Page 20 - TrafficInfraTech Dec-Jan 2019
P. 20
ITS
infrastructure. Rather, it is integrated
into devices/gateways/servers and
allows distributed intelligence. It hides
the complexity of Network usage from
applications as the standard remains
agnostic to the communication
protocol. Due to this functionality,
divergent applications can seamlessly
be integrated by using pluggable
adapters which convert the data model
of the particular Network Type to the
oneM2M Data Model. It controls when
communication happens and notifies
applications about events so that
the applications are not required to
continuously poll for the arrival of the
data. It stores and shares data based on
the policies governing the data storage
and grant of access control privileges.
All the entities in this framework
significant technologies. There are in the cloud. While on one side you are represented as resources and all the
both opensource and commercial have all these devices communicating data generated by these sensors and
implementations. C-DOT, the R&D with the common service layer and associated applications are the content
unit of department of Telecom has on the other side there are the instances; Example, a temperature
also been contributing significantly head-end applications(monitoring or sensor would be represented by a
to oneM2M specifications. C-DOT analytical applications) which are the resource and the readings of the
has created the oneM2M standards recipient of the data generated by sensor would be the content instances.
compliant Common Service Layer these sensors and issuing commands The Registration CSF ensures that all
Platform, called CCSP which is the to the actuators (wherever applicable) applications register themselves to
only indigenously developed IoT/M2M through this common service layer. the platform before they are allowed
Platform. However, there are a number The common service functions are: to communicate. So, whenever you
of commercial as well as open-source Registration register yourself you get a unique
platforms based on oneM2M standard Discovery application entity ID, you get a set of
from many international organisations keys, so the set of keys will enable you
from across the globe. One such Security to encrypt the data that you are sending
platform is from HPE which has been Group Management and communicating. Now encryption
deployed in Bhopal Smart City. Data Management & Repository can be a hop by hop encryption, you
can have an end to end encryption,
This oneM2M compliant system Subscription & Notification thereby securing your data. Security as
from HP is the mainstay for this Bhopal Device Management you see, security is now engrained into
Smart City which also includes ITS Application & Service Management this common service layer. So, while you
Applications. are following the standard you have to
Communication Management and
Common Service Functions have security implemented into your
Delivery Handling
The common service layer is realised Network Service Exposure application. The Discovery CSF discovers
using twelve common service functions all those resources which are being used
and are the core of this horizontal Location in this ecosystem.
common service layer. These twelve Service Charging & Accounting One major function - subscription
common service functions can be These functions are exposed to and notification - this is a game changer
accessed either by the applications the applications via developer friendly because now your business application
interfacing the devices or actuators in APIs. The Common Service Functions doesn’t have to poll each device in order
the field domain or by the applications (CSFs) are not confined only to the core to fetch the data. It only must subscribe
20 December ’18 - January ’19 / TrafficInfraTech www.trafficinfratech-com-500653.hostingersite.com

