Page 569 - Unleashing the potenti al of the Internet of Things
P. 569
Unleashing the potential of the Internet of Things 5
Table of Contents
Page
1 Scope ............................................................................................................................. 557
2 References ..................................................................................................................... 557
3 Definitions .................................................................................................................... 557
3.1 Terms defined elsewhere ................................................................................ 557
3.2 Term defined in this Recommendation .......................................................... 558
4 Abbreviations and acronyms ........................................................................................ 558
5 Conventions .................................................................................................................. 559
6 Ubiquitous networking in NGNs .................................................................................. 559
6.1 Overview of ubiquitous networking ............................................................... 559
6.2 Architectural model for ubiquitous networking ............................................. 560
7 Basic concept of object-to-object communication ....................................................... 563
7.1 Objects in the ubiquitous networking environment ........................................ 563
7.2 Characteristics of objects ................................................................................ 563
8 Requirements of "connecting-to-anything" capability for ubiquitous networking ....... 564
8.1 General requirements for object-to-object communication ............................ 564
8.2 Technical considerations for object-to-object communication ...................... 564
9 A mechanism for object-to-object communication: identity processing for
connecting to anything .................................................................................................. 566
10 Security considerations ................................................................................................. 567
Appendix I Characteristics and examples of objects in the ubiquitous networking
environment .................................................................................................................. 568
Appendix II Ubiquitous networking applications and examples using object-to-object
communication ............................................................................................................. 570
Bibliography............................................................................................................................. 571
Rec. ITU-T Y.4404/Y.2062 (03/2012) 555