The document discusses LTE key technologies including those from Release 9 and Release 10 of the 3GPP specifications. It describes the organizations involved in developing LTE standards and trials. The basic LTE technologies covered include OFDMA for downlink and SC-FDMA for uplink, frame structure, and peak throughput calculation methods. Key technologies added in Release 9 include enhanced dual-layer beamforming transmission to improve cell capacity and coverage using multiple layers. Release 10 features further expanded the use of multiple antennas and introduced carrier aggregation.
- 3GPP will standardize 5G technology in two phases, with Release 15 aiming for early 2020 deployments and Release 16 targeting the IMT-2020 submission.
- Coordination between RAN and SA groups is planned to converge on goals, timelines, and whether standalone operation should be supported in Release 15.
- Channel modeling above 6 GHz is progressing well, and requirements and scenarios for new radio access technologies have been identified.
- The new radio will be studied and evaluated, with the goal of a single technical framework addressing all usage scenarios while ensuring forward compatibility across releases.
The document discusses 3GPP, LTE, IMS, and VoLTE. It begins with an introduction to 3GPP as the standards body that includes seven telecommunications organizations and defines cellular technologies. It then covers the evolution of 3GPP standards from 2G to 4G LTE and emerging 5G technologies. IMS is introduced as 3GPP's IP Multimedia Subsystem specification that allows the delivery of multimedia over packet networks. Finally, VoLTE is defined as using IMS to provide voice calls over an LTE network.
The document outlines the course content for a training on LTE Network and Radio Planning Design. The course will cover:
1. An introduction and overview of the LTE architecture and its evolution from previous 3GPP standards like GSM, UMTS, and LTE.
2. Details of the LTE radio interface and channels.
3. LTE link budgets and capacity planning principles.
4. CPE testing procedures.
Technical Overview of LTE ( Hyung G. Myung)Going LTE
The document provides a technical overview of 3GPP LTE (Long Term Evolution). It discusses the evolution of cellular wireless systems from 1G to 3G, and the development of 4G technologies including 3GPP LTE, 3GPP2 UMB, and IEEE 802.16m. It describes the key requirements, enabling technologies, features, and standard specifications of 3GPP LTE. It also outlines the LTE protocol architecture and network architecture, including the roles of eNB, MME, S-GW, and P-GW nodes.
Content
Brief history about wireless ecosystem.
What is LTE (Long Term Evolution) ?
How is it different from older technologies ?
Network architecture in LTE
Radio Access network (RAN)
Evolved Packet Core (EPC)
Bearers in LTE
Interfaces in LTE
Life Cycle of a UE
LTE RAN overview
Architecture and requirements
Channel bandwidths and operating bands
OFDMA and SC-FDMA
Frequency (LTE-FDD) and time division duplexing (LTE-TDD)
Multiple Antenna techniques in LTE
Channels in LTE and protocol Stack
LTE EPC overview
Architecture
Functions of various elements in EPC
Content
Brief history about wireless ecosystem.
What is LTE (Long Term Evolution) ?
How is it different from older technologies ?
Network architecture in LTE
Radio Access network (RAN)
Evolved Packet Core (EPC)
Bearers in LTE
Interfaces in LTE
Life Cycle of a UE
LTE RAN overview
Architecture and requirements
Channel bandwidths and operating bands
OFDMA and SC-FDMA
Frequency (LTE-FDD) and time division duplexing (LTE-TDD)
Multiple Antenna techniques in LTE
Channels in LTE and protocol Stack
LTE EPC overview
Architecture
Functions of various elements in EPC
LTE is a 4G wireless technology developed by 3GPP to provide high-speed data and media transport, as well as high-capacity voice support into the next decade. It combines OFDM and MIMO to significantly increase peak data rates while improving spectral efficiency and lowering costs. LTE aims to meet carrier needs through flexible scalable bandwidth, support for FDD and TDD spectrum, and simplified network architecture. It is designed to evolve GSM, WCDMA and CDMA networks towards an all-IP packet-switched system.
The document discusses LTE key technologies including those from Release 9 and Release 10 of the 3GPP specifications. It describes the organizations involved in developing LTE standards and trials. The basic LTE technologies covered include OFDMA for downlink and SC-FDMA for uplink, frame structure, and peak throughput calculation methods. Key technologies added in Release 9 include enhanced dual-layer beamforming transmission to improve cell capacity and coverage using multiple layers. Release 10 features further expanded the use of multiple antennas and introduced carrier aggregation.
- 3GPP will standardize 5G technology in two phases, with Release 15 aiming for early 2020 deployments and Release 16 targeting the IMT-2020 submission.
- Coordination between RAN and SA groups is planned to converge on goals, timelines, and whether standalone operation should be supported in Release 15.
- Channel modeling above 6 GHz is progressing well, and requirements and scenarios for new radio access technologies have been identified.
- The new radio will be studied and evaluated, with the goal of a single technical framework addressing all usage scenarios while ensuring forward compatibility across releases.
The document discusses 3GPP, LTE, IMS, and VoLTE. It begins with an introduction to 3GPP as the standards body that includes seven telecommunications organizations and defines cellular technologies. It then covers the evolution of 3GPP standards from 2G to 4G LTE and emerging 5G technologies. IMS is introduced as 3GPP's IP Multimedia Subsystem specification that allows the delivery of multimedia over packet networks. Finally, VoLTE is defined as using IMS to provide voice calls over an LTE network.
The document outlines the course content for a training on LTE Network and Radio Planning Design. The course will cover:
1. An introduction and overview of the LTE architecture and its evolution from previous 3GPP standards like GSM, UMTS, and LTE.
2. Details of the LTE radio interface and channels.
3. LTE link budgets and capacity planning principles.
4. CPE testing procedures.
Technical Overview of LTE ( Hyung G. Myung)Going LTE
The document provides a technical overview of 3GPP LTE (Long Term Evolution). It discusses the evolution of cellular wireless systems from 1G to 3G, and the development of 4G technologies including 3GPP LTE, 3GPP2 UMB, and IEEE 802.16m. It describes the key requirements, enabling technologies, features, and standard specifications of 3GPP LTE. It also outlines the LTE protocol architecture and network architecture, including the roles of eNB, MME, S-GW, and P-GW nodes.
Content
Brief history about wireless ecosystem.
What is LTE (Long Term Evolution) ?
How is it different from older technologies ?
Network architecture in LTE
Radio Access network (RAN)
Evolved Packet Core (EPC)
Bearers in LTE
Interfaces in LTE
Life Cycle of a UE
LTE RAN overview
Architecture and requirements
Channel bandwidths and operating bands
OFDMA and SC-FDMA
Frequency (LTE-FDD) and time division duplexing (LTE-TDD)
Multiple Antenna techniques in LTE
Channels in LTE and protocol Stack
LTE EPC overview
Architecture
Functions of various elements in EPC
Content
Brief history about wireless ecosystem.
What is LTE (Long Term Evolution) ?
How is it different from older technologies ?
Network architecture in LTE
Radio Access network (RAN)
Evolved Packet Core (EPC)
Bearers in LTE
Interfaces in LTE
Life Cycle of a UE
LTE RAN overview
Architecture and requirements
Channel bandwidths and operating bands
OFDMA and SC-FDMA
Frequency (LTE-FDD) and time division duplexing (LTE-TDD)
Multiple Antenna techniques in LTE
Channels in LTE and protocol Stack
LTE EPC overview
Architecture
Functions of various elements in EPC
LTE is a 4G wireless technology developed by 3GPP to provide high-speed data and media transport, as well as high-capacity voice support into the next decade. It combines OFDM and MIMO to significantly increase peak data rates while improving spectral efficiency and lowering costs. LTE aims to meet carrier needs through flexible scalable bandwidth, support for FDD and TDD spectrum, and simplified network architecture. It is designed to evolve GSM, WCDMA and CDMA networks towards an all-IP packet-switched system.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
This document provides an overview of Long-Term Evolution (LTE) cellular technology. It describes LTE's network architecture including the E-UTRAN, Mobility Management Entity, Serving Gateway and Packet Data Network Gateway. It also discusses key LTE technologies such as OFDMA, SC-FDMA, MIMO and the evolution to LTE-Advanced with carrier aggregation and enhanced multi-antenna transmission techniques. Finally, it summarizes two research papers on power saving mechanisms in LTE networks and the potential for using LTE in vehicular networking applications.
