ETSI

Available (247)

Showing 145 - 156 per page



Environmental Engineering (EE); Sustainable power feeding solutions for 5G network

Mobile and fixed networks are evolving towards ultra-broadband and, with 5G, are going to converge. The use of much broader frequency ranges, up to 60 GHz, where radio propagation is an issue, is going to impact the network deployment topologies. In particular, the use of higher frequencies and the need to cover hot/black spots and indoor locations, will make it necessary to deploy much denser amount of radio nodes. 5G is introducing major improvements on Massive MIMO, IoT, low latency, unlicensed spectrum, and with V2x for the vehicular market. Support of some of these services will have a relevant effect on the power ratings and the energy consumption at the radio base station. A major new service area of 5G impacting the powering and backup will be the URLLC (Ultra Reliable Low Latency Communication) as its support will increase the service availability demands by many orders of magnitude. Supporting such high availability goals will be partly reached through redundant network coverage, but a main support will have to come through newly designed powering architectures. This will be made even more challenging as 5G will require the widespread introduction of distributed small cells. ETSI TS 110 174-2-2 [i.5] analyses the implications and indicates possible solutions to fulfil such high demanding availability goals. There is a need to define sustainable and smart powering solutions, able to adapt to the present mobile network technologies and able to evolve to adapt to their evolution. The flexibility would be needed at level of power interface, power consumption, architecture tolerant to power delivery point changes and including control-monitoring. This means that it should include from the beginning appropriate modularity and reconfiguration features for local powering and energy storage and for remote powering solutions including power lines sizing, input and output conversion power and scalable sources. The present document was developed jointly by ETSI TC EE and ITU-T Study Group 5. It is published respectively by ITU and ETSI as Recommendation ITU-T L.1210 [i.7] and ETSI ES 203 700 (the present document), which are technically-equivalent.

ETSI ES 203 700 V1.1.1

Securing Artificial Intelligence (SAI); Mitigation Strategy Report

The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases

ETSI GR SAI 005 V1.1.1 (2021-03)

Terrestrial Trunked Radio (TETRA);Testing specification; Part 1: Radio

Methods for testing whether TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment achieve the performance specified in ETSI EN 300 392-2 [1]. Specific test methods for DMO equipment are recommended in annex F of the present document. The purpose of these specifications is to provide a sufficient quality of radio transmission and reception for equipment operating in a TETRA system and to minimize harmful interference to other equipment. The present document is applicable to TETRA systems operating at radio frequencies in the range of 137 MHz to 1 GHz. Versions V3.3.1 [i.5] and earlier of the present document specified the methods used for type testing. The minimum technical characteristics of TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment and radio test methods to be used for providing presumption of conformity, are now specified in ETSI EN 303 758

ETSI TS 100 394-1 V4.1.1

Context Information Management (CIM); NGSI-LD Testing Framework: Test Template

The Testing Framework (document format) specifies a testing framework defining a methodology for the development of the test strategies, test systems and resulting test specifications. The present document identifies the implementation under test (scope of the testing), the format for the test specification, the test architecture, the points of control and observation, the naming conventions (e.g. for test case ID and test case grouping ID), etc. It also provides the Implementation Conformance Statement which is basically a checklist for a client-owner so they know what parts of the specification will be tested and if any is optional. The ICS will be published as a separate GS.

ETSI GS CIM 016 V1.1.1

ETSI GR MEC 035 V3.1.1 (2021-06)Multi-access Edge Computing (MEC); Study on Inter-MEC systems and MEC-Cloud systems coordination

The document studies the applicability of MEC specifications to inter-MEC systems and MEC-Cloud systems coordination that supports e.g. application instance relocation, synchronization and similar functionalities. Another subject of this study is the enablement and/or enhancement of functionalities for application lifecycle management by third parties (e.g. application developers).

ETSI GR MEC 035 V3.1.1 (2021-06)

Securing Artificial Intelligence (SAI);Mitigation Strategy Report

The present document summarizes and analyses existing and potential mitigation against threats for AI-based systems as discussed in ETSI GR SAI 004 [i.1]. The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases.

ETSI GR SAI 005 V1.1.1

Securing Artificial Intelligence (SAI);Problem Statement

The present document describes the problem of securing AI-based systems and solutions, with a focus on machine learning, and the challenges relating to confidentiality, integrity and availability at each stage of the machine learning lifecycle. It also describes some of the broader challenges of AI systems including bias, ethics and explainability. A number of different attack vectors are described, as well as several real-world use cases and attacks.

ETSI GR SAI 004 V1.1.1