35.110 网络 标准查询与下载



共找到 1597 条与 网络 相关的标准,共 107

Amendment 1 - Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 22: Cognitive Wireless RAN Medi

ICS
35.110
CCS
发布
2017-10-27
实施

Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Specific requirements — Part 22: Cognitive Wireless RAN Medium Access Cont

ICS
35.110
CCS
发布
2017-10-27
实施

This International Standard specifies a distributed medium access control (MAC) sublayer and a physical layer (PHY) for wireless networks.

Information technology -- Telecommunications and information exchange between systems -- High-rate ultra-wideband PHY and MAC standard

ICS
35.110
CCS
发布
2017-10-03
实施

This International Standard specifies the interface between implementations of the PHY and MAC as specified in ISO/IEC 26907.

Information technology -- Telecommunications and information exchange between systems -- MAC-PHY interface for ISO/IEC 26907

ICS
35.110
CCS
发布
2017-10-03
实施

The recent advancement of wireless-based communication technology and electronics has facilitated the implementation of a low-cost, low-power sensor network. Basically, a ubiquitous sensor network (USN) consists of three parts: a sensor network consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing between the sensor networks and an application server, and the application server controlling the sensor node in the sensor network or collecting the sensed information from the sensor nodes in the sensor network. USN can be an intelligent information infrastructure of advanced e-Life society, which delivers user-oriented information and provides knowledge services to anyone anytime, anywhere and wherein information and knowledge are developed using context awareness by detecting, storing, processing, and integrating the situational and environmental information gathered from sensor tags and/or sensor nodes affixed to anything. Since there are many security and privacy threats in transferring and storing information in the USN, appropriate security mechanisms may be needed to protect against those threats in the USN. This Recommendation | International Standard describes the security threats to and security requirements of the ubiquitous sensor network. In addition, this Recommendation | International Standard categorizes the security technologies according to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of the USN. Finally, the security requirements and security technologies for the USN are presented.

Information technology -- Telecommunications and information exchange between systems -- Security framework for ubiquitous sensor networks

ICS
35.110
CCS
发布
2017-10-03
实施

This part of ISO/IEC 29145 specifies the MAC of the WiBEEM (Wireless Beacon-enabled Energy Efficient Mesh network) protocol for wireless home network services that supports a low power-consuming wireless mesh network as well as device mobility and QoS.

Information technology - Wireless beacon-enabled energy efficient mesh network (WiBEEM) for wireless home network services - Part 2: MAC layer

ICS
35.110
CCS
发布
2017-10-03
实施

This part of ISO/IEC 29145 specifies the network layer (NWK) of the WiBEEM (Wireless Beacon-enabled Energy Efficient Mesh network) protocol for wireless home network services that support a low-power-consuming wireless mesh network as well as device mobility and quality of service.

Information technology - Wireless beacon-enabled energy efficient mesh network (WiBEEM) for wireless home network services - Part 3: NWK layer

ICS
35.110
CCS
发布
2017-10-03
实施

For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802® Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.1AE™ MAC Security. c) Facilitates the use of industry standard authentication and authorization protocols.

Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1X: Port-based network access control

ICS
35.110
CCS
发布
2017-10-03
实施

This part of ISO/IEC 24767 specifies home network security requirements that may come from inside or outside a home. It serves as a foundation for the development of security services against threats affecting the home environment. The discussions about security requirements in this standard are presented in a relatively informal manner. Although many of the items discussed here are expected to guide the design of security mechanisms applied either inside home networks or through the Internet, they are not considered formal requirements. Various devices are connected to the home network; see Figure 1. The devices of the "living network", the devices for "A/V entertainment and the devices for "informational applications" provide different features and performance. This standard provides means to analyse the risks for each networked device and to define its specific "security requirements".

Information technology -- Home network security -- Part 1: Security requirements

ICS
35.110
CCS
发布
2017-10-03
实施

This International Standard specifies the PHY characteristics and MAC procedures used for short-range, low-data-rate, wireless communications with very low latency and point-to-multipoint connection capability.

Information technology -- Telecommunications and information exchange between systems -- PHY/MAC specifications for short-range wireless low-rate applications in the ISM band

ICS
35.110
CCS
发布
2017-10-03
实施

This International Standard (IS) provides Sensor Network Reference Architecture (SNRA) views. The architecture views include business, operational, systems, and technical perspectives, and these views are presented in functional, logical, and/or physical views where applicable. This IS focuses on high-level architecture views which can be further developed by system developers and implementers for specific applications and services.

Information technology -- Sensor networks: Sensor Network Reference Architecture (SNRA) -- Part 3: Reference architecture views

ICS
35.110
CCS
发布
2017-10-03
实施

This part of the ISO/IEC 29182 series, describes and provides — a compilation of sensor network applications for which International Standardized Profiles (ISPs) are needed, — guidelines for the structured description of sensor network applications, and — examples for structured sensor network applications. This part of ISO/IEC 29182 does not cover ISPs for which drafting rules are described in ISO/IEC TR 10000. Due to the generic character of ISO/IEC 29182 fully developed ISPs will not be included in this International Standard.