LTE was developed to meet increasing demands for mobile data traffic by improving key metrics like latency, throughput, capacity and coverage compared to HSPA. It features flexible bandwidths up to 20MHz, simplified network architecture, advanced antenna techniques and OFDMA/SC-FDMA based access for downlink and uplink respectively. LTE supports peak rates of 300Mbps downlink and 75Mbps uplink depending on UE category and bandwidth. It adopts an all-IP flat architecture with simplified all-packet based transmission procedures.
This document provides an overview of UMTS network architecture and components. It describes the key elements of the UMTS Release 99 core network, including the circuit switched and packet switched domains. It also discusses the radio access network (UTRAN) and its components such as the radio network controller (RNC) and Node B. Finally, it summarizes the functions of the mobile switching center (MSC) and media gateway (MGW) in the UMTS network.
Technology neutrality allows any wireless technology that fits within a spectrum band to be used without requiring or assuming a particular technology. This provides economic benefits such as promoting innovation, competition between technologies, and more efficient spectrum usage. Europe adopted the principle of technology neutrality through policies like WAPECS and by updating legislation to allow 3G technologies like UMTS900 to be used within 2G bands like 900MHz. This refarming of 2G spectrum for 3G uses provides coverage and cost benefits compared to deploying 3G only at higher frequencies.
This presentation discusses 3GPP's System Architecture Evolution (SAE) which aims to provide services over any access network through a common IP-based core network. It covers migration from GSM to a multi-access system using SAE/LTE, including support for SIM/USIM/ISIM, security evolution, and interworking of multi-mode terminals and networks through service continuity, multiple registration, and voice call continuity. IMS is also discussed as the service platform for multimedia services in 3GPP networks.
The document discusses the evolution of 3G networks to 4G LTE networks. It describes the key aspects of LTE including the LTE architecture, air interface technologies like OFDMA and SC-FDMA, and the Evolved Packet Core. The goals of LTE were to provide higher data rates, improve spectrum efficiency, reduce latency and simplify the network architecture. LTE adopted an all-IP flat architecture with reduced network elements in the core to help lower costs and complexity.
Wireless communication netwrks.unit 5...3gpp architecture evolutionsangavaisang
1) The document discusses the evolution from GSM networks to multi-access IP networks including 3G, LTE, WiFi and other technologies.
2) A key part of this evolution is the System Architecture Evolution (SAE) which defines an IP-based core network that can support both 3GPP and non-3GPP access technologies in a seamless manner.
3) The IMS (IP Multimedia Subsystem) plays an important role as well, providing all-IP multimedia services across different access networks in a standardized way.
This document summarizes the views on 5G spectrum from the GSA Spectrum Group European regional team. It outlines that both low and high frequency spectrum bands will be needed to meet the diverse 5G usage scenarios. The "pioneer bands" identified by the European Union for 5G trials and early commercial deployment include 700 MHz, 3400-3800 MHz, and 24.25-27.5 GHz bands. The 3400-3800 MHz (C-band) is particularly important as it can provide wide contiguous blocks of 100 MHz or more per operator. However, the C-band spectrum is currently fragmented in Europe and consolidation is needed to enable 5G deployment by 2020.
This document provides an introduction to UMTS (Universal Mobile Telecommunications System). It describes the context and limitations of previous mobile systems that led to the development of 3G systems like UMTS. The goals of UMTS are to provide high-quality wireless multimedia services across converged fixed and mobile networks. The technical overview explains that UMTS uses CDMA to separate users within a cell and has both FDD and TDD duplex modes for frequency division.
This document provides a comparison of LTE and WiMax technologies. It discusses their network architectures, supported services, mobility capabilities, access technologies, performance metrics like data rates and spectrum efficiency, and limitations. While the technologies have similar performance under comparable conditions, LTE has some advantages like higher data rates, efficiency, and support for full 3GPP mobility and interoperability. The success of each technology will depend on operators' individual situations and strategies.
5G network architecture will include new functional blocks and interfaces defined by 3GPP. There are several options for deploying 5G, including standalone and non-standalone modes. When adding 5G to an existing multi-RAT site, backhaul capacity will need to be increased to at least 10Gbps to support 5G capabilities like massive MIMO and wider channel bandwidths. Migration from EPC to the new 5G core (NGCN) will require interworking between the networks during transition.
This document provides an overview of LTE technology from Huawei, including:
1. It describes the evolution of radio technologies leading up to LTE, which can achieve downlink speeds of 100Mbps and uplink speeds of 50Mbps.
2. It explains the LTE network architecture, which uses a flat, simplified design compared to previous standards. Key elements include the E-UTRAN, EPC, and interfaces like S1 and X2.
3. It introduces LTE air interface principles like OFDMA for downlink multiple access and SC-FDMA for uplink multiple access, allowing high spectrum efficiency through orthogonal frequency division.
A brief presentation of Runcom's profile, a pioneer and a leader manufacture of OFDMA based end to end Wireless Broadband Access Infrastructure Solutions for the global 4G market using Wimax and LTE propriety technology.
This document provides an overview of LTE architecture and interfaces. It begins with a brief history of 3GPP and IEEE standards evolutions leading to LTE. It then discusses the key capabilities and performance targets of LTE such as higher data rates, lower latency, and improved spectrum efficiency. The document outlines the LTE system architecture including the Evolved UTRAN and Evolved Packet Core. It describes the network interfaces between these components and other 3GPP networks for interworking and roaming. In summary, the document covers the evolution and standardization history driving LTE, its important technical capabilities, and high-level network architecture.
The document summarizes Long Term Evolution (LTE) technology. It discusses the evolution of LTE from 3G networks and its key features like downlink speeds of 100Mbps. The technologies that LTE uses are described, including OFDMA for downlink and SC-FDMA for uplink. LTE architecture is explained as a flat all-IP architecture with E-UTRAN and EPC components. Future applications of LTE Advanced and 4G are also mentioned.
LTE is a mobile broadband technology specified in 3GPP release 8 that provides higher data rates of up to 300 Mbps downlink and 75 Mbps uplink. The high-level architecture of LTE includes user equipment (UE), the evolved-UTRAN radio access network, and the evolved packet core. LTE Advanced, specified in release 10, utilizes technologies like carrier aggregation to support peak rates of 1 Gbps downlink and 500 Mbps uplink. LTE Advanced in unlicensed spectrum as specified in release 13 aggregates unlicensed bands with licensed spectrum for a unified LTE network leveraging both types of spectrum.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
1. 4G is the next major generation of mobile cellular systems expected to be deployed around 2010, extending beyond previous generations to provide peak data rates over 20 Mbps.
2. Key challenges for 4G include improving coverage while increasing capacity, as higher carrier frequencies and data rates require more cells to maintain coverage; and securing sufficient spectrum, ideally below 5 GHz for wide-area coverage.
3. Potential coverage and capacity solutions include asymmetric data rates, small cells, adaptive antennas, and advanced air interfaces optimized for IP traffic with techniques like OFDM.
Vehicular Ad-hoc NETwork (VANET) aims to enable vehicle-to-vehicle and vehicle-to-infrastructure communication to improve road safety and traffic efficiency. VANET uses dedicated short range communication technology and wireless standards like 802.11p to allow vehicles to communicate and share safety information. Key protocols discussed include the physical and MAC layers of 802.11p, as well as routing protocols for unicast, multicast, and broadcast communication. Challenges addressed include reducing collisions, improving throughput, and dealing with high vehicle mobility. Potential safety applications include collision warnings while non-safety applications provide traffic and navigation assistance.
The document discusses various LTE measurement parameters and procedures including:
1. The eNB reports a list of detected PRACH preambles and measures timing advance, average RSSI, average SINR, UL CSI, and transport BLER for RRM purposes.
2. UE measurements include CQI, RSRP, and RSRQ while eNB measurements include timing advance, RSSI, SINR, UL CSI, detected preambles, and transport BLER. Inter-RAT measurements are also discussed.
3. Examples of RSRP, RSRQ, and timing advance procedures are provided along with CQI measurement details. PLMN selection, cell selection,
This document provides an overview of Long-Term Evolution (LTE) cellular technology. It describes LTE's network architecture including the E-UTRAN, Mobility Management Entity, Serving Gateway and Packet Data Network Gateway. It also discusses key LTE technologies such as OFDMA, SC-FDMA, MIMO and the evolution to LTE-Advanced with carrier aggregation and enhanced multi-antenna transmission techniques. Finally, it summarizes two research papers on power saving mechanisms in LTE networks and the potential for using LTE in vehicular networking applications.
