50 likes | 103 Views
Background. Discovery was mentioned by a number of companies and ranked high in ETSI M2M R2 priorities At the conference call of Feb. 3 rd , the following points were raised regarding this item What is the scope of discovery, i.e. what to be discovered Define requirements Define solutions.
E N D
Background • Discovery was mentioned by a number of companies and ranked high in ETSI M2M R2 priorities • At the conference call of Feb. 3rd, the following points were raised regarding this item • What is the scope of discovery, i.e. what to be discovered • Define requirements • Define solutions
What to be Discovered • M2M Service Provider Discovery and Bootstrapping • Discover available M2M service providers • Service provider to distribute security credentials and security entities used for M2M service bootstrapping • M2M SCL Discovery: • IP address of the host of SCLs • SCL base URI • M2M Services Discovery • Here are examples of services to be discovered • e.g. protocols supported (CoAP, HTTP); bootstrapping methods supported; DM protocols supported; charging (rate); interworking profiles, device types … • Service capabilities: e.g. rem, toe … • Contents Increasingly dynamic and request automated discovery
Discovery in Flow of Events Network bootstrapping and registration M2M Service Bootstrap M2M Service Provider Discovery M2M Service Connection M2M Service Provider Bootstrap (authenticate, security credentials) M2M SCL Registration M2M SCL Discovery (and maybe initial M2M services discovery) M2M Services Discovery Note: These are conceptual steps and some steps can be combined
Requirements & Next Steps • Requirements • The M2M system shall support automated discovery of M2M service providers, service layers and services. • Next steps are: • Clearly define Stage 2 procedures • Upon review and agreements of Stage 2, complete Stage 3 definitions