Information technology -- Sensor networks: Sensor Network Reference Architecture (SNRA) -- Part 6: Applications

ICS
35.110
CCS
发布
2017-10-03
实施

This International Standard specifies a physical layer (PHY), distributed medium access control (MAC) sublayer, and an HDMI protocol adaptation layer (PAL) for 60 GHz wireless networks.

Information technology -- Telecommunications and information exchange between systems -- High rate 60 GHz PHY, MAC and PALs

ICS
35.110
CCS
发布
2017-10-03
实施

This standard specifies the air interface, including the cognitive medium access control layer (MAC) and physical layer (PHY), of point-to-multipoint wireless regional area networks comprised of a professional fixed base station with fixed and portable user terminals operating in the VHF/UHF TV broadcast bands between 54 MHz to 862 MHz.

Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 22: Cognitive Wireless RAN Medium Access Control (MCA) and Physical Layer (PHY) Specifications:

ICS
35.110
CCS
发布
2017-10-03
实施

This part of ISO/IEC 15149 specifies the physical layer and media access control layer protocols of wireless network over a magnetic field in a low frequency band (~300 KHz) for wireless communication in harsh environment (i.e., around metal, underwater, underground, etc.). The physical layer protocol is designed for the following scope: — low carrier frequency for large magnetic field area and reliable communication in harsh environment; — simple and robust modulation for a low implementation cost and error performance; — variable coding and bandwidth for a link adaptation. The media access control layer protocol is designed for the following scope: — simple and efficient network topology for low power consumption; — variable superframe structure for compact and efficient data transmission; — dynamic address assignment for small packet size and efficient address management. This part of ISO/IEC 15149 supports several Kbps data transmission in wireless network within a distance of several meters. It can be applied to various services such as the following areas: — environmental industry to manage pollution levels in soil and water using wireless underground or underwater sensors; — construction industry to monitor the integrity of buildings and bridges using wireless, inner-corrosion sensors; — consumer-electronics industry to detect food spoilage in wet, airtight storage areas and transfer the sensing data from the inside to the outside; — agricultural industry to manage the moisture level as well as mineral status in soil using wireless, buried sensors; — transportation industry to manage road conditions and traffic information using wireless, underground sensors.

Information technology -- Telecommunications and information exchange between systems -- Magnetic field area network (MFAN) -- Part 1: Air interface

ICS
35.110
CCS
发布
2017-10-03
实施

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.

Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Part 1AR: Secure device identity

ICS
35.110
CCS
发布
2017-10-03
实施

This part of ISO/IEC 24767 specifies security in a home network for equipment with limited IT capability. The Secure Communication Protocol for Middleware (SCPM) is particularly designed to support network security (see 5.2) for equipment not capable of supporting Internet security protocols such as IPSec or SSL/TLS. Although this protocol is designed for unsafe transmissions, it may be used on other types of transmissions. Of course, the quality level of the security services of SCPM is not equal with that of the Internet security protocols but will ensure that such middleware can also be connected securely within a home. It is not the intention that SCPM replace existing security mechanisms of protocols that have already been published. The SCPM provides the security services at the network layer and the protocol does not rely on any specific media transmission. This part of ISO/IEC 24767 contains detailed specifications of the security services supported, the necessary message formats, the information flows and the processing of these pieces of information necessary for the implementation of this protocol. Therefore, this standard neither addresses media-dependent issues nor an overall security architecture covering every home-networking technology. The protocol specified in this standard is media-independent and covers the security services for the network layer for protocols that do not have a conflicting network-layer addressing scheme. Network layer security services are provided through the use of a combination of cryptographic and security mechanisms. Each protocol should specify the details of this security implementation. An HES system supporting more than one protocol needs a gateway in between protocols. Finally, this standard does not define any type of application except for key management which has become essential in any security service. Nonetheless, there are no restrictions on which types of applications may be deployed with SCPM.

Information technology -- Home network security -- Part 2: Internal security services: Secure Communication Protocol for Middleware (SCPM)

ICS
35.110
CCS
发布
2017-10-03
实施

物联网系统是软件和硬件系统智能化协同处理的复杂的应用系统,因此当前各软件、硬件测试类标准均无法单独应用于物联网系统的检测。 本标准的评价指标的制定的依据是以国际标准《物联网参考体系架构》以及配套的国内标准《物联网参考体系结构》中提出的物联网六域概念模型作为评价对象,而不再对单独的软件和硬件作为评价对象。本标准的主要技术要求是根据物联网的特性总结出的六域模型中涵盖物联网特性指标、功能指标、性能指标、环境适应性指标、安全指标、管理指标。这些技术指标既包括了评价对象六域模型中软件和硬件的指标,同时也包括了有物

Evaluation guide for IoT system

ICS
35.110
CCS
I652
发布
2017-10-01
实施
2017-09-18

Amendment 1 - Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers

ICS
35.110
CCS
发布
2017-08-24
实施

E-commerce service provider service specifications based on online retail open platform

ICS
35.110
CCS
L01
发布
2017-08-21
实施
2018-06-01



Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号