{"title":"LoRa-Alliance Regional Parameters Overview","authors":"Dave Kjendal","doi":"10.13052/jicts2245-800X.914","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.914","url":null,"abstract":"The LoRaWAN® Regional Parameters specification defines the adaptation of the LoRaWAN® Link Layer specification to comply with the various regulations enforced throughout the world on the use of various frequency bands of unlicensed spectrum which are available. It defines default values for Link Layer parameters and channel plans. Each of the regional channel plans can be broadly characterized as dynamic channel plans, with a small number of default channels, or fixed channel plans, where all channels are defined then selectively activated by the network. Regional parameters are defined for a vast majority of countries in the world, using 9 main channel plans, and support for additional countries is regularly added.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"35-46"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255478.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68113987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LoRa Alliance Certification - Journal of ICT","authors":"Derek Hunt","doi":"10.13052/jicts2245-800X.912","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.912","url":null,"abstract":"LoRaWAN® Certification of devices is critical for effective and efficient mass deployment of LoRaWAN Networks, as it ensures devices will work on any network, under all conditions. Certified Devices significantly reduce the support costs as any product failures detected later when the device is deployed is far more expensive to repair and poor RF performance of the device increase number of gateways needed and cost of the network infostructure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255488.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68113985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-Driven Business Model Innovation for 6G","authors":"Sriganesh K. Rao","doi":"10.13052/jicts2245-800X.935","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.935","url":null,"abstract":"Futuristic disruptive technologies like 6G, could further transform the way we live and work, beyond what was enabled by 5G. The expected features could enable massive high-speed and low-latency connectivity across diverse devices giving rise to new applications enabling instant availability of data related to Smart Cities, Industries 4.0, Intelligent Transport Systems, Utilities, Healthcare, Security, Media & Entertainment, etc. They will further make it possible to scale current real-time data collection strategies, adding more devices without the need for wired connections or fear of interference. Data is considered as the new oil due to tremendous possibilities it can bring in the business world through predictive and prescriptive analytics. This gives rise to the importance of data-driven business model innovation to provide actionable insights to the business owners, helping them to develop sustainable business models. Organizations using big data and analytics within their innovation process are more likely to remain competitive and sustainable. This paper discusses the importance of harnessing “Real-time Data” to create value, the challenges in harnessing value from data especially “dark data,” the role of “Data-driven Business Model Innovation” in creating sustainable business and Intelligent Transport System Data-driven Business Model Innovation as an example.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 3","pages":"405-426"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255453/10255491.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pedro Henrique Gomes;Magnus Buhrgard;János Harmatos;Swarup Kumar Mohalik;Dinand Roeland;Jörg Niemöller
{"title":"Intent-Driven Closed Loops for Autonomous Networks","authors":"Pedro Henrique Gomes;Magnus Buhrgard;János Harmatos;Swarup Kumar Mohalik;Dinand Roeland;Jörg Niemöller","doi":"10.13052/jicts2245-800X.929","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.929","url":null,"abstract":"Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling zero-touch management of end-to-end services across different management domains. However, the coordinated and optimal instantiation and operation of multiple closed loops is an open question that is left for implementation by the ZSM specifications. In this paper, we propose a methodology that uses intents as a way of communicating requirements to be considered by autonomous management domains to coordinate hierarchies of closed loops. The intent-driven methodology facilitates hierarchical and peer interactions for delegation and escalation of intents. Furthermore, it extends the existing management capabilities of the ZSM framework and facilitates conflict-free integration of closed loops by setting optimal (and non-conflicting) goals that each closed loop in the hierarchy needs to account for. We show an example of the application of the proposed methodology in a network slicing assurance use case. The new capabilities introduced in this paper can be considered as an extension of the ZSM framework to be used in scenarios where multiple intent-driven closed loops exist.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"257-290"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255461.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaoting Huang;Takahito Yoshizawa;Sheeba Backia Mary Baskaran