LTE was developed to meet increasing demands for mobile data traffic by improving key metrics like latency, throughput, capacity and coverage compared to HSPA. It features flexible bandwidths up to 20MHz, simplified network architecture, advanced antenna techniques and OFDMA/SC-FDMA based access for downlink and uplink respectively. LTE supports peak rates of 300Mbps downlink and 75Mbps uplink depending on UE category and bandwidth. It adopts an all-IP flat architecture with simplified all-packet based transmission procedures.
This document provides an overview of UMTS network architecture and components. It describes the key elements of the UMTS Release 99 core network, including the circuit switched and packet switched domains. It also discusses the radio access network (UTRAN) and its components such as the radio network controller (RNC) and Node B. Finally, it summarizes the functions of the mobile switching center (MSC) and media gateway (MGW) in the UMTS network.
Technology neutrality allows any wireless technology that fits within a spectrum band to be used without requiring or assuming a particular technology. This provides economic benefits such as promoting innovation, competition between technologies, and more efficient spectrum usage. Europe adopted the principle of technology neutrality through policies like WAPECS and by updating legislation to allow 3G technologies like UMTS900 to be used within 2G bands like 900MHz. This refarming of 2G spectrum for 3G uses provides coverage and cost benefits compared to deploying 3G only at higher frequencies.
This presentation discusses 3GPP's System Architecture Evolution (SAE) which aims to provide services over any access network through a common IP-based core network. It covers migration from GSM to a multi-access system using SAE/LTE, including support for SIM/USIM/ISIM, security evolution, and interworking of multi-mode terminals and networks through service continuity, multiple registration, and voice call continuity. IMS is also discussed as the service platform for multimedia services in 3GPP networks.
The document discusses the evolution of 3G networks to 4G LTE networks. It describes the key aspects of LTE including the LTE architecture, air interface technologies like OFDMA and SC-FDMA, and the Evolved Packet Core. The goals of LTE were to provide higher data rates, improve spectrum efficiency, reduce latency and simplify the network architecture. LTE adopted an all-IP flat architecture with reduced network elements in the core to help lower costs and complexity.
Wireless communication netwrks.unit 5...3gpp architecture evolutionsangavaisang
1) The document discusses the evolution from GSM networks to multi-access IP networks including 3G, LTE, WiFi and other technologies.
2) A key part of this evolution is the System Architecture Evolution (SAE) which defines an IP-based core network that can support both 3GPP and non-3GPP access technologies in a seamless manner.
3) The IMS (IP Multimedia Subsystem) plays an important role as well, providing all-IP multimedia services across different access networks in a standardized way.
This document summarizes the views on 5G spectrum from the GSA Spectrum Group European regional team. It outlines that both low and high frequency spectrum bands will be needed to meet the diverse 5G usage scenarios. The "pioneer bands" identified by the European Union for 5G trials and early commercial deployment include 700 MHz, 3400-3800 MHz, and 24.25-27.5 GHz bands. The 3400-3800 MHz (C-band) is particularly important as it can provide wide contiguous blocks of 100 MHz or more per operator. However, the C-band spectrum is currently fragmented in Europe and consolidation is needed to enable 5G deployment by 2020.
This document provides an introduction to UMTS (Universal Mobile Telecommunications System). It describes the context and limitations of previous mobile systems that led to the development of 3G systems like UMTS. The goals of UMTS are to provide high-quality wireless multimedia services across converged fixed and mobile networks. The technical overview explains that UMTS uses CDMA to separate users within a cell and has both FDD and TDD duplex modes for frequency division.
This document provides a comparison of LTE and WiMax technologies. It discusses their network architectures, supported services, mobility capabilities, access technologies, performance metrics like data rates and spectrum efficiency, and limitations. While the technologies have similar performance under comparable conditions, LTE has some advantages like higher data rates, efficiency, and support for full 3GPP mobility and interoperability. The success of each technology will depend on operators' individual situations and strategies.
5G network architecture will include new functional blocks and interfaces defined by 3GPP. There are several options for deploying 5G, including standalone and non-standalone modes. When adding 5G to an existing multi-RAT site, backhaul capacity will need to be increased to at least 10Gbps to support 5G capabilities like massive MIMO and wider channel bandwidths. Migration from EPC to the new 5G core (NGCN) will require interworking between the networks during transition.
This document provides an overview of LTE technology from Huawei, including:
1. It describes the evolution of radio technologies leading up to LTE, which can achieve downlink speeds of 100Mbps and uplink speeds of 50Mbps.
2. It explains the LTE network architecture, which uses a flat, simplified design compared to previous standards. Key elements include the E-UTRAN, EPC, and interfaces like S1 and X2.
3. It introduces LTE air interface principles like OFDMA for downlink multiple access and SC-FDMA for uplink multiple access, allowing high spectrum efficiency through orthogonal frequency division.
A brief presentation of Runcom's profile, a pioneer and a leader manufacture of OFDMA based end to end Wireless Broadband Access Infrastructure Solutions for the global 4G market using Wimax and LTE propriety technology.
This document provides an overview of LTE architecture and interfaces. It begins with a brief history of 3GPP and IEEE standards evolutions leading to LTE. It then discusses the key capabilities and performance targets of LTE such as higher data rates, lower latency, and improved spectrum efficiency. The document outlines the LTE system architecture including the Evolved UTRAN and Evolved Packet Core. It describes the network interfaces between these components and other 3GPP networks for interworking and roaming. In summary, the document covers the evolution and standardization history driving LTE, its important technical capabilities, and high-level network architecture.
The document summarizes Long Term Evolution (LTE) technology. It discusses the evolution of LTE from 3G networks and its key features like downlink speeds of 100Mbps. The technologies that LTE uses are described, including OFDMA for downlink and SC-FDMA for uplink. LTE architecture is explained as a flat all-IP architecture with E-UTRAN and EPC components. Future applications of LTE Advanced and 4G are also mentioned.
LTE is a mobile broadband technology specified in 3GPP release 8 that provides higher data rates of up to 300 Mbps downlink and 75 Mbps uplink. The high-level architecture of LTE includes user equipment (UE), the evolved-UTRAN radio access network, and the evolved packet core. LTE Advanced, specified in release 10, utilizes technologies like carrier aggregation to support peak rates of 1 Gbps downlink and 500 Mbps uplink. LTE Advanced in unlicensed spectrum as specified in release 13 aggregates unlicensed bands with licensed spectrum for a unified LTE network leveraging both types of spectrum.
The document discusses how to characterize and dimension user traffic in 4G networks. It describes how to define data traffic in terms of data speed and data tonnage. Data speed is the rate at which data is transferred, while data tonnage refers to the total amount of data exchanged. The document provides examples of data speed metrics used in 3GPP standards and outlines factors to consider when calculating expected data usage per subscriber based on typical mobile application usage patterns and available data plans. Dimensioning user traffic accurately is important for designing 4G networks to meet capacity demands.
1. 4G is the next major generation of mobile cellular systems expected to be deployed around 2010, extending beyond previous generations to provide peak data rates over 20 Mbps.
2. Key challenges for 4G include improving coverage while increasing capacity, as higher carrier frequencies and data rates require more cells to maintain coverage; and securing sufficient spectrum, ideally below 5 GHz for wide-area coverage.
3. Potential coverage and capacity solutions include asymmetric data rates, small cells, adaptive antennas, and advanced air interfaces optimized for IP traffic with techniques like OFDM.
Vehicular Ad-hoc NETwork (VANET) aims to enable vehicle-to-vehicle and vehicle-to-infrastructure communication to improve road safety and traffic efficiency. VANET uses dedicated short range communication technology and wireless standards like 802.11p to allow vehicles to communicate and share safety information. Key protocols discussed include the physical and MAC layers of 802.11p, as well as routing protocols for unicast, multicast, and broadcast communication. Challenges addressed include reducing collisions, improving throughput, and dealing with high vehicle mobility. Potential safety applications include collision warnings while non-safety applications provide traffic and navigation assistance.
