High Level Architecture (HLA)

Similar documents
High Level Architecture (HLA)

High Level Architecture (HLA)

onem2m AND SMART M2M INTRODUCTION, RELEASE 2/3

onem2m and its role in achieving interoperability in IoT

AIOTI ALLIANCE FOR INTERNET OF THINGS INNOVATION

ETSI standards are enabling a global M2M solution. Enrico Scarrone, ETSI TC M2M Chairman, Telecom Italia 3 ETSI M2M workshop, Mandelieu, France, EU

2 - onem2m Common Architecture for IoT

onem2m - A Common Service Layer for IoT Basic principles and architecture overview

The onem2m standard Horizontal Service Layer

ONEM2M FOR SMART CITIES

Overview of IoT related activities in ETSI

HOP Ubiquitous Overview

Khartoum, Sudan Dec 2017

ETSI M2M Release 2. Enrico Scarrone, ETSI TC Smart M2M Vice-Chairman, Telecom Italia 4 ETSI M2M workshop, Mandelieu, France, EU

Standards to enable an IoT Eco System

onem2m Common Architecture for IoT interoperability

IOT STANDARDS ECOSYSTEM WHAT S NEW? IOT WEEK GENEVA 2017

Status of Machine to Machine Standards work in TC M2M and onem2m. Many thanks to the various contributors from TC M2M

ITU-T Y Next generation network evolution phase 1 Overview

onem2m ADAPTED FOR SMART CITIES ETSI IOT M2M WORKSHOP 2016 NOV 15 TH 2016

IoT Standards & Smart Cities Session 1: The Internet of Things Revolution in India Maximising the Next Generation IoT Opportunity in India

Document Number Document Name: Date: Abstract:

ETSI IoT/M2M Workshop 2016 featuring the Smart World. November 15 th -17 th, 2016

Open source onem2m Platforms

ONEM2M TECHNICAL SPECIFICATION

Showcase. Showcase D: onem2m Enriched Personal Life

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam.

THE ROLE OF INTEROPERABILITY IN ACHIEVING PROFITABLE GROWTH IN IOT

onem2m Standards Activities - IoT/M2M Service Layer -

ETSI-AFI work on SDN-oriented Enablers for Customizable Autonomic Management & Control in Evolving and Future Networks

Standardized M2M Software Development Platform Contents

temp heat I/O A/C flow valve pump

How onem2m fits into the landscape of IoT technologies

HOT TOPICS LED BY ETSI - 5G AND IOT

AIOTI ALLIANCE FOR INTERNET OF THINGS INNOVATION

W3C Web of Things. W3C Auto WG F2F Meeting April 2016

onem2m A Common Service Platform for IoT

Standard for an Architectural Framework for the Internet of Things (IoT) IEEE P2413

This Specification is provided for future development work within onem2m only. The Partners accept no liability for any use of this Specification.

Facing the Challenges of M2M Security and Privacy Phil Hawkes Principal Engineer at Qualcomm Inc. onem2m

Final draft ETSI ES V1.1.1 ( )

ETSI TR V1.1.1 ( )

Internet of Things (various aspects), applications, challenges, Standards, current status, etc.

ETSI M2M Architecture Introduction

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017

IoT Week Workshop on Globally Interoperable IoT Identification and Data Processing Identifiers in IoT

ETSI TR V1.1.1 ( )

ISO/IEC JTC 1 Study Group on Smart Cities

Standard Open Source Cloud APIs for the Smart Home

Update on IP VPN work in ITU-T

to Serve the Internet of Things: the onem2m Initiative

Problem Statement of Edge Computing beyond Access Network for Industrial IoT

Harvesting IOT data. (Using IP networks) Ericsson 2014

DIGITIZING INDUSTRY, ICT STANDARDS TO

IMT2020/ 5G Standardization In ITU-T Study Group 13. Hans (Hyungsoo) KIM Vice-chairman ITU-T SG13

SG-CG/SGIS SG-CG/SGIS. ETSI Cyber Security Workshop Sophia Antipolis, France, January the 16th, 2013 Jean-Pierre Mennella, Alstom Grid

