Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
3> (2011-01)
Technical Report
Reference
<DTR/M2M-00013>
Keywords
<M2M, Network, Service>
ETSI
Important notice
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
ETSI
3 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
Contents
Contents ..............................................................................................................................................................3
Intellectual Property Rights ................................................................................................................................4
Foreword.............................................................................................................................................................4
Introduction ........................................................................................................................................................4
1 Scope ........................................................................................................................................................5
2 References ................................................................................................................................................5
2.1 Normative references ......................................................................................................................................... 5
3 Definitions, and abbreviations ..................................................................................................................6
3.1 Definitions .......................................................................................................................................................... 6
Definition format ................................................................................................................................................................. 7
3.3 Abbreviations ..................................................................................................................................................... 7
Abbreviation format ............................................................................................................................................................ 7
4. Architectural Frameowork and Reference Points.....................................................................................7
4.1 Reference Architecture ....................................................................................................................................... 7
4.1.1 Refence Architecture for Interworking with XDMS..................................................................................... 7
4.1.2 OMA-DM/BBF-TR069 Integration ............................................................................................................ 11
4.2 Reference Points .............................................................................................................................................. 12
5. Delegation of M2M Service Capabilities ...............................................................................................14
5.1 Application Usage of XDMS for Management of M2M Service Capabilities Resources................................ 14
5.1.1 High level Principles ................................................................................................................................... 14
5.1.1. 1 M2M Service Capabilities Application Usages .................................................................................................... 14
5.1.1.2 Mapping between XDMS and M2M Service Capability AS ................................................................................ 16
5.1.2 Management of Device/Gateway SCL resources ....................................................................................... 17
5.1.3 Management of device/gateway Application resources .............................................................................. 17
5.1.4 Management of Network Application resources......................................................................................... 17
5.1.5 Management of Access Right Resources ................................................................................................... 17
5.1.6 Managament of Group Resources ............................................................................................................... 17
6 M2M Service Capabilities Procedures ............................................................................................................. 17
6.1.1 Service Bootstrap ........................................................................................................................................ 17
6.1.2 Registration Procedure ................................................................................................................................ 17
6.1.3 Secure Communication ............................................................................................................................... 17
6.1.4 M2M Service Capability Discovery Procedure .......................................................................................... 17
6.1.5 Group Communication Procedure .............................................................................................................. 17
6.1.6 Subscription Procedure ............................................................................................................................... 17
6.1.7 Reading and Writing Procedures ................................................................................................................ 17
6.1.8 Remote Entity Management Procedures ..................................................................................................... 17
7. Telco Operator Exposure (TOE) Related Procedures ............................................................................18
7.1 Location Procedure........................................................................................................................................... 18
7.2 SMS Procedure ................................................................................................................................................. 18
7.3 MMS Procedure ............................................................................................................................................... 18
7.4 Voice Call Procedure........................................................................................................................................ 18
7.5 Presence Procedure........................................................................................................................................... 18
Proforma copyright release text block ..............................................................................................................18
A.1 First clause of the annex .........................................................................................................................18
A.1.1 First subdivided clause of the annex................................................................................................................. 18
History ..............................................................................................................................................................20
History box entries ............................................................................................................................................................ 20
ETSI
4 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Report (TR) has been produced by {ETSI Technical Committee|ETSI Project|<other>} <long techbody>
(<short techbody>).
Introduction
This clause is optional. If it exists, it is always the third unnumbered clause.
ETSI
5 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
1 Scope
The present document describes the ways in which M2M Service Capabilities can delegate aspects of its functionalities
to existing underlying core network functionality. Leveraging existing deployed standard core network functionality to
fulfil M2M Service Capabilities functionality is particularly attractive for incumbent service providers who have
already deployed networks and intend to offer M2M services.
There is no restriction on which core network functionality can be used to fulfil a role as long as it can fulfil the
intended role without any changes to its functionality nor to its standard interfaces
The report will document supported M2M Service Capabilities on a per procedure basis as defined in the mIa and mID
interfaces versus the corresponding core network functionality(ies) that can fulfil the role for the procedure, and the
manner in which that role is fulfilled. This ensures successful interworking in a multi-vendor environment.
In addition to the delegation aspect described above, this document describes how M2M Service Capabilities interwork
with core network nodes to fulfil tasks required, but are not directly related, to defined procedures on the mIa and mId
interfaces.