The document discusses the need for a coherent regulatory framework to transform Pakistan's ICT industry in line with global trends. It outlines the evolution of telecom regulation from state monopolies to the current 4th generation focusing on convergence. Key trends driving changes include rapid mobile broadband growth, increasing data traffic, spectrum requirements, defining broadband speeds, use of TV white spaces, rise of over-the-top applications, and convergence of fixed and mobile networks. The document also reviews Pakistan's telecom policies and recommends revising the licensing framework by 2016 to address gaps and keep up with technology and market changes.
Since the photonic layer is the cheapest on a per-bit, per-function basis, and since
the key imperative before operator's today is to bridge the yawning gap between
exponentially increasing data traffic on the one-hand, and flat-to-declining revenues
on the other, a tighter coupling between the packet and optical layers to derive
operational, management, and deployment efficiencies, has...
The document provides an overview of High Speed Packet Data Evolution (HSPA+). It discusses the goals of HSPA+ to achieve performance comparable to Long Term Evolution (LTE) with a bandwidth of 5MHz. The key techniques discussed to achieve these goals include Multiple Input Multiple Output (MIMO), higher order modulation up to 64QAM, control channel improvements, and protocol optimizations. In conclusion, the combination of these techniques allows HSPA+ to reach close to LTE performance targets, though some targets like lower latency may not be achievable due to the longer transmission time interval of HSPA+.
This document summarizes Koonsys' iNOP network optimization software and service. It describes Koonsys' history and timeline, the traditional and innovative services it offers to wireless and wired network operators, its customers and partners. It then discusses trends in the telecom industry requiring cost savings and network expansion. iNOP is presented as the unique solution that addresses both needs through a techno-economic model combining technical and financial optimization of transmission networks. The document outlines how iNOP works through advanced algorithms, potential project results, deliverables and sample case studies showing capacity increases, cost savings and other benefits achieved for various mobile operators.
The document summarizes the key concepts in planning and deploying a 3G WCDMA mobile network. It describes the network architecture including nodes like RNC, Node B and interfaces. It also explains radio network planning phases and considerations like frequency planning, link budget calculations, coverage and capacity planning. The document discusses technologies like HSDPA that enhance data capabilities and presents LinkIT, a planning tool developed to understand network planning mathematics.
Early Builders' Roundtable APCO 2013 Conference 08-20-13Bill Schrier
Four early builders of LTE Public Safety wireless broadband networks share their lessons learned at the APCO 2013 Conference in Anaheim. Chuck Robinson of Charlotte, Barry Fraser of Bay-RICS, Todd Early of Texas and Vicki Helfrich of Mississippi are presenters. Moderated by Bill Schrier
Intelligent Transportation System (ITS) uses information and communication technologies to improve transportation safety, mobility, and efficiency. ITS applications include traffic management, emergency response, electronic toll collection, and vehicle-to-vehicle communication. Key technologies enabling ITS are vehicular ad hoc networks (VANETs), which allow vehicles to communicate, and wireless sensor networks (WSNs), which can monitor road conditions. Open research challenges include reliable communication in dense traffic and leveraging cloud computing with VANETs and vehicle resources.
Koonsys is a network optimization company that launched its iNOP software in 2004. iNOP uses advanced algorithms and optimization techniques to analyze telecom network data and identify opportunities to reduce costs and improve network performance. It provides customized optimization plans and reports for clients. Case studies showed iNOP optimized networks by reducing microwave hops by 5-33%, freeing up tower space, increasing link capacities by 27-262%, and reducing costs per Mbps transferred by 16-51%.
This document provides an overview of 4G wireless systems and LTE architecture. It discusses the purpose and motivation for 4G technology, including providing high-speed wireless access to mobile devices. It describes the LTE architecture, including the evolved NodeB, evolved packet core components, and interfaces. It also covers LTE channel structure, protocols, and the radio access network components of 4G such as OFDMA and frame structure.
The document provides an overview of the LTE radio layer 2, RRC and radio access network architecture. It summarizes the E-UTRAN architecture, user and control plane protocol stacks, connection management, RRC states, connected state mobility, and highlights interoperability with legacy systems and self-organizing networks. Key aspects covered include EPS bearer service architecture, PDCP, RLC, MAC, scheduling, DRX, security, and reliable transport using HARQ and ARQ.
The document provides an overview of the LTE radio layer 2, RRC and radio access network architecture. It summarizes the E-UTRAN architecture, user and control plane protocol stacks, connection management, RRC states, and connected state mobility procedures. It also highlights interoperability with legacy systems, self-organizing networks, UE positioning, multimedia broadcast, latency evaluations, and LTE-Advanced features.
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...Yi-Hsueh Tsai
3GPP Overview
TSG Plenary Status
Progress and content of SA1 5G Study Item - SMARTER
- Introduction and Status
- Radio Interface Technology definition
- Time Delay analysis
- Use Cases and Summary
RAN workshop on 5G Chairman Summary
- Use Cases & Services
- New radio
- 5G Time Line and Phasing
- Next steps
NGMN Alliance’ 5G Use Cases
The document discusses geolocation services provided by Integral Systems Service Solutions (IS3). Key points:
1. IS3 was recently merged with Kratos Technology and Training Systems and is now operating under the parent company SAT Corporation.
2. SAT Corporation provides interference detection and geolocation products including Monics and satID that use techniques like TDOA and FDOA to locate interfering signals within two satellites using just two antennas.
3. Geolocation services can identify the source of accidental interference from issues like equipment failure or operator error, as well as locate intentional interference.
Comtech advanced backhaul_solutions-rio_nov_2012SSPI Brasil
This document provides best practices for designing advanced backhaul solutions over satellite links. It discusses the importance of understanding traffic patterns and characteristics, preparing proper link budgets, and using tools like compression, adaptive coding and modulation, and carrier-in-carrier technology to optimize bandwidth usage in a statistical manner. It also covers considerations for different traffic types like synchronous data, packet-based links, and voice traffic with regards to latency, jitter, and traffic modeling.
IRJET- Power Line Carrier CommunicationIRJET Journal
This document describes power line carrier communication (PLCC), which uses power lines as a communication medium. It discusses using PLCC to transmit electricity billing data from individual homes to the electricity company without site visits. Key components of the system include a real-time clock, energy meter, microcontroller, LCD display, and FSK transmitter and receiver. Data transmission is done by modulating a signal onto the power line using FSK modulation. The system is intended to reduce the burden on electricity companies by allowing remote transmission of billing data without the need for site visits.
There is considerable development work going on regarding emergency Applications and in this session attendees were informed about the most recent updates and heard first hand where the latest thinking will take us. They were also informed about standards discussed and produced by international Standards Developing Organisations (SDOs) and that will impact emergency calls handling organisations.
4G cellular systems aim to provide broadband wireless access with peak data rates over 20 Mbps. Key challenges for 4G include limited coverage due to higher frequencies and capacity constraints of current air interfaces. 4G requires spectrum below 5 GHz for wide-area coverage given mobile device limitations. It will also utilize technologies like adaptive antennas and asymmetric data rates to boost coverage and capacity.
Similar to 2005 RSA Conference: Safe at Any Speed (20)
As organizations shift control of their infrastructure and data to the cloud, it is critical that they rethink their application security efforts. This can be accomplished by ensuring applications are designed to take advantage of built-in cloud security controls and configured properly in deployment.
Attend this webcast to gain insight into the security nuances of the cloud platform and risk mitigation techniques. Topics include:
• Common cloud threats and vulnerabilities
• Exposing data with insufficient Authorization and Authentication
• The danger of relying on untrusted components
• Distributed Denial of Service (DDoS) and other application attacks
• Securing APIs and other defensive measures
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Security Innovation
This talk will help you, as a decision maker or architect, to understand the risks of migrating a thick client or traditional web application to the modern web. In this talk I’ll give you tools and techniques to make the migration to the modern web painless and secure so you can mitigate common pitfalls without having to make the mistakes first. I’ll be doing demos, and telling lots of stories throughout.
Making some good architectural decisions up front can help you:
- Minimize the risk of data breach
- Protect your user’s privacy
- Make security choices easy the easy default for your developers
- Understand the cloud security model
- Create defaults, policies, wrappers, and guidance for developers
- Detect when developers have bypassed security controls
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)Security Innovation
To ensure critical data can only be accessed by authorized personnel, it is paramount to integrate security best practices during development. It’s equally important to protect deployed systems, especially in CI/CD (continuous integration and deployment) and DevOps environments.
Attend this webcast to learn techniques to define, design, develop, test, and maintain secure systems. Particular focus will be paid to software-dependent systems.