Chapter 4. Fundamental Concepts and Models

ETSI M2M workshop Nov 2013

ISO/IEC JTC 1/SWG 5 N 11

F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things

OM2M Horizontal platform for the IoT

TECHNICAL REPORT Architecture Part 2: Study for the merging of architectures proposed for consideration by onem2m

Machine Communication Platforms for Smart Home Applications. Tom Pfeifer Next Generation Networks ANGA COM 2013

ETSI Zero touch network and Service Management (ZSM)

ETSI TR V1.1.1 ( )

15 th November 2016 IoT Build Conference, Double Tree Hilton, Tower of London London, UK

Machine Type Communication and M2M Platform Evolution: Horizontal Service Capabilities or Vertical Silo Mindset?

DEFINITION OF A PILOT TEST PLAN FOR COOPERATION OF AGRICULTURE EQUIPMENT WITH ONEM2M AND C-ITS

Combining LwM2M and OneM2M

A.1 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n

ETSI TS V2.7.1 ( )

ITU-T activities related to Smart Cities - focus on SG20 and FG-DPM

Workshop on Smart Sustainable Cities Samarkand, Uzbekistan, 1-2 June 2017 ITU-T Focus Group on Data Processing and Management

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

ITU-T Study Group 20: Internet of Things (IoT) and smart cities and communities

Requirements and capabilities for. NGN services Marco Carugi Nortel Networks March 2005 Jeju Island, South Korea

Power of open source communities to onem2m

Information Sharing for onem2m Native and Interworked Applications. ETSI IoT/M2M Workshop 2016 Source: Joerg Swetina (NEC) Session 4: IoT Semantic

M403 ehealth Interoperability Overview

27 June, 2017 Jaeho Kim Korea Electronics Technology Institute

Edge Computing & Blockchains for Industrial Automation. John Kaldis Athens Information Technology

ISO/IEC JTC 1 N 13538

Digital (Virtual) Identities in Daidalos and beyond. Amardeo Sarma NEC Laboratories Europe

ETSI TS V ( )

Web of Things Architecture and Use Cases. Soumya Kanti Datta, Christian Bonnet Mobile Communications Department

Cyber Physical Systems Standards and Frugal Innovation challenges

ETSI GS MEC-IEG 005 V1.1.1 ( )

INTEROPERABILITY ISSUES IN IOT

ETSI TISPAN Vision on Convergence. FMCA Convergence & Customer Experience 26 June 2008 Sophia-Antipolis, France

Document Number Document Name: Date: Abstract:

Presentation on OSGi Alliance

GSM V8.0.0 ( )

The Role and Contribution of OMA in Service Delivery Platform Standardization

CITEL s s Focus on Cybersecurity and Critical Infrastructure Protection CITEL

Industrial Internet Connectivity Framework (IICF)

United States Government Cloud Standards Perspectives

5G Fixed-Mobile Convergence

ETSI TR V1.1.1 ( )

Internet of Things: The story so far

e-sens Electronic Simple European Networked Services

Transcription:

1 High Level Architecture (HLA) Release 2.0 WG03 lot Standardisation 2015

2 3 4 5 6 7 8 9 10 11 12 1. Highlights and recommendation... 3 2. Objectives of this document... 3 3. Use of ISO/IEC/IEEE 42010... 3 4. Domain Model... 4 5. Functional model... 5 6. Mapping of SDOs work to the HLA functional model... 10 7. Next steps... 14 8. Annex - Relationship of HLA functional model to other models... 15 9. References:... 16 13 - Restricted 2