2 References
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee
their long term validity.
ETSI
6 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
The following referenced documents are required for the application of the present document:
[1] ETSI TR 102 725: " Machine to Machine Communications (M2M); Definitions".
The acronyms and the abbreviations defined in TR 102 725 and used inside this document (TS 102
690) are normative by means of this reference.
[2] ETSI TS 102 xxx: " Machine to Machine Communications (M2M); mIa, mId, dIa Interfaces".
[3] 3GPP TS 23.002: "3rd Generation Partnership Project; Technical Specification Group Services
and Systems Aspects; Network architecture".
[4] 3GPP TS 33.220: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; Generic Authentication Architecture (GAA); Generic bootstrapping
architecture".
[6] 3GPP TS 29.229: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Cx and Dx interfaces based on the Diameter protocol; Protocol details"
[7] 3GPP TS 29.329: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Sh Interface based on the Diameter protocol; Protocol details".
[8] 3GPP TS 29.214: "3rd Generation Partnership Project; Technical Specification Group Core
Network and Terminals; Policy and Charging Control over Rx reference point".
[9] 3GPP TS 32.299: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; Telecommunication management; Charging management; Diameter charging
applications".
[10] 3GPP TS 23.271: "3rd Generation Partnership Project; Technical Specification Group Services
and System Aspects; Functional stage 2 description of Location Services (LCS)".
[17] ETSI TS 102 921: “M2M mIa, dIa and mId interfaces”
[19] Broadband Forum “TR-181 Device Data Model for TR-069”, Issue 2, Issue Date: May 2010.
http://www.broadband-forum.org/technical/download/TR-181_Issue-2.pdf
Definitions and abbreviations extracted from ETSI deliverables can be useful when drafting documents and can be
consulted via the Terms and Definitions Interactive Database (TEDDI) (http://webapp.etsi.org/Teddi/).
3.1 Definitions
ETSI
7 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
• The form of a definition shall be such that it can replace the term in context. Additional information
shall be given only in the form of examples or notes (see below).
For the purposes of the present document, the [following] terms and definitions [given in ... and the following] apply:
Definition format
<defined term>: <definition>
3.3 Abbreviations
Abbreviations should be ordered alphabetically.
For the purposes of the present document, the [following] abbreviations [given in ... and the following] apply:
Abbreviation format
<ACRONYM1> <Explanation>
<ACRONYM2> <Explanation>
<ACRONYM3> <Explanation>
4.1.1.1 Option1: M2M SCL and Core network Nodes owned by different Providers
Figure 1 below shows the architecture for option 1.
In this option, the provider of the M2M SCL is independent from the provider of the core network nodes which include
HSS, XDMS and the Aggregation Proxy depicted in Figure 4.1.1-1.
ETSI
8 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
M2M Applications
mIa
M2M Service Capabilities
XDMS
M2M Device Domain NAE
NSEC11
NSEC
1
M2M Applications NRAR
NHDR
dIa XDM-4
Routing
NCB function
M2M NTOE
Service XDM-11
Capabilities NCS NTM TLS per user Aggregation
mId Proxy
NGC TLS per user
Figure 4.1.1-1 : Option 1 - interworking XDMS- M2M SCL for different service providers
Notes:
1- Denotes an XDM agent implemented in NRAR and NSEC. Note that typically there would be 1 XDM
agent per M2M SCL
In option 1, the Aggregation proxy is the node of interaction between the 2 providers. The aggregation proxy includes
an embedded authentication proxy which performs the authentication for user (device application/network
application/SCL) requests arriving to the M2M SC. User authentication is performed against user credentials stored in
HSS.
Every request arriving to the M2M SCL and that requires a creation/retrieval/update/deletion of a resource, results in an
equivalent XCAP request created by the XDM agent towards the Aggregation Proxy.
The M2M SCL establishes a separate TLS tunnel for every distinct user prior to exchanging any user traffic with the
Aggregation Proxy. The TLS tunnel establishes mutual authentication between the M2M SCL and the aggregation
proxy and is bound to the user. The TLS tunnel eliminates the need to authenticate the user for every request. This is
however the M2M SCL provider policy choice and a user can be authenticated for every request. Typically, the user is
authenticated when the TLS is established and need not be authenticated for subsequent transactions as long as there is a
TLS tunnel bound to the user. An M2M SCL provider may choose to tear down the TLS tunnel once a transaction is
completed to force authentication for every user initiated request.
