ImageVerifierCode 换一换
格式:PDF , 页数:26 ,大小:1.23MB ,
资源ID:806537      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-806537.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T Y 4115-2017 Reference architecture for IoT device capability exposure (Study Group 20).pdf)为本站会员(explodesoak291)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T Y 4115-2017 Reference architecture for IoT device capability exposure (Study Group 20).pdf

1、 Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4115 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES Internet of thing

2、s and smart cities and communities Requirements and use cases Reference architecture for IoT device capability exposure Recommendation ITU-T Y.4115 ITU-T Y-SERIES RECOMMENDATIONS GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITI

3、ES GLOBAL INFORMATION INFRASTRUCTURE General Y.100Y.199 Services, applications and middleware Y.200Y.299 Network aspects Y.300Y.399 Interfaces and protocols Y.400Y.499 Numbering, addressing and naming Y.500Y.599 Operation, administration and maintenance Y.600Y.699 Security Y.700Y.799 Performances Y.

4、800Y.899 INTERNET PROTOCOL ASPECTS General Y.1000Y.1099 Services and applications Y.1100Y.1199 Architecture, access, network capabilities and resource management Y.1200Y.1299 Transport Y.1300Y.1399 Interworking Y.1400Y.1499 Quality of service and network performance Y.1500Y.1599 Signalling Y.1600Y.1

5、699 Operation, administration and maintenance Y.1700Y.1799 Charging Y.1800Y.1899 IPTV over NGN Y.1900Y.1999 NEXT GENERATION NETWORKS Frameworks and functional architecture models Y.2000Y.2099 Quality of Service and performance Y.2100Y.2199 Service aspects: Service capabilities and service architectu

6、re Y.2200Y.2249 Service aspects: Interoperability of services and networks in NGN Y.2250Y.2299 Enhancements to NGN Y.2300Y.2399 Network management Y.2400Y.2499 Network control architectures and protocols Y.2500Y.2599 Packet-based Networks Y.2600Y.2699 Security Y.2700Y.2799 Generalized mobility Y.280

7、0Y.2899 Carrier grade open environment Y.2900Y.2999 FUTURE NETWORKS Y.3000Y.3499 CLOUD COMPUTING Y.3500Y.3999 INTERNET OF THINGS AND SMART CITIES AND COMMUNITIES General Y.4000Y.4049 Definitions and terminologies Y.4050Y.4099 Requirements and use cases Y.4100Y.4249 Infrastructure, connectivity and n

8、etworks Y.4250Y.4399 Frameworks, architectures and protocols Y.4400Y.4549 Services, applications, computation and data processing Y.4550Y.4699 Management, control and performance Y.4700Y.4799 Identification and security Y.4800Y.4899 Evaluation and assessment Y.4900Y.4999 For further details, please

9、refer to the list of ITU-T Recommendations. Rec. ITU-T Y.4115 (04/2017) i Recommendation ITU-T Y.4115 Reference architecture for IoT device capability exposure Summary Recommendation ITU-T Y.4115 specifies the reference architecture of IoT device capability exposure (IoT DCE) which supports IoT appl

10、ications in DCE devices (e.g., smart phones, tablets and home gateways) to access device capabilities exposed by IoT devices connected to the DCE device. This Recommendation clarifies the concept of the IoT DCE, identifies its general characteristics and common requirements and provides the referenc

11、e architecture for the IoT DCE and relevant high-level common procedures. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T Y.4115 2017-04-29 20 11.1002/1000/13266 Keywords Device capability, device capability exposure, Internet of things. * To access the Recommendation, type

12、the URL http:/handle.itu.int/ in the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T Y.4115 (04/2017) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency

13、 in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to

14、 standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations

15、 is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness

16、to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is

17、 achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLE

18、CTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, wheth

19、er asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are caution

20、ed that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2017 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU

21、. Rec. ITU-T Y.4115 (04/2017) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 2 5 Conventions 2 6 Introduction . 2 7 General characteristics of IoT DCE 3 7.1 Provision of s

22、tandardized uniform interfaces . 3 7.2 Discovery and exposure of IoT devices . 4 7.3 Collection and exposure of data to IoT applications 4 7.4 Collection and exposure capabilities of the connected IoT devices . 4 7.5 Access to the capabilities of the connected IoT devices 4 7.6 Security and privacy

23、protection 4 8 Common requirements of IoT DCE . 4 8.1 Communication with the IoT devices . 4 8.2 Publication of the IoT device capabilities 4 8.3 Subscription to the exposed IoT device capabilities 5 8.4 Access to the exposed IoT device capabilities . 5 8.5 Security protection and privacy preservati

24、on . 5 9 Reference architecture of IoT DCE 5 9.1 Profile management functional component (PM-FC) 6 9.2 Auth agent management functional component (AAM-FC) 8 9.3 Application management functional component (AM-FC) . 8 9.4 Device proxy management functional component (DPM-FC) 8 9.5 Device proxy 9 9.6

25、Auth agent 9 9.7 Interface DCE-1 9 9.8 DCE device and external entities . 10 10 Common reference procedures of IoT DCE . 10 10.1 Registration of the IoT devices . 10 10.2 Publication of the exposed IoT device capabilities 10 10.3 Subscription to the exposed IoT device capabilities 11 10.4 Access to

26、the exposed IoT device capabilities . 13 11 Security considerations . 13 iv Rec. ITU-T Y.4115 (04/2017) Page Appendix I Use cases of IoT DCE 14 I.1 Leveraging personal data integration for wearable devices . 14 I.2 Leveraging centralized controlling for home devices 15 Appendix II Implementation exa