14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 1. Highlights and recommendation In the context of the WG3 and by following the evolution on IoT Architectural aspects and available specifications, WG3 has developed a High Level Architecture (HLA) for IoT that should be applicable to Large Scale Pilots. The HLA takes into account existing SDOs and alliances architecture specifications. This document is an integral part of a set of deliverables from WG3 that also cover IoT landscape and Semantic Interoperability aspects. WG3 recommends that the HLA be the basis for further discussion with the Large Scale Pilot (LSP) WGs in order to promote architectural convergence among the WGs. Further development of the HLA should be an incremental exercise taking into account the LSP WGs feedback, however it should remain high level and not compete with established SDOs, alliances and open source projects. 2. Objectives of this document This document provides an initial proposal for a high-level IoT architecture to serve as a basis for discussion within, referred to as the HLA (High-level architecture). The proposal results from discussions within the WG3 and takes into account the work of SDOs, Consortia, and Alliances in the IoT space. Throughout the proposal, WG3 has kept in mind the need to support instantiation for all Large Scale Pilot deployments. This document: Introduces the use of ISO/IEC/IEEE 42010 by WG3 Presents a Domain Model and discusses the thing in IoT Presents a Functional Model Links this work with the WG3 Semantic Interoperability work and the SDO Landscape work Provides mapping examples to some existing SDO/Alliances architectural work related to functional models: ITU-T, onem2m, IIC. An annex describes work in progress, pertaining to the relationship of the HLA functional model with other models. The current version of this document contains some initial content related to the possible relationship with Big Data models, in particular the Big Data interoperability framework developed by NIST [2]. 3. Use of ISO/IEC/IEEE 42010 A key recommendation from WG3 is that architectures should be described using the ISO/IEC/IEEE 42010 standard. The standard motivates the terms and concepts used in - Restricted 3

51 52 53 54 55 56 57 58 59 60 61 62 63 describing an architecture and provides guidance on how architecture descriptions are captured and organized. ISO/IEC/IEEE 42010 expresses architecture in terms of multiple views in which each view adheres to a viewpoint and comprises one or more architecture models. The ISO/IEC/IEEE 42010 standard specifies minimal requirements for architecture descriptions, architecture frameworks, architecture description languages and architecture viewpoints. WG3 recommends using ISO/IEC/IEEE 42010 to capture relevant views and supporting models. The HLA described in this document puts the thing (in the IoT) at the center of value creation. While the body of the proposal is consistent with ISO/IEC/IEEE 42010, WG3 does not provide a complete architecture description for IoT which conforms to the standard. Figure 1 provides an overview of architectural models as described in ISO/IEC/IEEE 42010 64 65 66 67 68 69 70 71 72 73 74 75 Figure 1: Architectural Models based on ISO/IEC/IEEE 42010 With respect to Figure 1, WG3 focuses its recommendations on the Domain and Functional models: The Domain Model describes entities in the IoT domain and the relationships between them The Functional Model describes functions and interfaces (interactions) within the IoT domain 4. Domain Model The Domain Model is derived from the IoT-A Domain Model [1]. A more detailed description of the IoT-A domain model is available in the companion slide-set. - Restricted 4

76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 Figure 2: Domain Model The domain model captures the main concepts and relationships in the domain at the highest level. The naming and identification of these concepts and relationships provide a common lexicon for the domain and are foundational for all other models and taxonomies. In this model, a User (human or otherwise) interacts with a physical entity, a Thing. The interaction is mediated by an IoT Service which is associated with a Virtual Entity, a digital representation of the physical entity. The IoT Service then interacts with the Thing via an IoT Device which exposes the capabilities of the actual physical entity. 5. Functional model The Functional Model describes functions and interfaces (interactions) within the domain. Interactions outside of the domain are not excluded, e.g. for the purpose of using a big data functional model. Annex I provides initial ideas about the possible relationship between the HLA functional model and the NIST big data interoperability reference architecture. 5.1. layered approach The functional model of is composed of three layers as depicted in Figure 3: 93 94 The Application layer: contains the communications and interface methods used in process-to-process communications - Restricted 5