The duration of the TLS tunnel for a user session is subject to policies for either the M2M SCL or the aggregation
proxy. Certain events can also lead to the tearing down of a user TLS tunnel such as the de-registration of the user.
Either node can tear town the TLS tunnel.
Once a user is successfully authenticated for an incoming request, the equivalent XCAP request is forwarded to the
XDMS for further processing.
Figure 4.1.1-2 below shows a high level call flow for an exemplary case for illustrative purposes:
ETSI
9 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
Aggregation
User M2M SCL proxy HSS XDMS
NRAR/NEC XDM Agent
7. Response 6. Response
8. Response
1- In step 1 a user initiates a creation request for a new resource to its local SCL.
2- The local /hosting SCL verifies is there is an existing TLS tunnel bound to the user. If none is found, the Local
SCL establishes a TLS tunnel towards the aggregation proxy for the user.
3- Once the tunnel is successfully established the XDM agent creates the XCAP request equivalent to the
incoming user request and forwards it to the aggregation proxy.
4- The aggregation proxy performs user authentication first against user credentials stored in HSS, if the TLS for
the user was just established.
5- Once the user is successfully authenticated, the aggregation proxy forwards the request to the XDMS
6- XDMS sends back the response to the aggregation proxy
7- The aggregation proxy forwards the response to the Local SCL (XDM agent)
8- The locals SCL returns the response to the user
4.1.1.2 Option2: M2M SCL and Core network Nodes owned by the same Provider
Figure 4.1.1-3 below shows the architecture for option 2.
In this option, the provider of the M2M SCL is the same provider of the core network nodes which include HSS, and
XDMS depicted in Figure 3.
Note that this option equally applies to the case when the MSM SCL and the core network provider are independent but
have an agreement that allows such an architecture to be deployed
ETSI
10 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
M2M Applications
mIa
M2M Service Capabilities
Communication modules
Zh, Zh++
Core Network Connection
Figure 4.1.1-3 : Option 2 - interworking XDMS- M2M SCL for same service providers
Notes:
Option 2 does not include an aggregation proxy. Rather, the XMD agent includes an embedded authentication proxy
which performs the authentication for every user (device application/network application/SCL) request arriving to the
M2M SCL.
Every request arriving to the M2M SCL and that requires a creation/retrieval/update/deletion of a resource, results in an
equivalent XCAP request from the XDM agent towards the XDMS.
The XDM agent in the M2M SCL authenticates every user request requiring access to a resource. The authentication is
performed against user credentials stored in HSS.
Once a user is successfully authenticated for an incoming request, the XDM agent creates an equivalent XCAP request
towards XDMS for further processing
Figure 4.1.1-4 below shows a high level call flow for an exemplary case for illustrative purposes:
ETSI
11 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
2. Authenticate User
4. Response
5. Response
1- In step 1 a user initiates a creation request for a new resource to its local SCL.
2- The local /hosting SCL authenticates the user against user credentials stored in HSS.
3- Once the user is successfully authenticated, the XDM agent creates the XCAP request equivalent to the user
request and forwards it to the XDMS
4- XDMS sends back the response to the Local SCL (XDM agent)
5- The locals SCL returns the response to the user
M2M Applications
M2M Service
Capabilities Routing
SC7 SC3
function
D/GREM
NREM
Device Mgmt
Device Mgmt interface Device Mgmt SC4
Client Server
SC5
mId
Core Network Connection
Communication modules
Core Network A Core Network B
ETSI
12 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
Figure 4.1.2-1 Integration of device management enablers for M2M Remote Entity Management
In this option, the Device Management Client is integrated as a part of the D/GREM Service Capability, while the
Device Management Server is integrated as a part of the NREM Service Capability.
The D/GREM may collect the Management Object data from the Device Management Client in the local M2M
Device/Gateway via an internal interface, and may create/update the corresponding mgmtObj resource(s) in the N-
SCL via the mId reference point using the RESTful access methods as described in ETSI M2M TS 102 690 [16] and
TS 102 921 [17].
Alternatively, the mgmtObj resource may be created by administrative means in the N-SCL.
