Journal of ICT Standardization最新文献

筛选
英文 中文
LoRa-Alliance Regional Parameters Overview LoRa联盟区域参数概述
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.914
Dave Kjendal
{"title":"LoRa-Alliance Regional Parameters Overview","authors":"Dave Kjendal","doi":"10.13052/jicts2245-800X.914","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.914","url":null,"abstract":"The LoRaWAN® Regional Parameters specification defines the adaptation of the LoRaWAN® Link Layer specification to comply with the various regulations enforced throughout the world on the use of various frequency bands of unlicensed spectrum which are available. It defines default values for Link Layer parameters and channel plans. Each of the regional channel plans can be broadly characterized as dynamic channel plans, with a small number of default channels, or fixed channel plans, where all channels are defined then selectively activated by the network. Regional parameters are defined for a vast majority of countries in the world, using 9 main channel plans, and support for additional countries is regularly added.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"35-46"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255478.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68113987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LoRa Alliance Certification - Journal of ICT LoRa联盟认证-ICT杂志
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.912
Derek Hunt
{"title":"LoRa Alliance Certification - Journal of ICT","authors":"Derek Hunt","doi":"10.13052/jicts2245-800X.912","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.912","url":null,"abstract":"LoRaWAN® Certification of devices is critical for effective and efficient mass deployment of LoRaWAN Networks, as it ensures devices will work on any network, under all conditions. Certified Devices significantly reduce the support costs as any product failures detected later when the device is deployed is far more expensive to repair and poor RF performance of the device increase number of gateways needed and cost of the network infostructure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255488.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68113985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data-Driven Business Model Innovation for 6G 6G数据驱动的商业模式创新
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.935
Sriganesh K. Rao
{"title":"Data-Driven Business Model Innovation for 6G","authors":"Sriganesh K. Rao","doi":"10.13052/jicts2245-800X.935","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.935","url":null,"abstract":"Futuristic disruptive technologies like 6G, could further transform the way we live and work, beyond what was enabled by 5G. The expected features could enable massive high-speed and low-latency connectivity across diverse devices giving rise to new applications enabling instant availability of data related to Smart Cities, Industries 4.0, Intelligent Transport Systems, Utilities, Healthcare, Security, Media & Entertainment, etc. They will further make it possible to scale current real-time data collection strategies, adding more devices without the need for wired connections or fear of interference. Data is considered as the new oil due to tremendous possibilities it can bring in the business world through predictive and prescriptive analytics. This gives rise to the importance of data-driven business model innovation to provide actionable insights to the business owners, helping them to develop sustainable business models. Organizations using big data and analytics within their innovation process are more likely to remain competitive and sustainable. This paper discusses the importance of harnessing “Real-time Data” to create value, the challenges in harnessing value from data especially “dark data,” the role of “Data-driven Business Model Innovation” in creating sustainable business and Intelligent Transport System Data-driven Business Model Innovation as an example.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 3","pages":"405-426"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255453/10255491.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intent-Driven Closed Loops for Autonomous Networks 自主网络的意图驱动闭环
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.929
Pedro Henrique Gomes;Magnus Buhrgard;János Harmatos;Swarup Kumar Mohalik;Dinand Roeland;Jörg Niemöller
{"title":"Intent-Driven Closed Loops for Autonomous Networks","authors":"Pedro Henrique Gomes;Magnus Buhrgard;János Harmatos;Swarup Kumar Mohalik;Dinand Roeland;Jörg Niemöller","doi":"10.13052/jicts2245-800X.929","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.929","url":null,"abstract":"Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling zero-touch management of end-to-end services across different management domains. However, the coordinated and optimal instantiation and operation of multiple closed loops is an open question that is left for implementation by the ZSM specifications. In this paper, we propose a methodology that uses intents as a way of communicating requirements to be considered by autonomous management domains to coordinate hierarchies of closed loops. The intent-driven methodology facilitates hierarchical and peer interactions for delegation and escalation of intents. Furthermore, it extends the existing management capabilities of the ZSM framework and facilitates conflict-free integration of closed loops by setting optimal (and non-conflicting) goals that each closed loop in the hierarchy needs to account for. We show an example of the application of the proposed methodology in a network slicing assurance use case. The new capabilities introduced in this paper can be considered as an extension of the ZSM framework to be used in scenarios where multiple intent-driven closed loops exist.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"257-290"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255461.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Authentication Mechanisms in the 5G System 5G系统中的认证机制
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.921
Xiaoting Huang;Takahito Yoshizawa;Sheeba Backia Mary Baskaran
{"title":"Authentication Mechanisms in the 5G System","authors":"Xiaoting Huang;Takahito Yoshizawa;Sheeba Backia Mary Baskaran","doi":"10.13052/jicts2245-800X.921","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.921","url":null,"abstract":"The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"61-78"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255480.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I2BN: Intelligent Intent Based Networks I2BN:基于智能意图的网络
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.926
Péter Szilágyi