95 96 97 98 99 100 101 102 The IoT layer: groups IoT specific functions, such as data storage and sharing, and exposes those to the application layer via interfaces commonly referred to as Application Programming Interfaces (APIs). The IoT Layer makes use of the Network layer s services. The Network layer: the services of the Network layer can be grouped into data plane services, providing short and long range connectivity and data forwarding between entities, and control plane services such as location, device triggering, QoS or determinism. 103 104 Figure 3: three layer functional model. 105 106 107 108 109 110 111 112 113 114 Note: The term layer is used here in the software architecture sense. Each layer simply represents a grouping of modules that offers a cohesive set of services; no mappings to other layered models or interpretation of the term should be inferred. 5.2. High level functional model The functional model describes functions and interfaces between functions of the IoT system. Functions do not mandate any specific implementation or deployment; therefore it should not be assumed that a function must correspond to a physical entity in an operational deployment. Grouping of multiple functions in a physical equipment remains possible in the instantiations of the functional model. Figure 4 provides a high level functional model, referred to as the HLA functional model. - Restricted 6

115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 Figure 4: HLA functional model Functions depicted in Figure 4 are: App Entity: is an entity in the application layer that implements IoT application logic. An App Entity can reside in devices, gateways or servers. A centralized approach shall not be assumed. Examples of App Entities include a fleet tracking application entity, a remote blood sugar monitoring application entity, etc. IoT Entity: is an entity in the IoT layer that exposes IoT functions to App Entities via the interface 2 or to other IoT entities via interface 5. Typical examples of IoT functions include: data storage, data sharing, subscription and notification, firmware upgrade of a device, access right management, location, analytics, semantic discovery etc. An IoT Entity makes use of the underlying Networks data plane interfaces to send or receive data via interface 3. Additionally interface 4 could be used to access control plane network services such as location or device triggering. Networks: may be realized via different network technologies (PAN, LAN, WAN, etc.) and consist of different interconnected administrative network domains. The Internet Protocol typically provides interconnections between heterogeneous networks. Depending on the App Entities needs, the network may offer best effort data forwarding or a premium service with QoS guarantees including deterministic guarantees. According to this functional model a Device can contain an App Entity and a Network interface, in this case it could use a IoT Entity in the gateway for example. This is a typical - Restricted 7

137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 example for a constrained device. Other devices can implement an App Entity, an IoT Entity and a Network interface. Interfaces depicted in Figure 2 are: 1: defines the structure of the data exchanged between App Entities (the connectivity for exchanged data on this interface is provided by the underlying Networks). Typical examples of the data exchanged across this interface are: authentication and authorization, commands, measurements, etc. 2: this interface enables access to services exposed by an IoT Entity to e.g. register/subscribe for notifications, expose/consume data, etc. 3: enables the sending/receiving of data across the Networks to other entities. 4: enables the requesting of network control plane services such as: device triggering (similar to wake on lan in IEEE 802), location (including subscriptions) of a device, QoS bearers, deterministic delivery for a flow, etc. 5: enables the exposing/requesting services to/from other IoT Entities. Examples of the usage of this interface are to allow a gateway to upload data to a cloud server, retrieve software image of a gateway or a device, etc. The HLA enables the digital representation of physical things in the IoT Entities. Such representations typically support discovery of things by App Entities and enable related services such as actuation or measurements. To achieve semantic interoperability, the representation of things typically contains data, such as measurements, as well as metadata. The metadata provide semantic descriptions of the things in line with the domain model and may be enhanced/extended with knowledge from specific vertical domains. The representation of the things in the IoT Entities is typically provided by App Entities or IoT Entities residing in devices, gateways or servers. A one to one mapping between a physical thing and its representation shall not be assumed as there could be multiple representations depending on the user needs. Figure 5 provides the relationships between the physical things, their representations and the link to semantic metadata which are an instantiation of the domain model described earlier in this document. Further information about Semantic Interoperability is available from [6]. - Restricted 8

170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 Figure 5: relationship between a thing, a thing representation and the domain model 5.3.HLA Security and Management considerations Security and Management are fully recognized as important features in the HLA. Some SDOs specify security and management as separate features, however in the HLA security and management are intrinsic to interface specifications. All the depicted interfaces shall support authentication, authorization and encryption at hop by hop level. End to end application level security could also be achieved via securing interface 1. It is fully recognized that there could be additional and diverse security needs for the different LSPs. Note: WG03 is in close cooperation with WG4 that is addressing the policy issues for security and privacy. As far as management is concerned, there are two aspects of interest: Device and gateway management, which are broadly defined as software/firmware upgrade as well as configuration/fault and performance management. Device management can be performed using interface 5 via known protocols e.g. BBF TR-069 and OMA LWM2M. Additionally Device and gateway management could also be exposed as features to cloud applications using interface 2. - Restricted 9