Any device management activity (e.g. firmware update, fault management) in the Device/Gateway is carried out by
the Device Management Client, communicating with a Device Management Server in NREM via existing device
management interfaces.
The GREM is also responsible for the management of the D’-type devices associated with the M2M Gateway. The
Management Object data of the D’-type device is a part of the Management Object data of the M2M Gateway. The
interactions between the GREM and the D’-type device for device management purpose is out of scope.
NREM triggers OMA-DM [11] or BBF-TR069 [18] Device Management procedures over mId resulting from actions
on the mgmtObj resources by M2M Network Applications via mIa or by M2M Management Functions.
Note: Alternatively to Device Management Server being integrated as a part of the NREM a Device Management
Server may be external to NREM but interface with NREM via an implementation-specific interface exposed by the
Device Management Server.
• high-level management functionalities (e.g. ETSI M2M specific data model) which shall be supported by the
underlying Management Object(s) on the remote entity.
or
• low-level functionalities on the remote entity mapped from the data model as specified by existing device
management technologies (e.g. OMA-DM, BBF-TR069).
Zh reference point: The Zh is an intra-operator interface. The protocol is based on Diameter as specified in 3GPP TS
33.220 [4].
Zh++ reference point: The Zh ++ reference point is an extension of the Zh reference point to support Digest-based
authentication schemes. The extensions are currently proprietary but there is ongoing work in 3GPP to support such a
ETSI
13 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
scheme at which point reference shall be made to the standardized reference point. Given that this is an intra-operator
interface no interoperability issues is foreseen.
XDM-11: The XDM-11 Reference Point supports the communication between the XDM Agent and the Aggregation
Proxy. The protocol for the XDM-11 Reference Point is XCAP and XDCP.
• Management of XDM Resources (e.g. create, modify, retrieve, delete) handled by any XDMS in any network.
XDM-14: The XDM-14 Reference Point provides the following functions:
• Management of XDM Resources (e.g. create, modify, retrieve, delete) handled by a particular XDMS residing
in the same network as the XDM Agent;
• Forwarding of XDM Resources handled by a particular XDMS residing in the same network as the XDM
Agent.
XDM-4: The XMD-4 Reference Point provides the following functions:
• Management of XDM Resources (e.g. create, modify, retrieve, delete, restore) handled by a particular XDMS;
• History Information management for XDM Documents (e.g. retrieve the History information related to an
XDM Document);
• History function related preferences management (e.g. enable/disable History function) for XDM Documents
handled by particular XDMS;
• Management (e.g. create, modify, retrieve, delete, restore) of XDM Resources requested by an XDMS but
handled by any other XDMS.
mId:
This reference point shall support the RESTful interface as defined in ETSI M2M TS 102 690 [16] and TS 102 921
[17], which allows the D/GREM to create mgmtObj resources in the NREM for the purpose of the remote entity
management thereafter.
If OMA-DM technology is re-used for the M2M remote entity management, this reference point shall also support DM-
1 and DM-2 interfaces as defined in [11].
• DM-1 provides an interface over which DM Server in the M2M Core may send device management
notification to DM Client on the M2M Device/Gateway to trigger the initiation of a DM session. See details in
[11]. The protocol communicated over this interface is DM Notification [12].
• DM-2 provides an interface over which DM Server in the M2M Core may send device management
commands to DM Client on the M2M Device/Gateway and DM Client may return status and alerts to DM
Server. See details in [11]. The protocol communicated over this interface can be DM session [13] or
sessionless messages [14].
If TR-069 technology is reused for the M2M remote entity management, this reference point shall also support TR-069
CWMP interfaces as defined in [18].
• TR-069 CWMP provides an interface over which TR-069 ACS Server in the M2M Core may send device
management notification to TR-069 CPE on the M2M Device/Gateway and CPE may return status and alerts
to ACS Server. See details in [18]. The protocol communicated over this interface is the CPE WAN
Management Protocol (CWMP).
ETSI
14 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
- Every independent entity shall have a different tree under the XCAP-root and where its resources are stored
under the appropriate application usages. This ensures complete privacy and simplifies the entire XDMS
operation.
