Standard

Available (1835)

Showing 1657 - 1668 per page



ITU-T - SG13 - Y.FMC-AAECApplication addressing in edge computing in IMT-2020 network and beyond

On the basis of Y.FMC-AAEC-req, which specifies use cases and requirement of application addressing in edge computing, this draft Recommendation presents the framework and technical solutions of application addressing in edge computing in IMT-2020 network and beyond. The following aspects of application addressing in edge computing are addressed in this Recommendation: Framework of application addressing in edge computing Procedures of application addressing in edge computing Security considerations on application addressing in edge computing

ITU-T - SG13 - Y.FMC-AAEC

ITU-T - SG13 - Y.ec-reqtsOverview and requirements of edge computing

This Recommendation provides overview and requirements of edge computing. To provide requirements, this Recommendation defines terms and concept of edge computing, provides reference frameworks for edge computing based on fundamental characteristics and capabilities. Also, this Recommendation provides requirements through various use cases based on reference framework.

ITU-T - SG13 - Y.ec-reqts

ITU-T - SG13 - Y.FMC -AAEC-reqUse cases and Technical requirements for supporting application addressing in edge computing for future networks including IMT-2020 network

This draft Recommendation presents the use cases and technical requirements of application addressing in edge computing for future networks including IMT-2020. Application Addressing is the process to discover the IP address of the server which the application running on when UE intends to access the application This Recommendation specifies the following aspects of application addressing in edge computing in the context for future networks including IMT-2020: Use cases and requirements of application addressing in edge computing for future networks including IMT-2020. FMC architecture enhancement requirements.

ITU-T - SG13 - Y.FMC -AAEC-req

ITU-T - SG20Framework of decentralized service by using DLT and edge computing technologies for IoT devices

Decentralized services (e.g., enabled by distributed ledger technologies, DLT) for IoT devices can be deployed in local area networks (e.g., in IoT devices or in local IoT gateways for constrained IoT devices) or in clouds (e.g., in remote IoT gateways or in cloud systems). When deployed in local area networks, the decentralized services will be affected by the local storage capability of peers and their computation capability and communication latency among peers. When deployed in clouds, the decentralized services will be affected by speed and efficiency of data access. With the popularization of the use of edge computing, part or whole of functionalities of DLT-based decentralized services can be deployed in edge nodes. This draft Recommendation introduces decentralized service by using DLT and edge computing technologies, which is an intermediate supporting service between decentralized services in local area networks and that in clouds. Decentralized service by using DLT and edge computing technologies is deployed in edge nodes and can facilitate interaction among peers of decentralized services, no matter where the peers are deployed (e.g., in local areas or in clouds). This draft Recommendation analyses characteristics and general requirements of decentralized service by using DLT and edge computing technologies, and provides its functional framework and relevant common capabilities, functionalities and general procedures.

ITU-T - SG20

ITU-T Y.4208Internet of things requirements for support of edge computing

Some of the capabilities offered by the Internet of thing (IoT), e.g., capabilities for computing, storage and analytics, are evolving in closer proximity to IoT data sources. Recommendation ITU-T Y.4208 provides an overview of related challenges faced by the IoT and describes how IoT-supporting edge computing (EC) may address these challenges. From the edge-computing deployment perspective, service requirements for support of EC capabilities in the IoT are identified, as well as related functional requirements. As an example, scenarios of EC deployment in different application domains, EC scenarios for vehicle-to-everything (V2X) and for smart manufacturing are provided in an appendix.

ITU-T Y.4208

ITU-T - SG16 - F.DVMSFEdge - Distributed vehicular multimedia services framework for V2X based edge computing

Recommendation ITU-T F.749.3 describes the use-cases and requirements for vehicular multimedia networks (VMN), taking into account the autonomous levels defined by [SAE J3016], and defined the Vehicular multimedia service platform (VMSP) with the following functions: multimedia services, infotainment applications, intelligent voice interaction, high precision navigation (maps), security updates, software and certificates. This recommendation suggests to use Edge computing platform as the distributed computing system with the following advantages: - computing and network resource of VMSP allocation; - increase of services performance; - decentralization; - user demand services; - reduction of delays. This recommendation considers the framework of distributed VMS for V2X networks based on the EdC possibilities.

ITU-T - SG16 - F.DVMSF

ITU-T - SG5 - L.Spec_Edge DCSpecification of Edge Data Centre infrastructure

In recent years, there a+E139:I139re more extra-large data centres worldwide. Although these kind of data centres are in strong capability of data processing, it is a little bit difficult to meet the need of data centre application from users. The Edge data centre is established to perfectly solve this problem and let users get better experience of data access. With the huge quantity application and establishment of Edge data centres, the specific requirement of data centre infrastructure, especially in Edge data centre, will be stricter in the future. This Recommendation proposes to establish clear requirements on infrastructure including ICT system, powering system, cooling system, monitoring system etc. to get green, safe, reliable, smart, energy-saving Edge data centre.

ITU-T - SG5 - L.Spec_Edge DC

ITU-T - SG16 - F.DC-CGS-TRECTechnical requirements of cloud gaming system for 5G mobile edge computing

Cloud gaming requires high real-time performance, so it needs special hardwares to match the needs of real-time game rendering. This recommendation will describe the detailed infrastructure requirements of cloud gaming and provide reference for infrastructure selection of mobile edge computing in different scenarios. Among the factors that restrict the development of cloud gaming, the long end-to-end delay is the most important one. Mobile Edge computing is an effective way to reduce the end-to-end delay. This recommendation will describe the architecture and interaction process of cloud gaming system optimized for edge computing.

ITU-T - SG16 - F.DC-CGS-TREC

ITU-T - SG13 - Y.ecloud-reqtsCloud computing - Functional requirements of edge cloud

This Recommendation provides functional requirements of edge cloud. Edge cloud is a cloud computing deployed to the edge of the network. It has small capacity resources enabling cloud service. It addresses the following subjects: - Overview of edge cloud; - Operation of edge cloud in distributed cloud; - Functional requirements of edge cloud; - Use cases of edge cloud in distributed cloud.

ITU-T - SG13 - Y.ecloud-reqts

Evaluation criteria for IT security -- Part 2: Security functional components

This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.

ISO/IEC 15408-2:2008

Evaluation criteria for IT security -- Part 3: Security assurance components

This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It includes the evaluation assurance levels (EALs) that define a scale for measuring assurance for component Targets of Evaluation (TOEs), the composed assurance packages (CAPs) that define a scale for measuring assurance for composed TOEs, the individual assurance components from which the assurance levels and packages are composed, and the criteria for evaluation of Protection Profiles (PPs) and Security Targets (STs).

ISO/IEC 15408-3:2008

Security assurance framework -- Part 1: Introduction and concepts

This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It provides information fundamental to users of ISO/IEC TR 15443-2.

ISO/IEC TR 15443-1:2012