Topics include:
• Identifying and risk-rating common vulnerabilities
• Applying practices such as least privilege, input/output sanitation, and system hardening
• Implementing test techniques for system components, COTS, and custom software
Sensitive data is vulnerable when it is stored insecurely and transmitted over open networks. The PCI Security Council takes a hard line on protecting cardholder data and describes specific methods to comply with its standards.
Attend this webinar to better understand methods that make data theft more difficult for attackers and render stolen data unusable.
Topics covered include:
• Properly protecting stored cardholder data - encryption, hashing, masking and truncation
• Securing data during transmission - using strong cipher suites, valid certificates, and strong TLS security
• How to identify and mitigate missing encryption
The document discusses 5 ways to train cross-functional DevOps teams in security: 1) elevate security knowledge across the entire team while developing security champions, 2) balance traditional training with hands-on learning using real scenarios, 3) offer role-based security training tailored to each role rather than trying to make everyone security experts, 4) use shorter, modularized training modules rather than long-form courses based on education research, 5) establish a training plan for DevOps teams as Gartner predicts DevSecOps practices will be embedded in 80% of rapid development teams by 2021.
Regulatory compliance mandates have historically focused on IT & endpoint security as the primary means to protect data. However, as our digital economy has increasingly become software dependent, standards bodies have dutifully added requirements as they relate to development and deployment practices. Enterprise applications and cloud-based services constantly store and transmit data; yet, they are often difficult to understand and assess for compliance.
This webcast will present a practical approach towards mapping application security practices to common compliance frameworks. It will discuss how to define and enact a secure, repeatable software development lifecycle (SDLC) and highlight activities that can be leveraged across multiple compliance controls. Topics include:
* Consolidating security and compliance controls
* Creating application security standards for development and operations teams
* Identifying and remediating gaps between current practices and industry accepted "best practices”
How to Hijack a Pizza Delivery Robot with Injection FlawsSecurity Innovation
Welcome to the lighter side of the software security world!
We’ll explain complex topics like injection flaws, configuration errors, and parameter tampering with real-world analogies, like breaking into your house through your shed, or sneaking into a Coldplay concert using a reflective yellow vest, a walkie talkie toy, and your bravado. If you’ve ever struggled to remember exactly how these issues work or struggled to explain them to someone outside of the security field, this presentation will help (and probably make you laugh).
Topics covered include:
- Injection Flaws
- XSS
- SQL Injection
- Broken Authentication
- Privilege Escalation
- Information Disclosure
- Parameter Tampering
- Configuration Errors
This webinar is ideal for anyone who wants to understand core Application Security concepts so they can apply risk mitigation strategies with better context.
Software runs today’s business; however, security implications are often misunderstood, creating significant organizational risk. Poorly configured servers, 3rd-party software, and continuous release cycles put additional pressure on already stressed teams.
Hackers no longer just exploit vulnerabilities in code -- faulty cloud deployments, weak database structures, and business logic problems are also easy targets for attackers. To reduce risk, you’ve got to audit your system in the same way an attacker would.
This presentation demonstrates how attackers compromise the modern enterprise. For each attack demonstrated, mitigation practices will be discussed. WARNING: software will be harmed during this presentation. Viewer discretion advised.
Ed Adams discusses addressing the cybersecurity skills shortage and diversity imbalance. He outlines that there will be 3.5 million unfilled cybersecurity jobs by 2021 according to a Cybersecurity Ventures report. However, PCI standards have been influential in improving security and could help address these issues. If more groups like minorities and women are trained through PCI certification programs, it could help fill many open jobs. Diversity in the workplace also provides cultural and business benefits, with research showing diverse teams outperform less diverse peers. Speakers provide tips on successful diversity initiatives like mentorship programs, partnering with universities, and ensuring all groups feel included and supported in technical fields.
Information systems in the digital age are complex and expansive, with attack vectors coming in from every angle. This makes analyzing risk challenging, but more critical than ever.
There is a need to better understand the dynamics of modern IT systems, security controls that protect them, and best practices for adherence to today’s GRC requirements.
These slides are from our webinar covering topics like:
· Threats, vulnerabilities, weaknesses – why their difference matters
· How vulnerability scanning can help (and hinder) your efforts
· Security engineering and the system development lifecycle
· High impact activities - application risk rating and threat modeling
The cloud is a cost-effective way to provide maximum accessibility for your customers. However, organizations often fail to optimize and configure it properly for their environment, leaving them inadvertently exposed.
These slides are from our recent webinar covering proven techniques that reduce cloud risk, including:
• Building applications to leverage automation and built-in cloud controls
• Securing access control and key management
• Ensuring essential services are running, reachable, and securely hardened
Security Innovation is a leader in software security that provides various security services and training solutions. Their CMD+CTRL Cyber Range is a cloud-based cybersecurity simulation and training platform that allows users to build and assess their skills through hands-on practice in simulated real-world software environments and scenarios. The platform aims to improve cybersecurity skills in a more engaging and effective manner compared to traditional cyber ranges.
IoT Systems provide powerful, flexible features for IT systems — tracking, monitoring, and other data sharing. Today’s IoT devices utilize microservices and APIs that make them easy to put into production. But securing them isn’t as easy.
This webinar will look at security risks of IoT devices, interfaces, and implementations. We’ll provide practical steps and checklists any DevOps team can use to make their IoT components as secure as possible. We’ll also cover some testing best practices that can be done pre- and post-production to verify security and resilience on an ongoing basis.
This session provides an introduction to simulation environments like Cyber Ranges, differentiate them from gamification systems, and discusses the emerging delivery, adoption and organizational lessons learned that are driving further adoption.
Blockchain is a promising technology getting a lot of attention these days; however, organizations aren’t entirely sure how it might improve business operations, what the risk implications are, and the security savviness needed to implement securely.
This webcast will address the most pressing issues and misconceptions surrounding Blockchain today, including:
• What is Blockchain?
• What are the new technologies I need to understand?
• Use Cases: where is Blockchain most advantageous?
• Snooze Cases: where/when is Blockchain a bad idea?
• What are the most common pitfalls with Blockchain?
Software runs our world — the cars we drive, the phones we use, the websites we browse, the entertainment we consume. In every instance privacy risks abound. How do software development teams design and build software to ensure privacy data is protected?
Attend this webcast to learn practical tips to build software applications that protect privacy data. Understand the requirements of new laws such as GDPR and the impact they have on software development.
Topics covered:
• Designing for Privacy: least privilege and compartmentalization
• Creating privacy impact rating
• Implementing application privacy controls
• Techniques for effective privacy testing
This document summarizes a webinar on privacy secrets and how systems can reveal personal information. It discusses defining privacy, the seven types of privacy, and the differences between privacy and security. It also covers threats to privacy like big data, location tracking, and metadata analysis. The webinar examines data types like PII, PHI, and anonymous/pseudonymous data. It provides examples of data lifecycles and analyzing how data flows through systems and to third parties. The goal is to help organizations understand privacy risks and comply with regulations like GDPR.
DevOps continues to be a buzzword in the software development and operations world, but is it really a paradigm shift? It depends on what lens you view it through.
Roman Garber, an active software security engineering and software team lead thinks so. Ed Adams, Security Innovation CEO, a 20-year software quality veteran and former mechanical engineer, curmudgeonly disagrees.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
Did you lock the door before leaving your house this morning? If you did, you threat modeled without even realizing it. Threat modeling is identifying potential threats (house robbery) and implementing measures to mitigate the risk (locking your door).
Protecting valuable assets, no matter if personal assets or business-related assets such as the software you are developing, threat modeling should become an instinctual and necessary part of your process.
Our talk highlights how nearly 50% of security flaws can be mitigated through threat modeling. We help you prevent and mitigate risks by utilizing a reliable and hard-hitting analysis technique that can be applied to individual applications or across an entire portfolio. We show you how to effectively apply these techniques at the start of the design phase and throughout every phase of the development lifecycle so you can maximize the ROI of your security efforts.
