Page 20 - TrafficInfraTech Dec-Jan 2019
P. 20

ITS







                                                                                      infrastructure. Rather, it is integrated
                                                                                      into devices/gateways/servers and
                                                                                      allows distributed intelligence. It hides
                                                                                      the complexity of Network usage from
                                                                                      applications as the standard remains
                                                                                      agnostic to  the  communication
                                                                                      protocol. Due to this functionality,
                                                                                      divergent applications can seamlessly
                                                                                      be integrated by using pluggable
                                                                                      adapters which convert the data model
                                                                                      of the particular Network Type to the
                                                                                      oneM2M Data Model. It controls when
                                                                                      communication happens and notifies
                                                                                      applications about events so that
                                                                                      the applications are not required to
                                                                                      continuously poll for the arrival of the
                                                                                      data. It stores and shares data based on
                                                                                      the policies governing the data storage
                                                                                      and grant of access control privileges.
                                                                                         All  the  entities  in  this  framework
                 significant technologies. There are   in the cloud. While on one side you   are represented as resources and all the
                 both opensource and commercial    have all these devices communicating   data generated by these sensors and
                 implementations. C-DOT, the R&D   with the common service layer and   associated applications are the content
                 unit of department of Telecom has   on the other side there are the   instances; Example, a temperature
                 also  been contributing  significantly   head-end applications(monitoring or   sensor would be  represented  by  a
                 to oneM2M specifications. C-DOT   analytical applications) which are the   resource and the readings of the
                 has created the oneM2M standards   recipient of the data generated by   sensor would be the content instances.
                 compliant Common Service Layer    these sensors and issuing commands   The Registration CSF ensures that all
                 Platform, called CCSP which is the   to the actuators (wherever applicable)   applications register themselves to
                 only indigenously developed IoT/M2M   through this common service layer.   the platform before they are allowed
                 Platform. However, there are a number   The common service functions are:  to communicate. So, whenever you
                 of commercial as well as open-source   Registration                  register yourself you get a unique
                 platforms based on oneM2M standard   Discovery                       application entity ID, you get a set of
                 from many international organisations                                keys, so the set of keys will enable you
                 from across the globe. One such     Security                         to encrypt the data that you are sending
                 platform is from HPE which has been   Group Management               and communicating. Now encryption
                 deployed in Bhopal Smart City.      Data Management & Repository     can be a hop by hop encryption, you
                                                                                      can  have  an  end  to end  encryption,
                   This oneM2M compliant system      Subscription & Notification      thereby securing your data. Security as
                 from HP is the mainstay for this Bhopal   Device Management          you see, security is now engrained into
                 Smart City which also includes ITS   Application & Service Management  this common service layer. So, while you
                 Applications.                                                        are following the standard you have to
                                                     Communication Management and
                 Common Service Functions                                             have security implemented into your
                                                     Delivery Handling
                   The common service layer is realised   Network Service Exposure    application. The Discovery CSF discovers
                 using twelve common service functions                                all those resources which are being used
                 and are the core of this horizontal   Location                       in this ecosystem.
                 common service layer. These twelve   Service Charging & Accounting      One major function - subscription
                 common service functions can be      These functions are exposed to   and notification - this is a game changer
                 accessed either by the applications   the applications via developer friendly   because now your business application
                 interfacing the devices or actuators in   APIs. The Common Service Functions   doesn’t have to poll each device in order
                 the field domain or by the applications   (CSFs) are not confined only to the core   to fetch the data. It only must subscribe




            20  December ’18 - January ’19  / TrafficInfraTech                                          www.trafficinfratech-com-500653.hostingersite.com
   15   16   17   18   19   20   21   22   23   24   25