ImageVerifierCode 换一换
格式:PDF , 页数:50 ,大小:1.48MB ,
资源ID:806554      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-806554.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T Y 4500 22-2018 oneM2M C Field device configuration (Study Group 20).pdf)为本站会员(sumcourage256)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T Y 4500 22-2018 oneM2M C Field device configuration (Study Group 20).pdf

1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4500.22 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2018) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES Internet of things an

2、d smart cities and communities Frameworks, architectures and protocols oneM2M Field device configuration Recommendation ITU-T Y.4500.22 ITU-T Y-SERIES RECOMMENDATIONS GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS, NEXT-GENERATION NETWORKS, INTERNET OF THINGS AND SMART CITIES GLOBAL IN

3、FORMATION INFRASTRUCTURE General Y.100Y.199 Services, applications and middleware Y.200Y.299 Network aspects Y.300Y.399 Interfaces and protocols Y.400Y.499 Numbering, addressing and naming Y.500Y.599 Operation, administration and maintenance Y.600Y.699 Security Y.700Y.799 Performances Y.800Y.899 INT

4、ERNET PROTOCOL ASPECTS General Y.1000Y.1099 Services and applications Y.1100Y.1199 Architecture, access, network capabilities and resource management Y.1200Y.1299 Transport Y.1300Y.1399 Interworking Y.1400Y.1499 Quality of service and network performance Y.1500Y.1599 Signalling Y.1600Y.1699 Operatio

5、n, administration and maintenance Y.1700Y.1799 Charging Y.1800Y.1899 IPTV over NGN Y.1900Y.1999 NEXT GENERATION NETWORKS Frameworks and functional architecture models Y.2000Y.2099 Quality of Service and performance Y.2100Y.2199 Service aspects: Service capabilities and service architecture Y.2200Y.2

6、249 Service aspects: Interoperability of services and networks in NGN Y.2250Y.2299 Enhancements to NGN Y.2300Y.2399 Network management Y.2400Y.2499 Network control architectures and protocols Y.2500Y.2599 Packet-based Networks Y.2600Y.2699 Security Y.2700Y.2799 Generalized mobility Y.2800Y.2899 Carr

7、ier grade open environment Y.2900Y.2999 FUTURE NETWORKS Y.3000Y.3499 CLOUD COMPUTING Y.3500Y.3999 INTERNET OF THINGS AND SMART CITIES AND COMMUNITIES General Y.4000Y.4049 Definitions and terminologies Y.4050Y.4099 Requirements and use cases Y.4100Y.4249 Infrastructure, connectivity and networks Y.42

8、50Y.4399 Frameworks, architectures and protocols Y.4400Y.4549 Services, applications, computation and data processing Y.4550Y.4699 Management, control and performance Y.4700Y.4799 Identification and security Y.4800Y.4899 Evaluation and assessment Y.4900Y.4999 For further details, please refer to the

9、 list of ITU-T Recommendations. Rec. ITU-T Y.4500.22 (03/2018) i Recommendation ITU-T Y.4500.22 oneM2M Field device configuration Summary Recommendation ITU-T Y.4500.22 specifies the architectural options, resources and procedures needed to provision and maintain devices in the field domain in order

10、 to establish M2M service layer operation. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T Y.4500.22 2018-03-01 20 11.1002/1000/13512 Keywords Device management, device configuration, oneM2M. * To access the Recommendation, type the URL http:/handle.itu.int/ in the address f

11、ield of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T Y.4500.22 (03/2018) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, inform

12、ation and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worl

13、dwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in W

14、TSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication admini

15、stration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provi

16、sions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. NOTE This Recommendation departs slightly from the

17、 usual editorial style of ITU-T Recommendations to preserve existing cross-referencing from external documents. INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right.

18、ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectua

19、l property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2018 All rights re

20、served. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T Y.4500.22 (03/2018) iii Table of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation .

