Page 553 - 5G Basics - Core Network Aspects
P. 553

Applications                                                1


                    other side, devices can indirectly receive information (e.g., commands) from the communication
                    network.
                    Ad-hoc  networking:  Devices  may  be  able  to  construct  networks  in  an  ad-hoc  manner  in  some
                    scenarios which need increased scalability and quick deployment.
                    Sleeping and waking-up: Device capabilities may support "sleeping" and "waking-up" mechanisms
                    to save energy.
            NOTE – The support in a single device of both capabilities of direct interaction with the communication network and
            indirect interaction with the communication network is not mandatory.
            –       Gateway capabilities:

                    The gateway capabilities include but are not limited to:
                    Multiple interfaces support: At the device layer, the gateway capabilities support devices connected
                    through different kinds of wired or wireless technologies, such as a controller area network (CAN)
                    bus, ZigBee, Bluetooth or Wi-Fi. At the network layer, the gateway capabilities may communicate
                    through  various  technologies,  such  as  the  public  switched  telephone  network  (PSTN),  second
                    generation or third generation (2G or 3G) networks, long-term evolution networks (LTE), Ethernet
                    or digital subscriber lines (DSL).
                    Protocol conversion: There are two situations where gateway capabilities are needed. One situation
                    is  when  communications  at  the  device  layer  use  different  device  layer  protocols,  e.g.,  ZigBee
                    technology protocols and Bluetooth technology protocols, the other one is when communications
                    involving both the device layer and network layer use different protocols e.g., a ZigBee technology
                    protocol at the device layer and a 3G technology protocol at the network layer.

            8.5     Management capabilities

            In a similar way to traditional communication networks, IoT management capabilities cover the traditional
            fault,  configuration,  accounting,  performance  and  security  (FCAPS)  classes,  i.e.,  fault  management,
            configuration management, accounting management, performance management and security management.

            The  IoT  management  capabilities  can  be  categorized  into  generic  management  capabilities  and  specific
            management capabilities.

            Essential generic management capabilities in the IoT include:
            –       device  management,  such  as  remote  device  activation  and  de-activation,  diagnostics,  firmware
                    and/or software updating, device working status management;
            –       local network topology management;
            –       traffic and congestion management, such as the detection of network overflow conditions and the
                    implementation of resource reservation for time-critical and/or life-critical data flows.
            Specific management capabilities are closely coupled with application-specific requirements, e.g., smart grid
            power transmission line monitoring requirements.

            8.6     Security capabilities
            There are two kinds of security capabilities: generic security capabilities and specific security capabilities.
            Generic security capabilities are independent of applications. They include:
            –       at the application layer: authorization, authentication, application data confidentiality and integrity
                    protection, privacy protection, security audit and anti-virus;
            –       at the network layer: authorization, authentication, use data and signalling data confidentiality, and
                    signalling integrity protection;
            –       at the device layer: authentication, authorization, device integrity validation, access control, data
                    confidentiality and integrity protection.

            Specific  security  capabilities  are  closely  coupled  with  application-specific  requirements,  e.g.,  mobile
            payment, security requirements.

                                                                                                         543
   548   549   550   551   552   553   554   555   556   557   558