193 194 195 196 Infrastructure management in terms of configuration, fault and performance is not handled in this version of the HLA but is fully recognized as important aspect for future study. 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 6. Mapping of SDOs work to the HLA functional model The purpose of this section is to provide examples of mapping of existing SDO/alliances architectures to the HLA functional model. The intent of this mapping exercise is threefold: Demonstrate that HLA is closely related to existing architectures and architectural frameworks Provide positioning of existing standards vis-à-vis the HLA Derive any possible important gaps in the HLA (even if the HLA aims to remain high-level) This section does not intend to be exhaustive, other mappings can be added in future releases of this document. 6.1.ITU-T In ITU-T Recommendation Y.2060 Overview of the Internet of Things [3], ITU-T has developed an IoT Reference Model which provides a high level capability view of an IoT infrastructure. As shown in figure 6, the model is composed of the following layers, providing corresponding sets of capabilities [Note - likewise for the HLA, a layer represents here a grouping of modules offering a cohesive set of services]: Application Layer (Application capabilities) Service Support and Application Support Layer (SSAS capabilities - distinguished into Generic support capabilities and Specific support capabilities) Network Layer (Network capabilities - distinguished into Networking capabilities (Control plane level) and Transport capabilities (Data plane level)) Device Layer (Device/Gateway capabilities) The Security capabilities and Management capabilities - both distinguished into Generic Security (Management) capabilities and Specific Security (Management) capabilities are cross-layer, i.e. they can be provided in support of different capability groupings. - Restricted 10

230 231 232 233 234 Figure 6: ITU-T Y.2060 IoT Reference Model Figure 7 provides an initial high level mapping of the ITU-T Y.2060 IoT Reference model to HLA functional model. 235 236 237 238 239 240 241 242 Figure 7: ITU-T IoT Reference Model mapping to WG3 s HLA functional model Various detailed studies related to IoT functional framework and architectural aspects have been developed or are currently in progress within ITU-T; relevant ones include ITU-T Rec. Y.2068 ( Functional framework and capabilities of the Internet of things ), ITU-T draft Rec. F.M2M- RA ( Requirements and reference architecture of M2M service layer ) and ITU-T draft Rec. Y.NGNe-IoT-Arch ( Architecture of the Internet of Things based on NGN evolution ). - Restricted 11

243 244 245 246 247 248 6.2.oneM2M Figure 8 provides the mapping between onem2m and the HLA functional model. onem2m specifies a Common Services Entities (CSE) which provide IoT functions to onem2m AEs (Applications Entities) via APIs [4]. The CSEs also allows leveraging underlying network services (beyond data transport) which are explicitly specified in onem2m and referred to as Network Services Entity (NSE). 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 Figure 8: mapping onem2m to HLA onem2m has specified all interfaces depicted in Figure 8 to a level that allows for interoperability. Three protocols binding have been specified for Mcc and Mca reference points: CoAP, MQTT and HTTP. As regards the Mcn reference point, normative references have been made to interfaces specified by 3GPP and 3GPP2 in particular. However onem2m does not specify vertical specific data formats for exchange between App Entities according to HLA interface 1. This can however be achieved by interworking with other technologies such as ZigBee, AllSeen, etc. 6.3. IIC The Industrial Internet reference Architecture (IIRA) is a standard-based open architecture [5]. The description and representation of the architecture are generic and at a high level of abstraction to support the requisite broad industry applicability., source IIC. Figure 9 provides a three-tier architecture as specified in [5]. - Restricted 12

