Intelligent transport systems - Traffic and travel information (TTI) via transport protocol experts ...
ISO/TS 21219-23: 2016 describes new mobility services like car sharing, car rental or park and ride as well as the integration of different transport modes by multimodal or off-board navigation are gaining increasing importance. Furthermore, the cooperative management of the transport infrastructure requires the provision of precise information and guidance on dedicated routes from a central…
Information technology — Sensor network testing framework
ISO/IEC 19637:2016 specifies:
- testing framework for conformance test for heterogeneous sensor networks,
- generic services between test manager (TMR) and test agent (TA) in the testing framework, and
- guidance for creating testing platform and enabling the test of different sensor network protocols.
Information technology - Sensor network testing framework
ISO/IEC 19637:2016 specifies:
- testing framework for conformance test for heterogeneous sensor networks,
- generic services between test manager (TMR) and test agent (TA) in the testing framework, and
- guidance for creating testing platform and enabling the test of different sensor network protocols.
Information technology — Radio frequency identification for item management — Part 4: Parameters for...
This part of ISO/IEC 18000 defines the air interface for radio frequency identification (RFID) devices
operating in the 2,45 GHz Industrial, Scientific, and Medical (ISM) band used in item management
applications. This part of ISO/IEC 18000 provides a common technical specification for RFID devices
that can be used by ISO committees developing RFID application standards. This part of ISO/IEC…
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic
techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities
A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as
the…
Information technology — Telecommunications and information exchange between systems — Local and met...
Link Aggregation provides protocols, procedures, and managed objects that allow the following:
— One or more parallel instances of full-duplex point-to-point links to be aggregated together to form a
Link Aggregation Group (LAG), such that a MAC Client can treat the LAG as if it were a single link.
— A resilient interconnect using multiple full-duplex point-to-point links among one to three…
Standard for Management Information Base (MIB) — Definitions for Ethernet — Part 3-1
This standard contains the Management Information Base (MIB) module specifications for IEEE Std 802.3,
also known as Ethernet. It includes the Structure of Management Information Version 2 (SMIv2) MIB
module specifications formerly produced and published by the Internet Engineering Task Force (IETF), and
the managed object branch and leaf assignments provided in the Guidelines for the Definition…
Information technology — Telecommunications and information exchange between systems — Local and met...
This standard contains descriptions of the IEEE 802® standards published by the IEEE for frame-based data
networks as well as a reference model (RM) for protocol standards. The IEEE 802 architecture is defined,
and a specification for the identification of public, private, and standard protocols is included.