21、 2 4 Abbreviations and acronyms 2 5 Conventions 2 6 Introduction . 3 7 Architectural aspects . 4 7.1 Introduction 4 7.2 Information needed for M2M service layer operation . 5 8 Resource type and data format definitions . 7 8.1 Resource type specializations 7 8.2 Resource-type specific procedures and

22、 definitions 25 8.3 Data formats for device configuration 34 9 Procedures . 35 9.1 life cycle procedures 35 9.2 Obtaining authentication credential procedure . 38 9.3 AE and CSE registration procedure . 39 9.4 Enabling data collection by dataCollection resource . 39 Annex A oneM2M Specification upda

23、te and maintenance control procedure . 41 Bibliography. 42 Rec. ITU-T Y.4500.22 (03/2018) 1 Recommendation ITU-T Y.4500.22 oneM2M Field device configuration 1 Scope This Recommendation specifies the architectural options, resources and procedures needed to pre-provision and maintain devices in the f

24、ield domain (e.g., ADN, ASN/MN) in order to establish M2M service layer operation between the devices application entity (AE) and/or common services entity (CSE) and a registrar and/or hosting CSE. The resources and procedures include information about the registrar CSE and/or hosting CSE needed by

25、the AE or CSE to begin machine to machine (M2M) service layer operation. This Recommendation contains oneM2M Release 2 specification oneM2M Field Device Configuration V2.0.0 and is equivalent to standards of oneM2M partners including ARIB, ATIS, CCSA, ETSI b-ETSI TS 118 122, TIA, TSDSI, TTA and TTC.

26、 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revisi

27、on; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this R

28、ecommendation does not give it, as a stand-alone document, the status of a Recommendation. The following referenced documents are necessary for the application of this Recommendation. ITU-T Y.4500.1 Recommendation ITU-T Y.4500.1 (2018), oneM2M Functional architecture. ITU-T Y.4500.4 Recommendation I

29、TU-T Y.4500.4 (2018), oneM2M Service layer core protocol. ITU-T Y.4500.5 Recommendation ITU-T Y.4500.5 (2018), oneM2M Management enablement (OMA). ITU-T Y.4500.6 Recommendation ITU-T Y.4500.6 (2018), oneM2M Management enablement (BBF). ITU-T Y.4500.11 Recommendation ITU-T Y.4500.11 (2018), oneM2M Co

30、mmon terminology. ETSI TS 118 103 ETSI TS 118 103 (2016), oneM2M; Security solutions. FIPS 180-4 NIST, FIPS 180-4 (2015), Secure Hash Standard (SHS). IETF RFC 6920 IETF RFC 6920 (2013), Naming Things with Hashes. 3 Definitions For the purposes of this Recommendation, the terms and definitions given

31、in oneM2M TS-0011 ITU-T Y.4500.11 apply. 3.1 Terms defined elsewhere 3.1.1 application entity (AE) ITU-T Y.4500.11: This represents an instantiation of application logic for end-to-end M2M solutions. 2 Rec. ITU-T Y.4500.22 (03/2018) 3.1.2 common services entity (CSE) ITU-T Y.4500.11: This represents

32、 an instantiation of a set of common service functions of the M2M environment. Such service functions are exposed to other entities through reference points. 3.1.3 (oneM2M) security principal ITU-T Y.4500.11: CSE or AE or node or M2M device which can be authenticated. NOTE When the security principa

33、l is a node or M2M device, then the node or M2M device is acting on behalf of the CSE and/or AE executing on the node or M2M device. 3.2 Terms defined in this Recommendation 3.2.1 application configuration: A procedure that configures an AE on an M2M node in the field domain for M2M service layer op

34、eration. 3.2.2 authentication profile: Security information that is needed to establish mutually-authenticated secure communications. 3.2.3 configuration AE: An AE whose role is to configure the M2M system, including the M2M node in the field domain. 3.2.4 configuration IPE: An IPE that provides the

35、 capability to configure the M2M node in the field domain by interworking the exchange of information between the M2M node and the M2M system. 3.2.5 service layer configuration: A procedure that configures a CSE on an M2M node in the field domain for M2M service layer operation. 4 Abbreviations and