265 266 267 Figure 9: IIC three tier IIS architecture The mapping of IIC to the HLA is depicted in the following Figure. 268 269 270 271 272 273 274 275 276 277 278 279 Figure 10: mapping HLA to IIC three tier IIS architecture In Figure 10, devices in the IIC proximity domain would typically run App Entities according to the HLA. The Edge gateways would in turn be mapped to IoT Entities, implementing as an example device management for proximity network devices. Interactions with the network for the purpose of data exchange or other network services are depicted through the interface 3 and 4 from the HLA. Finally the Application Domain in IIC would be equivalent to App Entities running in the enterprise data centers. - Restricted 13

280 281 282 283 284 285 286 287 288 289 290 291 7. Next steps The next steps, as agreed by WG3, are as follows: Continue to provide links to the WG3 SDO landscape deliverable (an example is already provided in the companion powerpoint presentation) Provide instantiation examples to specific LSPs Ensure the HLA is further discussed with other WGs with the objective to collect feedback and improve the HLA incrementally (i.e. Integrate feedback from WGs) Improve the link to Semantic Interoperability as documented in [6] Continue/refine the mapping exercise of existing SDOs architectures to the HLA 292 - Restricted 14

293 294 295 296 297 298 299 300 301 8. Annex - Relationship of HLA functional model to other models Annex I Relationship of HLA functional model with Big Data models NOTE This version of the document covers the Big Data interoperability framework developed by NIST. The NIST Big Data interoperability framework has been described to a great extent in the following document [2]. Of particular interest to the scope of this deliverable is the NIST Big Data Reference architecture which is depicted in Figure I.1 302 303 304 305 306 307 308 309 310 311 Figure I.1: NIST Big Data reference architecture When considering the relationship between HLA functional model and the NIST Big Data reference architecture, it is possible to consider a Data Provider as a HLA App Entity running in a Device or Gateway. The Big Data Application Provider could be an HLA IoT Entity or an App Entity running in a cloud server infrastructure, e.g. performing data aggregation. Finally a Data Consumer could be an App Entity running in a Utility back-end server. Figure I.2 depicts this mapping example. - Restricted 15

312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 Figure I.2 Mapping functional model entities to NIST big data reference architecture In Figure I.2 the interface depicted with (? ) to a Big Data Framework Provider could be important in Large Scale Deployments of. Further study is needed to figure-out current standardization developments related to this interface. A standardized interface may provide market benefits and remove dependency on a particular provider for the Big Data framework. 9. References: [1] IoT-A project: http://www.iot-a.eu/public/public-documents [2] NIST big data interoperability framework: http://bigdatawg.nist.gov/v1_output_docs.php [3] ITU-T Y.2060 Overview of the Internet of Things [4] onem2m Functional Architecture Release 1 http://www.etsi.org/deliver/etsi_ts/118100_118199/118101/01.00.00_60/ts_118101v010000p.pdf [5] Industrial Internet Reference Architecture, http://www.iiconsortium.org/iira.htm [6] WG3 deliverable on Semantic Interoperability 330 - Restricted 16

331 Editors: HLA Functional Model Editors: Paul Murdock, Landis+Gyr, Switzerland Omar Elloumi, Alcatel Lucent, France HLA Functional Model Contributors: Omar Elloumi, Alcatel Lucent, France Jean-Pierre Desbenoit, Schneider Electric, France Patrick Wetterwald, Cisco, France Georgios Karagiannis, Huawei, Greece Juergen Heiles, Siemens, Germany Paul Murdock, Landis+Gyr, Switzerland Marco Carugi, NEC Europe, UK Ovidiu Vermesan, Sintef, Norway Martin Serrano, Insight Centre for Data Analytics, Ireland Contributing Companies, Projects, Initiatives, SDOs: Additional Contributing Experts: Reviewers: Patrick Guillemin, WG3 Chair, ETSI, France Jean-Pierre Desbenoit, WG3 alternate Chair, Schneider Electric, France Acknowledgements The would like to thank the European Commission services for their support in the planning and preparation of this document. The recommendations and opinions expressed in this document do not necessarily represent those of the European Commission. The views expressed herein do not commit the European Commission in any way. European Communities, 2015. Reproduction authorised for non-commercial purposes provided the source is acknowledge. - Restricted 17