Topics covered include:
• Threat Modeling 101
• The propagating effect of poor design
• Tabletop exercise – a world with and without threat modeling
• Best practices and metrics for every stakeholder
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
2005 RSA Conference: Safe at Any Speed
1. Safe at Any Speed:
Dedicated Short Range
Communications
(DSRC) and On-road
Safety and Security
William Whyte
NTRU Cryptosystems
Tuesday, February 15th, 2005
2. Aim
• Give an overview of Intelligent Transport Systems (ITS)
standards as they affect personal safety and security
• Discuss the specific communications security requirements of
5.9 GHz Dedicated Short Range Communications (DSRC)
5. Overview
• 2.8 trillion vehicle miles traveled in 2001
• Nearly 43,000 deaths per year from automobile accidents
– 1.59 per 100 million vehicle miles traveled
• 3 million people injured
• Automobile accidents cost $230B
• ITS America has established a vision for zero fatalities
6. ITS America
• National Intelligent Transportation Systems Program Plan has
an aim of a reduction of transportation-related fatalities by 10-
15% by 2011, saving 5,000-7,000 lives a year
– For example, reductions of 15-40% in on-ramp metering accidents
• Save 20 billion per year by enhancing throughput and reducing
congestion
• Save 1 billion gallons of gasoline per year
• Single payment medium for national and regional travel
– Currently fragmented, three incompatible RF tolling mechanisms in
place
7. Accident Statistics
• Run Off Road - 30% of all fatalities
• Intersections - 50% of all crashes
• Pedestrian/Bicycle - 14% of fatalities
• Speed - involved in 30% of all crashes
• Human Factors - drivers a causal factor for at least 80% of all
crashes
• Toll Plazas significant source of accidents
– Accidents five times more likely in the tenth of a mile near a
tollbooth than in the same space on an open road
– Due to looking for change, merging, unexpected pedestrian
traffic…
8. National ITS Program Plan (2)
• Safety-related applications and products
– information products
– diagnostic/prognostic products
– driver assistance products
– active safety products.
• Advanced Crash Avoidance technologies:
– Mustn’t interfere with driver’s attention
– Must address manufacturer’s proprietary concerns
– Must behave consistently
9. Achievements to date:
• Traffic Management Centers have been created in two-thirds of the
75 largest metropolitan areas.
• Traffic signals and ramp meters have been tuned to improve traffic
flow and safety.
• Travel information is more readily available to the public to assist in
their travel planning and decision-making.
• Electronic toll collection has been installed on 70% of existing toll
road mileage and over ten million toll tags have been issued in North
America. Non-toll electronic payment applications have begun to
appear.
• Thirty states have begun using transponders and roadside computers
to screen safe and compliant commercial vehicles past weigh stations
and other roadside facilities at up to mainline speeds
– Nearly 7,000 motor carrier fleets participate in these programs.
10. Why DSRC?
• Next step is to reduce driver error by improving driver
information
• Enable vehicle-to-vehicle and vehicle-to-infrastructure
communication using wireless transponders built to a single
standard
• This is primarily to be used for safety applications, but will
provide sufficient bandwidth to allow private applications
– Tolling
– Traffic information
– Commercial
• Spectrum already allocated for this use
12. Existing Spectrum allocation
• Public safety:
– 25-50 MHz, 138-144 and 148-174 MHz, 220-222 MHz, 406-420 and 450-
470 MHz, 806-824 and 851-869 MHz for voice communications
– 90 MHz at 4.9 GHz for data communications
– 764-776 MHz and 794-806 MHz will be available once TV broadcasters
complete transition to DTV (12/31/06)
• Tolling
– 902-928 MHz already approved
• 5.9 GHz DSRC Spectrum
– First to be FCC-approved for both public safety and private use
• Prioritization issues, to be discussed later
– Japan, Europe have approved spectrum at 5.8 GHz for similar uses
13. Radio Taxonomy
• OBU – On Board Unit
– PSOBU – Public Safety On Board Unit
– OBUs are mobile, unlicensed users of spectrum (under FCC)
• RSU – RoadSide Unit
– Stationary units
• Allowed to move from site to site, but must be stationary to
operate
– Licensed by site (under FCC)
– Allowed to provide channel management to OBUs in their
communications zone
14. Enormous shift in mindset
• Previously, the tag was the application
– Tolling tag enables tolling
– GPS receiver enables Neverlost
– Reflected in language – people talk about “900 MHz applications”
• Now the OBU is the network access point for many
applications
– Completely different security model
15. RSU - Roadside Unit; OBU - Onboard Unit; EV - Emergency Vehicle; EIRP - Effective Isotropic Radiated
Power; CSMA - Carrier Sense Multiple Access
5.9 GHz DSRC TECHNOLOGY
CHARACTERISTICS
• Approach: Active
• Bandwidth: 75 MHz (5.850 - 5.925 GHz)
• Modulation: QPSK OFDM (with 16QAM and 64QAM options) (BPSK preamble)
• Channels: 7 - 10 MHz channels (optional combinations of 10 and 20 MHz channels)
• Data Rate: 6, 9, 12, 18, 24, and 27 Mbps with 10 MHz Channels (3 Mbps preamble)
(or 6, 9, 12, 18, 24, 36, 48, and 54 Mbps with 20 MHz Channel option) (6 Mbps preamble)
• Max Tx Pwr: 28.8 dBm (at the antenna input)
• RSU EIRP: Nominal 0 - 33 dBm (1 mW - 2 W) / Max. 44.8 dBm (30 W)
• OBU EIRP: Nominal 0 - 20 dBm (1 - 100 mW) / Max. 44.8 dBm (30 W)
• RSU and OBU Sensitivity: - 82 dBm (QPSK) / - 65 dBm (64QAM)
• C/I: 4 - 6 dB (for QPSK @ 10-4 BER coded) / 16 - 17 dB (for 64QAM @ 10-4 BER coded)
• Band Sharing Strategy - Frequency Coordination. Selection of alternate channels for
adjacent zones. Use CSMA to prevent interference between users in the channel.
• Typical Successful Transmission rate: 50-60%
17. Application Taxonomy (DSRC style)
• Vehicle safety
• Public safety
– Operated by emergency vehicles and other vehicles accredited by
a government agency
– Usually, but not exclusively, emergency response
• Other
– Tolling
– CVO fleet management
18. Application Taxonomy (FCC style)
• Public safety
– Anything that impacts the safety of the public
• Includes public safety and vehicle safety
• Also Tolling
n See above
• Other applications
• Distinction is significant because public safety applications can
broadcast at higher power
19. 5.9 DSRC Standardization
• IEEE
– P802.11p – MAC and PHY
– P1556 – security services
– P1609 – networking stack
• ASTM E2213-03
– MAC and PHY
• Related:
– NTCIP – message sets and protocols for intelligent transport systems
– SAE – message sets for ITS
– IEEE 1512 – message sets for incident management (coordinates with
SAE)
