ITU

Available (331)

Showing 61 - 72 per page



Y.IoT-DSE-arc Reference architecture of service exposure for decentralized services for IoT applications

This draft Recommendation introduces a concept of service exposure for decentralized services (DSE) for IoT applications, analyses its common characteristics and high-level requirements, and provides a reference architecture of DSE and relevant common capabilities.

Y.IoT-DSE-arc

ITU-T Y.4208Internet of things requirements for support of edge computing

Some of the capabilities offered by the Internet of thing (IoT), e.g., capabilities for computing, storage and analytics, are evolving in closer proximity to IoT data sources. Recommendation ITU-T Y.4208 provides an overview of related challenges faced by the IoT and describes how IoT-supporting edge computing (EC) may address these challenges. From the edge-computing deployment perspective, service requirements for support of EC capabilities in the IoT are identified, as well as related functional requirements. As an example, scenarios of EC deployment in different application domains, EC scenarios for vehicle-to-everything (V2X) and for smart manufacturing are provided in an appendix.

ITU-T Y.4208

ITU-T - SG20Framework of decentralized service by using DLT and edge computing technologies for IoT devices

Decentralized services (e.g., enabled by distributed ledger technologies, DLT) for IoT devices can be deployed in local area networks (e.g., in IoT devices or in local IoT gateways for constrained IoT devices) or in clouds (e.g., in remote IoT gateways or in cloud systems). When deployed in local area networks, the decentralized services will be affected by the local storage capability of peers and their computation capability and communication latency among peers. When deployed in clouds, the decentralized services will be affected by speed and efficiency of data access. With the popularization of the use of edge computing, part or whole of functionalities of DLT-based decentralized services can be deployed in edge nodes. This draft Recommendation introduces decentralized service by using DLT and edge computing technologies, which is an intermediate supporting service between decentralized services in local area networks and that in clouds. Decentralized service by using DLT and edge computing technologies is deployed in edge nodes and can facilitate interaction among peers of decentralized services, no matter where the peers are deployed (e.g., in local areas or in clouds). This draft Recommendation analyses characteristics and general requirements of decentralized service by using DLT and edge computing technologies, and provides its functional framework and relevant common capabilities, functionalities and general procedures.

ITU-T - SG20

Requirements and common characteristics of IoT identifier for IoT service

The objective of this Recommendation is to analyse identifiers in existing technologies and networks for IoT service, and describe the requirements of IoT identifier, common characteristics of IoT identifier, and the general architecture of IoT identifier.
This Recommendation describes the requirements and common characteristics of IoT identifier for IoT service. The scope of this Recommendation includes:
- Analysis of identifiers in existing technologies and networks
- Describe requirements of IoT identifier
- Describe common characteristics of IoT identifier
- Describe the general architecture of IoT identifier

Proof-of-concept for data service using information centric networking in IMT-2020

This Supplement specifies a proof-of-concept for a service that provides named data such as Internet of Things (IoT) named data by information centric networking in IMT-2020. In the Supplement, an enhanced name resolution system is implemented based on distance-constrained containers to resolve from names to addresses more efficiently.

Virtual Business Gateway

Virtual Business Gateway. This Technical Report specifies architecture and requirements for the virtual business gateway. The virtual business gateway architecture supports the migration of functionalities running on a business gateway to the network service provider's infrastructure to enable network-based features and services. Such migration is expected to simplify the deployment and management of the network and business services.

Data aware networking (information centric networking) – Requirements and capabilities

This Recommendation specifies the requirements and capabilities of data aware networking (DAN) to realize the use cases and scenarios described in ITU-T Supplement 35 to Recommendation Y.3033, Data aware networking - Scenarios and use cases, which are expected to be major applications/services provided on DAN. One of the objectives reflecting emerging requirements for future networks (FNs) is data awareness as specified in ITU-T Recommendation Y.3001 - Future networks: Objectives and design goals. DAN is expected to have capabilities optimized to handle enormous amount of data and to enable users to access desired data safely, easily, quickly, and accurately, regardless of their location by making information the destination of request delivery. DAN can be rephrased as the networking whose central concern is retrieving information, i.e., information centric networking (ICN).

Architectural requirements for cloud storage in video surveillance

This Recommendation defines a cloud storage architecture in visual surveillance. Cloud storage enables the service users to have ubiquitous, convenient and on-demand network access to a shared pool of the configurable storage resources, which can be rapidly provisioned and released with the minimal management effort or service-provider interaction. Cloud storage can realize flexible and reliable data storage for large-scale visual surveillance, and its components are modularized and allocated dynamically based on the real usage. This Recommendation provides the architecture, entities, reference points and service control flow for cloud storage in visual surveillance.

Security requirements of Network as a Service (NaaS) in cloud computing

Network as a Service (NaaS) is one of the representative cloud service categories, in which the capability provided to the cloud service customer (CSC) is transport connectivity and related network capabilities. NaaS services can provide any of three cloud capabilities as: NaaS application service, NaaS platform service and NaaS connectivity service. All the three kinds of NaaS service face particular security challenges such as application security vulnerabilities, security risks of network virtualization, eavesdropping, etc. Recommendation ITU-T X.SRNaaS analyses the security challenges and security requirements of NaaS application, NaaS platform and NaaS connectivity. This Recommendation could help NaaS service providers to address on the security issues. The capabilities provided by this Recommendation will take into account the national legal and regulatory obligations in individual Member States in which the NaaS services operate.The methodology of this proposal would follow the recommendations of clause 10 in Recommendation ITU-T X.1601.

Security requirements of public infrastructure as a service (IaaS) in cloud computing

Infrastructure as a Service (IaaS) is one of the representative categories of cloud services, in which the cloud capabilities service provided to the CSC is an infrastructure capabilities type. IaaS environments and virtualized services are facing more challenges and threats than traditional information technology infrastructure and application. Platforms that share computing, storage, and network services need protections specific to the threats in the IaaS environment. If these threats are not carefully addressed, it will have very negative impact on the development of IaaS services.Recommendation ITU- X.SRIaaS aims to document the security requirements of public IaaS. This will be helpful for IaaS CSPs to improve the overall security level throughout the planning, constructing and operating stages of IaaS platform and services. This work also complements the security standardization activity related to Software Defined Networks

Security requirements for Communication as a Service application environments

Recommendation ITUT X.SRCaaS recommends the security requirements of communication as a service (CaaS) application environments with the identification of the risks. The Recommendation describes the scenarios and the features of CaaS, into which multicommunication capabilities are plugged. Moreover, some special /unique risks are identified, which are caused by the unique features of CaaS. The corresponding security requirements are recommended for the following aspects: Identity fraud, orchestration security, multi devices security, countering spam, privacy protection, infrastructure attack, attack from infrastructure, Intranet attack and so on. The Recommendation refers to the common security requirements of Recommendation ITUT X.1602 to avoid duplicated work. These measures in the requirements take into account the national legal and regulatory obligations in individual member states in which the platforms operate. The work applies the methodology standardized in clause 10 of Recommendation ITU-T X.1601.