwise e.g., interoperability problems with other services could arise. Should/Should not: Recommendation: 1) Effect on this Recommendation: This Recommendation needs to describe a solution that allows the presence and the absence of the feature. 2) Effect on products: An implementation may or ma

    41、y not support it; however support is recommended. 3) Effect on deployments: A deployment may or may not use it; however usage is recommended. May/Need not: Permission/Option: 1) Effect on this Recommendation: This Recommendation needs to describe a solution that allows the presence and the absence o

    42、f the required feature. 2) Effect on products: An implementation may or may not support it. 3) Effect on deployments: A deployment may or may not use it. 6 Introduction Devices in the field domain that host oneM2M AEs and CSEs require configuration that permits the AE or CSE to successfully operate

    43、in the M2M service layer. TS-0001 ITU-T Y.4500.1 and TS-0003 ETSI TS 118 103 specify much of what is needed to configure these devices in the field domain (i.e., ADN, ASN/MN). Specifically, TS-0001 ITU-T Y.4500.1 provides: guidance on how a CSE is minimally provisioned in Annex E of the specificatio

    44、n including how a user AE is established within a hosting CSE; specification of the general communication flows across the Mca and Mcc reference points in clause 8; specifications for how ASN/MN and ADN nodes and M2M applications are enrolled in the M2M system so that the node in the field domain ca

    45、n establish connectivity with a CSE. TS-0001 ITU-T Y.4500.1 heavily relies on clause 6 and on the remote security provisioning framework (RSPF) of TS-0003 ETSI TS 118 103 to specify how the security credentials of ASN/MN and ADN nodes and M2M applications are established in the M2M system for the en

    46、rolment of the node or M2M application in the M2M system; specifications for how the ADN and ASN/MN nodes in the field domain are managed using external management technologies in clause 6.2.4; guidance for how the ADN and ASN/MN nodes in the field domain can be configured without the support of ext

    47、ernal management technologies in clause 9.1.2. The above clauses in TS-0001 ITU-T Y.4500.1 assume that, for an M2M application to operate in the M2M system, all required information needed to establish M2M service operation between a 4 Rec. ITU-T Y.4500.22 (03/2018) registrar or hosting CSE and the

    48、AE or CSE in the field domain is configured before registration of the AE or CSE to the M2M system. This Recommendation specifies the additional architectural elements, resources and procedures necessary to configure ASN/MN and ADN nodes in the field domain in order for that device to establish M2M

    49、service layer operation. These architectural elements, resources and procedures are in addition to the architectural elements, resources and procedures already defined in TS-0001 ITU-T Y.4500.1 and TS-0003 ETSI TS 118 103. 7 Architectural aspects 7.1 Introduction The information needed by the remote AE or CSE in the field domain to establish M2M service layer operation uses the architectural aspects of TS-0001 ITU-T Y.4500.1 in order to convey the i


    注意事项

    本文(ITU-T Y 4500 22-2018 oneM2M C Field device configuration (Study Group 20).pdf)为本站会员(sumcourage256)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开