20. Very Complicated!
• NTCIP Transportation Management Protocol - AASHTO
1103, AASHTO, 1103, No update, www.ntcip.org/order/
• NTCIP - CORBA Naming Convention Specification - AASHTO
1104, AASHTO, 1104, No update, www.ntcip.org/order/
• NTCIP - CORBA Security Service Specification - AASHTO
1105, AASHTO, 1105, No update, www.ntcip.org/order/
• NTCIP - CORBA Near-Real Time Data Service Specification - AASHTO
1106, AASHTO, 1106, No update, www.ntcip.org/order/
• NTCIP - Objects for Signal System Masters- AASHTO
1210, AASHTO, 1210, No update, www.ntcip.org/order/
• NTCIP Objects for Network Camera Operation, AASHTO, 1212, No
update, www.ntcip.org/order/
• NTCIP - Electrical and Lighting Mgmt System Interoperability &
Intercommunications Std - AASHTO 1213, AASHTO, 1213, No
update, www.ntcip.org/order/
• NTCIP - Weather Report Message Set for ESS - AASHTO
1301, AASHTO, 1301, No update, www.ntcip.org/order/
• Generic Reference Model for C2C Communications, AASHTO, 1602, No
update, www.ntcip.org/order/
• NTCIP - Application Profile for Common Object Request Broker Architecture
(CORBA) - AASHTO 2305, AASHTO, 2305, No update, www.ntcip.org/order/
• NTCIP Application Profile for XML C2C Communications, AASHTO, 2306, No
update, www.ntcip.org/order/
• NTCIP Structure and Identification of Management Information - NTCIP
8004, AASHTO, 8004, No update, www.ntcip.org/order/
• NTCIP Testing and Conformity Assessment Documentation within NTCIP
Standards Publications, AASHTO, 8007, No update, www.ntcip.org/order/
• NTCIP XML in ITS Center-to-Center Communications, AASHTO, 9010, No
update, www.ntcip.org/order/
• NTCIP Testing Guide for Users,AASHTO, 9012, No
update, www.ntcip.org/order/
• NTCIP SEP for Communications Profile, AASHTO, 901X, No
update, www.ntcip.org/order/
• TCIP Dialogs, APTA, TBD, No update, www.ntcip.org/order/
• Standard Specifications for Metadata Content for ITS-Generated Data - ASTM
E-17.54.02.1, ASTM, E17.54.02.1, No update, www.astm.org
• Standard Specifications for Archiving ITS-Related Traffic Monitoring Data -
ASTM E-17.54.02.2, ASTM, E17.54.02.2, No update, www.astm.org
• Standard for Common Traffic Incident Management Message Sets for Use in
Entities External to Centers - IEEE 1512.4, IEEE, 1512.4, No
update, www.ieee.org
• Standard for Dedicated Short Range Communications (DSRC) Resource
Manager - IEEE 1609.1, IEEE, 1609.1, No update, www.ieee.org
• Standard for Dedicated Short Range Communications (DSRC) Application Layer
- IEEE 1609-2, IEEE, 1609.2, No update, www.ieee.org
• Standard for IP Interface for Dedicated Short Range Comunications (DSRC) -
IEEE 1609.3, IEEE, 1609.3, No update, www.ieee.org
• Standard for Dedicated Short Range Communications (DSRC) Channelization -
IEEE 1609.4, IEEE, 1609.4, No update, www.ieee.org
• Standard for Security and Privacy of Vehicle/Roadside Communication Including
Smart Card Comm. ? IEEE P1556, IEEE, P1556, No update, www.ieee.org
• Application Programming Interface (API) Standard for the Advanced
Transportation Controller (ATC) - ITE 9603-1, ITE, 9603-1, No
update, www.ite.org
• Standard for Data Dictionary and Message Sets for Dedicated Short Range
Communcations (DSRC) - SAE J2xxx, SAE, J2xxx, No update, www.sae.org
21. Our focus: the network stack
• Need to manage channel switching
– Control channel + service channels
• High-priority messages and management messages on
control channel
n Safety messages
• Application data exchanged on safety channel
– Back to control channel every so often
• … and issues arising from that.
24. Medium Access Layer (MAC) and
Physical Layer (PHY)
Layers 1 and 2a
ASTM E2313-02
ISO 21215
Standards Structure
- Established Standards and procedures that are referenced or used as necessary
- Standards that must be modified or completed - Standards that must be written
Layer 2
Medium Access Control
(MAC)
IEEE 802.11
Layer 1
Physical Layer/
(PHY)
IEEE 802.11a
5.9 GHz
North American
Architecture
Specification
ASTM ????-A
5.9 GHz
Test Procedure
Specification
ASTM ????-T
Application Layer/
Layers 3-7
IEEE 1455
Application
Manager
IEEE 1609.1
CORE DSRC STANDARDS STRUCTURE
Other
Applications
SAP SAPUpper Layer
Manager/
ASTM ZZZZ
SAP
SAP
Lower Layer
Manager/
ASTM YYYY
Application and Network Layers
Layers 3 – 7
IEEE 1609.3
(Streamlined ISO 21210)
and IETF standards
SAP
SAP
SAP
SAP
SAP
SAP - Data Flow
- Management Flow
Logical Link Layer (LLC)
Layer 2b
IEEE 802.21
1 - Only a subset of IEEE 802.2 functions are required to support Layer 3
SAP
SAP 1 for
Network
Services
SAP 2 for Network Services
SAP
SAP
Safety Applications
SAE
Resource Manager
IEEE 1455
25. What makes the solution complex?
• Communications points are moving at high speed
• Must operate as master/slave when talking to roadside, peer-
to-peer directly
• Must acquire in milliseconds
• Must change channels in microseconds
• Must control power dynamically to decrease interference
• Must always get the most important message through first
• Must have bulletproof security
• Must preserve anonymity for end users
26. Radio
• The final selection between the Motorola entry and the OFDM forum
entry was made by the ASTM E17.51 DSRC Standards Writing
Group on August 24, 2001. THE WINNER was the OFDM forum
entry.
• The writing group selection was confirmed by letter ballot vote of the
Larger ASTM E17.51 subcommittee in October 2001.
• The ASTM DSRC STD E2313-02 was approved on 5/10/02,
underwent validation and verification testing, and was reissued with
slight modifications in 2003 as ASTM DSRC STD E2313-03
– Now forming the basis of IEEE 802.11p, whose PAR was recently
moved.
30. EMERGENCY VEHICLE APPROACH WARNING
5.9 GHz DSRC VEHICLE TO VEHICLE APPLICATION
VEHICLE
FRONT
EMERG.
VEHICLE
REAR
EMERG.
Note 1: The Emergency OBU transmits a warning to
ALERT other vehicles that it is coming.
In-Vehicle
Displays and
Annunciations
Traffic Signal
Traffic Signal
Emergency Vehicle
Not to Scale
up to 1000 m (3281 ft)
OBUs on Control Ch
Emergency Vehicle Approach
Warning Communication Zone
~
~
~
~
~
~
VEHICLE
LEFT
EMERG.
VEHICLE
RIGHT
EMERG.
ANIMATION
FOLLOWS
31. EMERGENCY VEHICLE SIGNAL PREEMPTION
5.9 GHz DSRC ROADSIDE TO VEHICLE APPLICATION
~
~
Traffic Signal
RSU
Horizontal
Support
RSU located in the
center of the
intersection
Traffic Signal
Traffic Signal
Emergency Vehicle
Not to Scale
up to 1000 m (3281 ft)
~
~
~
~
OBU on Intersection Ch
RSU on Intersection Ch
Note 1: OBU Transmitting
the Emergency Vehicle
Signal Preemption Request
on the Intersection Ch
32. up to 825 ft
range
Mobile Radio
Traffic Signal
Traffic Signal
Intersection Radio
The Central Intersection Communications Subsystem
Intersection Collision
Avoidance System
Equipment Cabinet
Traffic Signal - Green
Traffic Signal- Red
Radio Communication
VEHICLE BASED / INFRASTRUCTURE ASSISTED COLLISION AVOIDANCE
w/ STOP LIGHT ASSISTANT
33. INFRASTRUCTURE ASSISTED COLLISION AVOIDANCE
Not to Scale
Car NOT Stopping
Vehicle A
Vehicle B
334 ft @ 35 mph
Dynamic Message
Sign (DMS)
Mobile Radio
Intersection Radio
Vehicle Brake Lights
334ft@35mph
Traffic Signal - Green Traffic Signal- Red
Traffic Signal- Green
Traffic Signal- Red
Radar Tracking
Radio Communication
Radar System
ANIMATION
SCP - Straight Crossing Path
STOP
COLLISION
LEFT
STOP
COLLISION
RIGHT
Car being Warned
34. INFRASTRUCTURE ASSISTED COLLISION AVOIDANCE
Not to Scale
Car NOT Stopping
Vehicle A
Vehicle B
334 ft @ 35 mph
Dynamic Message
Sign (DMS)
Mobile Radio
Intersection Radio
Vehicle Brake Lights
334ft@35mph
Traffic Signal - Green Traffic Signal- Red
Traffic Signal- Green
Traffic Signal- Red
Radar Tracking
Radio Communication
Radar System
ANIMATION
SCP - Straight Crossing Path
STOP
COLLISION
LEFT
STOP
COLLISION
RIGHT
Car being Warned
35. LOW BRIDGE WARNING and ROLL OVER WARNING
gantry
The tractor trailer receives curve
parameters from the RSU in the
rollover warning sign. The on-board
computer calculates the proper
speed for this vehicle’s loading and
warns the driver if a rollover is
indicated.
Tractor-trailer with OBU
receiving rollover parameters
from the warning sign at the
curve on Control Channel
RSU located on a
Tower Transmitting
Bridge Clearance or
Warning on Control Ch
Tractor-trailer being
measured from the
gantry and receiving
link identification from
OBU on Control Ch
Application submitted by
Carl W. Compton,
KANSAS TURNPIKE AUTHORITY
Not to Scale
RSU located in the
the warning sign
using Control
Tractor-trailer can
pull over here if it
is Over the Height
limit for the bridge
Tractor-trailer can
exit here if it is
Over the Height
limit for the bridge
Roadside to Vehicle Application
36. TOLL COLLECTION (Open Road) in service channel
The Toll Collection RSU
operates on a Service
Channel and is located on
the gantry above the lanes gantry
= capture zone
RSU Antennas
Note 2: Users are allowed to
proceed at highway normal speeds
while the toll is paid.
