Standard

Available (1835)

Showing 1261 - 1272 per page



Environmental Engineering (EE); Sustainable power feeding solutions for 5G network

Mobile and fixed networks are evolving towards ultra-broadband and, with 5G, are going to converge. The use of much broader frequency ranges, up to 60 GHz, where radio propagation is an issue, is going to impact the network deployment topologies. In particular, the use of higher frequencies and the need to cover hot/black spots and indoor locations, will make it necessary to deploy much denser amount of radio nodes. 5G is introducing major improvements on Massive MIMO, IoT, low latency, unlicensed spectrum, and with V2x for the vehicular market. Support of some of these services will have a relevant effect on the power ratings and the energy consumption at the radio base station. A major new service area of 5G impacting the powering and backup will be the URLLC (Ultra Reliable Low Latency Communication) as its support will increase the service availability demands by many orders of magnitude. Supporting such high availability goals will be partly reached through redundant network coverage, but a main support will have to come through newly designed powering architectures. This will be made even more challenging as 5G will require the widespread introduction of distributed small cells. ETSI TS 110 174-2-2 [i.5] analyses the implications and indicates possible solutions to fulfil such high demanding availability goals. There is a need to define sustainable and smart powering solutions, able to adapt to the present mobile network technologies and able to evolve to adapt to their evolution. The flexibility would be needed at level of power interface, power consumption, architecture tolerant to power delivery point changes and including control-monitoring. This means that it should include from the beginning appropriate modularity and reconfiguration features for local powering and energy storage and for remote powering solutions including power lines sizing, input and output conversion power and scalable sources. The present document was developed jointly by ETSI TC EE and ITU-T Study Group 5. It is published respectively by ITU and ETSI as Recommendation ITU-T L.1210 [i.7] and ETSI ES 203 700 (the present document), which are technically-equivalent.

ETSI ES 203 700 V1.1.1

Securing Artificial Intelligence (SAI);Mitigation Strategy Report

The present document summarizes and analyses existing and potential mitigation against threats for AI-based systems as discussed in ETSI GR SAI 004 [i.1]. The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases.

ETSI GR SAI 005 V1.1.1

5G;5GS; User Equipment (UE) conformance specification; Part 1: Protocol (3GPP TS 38.523-1 version 16.6.0 Release 16)

The present document specifies the protocol conformance testing for the 3GPP UE connecting to the 5G System (5GS) via its radio interface(s). The following information can be found in the present document (first part of a multi-part test specification): - the overall test structure; - the test configurations; - the conformance requirement and references to the core specifications; - the test purposes; and - a brief description of the test procedure, the specific test requirements and short message exchange table. The applicability of the individual test cases is specified in the ICS proforma specification (3GPP TS 38.523-2 [2]). The Test Suites are specified in part 3 (3GPP TS 38.523-3 [3]). The present document is valid for UE implemented according to 3GPP Releases starting from Release 15 up to the Release indicated on the cover page of the present document.

ETSI TS 138 523-1 V16.6.0

Context Information Management (CIM); NGSI-LD Testing Framework: Test Template

The Testing Framework (document format) specifies a testing framework defining a methodology for the development of the test strategies, test systems and resulting test specifications. The present document identifies the implementation under test (scope of the testing), the format for the test specification, the test architecture, the points of control and observation, the naming conventions (e.g. for test case ID and test case grouping ID), etc. It also provides the Implementation Conformance Statement which is basically a checklist for a client-owner so they know what parts of the specification will be tested and if any is optional. The ICS will be published as a separate GS.

ETSI GS CIM 016 V1.1.1

Terrestrial Trunked Radio (TETRA);Testing specification; Part 1: Radio

Methods for testing whether TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment achieve the performance specified in ETSI EN 300 392-2 [1]. Specific test methods for DMO equipment are recommended in annex F of the present document. The purpose of these specifications is to provide a sufficient quality of radio transmission and reception for equipment operating in a TETRA system and to minimize harmful interference to other equipment. The present document is applicable to TETRA systems operating at radio frequencies in the range of 137 MHz to 1 GHz. Versions V3.3.1 [i.5] and earlier of the present document specified the methods used for type testing. The minimum technical characteristics of TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment and radio test methods to be used for providing presumption of conformity, are now specified in ETSI EN 303 758

ETSI TS 100 394-1 V4.1.1

Securing Artificial Intelligence (SAI); Mitigation Strategy Report

The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases

ETSI GR SAI 005 V1.1.1 (2021-03)

Extended producer responsibility - Guidelines for sustainable e-waste management

This Recommendation offers a description of the extended producer responsibility (EPR) system in dealing with e-waste. It expands on the different existing forms of EPR globally, not only in theoretical terms, but also with a practical view on their feasibility, challenges and pre-requisites. It presents the definition of the EPR system, in addition to the roles and responsibilities of the different stakeholders, the different types of EPR as well as how and why they could be used in certain contexts and not in others. The funding mechanism behind every mode and the organizational structure expected to be in place are also presented. The Recommendation concludes with many best practices from the international arena including developed, developing and emerging economies, as well as the challenges faced in some cases.

ITU-T L.1021

Standard for Autonomous Robotics (AuR) Ontology

This standard is a logical extension to IEEE 1872-2015 Standard for Ontologies for Robotics and Automation. The standard extends the CORA ontology by defining additional ontologies appropriate for Autonomous Robotics (AuR) relating to: 1) The core design patterns specific to AuR in common R&A sub-domains; 2) General ontological concepts and domain-specific axioms for AuR; and 3) General use cases and/or case studies for AuR.

P1872.2

Securing Artificial Intelligence (SAI);Problem Statement

The present document describes the problem of securing AI-based systems and solutions, with a focus on machine learning, and the challenges relating to confidentiality, integrity and availability at each stage of the machine learning lifecycle. It also describes some of the broader challenges of AI systems including bias, ethics and explainability. A number of different attack vectors are described, as well as several real-world use cases and attacks.

ETSI GR SAI 004 V1.1.1

Digital Radio Mondiale (DRM);System Specification

The frequency bands used for broadcasting below 30 MHz are: •Low Frequency (LF) band: from 148,5 kHz to 283,5 kHz, in ITU Region 1 [1] only; •Medium Frequency (MF) band: from 526,5 kHz to 1 606,5 kHz, in ITU Regions 1 [1] and 3 [1] and from 525 kHz to 1 705 kHz in ITU Region 2 [1]; •High Frequency (HF) band: a set of individual broadcasting bands in the frequency range 2,3 MHz to 27 MHz, generally available on a Worldwide basis. These bands offer unique propagation capabilities that permit the achievement of: •large coverage areas, whose size and location may be dependent upon the time of day, season of the year or period in the (approximately) 11 year sunspot cycle; •portable and mobile reception with relatively little impairment caused by the environment surrounding the receiver. There is thus a desire to continue broadcasting in these bands, perhaps especially in the case of international broadcasting where the HF bands offer the only reception possibilities which do not also involve the use of local repeater stations.

ETSI ES 201 980 V4.2.1 (2021-01)