36、acronyms For the purposes of this Recommendation, the abbreviations given in oneM2M TS-0011 ITU-T Y.4500.11, oneM2M TS-0001 ITU-T Y.4500.1 and the following apply: AE Application Entity CSE Common Services Entity M2M Machine to Machine MAF M2M Authentication Function MEF M2M Enrolment Function MO Ma

37、naged Object (BBF specified management) or Management Object (OMA specified management) NP Not Present RSPF Remote Security Provisioning Framework SAEF Security Associated Establishment Framework SUID Security Usage Identifier XML extensible Markup Language XSD XML Schema Definition 5 Conventions Th

38、e key words “Shall“, “Shall not“, “May“, “Need not“, “Should“, “Should not“ in this Recommendation are to be interpreted as described: Shall/Shall not: Rec. ITU-T Y.4500.22 (03/2018) 3 Requirements: 1) Effect on this Recommendation: This Recommendation needs to describe the required feature (i.e., s

39、pecify a technical solution for the requirement); 2) Effect on products: Every implementation (M2M solution that complies to this Recommendation) must support it. 3) Effect on deployments: Every deployment (M2M service based on this Recommendation) must use the standardized feature where applicable

40、otherwise e.g., interoperability problems with other services could arise. Should/Should not: Recommendation: 1) Effect on this Recommendation: This Recommendation needs to describe a solution that allows the presence and the absence of the feature. 2) Effect on products: An implementation may or ma

41、y not support it; however support is recommended. 3) Effect on deployments: A deployment may or may not use it; however usage is recommended. May/Need not: Permission/Option: 1) Effect on this Recommendation: This Recommendation needs to describe a solution that allows the presence and the absence o

42、f the required feature. 2) Effect on products: An implementation may or may not support it. 3) Effect on deployments: A deployment may or may not use it. 6 Introduction Devices in the field domain that host oneM2M AEs and CSEs require configuration that permits the AE or CSE to successfully operate

43、in the M2M service layer. TS-0001 ITU-T Y.4500.1 and TS-0003 ETSI TS 118 103 specify much of what is needed to configure these devices in the field domain (i.e., ADN, ASN/MN). Specifically, TS-0001 ITU-T Y.4500.1 provides: guidance on how a CSE is minimally provisioned in Annex E of the specificatio

44、n including how a user AE is established within a hosting CSE; specification of the general communication flows across the Mca and Mcc reference points in clause 8; specifications for how ASN/MN and ADN nodes and M2M applications are enrolled in the M2M system so that the node in the field domain ca

45、n establish connectivity with a CSE. TS-0001 ITU-T Y.4500.1 heavily relies on clause 6 and on the remote security provisioning framework (RSPF) of TS-0003 ETSI TS 118 103 to specify how the security credentials of ASN/MN and ADN nodes and M2M applications are established in the M2M system for the en

46、rolment of the node or M2M application in the M2M system; specifications for how the ADN and ASN/MN nodes in the field domain are managed using external management technologies in clause 6.2.4; guidance for how the ADN and ASN/MN nodes in the field domain can be configured without the support of ext

47、ernal management technologies in clause 9.1.2. The above clauses in TS-0001 ITU-T Y.4500.1 assume that, for an M2M application to operate in the M2M system, all required information needed to establish M2M service operation between a 4 Rec. ITU-T Y.4500.22 (03/2018) registrar or hosting CSE and the

48、AE or CSE in the field domain is configured before registration of the AE or CSE to the M2M system. This Recommendation specifies the additional architectural elements, resources and procedures necessary to configure ASN/MN and ADN nodes in the field domain in order for that device to establish M2M

49、service layer operation. These architectural elements, resources and procedures are in addition to the architectural elements, resources and procedures already defined in TS-0001 ITU-T Y.4500.1 and TS-0003 ETSI TS 118 103. 7 Architectural aspects 7.1 Introduction The information needed by the remote AE or CSE in the field domain to establish M2M service layer operation uses the architectural aspects of TS-0001 ITU-T Y.4500.1 in order to convey the i

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1