Technology

The Internet of Things will inter-connect billions of devices to provide major advances in energy, water, public safety, transportation, healthcare, industrial automation, smart homes, and smart vehicles.

PolicyNet

PolicyNet M2M Software Platform

oneM2M Functional Architecture

illustration--policynet-m2m-software-platform
Figure 1

oneM2M Common Service Functions

Available in the Grid Wide M2M Managed Services platform as a service

illustration--onem2m-common-service-functions
Figure 2

Figure 2 depicts the oneM2M Common Service Functions available in the Grid Wide M2M Managed Services platform as a service: Application and Service Layer Management; Communication Management and Delivery Handling; Data Management and Repository; Device Management; Discovery; Group Management; Location; Network Service Exposure, Service Execution and Triggering; Registration; Security; Service Charging and Accounting; and Subscription and Notification.

APPLICATION AND SERVICE LAYER MANAGEMENT

The Application and Service Layer Management (ASM) CSF provides a CSE Configuration Function (CF) and a CSE/AE Software Management Function (SMF).  The CSE CF enables configuration of the capabilities and features of a CSE (e.g., CMDH policies).  The CSE/AE SMF provides the capability to manage software packages and modules for CSEs and AEs.  Together, the ASM CF and SMF provide the capability to configure, troubleshoot and upgrade the functions of the CSE and AE. 

COMMUNICATION MANAGEMENT AND DELIVERY HANDLING

The Communication Management and Delivery (CMDH) CSF provides the capability to control and schedule uplink and downlink communications? and buffer communication requests for future forwarding according to operator-defined Quality of Service (QoS) policies. PolicyNet M2M Infrastructure Domain and Field Domain CSE Policy Enforcement Points (PEP) enforce service flow orchestration across all M2M vertical application service flows via CMDH policies.  PolicyNet M2M service flow orchestration leverages AE registered service flow requirements, combined with operator-defined CMDH policy and real-time network information, to optimize network resource utilization and maintain Quality of Service across all markets, especially high-ARPU people and low-ARPU critical infrastructure machines.

DATA MANAGEMENT AND REPOSITORY

The Data Management and Repository (DMR) CSF provides the capability to collect, aggregate, store and mediate large amounts of data for analytics and semantic processing of M2M applications. 

DEVICE MANAGEMENT

The Device Management (DMG) CSF provides the capability to manage M2M nodes that reside within an M2M System. The device management capability includes device configuration management, device diagnostics and monitoring, device firmware management and device network topology.

DISCOVERY

The Discovery (DIS) CSF provides the capability to search for, subject to access control policy, applications and services contained in M2M nodes, resources and services.

GROUP MANAGEMENT

The Group Management (GMG) CSF provides the capability for handling group creation, retrieval, update and deletion (CRUD) plus the distribution of bulk operations to the members of a group.  The GMG CSF leverages underlying network capabilities such as broadcast or multicast when available.

LOCATION

The Location (LOC) CSF allows AEs to obtain geographical location information of M2M Nodes for location-based services.

NETWORK SERVICE EXPOSURE, SERVICE EXECUTION AND TRIGGERING

The Network Service Exposure, Service Execution and Triggering (NSSE) CSF communicates with underlying networks over the Mcn reference point, on behalf of other CSEs and AEs, for accessing network service functions such as device triggering, small data transmission, location notification, policy rules setting, location queries, IMS services, device management. 

REGISTRATION

The Registration (REG) CSF processes registration requests from AEs or other CSEs, which then enable the AE or CSE to use, subject to access control policy, the M2M services provided by the common service layer.

SECURITY

The Security (SEC) CSF provides identity management, access control including authentication and authorization, security association establishment, security policy administration, and the services to manage sensitive data: confidentiality, integrity, availability.  Confidentiality controls access to information, integrity provides the assurance of trustworthy and accurate information, and availability guarantees reliable information access for authorized users.

SERVICE CHARGING AND ACCOUNTING

The Service Charging and Accounting (SCA) CSF manages charging policies and configuration, captures service layer chargeable events, and generates charging records and charging information.  The PolicyNet M2M platform provides service flow-level accounting capabilities, enforced at CSE PEPs according to operator-defined SCA policies.

SUBSCRIPTION AND NOTIFICATION

The Subscription and Notification (SUB) CSF manages subscriptions to resources, subject to access control policies, and publishes corresponding notifications to resource subscribers.

POLICYNET M2M SOFTWARE PLATFORM COMPONENTS

The PolicyNet M2M software is comprised of the both the infrastructure and field domain common service functions. The infrastructure domain functions are available in the cloud-based PolicyNet M2M platform, and the field domain functions are available inside select M2M LTE Modules that include the PolicyNet M2M CSE firmware.