Standard

Available (2726)

Showing 1945 - 1956 per page



3GPP TS 22.104 v17.0.0 (2019-06): Release 17, Stage 1

3GPP TS 22.104 (V17.0.0) addresses a challenging class of vertical applications, namely cyber-physical control applications, which require very high levels of communication service availability.  In some cases, they require very low end-to-end latencies. 
Real-time Ethernet is one of the established wireline communication technologies for cyber-physical control applications, and this specification identifies requirements that 5G systems must meet to support real-time Ethernet.

This specification provides new Stage 1 requirements based on the input from relevant stakeholders of the respective vertical domains. Its focus is mostly on factories of the future and electric power distribution. 

TS 22.104 for Rel-17 describes, among other aspects:

  • Performance requirements.
  • Clock synchronisation requirements.
  • Positioning requirements.
  • Ethernet applications. 

Related work: It is important to note the co-existing specifications for Rel-16, that is, TS 22.104 V16.2.0. 

 

Service requirements for cyber-physical control applications in vertical domains

Home Appliances Information Model and Mapping (oneM2M TS-0023 version 2.0.0 Release 2)

The present document describes the oneM2M defined information model for home appliances, including the description of how it is mapped with other information models from external organizations. It also explains the ontology for the home domain information model.

ETSI TS 118 123 V2.0.0

KMIP Opaque Managed Object Store Profile v1.0

The OASIS KMIP TC works to define a single, comprehensive protocol for communication between encryption systems and a broad range of new and legacy enterprise applications, including email, databases, and storage devices. By removing redundant, incompatible key management processes, KMIP will provide better data security while at the same time reducing expenditures on multiple products.

Electronic Identity Credential Trust Elevation Framework Version 1.0

The OASIS Trust Elevation TC works to define a set of standardized protocols that service providers may use to elevate the trust in an electronic identity credential presented to them for authentication. The Trust Elevation TC is intended to respond to suggestions from the public sector, including the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC). The Trust Elevation TC promotes interoperability among multiple identity providers--and among multiple identity federations and frameworks--by facilitating clear communication about common and comparable operations to present, evaluate and apply identity [data/assertions] to sets of declared authorization levels.

Authentication Step-Up Protocol and Metadata Version 1.0

The OASIS Trust Elevation TC works to define a set of standardized protocols that service providers may use to elevate the trust in an electronic identity credential presented to them for authentication. The Trust Elevation TC is intended to respond to suggestions from the public sector, including the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC). The Trust Elevation TC promotes interoperability among multiple identity providers--and among multiple identity federations and frameworks--by facilitating clear communication about common and comparable operations to present, evaluate and apply identity [data/assertions] to sets of declared authorization levels.

STIX(TM) Version 2.0

The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence. In the initial phase of TC work, three specifications will be transitioned from the US Department of Homeland Security (DHS) for development and standardization under the OASIS open standards process: STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), and CybOX (Cyber Observable Expression).

TAXII(TM) Version 2.0

The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence. In the initial phase of TC work, three specifications will be transitioned from the US Department of Homeland Security (DHS) for development and standardization under the OASIS open standards process: STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), and CybOX (Cyber Observable Expression).

CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2

The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new name for the framework that reflects the primary purpose: a Common Security Advisory Framework (CSAF). TC deliverables are designed standardize existing practice in structured machine-readable vulnerability-related advisories and further refine those standards over time.

Vehicular Communications; GeoNetworking; Part 1: Requirements

The present document specifies, at an abstract level, the general, functional and performance requirements that apply to the GeoNetworking protocols (EN 302 636-4 [i.1], EN 302 636-5 [i.2] and EN 302 636-6 [i.3]) for use in ETSI ITS G5 access technology (EN 302 663 [i.4]). The present document is applicable to ITS stations implementing ETSI ITS G5 access technology (EN 302 663 [i.4]) and the GeoNetworking protocols (EN 302 636-4 [i.1], EN 302 636-5 [i.2] and EN 302 636-6 [i.3]) for both single hop and multi-hop communications.

EN 302 636-1 V1.2.1

IEEE Standard for Ethernet

Ethernet local area network operation is specified for selected speeds of operation from 1 Mb/s to 400 Gb/s using a common media access control (MAC) specification and management information base (MIB). The Carrier Sense Multiple Access with Collision Detection (CSMA/CD) MAC protocol specifies shared medium (half duplex) operation, as well as full duplex operation. Speed specific Media Independent Interfaces (MIIs) allow use of selected Physical Layer devices (PHY) for operation over coaxial, twisted pair or fiber optic cables, or electrical backplanes. System considerations for multisegment shared access networks describe the use of Repeaters that are defined for operational speeds up to 1000 Mb/s. Local Area Network (LAN) operation is supported at all speeds. Othere specified capabilities include: various PHY types for access networks, PHYs suitable for metropolitan area network applications, and the provision of power over selected twisted pair PHY types.

 

 

The PDF of this standard is available at no cost to you compliments of the IEEE GET program: https://ieeexplore.ieee.org/browse/standards/get-program/page

IEEE 802.3-2018

IEEE Standard for Ethernet - Amendment 1:Physical Layer Specifications and Management Parameters for 2.5 Gb/s and 5 Gb/s Operation over Backplane

Ethernet Media Access Control (MAC) parameters, Physical Layer specifications, and management objects for the serial transfer of Ethernet format frames at 2.5 Gb/s and 5 Gb/s over electrical backplanes are defined in this amendment to IEEE Std 802.3-2018.

The PDF of this standard is available at no cost compliments of the IEEE GET Program: https://ieeexplore.ieee.org/browse/standards/get-program/page

IEEE 802.3cb-2018

IEEE Standard for Ethernet Amendment 2: Physical Layer and Management Parameters for Power over Ethernet over 4 pairs

The maximum Powered Device (PD) power available is increased by this amendment to IEEE Std 802.3-2018 by utilizing all four pairs in the specified structured wiring plant. This represents a substantial change to the capabilities of Ethernet with standardized power. The power classification information exchanged during negotiation is extended to allow meaningful power management capability. These enhancements solve the problem of higher power and more efficient standardized Power over Ethernet (PoE) delivery systems.

IEEE 802.3bt-2018