{"title":"Authentication Mechanisms in the 5G System","authors":"Xiaoting Huang;Takahito Yoshizawa;Sheeba Backia Mary Baskaran","doi":"10.13052/jicts2245-800X.921","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.921","url":null,"abstract":"The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"61-78"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255480.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I2BN: Intelligent Intent Based Networks","authors":"Péter Szilágyi","doi":"10.13052/jicts2245-800X.926","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.926","url":null,"abstract":"Intent based network management reduces the complexity of network programming from a growing set of deeply technical APIs to context-free high-level objectives that the network should autonomously achieve and keep. The practical implementation of an intent based network requires substantial automation technology embedded in the network. Automation should cover the entire lifecycle of intents, from their ingestion to fulfillment and assurance. This article investigates the feasibility of automatically assembling interworking implementation units into intent specific automation pipelines, where units are reusable self-learning closed loop micro-services with self-declared capabilities. Each closed loop may gain knowledge and respond to dynamically changing network conditions, thereby enabling network autonomy in reaching the declared intent objectives. The human-network intent interface for expressing intents is proposed to be based on the aggregation of the deployed network and service automation capabilities, rather than a formalism decoupled from the actual network implementation. This principle removes the ambiguity and compatibility gap between human intent definition and machine intent fulfillment, while retaining the flexibility and extendibility of the intents offered by any specific system via onboarding additional micro-services with novel capabilities. The concepts discussed by the article fit into the architecture and closed loop work items already defined by ETSI ZSM and provides considerations towards new areas such as intent driven autonomous networks and enablers for automation.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"159-200"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255479.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mehdi Bezahaf;Stephen Cassidy;David Hutchison;Daniel King;Nicholas Race;Charalampos Rotsos
{"title":"A Model-Driven and Business Approach to Autonomic Network Management","authors":"Mehdi Bezahaf;Stephen Cassidy;David Hutchison;Daniel King;Nicholas Race;Charalampos Rotsos","doi":"10.13052/jicts2245-800X.928","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.928","url":null,"abstract":"As corporate networks continue to expand, the technologies that underpin these enterprises must be capable of meeting the operational goals of the operators that own and manage them. Automation has enabled the impressive scaling of networks from the days of Strowger. The challenge now is not only to keep pace with the continuing huge expansion of capacity but at the same time to manage a huge increase in complexity - driven by the range of customer solutions and technologies. Recent advances in automation, programmable network interfaces, and model-driven networking will provide the possibility of closed-loop, self-optimizing, and self-healing networks. Collectively these support the goals of a truly automated network, commonly understood as “autonomic networking” even though this is a prospect yet to be achieved. This paper outlines the progress made towards autonomic networking and the framework and procedures developed during the UK Next Generation Converged Digital Infrastructure (NG-CDI) project. It outlines the operator-driven requirements and capabilities that have been identified, and proposes an autonomic management framework, and summarizes current art and the challenges that remain.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"229-256"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255465.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LoRaWAN Security","authors":"Olivier Seller","doi":"10.13052/jicts2245-800X.915","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.915","url":null,"abstract":"The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"47-60"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255484.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70607661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Editorial Foreword","authors":"Ramjee Prasad;Anand R. Prasad","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"This special issue is based on the workshop “6G Knowledge Lab Opening and 36th GISFI Workshop” held 21–22 December 2020, organized jointly by the CTIF Global Capsule (CGC) and the Global ICT Standardisation Forum for India (GISFI). The special issue is divided in 2 parts of which this is the first part consisting of 5 papers.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 3","pages":"i-ii"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255453/10255454.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio Pastor;Diego R. López;Jose Ordonez-Lucena;Sonia Fernández;Jesús Folgueira
{"title":"A Model-Based Approach to Multi-Domain Monitoring Data Aggregation","authors":"Antonio Pastor;Diego R. López;Jose Ordonez-Lucena;Sonia Fernández;Jesús Folgueira","doi":"10.13052/jicts2245-800X.9210","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.9210","url":null,"abstract":"The essential propellant for any closed-loop management mechanism is data related to the managed entity. While this is a general evidence, it becomes even more true when dealing with advanced closed-loop systems like the ones supported by Artificial Intelligence (AI), as they require a trustworthy, up-to-date and steady flow of state data to be applicable. Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and Service Management (ZSM) framework, and proper mechanisms for data aggregation, pre-processing and normalization are required to make possible AI-enabled closed-loop management. So far, solutions proposed for these data aggregation tasks have been specific to concrete data sources and consumers, following ad-hoc approaches unsuitable to address the vast heterogeneity of data sources and potential data consumers. This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to support their incorporation within network service lifecycles.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"291-310"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255466.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}