27、mple of IoT DCE 17 Bibliography. 18 Rec. ITU-T Y.4115 (04/2017) 1 Recommendation ITU-T Y.4115 Reference architecture for IoT device capability exposure 1 Scope This Recommendation specifies the reference architecture for IoT device capability exposure. The scope of this Recommendation includes: the

28、concept, general characteristics and requirements of IoT device capability exposure, the reference architecture for IoT device capability exposure including common procedures. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this te

29、xt, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition

30、of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T Y.2091 Recommendation ITU-T

31、Y.2091 (2011), Terms and definitions for next generation networks. ITU-T Y.4000 Recommendation ITU-T Y.4000/Y.2060 (2012), Overview of the Internet of things. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 application ITU-T Y.2091: A s

32、tructured set of capabilities, which provide value-added functionality supported by one or more services, which may be supported by an API interface. 3.1.2 capability b-ITU-R M.1224-1: The ability of an item to meet a service demand of given quantitative characteristics under given internal conditio

33、ns. 3.1.3 device ITU-T Y.4000: With regard to the Internet of things, this is a piece of equipment with the mandatory capabilities of communication and the optional capabilities of sensing, actuation, date capture, data storage and data processing. 3.1.4 internet of things (IoT) ITU-T Y.4000: A glob

34、al infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies. NOTE 1 Through the exploitation of identification, data capture, processing and communic

35、ation capabilities, the IoT makes full use of things to offer services to all kinds of applications, whilst ensuring that security and privacy requirements are fulfilled. NOTE 2 From a broader perspective, the IoT can be perceived as a vision with technological and societal implications. 2 Rec. ITU-

36、T Y.4115 (04/2017) 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 device capability exposure (DCE): A functional entity to manage the connected Internet of things (IoT) devices in an IoT area network, to expose the capabilities of the connected IoT de

37、vices to IoT applications and to support the IoT applications to access the exposed device capabilities. NOTE Through device capability exposure, IoT applications can dynamically discover the connected IoT devices. 3.2.2 DCE device: A device (e.g., smart phone, tablet, home gateway) that hosts the d

38、evice capability exposure (DCE) and connects to external IoT devices, and provides underlying hardware/software support for implementing the functionalities of DCE. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: AAM-FC Auth Agent Management Functional

39、 Component of the IoT DCE AM-FC Application Management Functional Component of the IoT DCE API Application Programming Interface DCE Device Capability Exposure DPM-FC Device Proxy Management Functional Component of the IoT DCE FC Functional Component IoT Internet of Things NFC Near Field Communicati

40、on OS Operating System PC Personal Computer PM-FC Profile Management Functional Component of the IoT DCE UPnP Universal Plug and Play USB Universal Serial Bus Wi-Fi Wireless Fidelity 5 Conventions The following conventions are used in this Recommendation: The keywords “is required to“ indicate a req

41、uirement which must be strictly followed and from which no deviation is permitted, if conformance to this Recommendation is to be claimed. The keywords “is recommended“ indicate a requirement which is recommended but which is not absolutely required. Thus, this requirement need not be present to cla

42、im conformance. 6 Introduction IoT devices for individual consumers, especially wearable devices (e.g., watches, glasses, headbands and belts), are accepted in the market and are becoming more and more popular. Usually, consumers use their device capability exposure (DCE) devices (e.g., smart phones

43、, tablets and home gateways) to manage IoT devices. There are two kinds of solutions for using DCE devices to manage IoT devices, vertical solutions and horizontal solutions. Rec. ITU-T Y.4115 (04/2017) 3 In vertical solutions, a device manufacturer is usually also an application vendor. When a devi

44、ce manufacturer launches a new IoT device (e.g., a smart watch) onto the market, it has to provide its own applications (for each of the target operating system (OS) platforms) that will allow consumers to access and manage devices through their DCE devices. In addition, in vertical solutions there

45、are many obstacles to one IoT application integrating the capabilities of different types of IoT devices at the same time. In horizontal solutions, IoT devices and relevant applications are separated. Device manufacturers launch IoT devices and provide relevant software proxies supporting open unifo

46、rm interfaces for the DCE devices. Based on the open standard interfaces, other application vendors can develop applications to access those of the IoT devices via the proxies. Therefore, horizontal solutions can overcome the disadvantages of the vertical solutions mentioned above. The IoT device ca

47、pability exposure (IoT DCE), a common integration middleware in DCE devices, uses one type of horizontal solution. The IoT DCE dynamically discovers, connects and accesses the IoT devices in an IoT area network, and exposes capabilities of the connected external IoT devices to upper IoT applications

48、 with standardized uniform interfaces. Using the uniform interfaces provided by the IoT DCE, the upper IoT applications in a DCE device can dynamically discover, subscribe and access the exposed capabilities of the IoT devices as published on the IoT DCE. Figure 6-1 Overview for IoT DCE The IoT DCE

49、in a DCE device (e.g., a smart phone) as shown in Figure 6-1, integrates the underlying device proxies through interfaces (e.g., I1 to Iy) provided by the manufacturers to interact with relevant IoT devices (e.g., the hairpin, belt, watches, glasses and shoes) respectively and provides uniform interfaces to upper IoT applications, with which the upper IoT applications can access the device capabilities of those IoT devices. 7 General characteristics of IoT DCE This clause describes the gene

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1