Not to Scale
Micro Zone
OBU on Channel 174 slot B
OBU on Channel 174 slot A
RSU on Channel 174
Note 3: Implementers use Time
Division to isolate vehicle
communications and angle of signal
arrival to locate vehicle.
30 m (98 ft)
Note1: OBU approaching the toll
zone are instructed to switch to a
service channel in order to conduct
the transaction.
RSU on Control Channel Toll
Zone Announcement
OBU on Control
Channel
37. TOLL COLLECTION (Lane Based) on the Service channels
RSUs are located
on the gantry
above the center of
each lane gantry
= capture zone
RSU Antennas
Not to Scale
Traffic Signal
Traffic Signal
Concrete Median
Traffic Signal
Traffic Signal
Pico Zones
OBU on Service Channel 182
RSU on Channel 180
OBU on Channel 180
RSU on Channel 182
RSU on Control Channel 178
Toll Zone Announcement RSU
on Control Channel
5.9 GHz DSRC ROADSIDE EQUIPMENT
38. Two different types of application
• Broadcast
– Safety messages
– Preempt use by other applications
• Transactional
– Tolling
– CVO
– Typically Client-Server Architecture
– Advertised by RSUs, consumed by OBUs
39. PSTs
• RSUs broadcast Provider Service
Tables (PSTs) listing the services
they provide and the channels they
are provided on
• OBUs decide whether or not to
consume that service, switch to the
channel if so
– Send back a response setting up a
link.
• PST size limited by MTU size, so
typically a given RSU will support
relatively few distinct applications
• Wave Router Advertisement (WRA)
gives channel switch timing
Restaurant
Maps
Traffic Info
Tolling
41. Security Issues Overview
• Anonymity
• Authentication
– Need to ensure that fake messages can’t be inserted into the
system
• Non public safety vehicles issue signal prioritization requests
• Non toll plazas request your tolling information
• Eavesdropping
– Don’t want competitors obtaining CVO data
• Of these, anonymity is the most difficult to address
• First, survey threats
42. Four Classes of Attacker
• Class 1: Attackers with a programmable radio transmitter
• Class 2: Attackers with an unmodified DSRC unit
• Class 3: Attackers with a modified DSRC unit and who have the
keying materials
• Class 4: “Inside” attackers with access to manufacturers and OEM
records
43. Example Attacks
• Class 1 Attacks
– Replay/tunneling of legitimate messages
• Class 2 Attacks
– Change of location
– Indicator mismatch
• Class 3 Attacks
– Generate any desired message
• Class 4 Attacks
– Key extraction
44. Out of scope threats
• Physical denial of service
• Radio jamming
• Attacks on the GPS infrastructure
• Software-based compromise of units
• Misconfiguration
45. Threat mitigation
• Authenticate messages
– Targets of messages are “all vehicles on the road”, so need public-
key signatures
• Encrypt confidential data
• Messages must be as short as possible and transactions as
fast as possible
– Long messages result in packet loss
• Current proposal: for broadcast, high-priority messages
(public/vehicle safety) a new compact certificate format and a
public key algorithm with particularly short keys
46. Trust Model
• Trust model varies application to application:
– For vehicle safety the operator is untrusted – applications need to
be isolated from them.
– For public safety the operator is trusted
– For e-Commerce, trust model is the same as desktop trust model
• Although if I borrow your car I may be able to buy gas on your
dime
– For CVO, drivers are not necessarily trusted to give accurate
information
• This needs to be enforced at the OS level
47. Anonymity
• Potential abuses of vehicle tracking systems are rife
– Stalkers
– Terrorists
– Law Enforcement Tracking
– Automatically issued speeding tickets
– Rental car agencies issuing fines for going out of state
• But tracking is also sometimes useful
– Sometimes law enforcement have a need to track you
– Tolling agencies can charge per mile travelled if they know how
many miles
48. Anonymity Requirements
• The privacy principles of ITS America include an “Anonymity
Principle” that states: “Where practicable, individuals should
have the ability to utilize Intelligent Transportation Systems on
an anonymous basis.”
• Important in principle
– Also, people who are concerned about tracking might disable their
radio, impacting the safety and other benefits.
– Need to reassure people that Big Brother isn’t in the passenger
seat.
49. Anonymity in Practice
• Need to protect against:
– Wireless-only attacker who links transmission to vehicle
– Attacker who links multiple transmissions to vehicle, and then links vehicle
to a single transmission by (eg) physical observation – tracking.
• Need to ensure that:
– It’s difficult for an attacker with off-the-shelf equipment to build a tracking
system
– It’s difficult for you to be tracked by an unknown party
• Users can opt in to services in the course of which they may be
subject to tracking, but should not be tracked otherwise
• So:
– Remove identifying marks, as much as possible, from broadcast
messages
– Encrypt transactional messages
51. Anonymous Certificates
• Broadcast messages from an OBU
– must be authenticated
• Otherwise, attacker with radio could simply generate fake brake light
messages and foul up traffic
– must not be traceable to a specific OBU
• Many techniques to do this
– Group signatures
– Issue an OBU with a large number of certificates, which it works through at random
• Currently preferred approach
• 10,000 certificates allows a new certificate every five minutes for a month!
n Actual rollover algorithm will be more complicated
• Each certificate contains a unique identifier, but no distinguishing information
– Must be compatible with revocation
• Can use unknown salt to increase work factor associated with revocation
• Cost should be comparable to installing a camera at a large number of
intersections.
52. IP Addresses
• Long-lived IP addresses can in theory be used as a tracking
token
• In practice, system is not designed for handoff of IP sessions
from one RSU to another
– so long-lived IP sessions happen when you’re stationary
– Less of a risk from tracking
• All devices on IVN will change IP address when the OBU
moves from one RSU communication zone to another
53. Private MACs: Random MACs
• Generate a random MAC
– Out of the local address space
– Collision probability insignificant with small groups
• 46 random bits
• How many cars can fit in 300 meters?
• When to change MAC
– At startup?
• Allows tracking for individual trips
• Not really acceptable
n Track me from point A to point B
n Real-life traffic analysis!
– When the signing key changes
• Order every 5-10 minutes
• Close monitoring can follow transitions
n But you can do that with signing keys anyway
54. Where will certs come from?
• Current plans:
• OBUs will be provisioned by manufacturer
– USDoT will be responsible for root cert
– Anonymous OBU certs will be signed by a pool of certs held by all
manufacturers to ensure they don’t give away car make
• RSUs, Public Safety vehicles will be given certificates
conforming to existing administrative hierarchies
– USDoT à State DoT à Local emergency services/public works
departments à individual units
– The intermediate certificates may be distributed by separate
service messages to reduce the size of time-critical messages
55. Revocation
• Safety Application certificates for OBUs:
– Revocation makes system work more smoothly but is not essential
– All certificates for a given vehicle have identifiers derived from a single secret
– To revoke, recover and distribute the secret
– Must be distributed to all vehicles on road; requires infrastructure
• Public Safety Applications:
– Potential audience for public safety messages is all vehicles
• Geographically limited, but could be limited to an area as large as a state
– Rather than distributing revocation information to all vehicles when a police car is
stolen:
• Issue short-lived certificates to public safety vehicles for use in on-road
operations
n Stolen vehicle only valid for one day (say)
• Issue long-lived certs which are used to apply for operations certs
n Revoke this if vehicle stolen; audience for revocation information is
now CAs (small group, online), not private vehicles (large group,
offline)
57. Timetable to deployment
• 2004-2006
– Finish/test/rework standards
– Finish prototype program and test prototypes
– Design realistic antennas
– Develop certification procedures
• 2006-2008
– Larger scale tests and resulting reworks
– Productization of design
• 2008
– Deployment decision
58. Deployment
• 2009-2014: Equip 400,000 intersections with DSRC
transmitters.
• 2008: Decision to deploy in vehicles
– Usual process: 3-year design cycle, deployment starts in high-end
vehicles and works down
• Both these could be accelerated in this case
• Perhaps 57 m out of 250-300 m US vehicles equipped in 2015.