- Application usages common to all entities shall be defined immediately under the XCAP-root. (e.g. AUIDn in
the figure below)
- All entities share the same Application usages (e.g. AUIDm, AUID1 in the figure below)
- OMA defined Application usages shall retain their location in the M2M directory scheme. In other words,
xcap-caps AUID shall be located immediately beneath the XCAP root. The same applies to the
oma.openmpobilealliance.xcap-directory AUID, which shall be located immediately beneath the XCAP root.
The figure below shows a high level overview of the above principles
XCAP-Root
<SCLBase1>
Entity 1 <SCLBase2> Org.openmobileallia AUIDn xcaps-cap
nce.xcap-directory
ETSI
15 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
XCAP-Root
SCLBase
org.ETSI.M2M-
org.ETSI.M2M- org.ETSI.M2M- org.ETSI.M2M- org.ETSI.M2M- org.ETSI.M2M-
Registered- org.ETSI.M2
Groups SCL-Remote- SCL-Local- Containers Access-Rights
SCLs M-SCLbase
Applications Applications
Maps to <scls>
Global Maps to
users information under users
users
<sclbase> root
<accessRight>
<group> <applicationAnnc>
users Includes *ALL*
Includes *ALL* Access Rights
groups created created by an
locally by
global application or
application, or <container> by a remote
by a remote a M2M entity
M2M entity.
users Includes *ALL* containers
users global created by an a local
application or a remote
M2M entity.
<SCL> <application>
XCAP-Root
SCLBase
org.ETSI.M2M-
org.ETSI.M2M- org.ETSI.M2M-
org.ETSI.M2M- AccessRight-
Application- Container-
Group-Collections Collections
Collections Collections
Eleven Application Usages are identified for managing M2M resources. They are as follows:-
- Access Right Application Usage defined under the sclbase tree. This Application Usage handles the
management of M2M access rights resources created under the sclbase.
ETSI
16 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
- Group Application Usage defined under the sclbase tree. This Application Usage handles the management of
M2M group resources created under the sclbase tree.
- Container Application Usage defined under the sclbase tree. This Application Usage handles the management
of M2M container resources created under the sclbase tree
- The Registered SCL (remote gateways/devices) Application Usage defined under the sclbase tree. This
Application Usage handles the management of M2M SLCs (registered SCLs) created under the sclbase tree.
- Registered M2M Applications Application Usage defined under the sclbase tree. This Application Usage
handles the management of M2M applications created under the sclbase tree.
- Announced Applications (Remotely registered M2M Applications) Application Usage defined under the
sclbase tree. This Application Usage handles the management of M2M announced applications resources
created under the sclbase tree.
- Container Collection Application Usage defined under the sclbase tree. This Application Usage handles the
management of M2M container collection resources, including announced containers resources, created under
the sclbase tree.
- Group Collection Application Usage defined under the sclbase tree. This Application Usage handles the
management of M2M group collection resources, including announced groups resources, created under the
sclbase tree.
- Access Rights Collection Application Usage defined under the sclbase tree. This Application Usage handles
the management of M2M access rights collection resources, including announced access rights resources,
created under the sclbase tree.
- Application Collection Application Usage defined under the sclbase tree. This Application Usage handles the
management of M2M application collection resources, including announced applications resources, created
under the sclbase tree.
- M2M SCL base Application usage defined under the leg e tree. This Application Usage handles the
management of all M2M resources created under the sclbase tree.
Note that in all Application Usages dealing with Collections, notably the last four, none of the referenced resources
included in any collection are referenced more than once. It is the responsibility of the M2M SC to enforce this
restriction.
Initially the XCAP root is provisioned in the M2M AS, or discovered through defined XDMS procedures. Following
that, and through the application usage, the M2M Service Capability AS creates the necessary XCAP URIs for storing
an XML document in the XCAP directory and maintains a mapping between that XCAP URI and the equivalent HTTP
URI for the XML document.
The mappings will be further described in the various application usages that govern the M2M application
ETSI
17 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
ETSI
18 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
ETSI
19 Draft ETSI TR 101 531 V<0.1.3> (2011-01)
History
Document history
V0.0.0 October 2010 Template
V.0.1.1 December 2010 Included M2M-XDMS interwork architecture for two business models. First
model, where the M2M SP owns the core network, and the second model where
the 2 providers are different
V.0.1.2 January 2011 Included the XDMS M2M overall Application Usage architecture, and Device
Management architecture
V.0.1.3 January 2011 Minor editorial updates by the M2M support team
ETSI