{"title":"I2BN: Intelligent Intent Based Networks","authors":"Péter Szilágyi","doi":"10.13052/jicts2245-800X.926","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.926","url":null,"abstract":"Intent based network management reduces the complexity of network programming from a growing set of deeply technical APIs to context-free high-level objectives that the network should autonomously achieve and keep. The practical implementation of an intent based network requires substantial automation technology embedded in the network. Automation should cover the entire lifecycle of intents, from their ingestion to fulfillment and assurance. This article investigates the feasibility of automatically assembling interworking implementation units into intent specific automation pipelines, where units are reusable self-learning closed loop micro-services with self-declared capabilities. Each closed loop may gain knowledge and respond to dynamically changing network conditions, thereby enabling network autonomy in reaching the declared intent objectives. The human-network intent interface for expressing intents is proposed to be based on the aggregation of the deployed network and service automation capabilities, rather than a formalism decoupled from the actual network implementation. This principle removes the ambiguity and compatibility gap between human intent definition and machine intent fulfillment, while retaining the flexibility and extendibility of the intents offered by any specific system via onboarding additional micro-services with novel capabilities. The concepts discussed by the article fit into the architecture and closed loop work items already defined by ETSI ZSM and provides considerations towards new areas such as intent driven autonomous networks and enablers for automation.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"159-200"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255479.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Model-Driven and Business Approach to Autonomic Network Management 自主网络管理的模型驱动和业务方法
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.928
Mehdi Bezahaf;Stephen Cassidy;David Hutchison;Daniel King;Nicholas Race;Charalampos Rotsos
{"title":"A Model-Driven and Business Approach to Autonomic Network Management","authors":"Mehdi Bezahaf;Stephen Cassidy;David Hutchison;Daniel King;Nicholas Race;Charalampos Rotsos","doi":"10.13052/jicts2245-800X.928","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.928","url":null,"abstract":"As corporate networks continue to expand, the technologies that underpin these enterprises must be capable of meeting the operational goals of the operators that own and manage them. Automation has enabled the impressive scaling of networks from the days of Strowger. The challenge now is not only to keep pace with the continuing huge expansion of capacity but at the same time to manage a huge increase in complexity - driven by the range of customer solutions and technologies. Recent advances in automation, programmable network interfaces, and model-driven networking will provide the possibility of closed-loop, self-optimizing, and self-healing networks. Collectively these support the goals of a truly automated network, commonly understood as “autonomic networking” even though this is a prospect yet to be achieved. This paper outlines the progress made towards autonomic networking and the framework and procedures developed during the UK Next Generation Converged Digital Infrastructure (NG-CDI) project. It outlines the operator-driven requirements and capabilities that have been identified, and proposes an autonomic management framework, and summarizes current art and the challenges that remain.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"229-256"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255465.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LoRaWAN Security LoRaWAN安全
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.915
Olivier Seller
{"title":"LoRaWAN Security","authors":"Olivier Seller","doi":"10.13052/jicts2245-800X.915","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.915","url":null,"abstract":"The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"47-60"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255484.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70607661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Editorial Foreword 编辑前言
Journal of ICT Standardization Pub Date : 2021-01-01
Ramjee Prasad;Anand R. Prasad
{"title":"Editorial Foreword","authors":"Ramjee Prasad;Anand R. Prasad","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"This special issue is based on the workshop “6G Knowledge Lab Opening and 36th GISFI Workshop” held 21–22 December 2020, organized jointly by the CTIF Global Capsule (CGC) and the Global ICT Standardisation Forum for India (GISFI). The special issue is divided in 2 parts of which this is the first part consisting of 5 papers.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 3","pages":"i-ii"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255453/10255454.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model-Based Approach to Multi-Domain Monitoring Data Aggregation 一种基于模型的多域监测数据聚合方法
Journal of ICT Standardization Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.9210
Antonio Pastor;Diego R. López;Jose Ordonez-Lucena;Sonia Fernández;Jesús Folgueira
{"title":"A Model-Based Approach to Multi-Domain Monitoring Data Aggregation","authors":"Antonio Pastor;Diego R. López;Jose Ordonez-Lucena;Sonia Fernández;Jesús Folgueira","doi":"10.13052/jicts2245-800X.9210","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.9210","url":null,"abstract":"The essential propellant for any closed-loop management mechanism is data related to the managed entity. While this is a general evidence, it becomes even more true when dealing with advanced closed-loop systems like the ones supported by Artificial Intelligence (AI), as they require a trustworthy, up-to-date and steady flow of state data to be applicable. Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and Service Management (ZSM) framework, and proper mechanisms for data aggregation, pre-processing and normalization are required to make possible AI-enabled closed-loop management. So far, solutions proposed for these data aggregation tasks have been specific to concrete data sources and consumers, following ad-hoc approaches unsuitable to address the vast heterogeneity of data sources and potential data consumers. This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to support their incorporation within network service lifecycles.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"291-310"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255466.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信