IEEE C802.16ppc-10/0015ProjectIEEE 802.16 Broadband Wireless Access Working Group <>TitleSuggested Edits to the Usage Models Section of the M2M Study ReportDate Submitted2010-04-08Source(s)Kerstin JohnssonIntel CorporationE-mail: [email protected]Re:IEEE 802.16-10/0024 Initial M2M Study Report (Draft)AbstractComments/edits on the usage models section of the M2M Study ReportPurposeTo assist in writing the scope of the Machine to Machine (M2M) Communication PARNoticeThis document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein.ReleaseThe contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16.Patent PolicyThe contributor is familiar with the IEEE-SA Patent Policy and Procedures:<> and <>.Further information is located at <> and <>.1
IEEE C802.16ppc-10/0015Suggested Edits to the Usage Models Section of the M2M Study Report1IntroductionThis contribution contains comments/edits to the merged content of the Usage Models section of the M2M Study Report draft. There is little/no change in content, only re-phrasing for clarity.2EditsFollowing are suggested phrasing edits to the merged Usage Models section. Previously highlighted text meant for deletion has been removed for ease of reading.12
IEEE C802.16ppc-10/00152802.16 Relevant M2M Usage Models [Editor’s Note: xxxfrom C80216ppc-10_0001r1, xxxfrom C80216ppc-10_0003, xxxfrom C80216ppc-10_0005, xxxis consolidated draft text]2.1Secured Access & SurveillanceSecurity[ZMany of the M2M use cases in this category can be serviced by short-range wireless (e.g. building access). However, there are enough scenarios where long-range wireless is helpful, if not required, that we include it here are a relevant WAN M2M category. Some examples use cases requiring WAN M2M are surveillance of and controlled access to large industrial parks or farms/estates where there is no access to short-range wireless (e.g. property gates, perimeter surveillance). While most of these are fixed in location, there are some use cases where surveillance video is fed to security vehicles monitoring the property.][General descriptionSecurity usage model is to prevent theft or insecure physical access in a building or car by M2M services.