C80216ppc-10_0015.doc - IEEE C802.16ppc-10/0015 Project...

This preview shows page 1 - 4 out of 15 pages.

IEEE C802.16ppc-10/0015 Project IEEE 802.16 Broadband Wireless Access Working Group < > Title Suggested Edits to the Usage Models Section of the M2M Study Report Date Submitted 2010-04-08 Source(s) Kerstin Johnsson Intel Corporation E-mail: [email protected] Re: IEEE 802.16-10/0024 Initial M2M Study Report (Draft) Abstract Comments/edits on the usage models section of the M2M Study Report Purpose To assist in writing the scope of the Machine to Machine (M2M) Communication PAR Notice This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups . It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein. Release The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. Patent Policy The contributor is familiar with the IEEE-SA Patent Policy and Procedures: < > and < >. Further information is located at < > and < >. 1
IEEE C802.16ppc-10/0015 Suggested Edits to the Usage Models Section of the M2M Study Report 1 Introduction This contribution contains comments/edits to the merged content of the Usage Models section of the M2M Study Report draft. There is little/no change in content, only re-phrasing for clarity. 2 Edits Following are suggested phrasing edits to the merged Usage Models section. Previously highlighted text meant for deletion has been removed for ease of reading. 1 2
IEEE C802.16ppc-10/0015 2 802.16 Relevant M2M Usage Models [Editor s Note: xxx from C80216ppc-10_0001r1 , xxx from C80216ppc-10_000 3, xxx from C80216ppc- 10_000 5, xxx is consolidated draft text ] 2.1 Secured Access & Surveillance Security [ Z Many of the M2M use cases in this category can be serviced by short-range wireless (e.g. building access). However, there are enough scenarios where long-range wireless is helpful, if not required, that we include it here are a relevant WAN M2M category. Some examples use cases requiring WAN M2M are surveillance of and controlled access to large industrial parks or farms/estates where there is no access to short-range wireless (e.g. property gates, perimeter surveillance). While most of these are fixed in location, there are some use cases where surveillance video is fed to security vehicles monitoring the property. ] [ General description Security usage model is to prevent theft or insecure physical access in a building or car by M2M services.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture