Introduce IPv6 related activities in ITU-T especially focused on SG13 and near future expectation of using IPv6 jointly with Ubiquitous Networking concept.
World Conference on International Telecommunications (#WCIT12) myth busting - presented by ITU to civil society stakeholders during the WCIT12 global briefing session held at ITU HQ on 9 October, 15:00-16:30.
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
Presentation given at the Joint UN/ITU CITEL Cybersecurity Workshop in Salta City, Argentina - Nov 2010. The material discusses Cybersecurity Skills Development and International Partnerships for the Americas.
Achievements and future works of ITU-T Study Group 20 on IoT and its applications including smart cities and communities
Presented at WTSA-16 by Mr Nasser Saleh Al Marzouqi, Chairman of ITU-T Study Group 20
Achievements and future works of ITU-T Study Group 5 on Environment and Climate Change
Presented at WTSA-16 by Mr Ahmed Zeddam, Chairman of ITU-T Study Group 5
World Conference on International Telecommunications (#WCIT12) myth busting - presented by ITU to civil society stakeholders during the WCIT12 global briefing session held at ITU HQ on 9 October, 15:00-16:30.
UN/ITU: Cybersecurity Skills Development - Salta, Argentina - 2010Dr David Probert
Presentation given at the Joint UN/ITU CITEL Cybersecurity Workshop in Salta City, Argentina - Nov 2010. The material discusses Cybersecurity Skills Development and International Partnerships for the Americas.
Achievements and future works of ITU-T Study Group 20 on IoT and its applications including smart cities and communities
Presented at WTSA-16 by Mr Nasser Saleh Al Marzouqi, Chairman of ITU-T Study Group 20
Achievements and future works of ITU-T Study Group 5 on Environment and Climate Change
Presented at WTSA-16 by Mr Ahmed Zeddam, Chairman of ITU-T Study Group 5
Achievements and future works of ITU-T Study Group 9 on Broadband Cable and TV
Presented at WTSA-16 by Mr Arthur Webster, Chairman of ITU-T Study Group 9
Achievements and future works of ITU-T Study Group 15 on Networks, Technologies and Infrastructures for Transport, Access and Home
Presented at WTSA-16 by Mr Stephen J. Trowbridge, Chairman of ITU-T Study Group 15
Achievements and future works of ITU-T Study Group 17 on Security
Presented at WTSA-16 by Mr Heung-Youl Youm, Vice-chairman, on behalf of Mr Arkadiy Kremer, Chairman of ITU-T Study Group 17
ITU Security in Telecommunications & Information TechnologyITU
The ITU-T Security Manual offers a comprehensive overview of ITU-T’s work to build confidence and security in the use of information and communication technologies (ICTs).
The manual documents ITU-T’s efforts to respond to global cybersecurity challenges with international standards, complementary guidance documents and outreach to build capacity in the application of advanced ICT security mechanisms.
Introductory chapters highlight high-priority areas of ITU-T security work and basic requirements for the protection of ICT applications, services and information. Central to this introduction is an examination of standards’ role in meeting the security requirements borne of prevalent threats and vulnerabilities.
The manual outlines foundational security architectures as a basis for the discussion of more specific security considerations, following an iterative structure addressing key aspects of ICT security:
Generic security architectures for open systems and end-to-end communications, as well as examples of application-specific architectures, which establish frameworks for the consistent application of multiple facets of security.
Information security management, risk management and asset management, including management activities relevant to securing network infrastructure and the data used to monitor and control the telecommunications network.
The Directory and its role in supporting authentication and other security services. Particular attention is paid to the cryptographic concepts that rely on Directory services, providing an introduction to public key infrastructures, digital signatures and privilege-management infrastructures.
Identity management – a topic of growing importance to connected things, objects and devices – and the related topic of telebiometrics, the use of biometric characteristics for personal identification and authentication in telecommunications environments.
Approaches to network security, including the security requirements for next-generation networks and mobile communications networks in transition from a single technologies (e.g. CDMA or GSM) to mobility across heterogeneous platforms using the Internet Protocol (IP). This section also tackles security provisions for home networks, cable television and ubiquitous sensor networks.
Cybersecurity and incident response, looking at how best to develop an effective response to cyber attacks, including the need to understand the source and nature of attacks when sharing associated information with monitoring agencies.
Application-specific security needs, emphasizing the security features defined in ITU-T standards for Voice over IP, Internet Protocol Television, Web services, and identification tags such as RFID tags.
Technical measures to counter common network threats such as spam, malicious code and spyware, including the importance of ti
Saguna edge computing solution for private enterprise networksSaguna
Private enterprise network solution using public LTE/5G infrastructure for Industry 4.0 manufacturing and Industrial IoT. Saguna Mobile Edge Computing solution delivers 5G URLLC performance, enterprise control of private data, easy to operate IT solution low OPEX and CAPEX
Achievements and future works of ITU-T Study Group 13 on Future networks including cloud computing, mobile and next-generation networks
Presented at WTSA-16 by Mr Leo Lehmann, Chairman of ITU-T Study Group 13
ITU Standardization of Telebiometric applications ITU
Our Goal at ITU-T SG17 is to develop telebiometric (remote life measurement) standards from sensor thru the gateway and into the cloud. The standards focus on how to acquire biological information and interaction, structure the data, encrypt, store, and authenticate.
Initially, biological data is acquired from a living entity e.g. a person. A Metric system is applied and the information is then structured and encrypted X. Implementing authentication standards ensures only the users permitted to view the telebiometric data have access.
Traditionally, biometrics has been a niche industry with a very limited scope. However at Q9/17, we have expanded the scope to all biological measurements combined with the necessary telecommunication infrastructure.
For more information on ITU-T SG17 – Security, please visit: http://www.itu.int/en/ITU-T/about/groups/Pages/sg17.aspx
Last update: Feb 2, 2021
With Standalone (SA) appearing in the U.S. in the not so distant future or ahead of schedule one year from now, there will be a lot more 5G association focuses – more entrances of chance for cyber criminals to reap private information.
AI and ML have just demonstrated their adequacy in various fields for order, ID and mechanization with higher exactness.
As 5G systems' essential selling point has been higher information rates and speed, it will be hard to handle wide scope of dangers from various focuses utilizing common/conventional defensive measures.
5G systems make a significantly extended, advanced digital assault weakness. In this way, the re-classified idea of these systems requires a likewise re-imagined digital technique.
Need to find out additional?
Tonex offers Tonex offers 5G Security Training, a 4-day hand on course that furnishes attendees with a solid and instinctive comprehension of what security in the remote frameworks is and how the security capacities are actualized.
The course is performed in both live onsite and offline.
Also, Tonex offers about two dozen 5G Training Courses that spread everything from 5G essentials to more particular regions, for example, C-RAN Training, NOMA Training, LTE Advanced Pro Training and mmWaves Technology Training.
5G Training Courses :
5G and mmWave Antenna Engineering Training
5G Citizens Band Radio Services (CBRS) Training
5G Cyber security Bootcamp | 3GPP Version
5G for Sales and Tech Sales/Support Training
5G NR Training | 5G New Radio (NR)
5G Security Training | 5G Wireless Security Training
5G Training for Non Engineers | 5G Wireless Training for Non Engineers
5G Training | 5G System Survey Training
5G Wi-Fi Offload Training | LTE-U | LAA
5G Wireless Crash Course
5G Wireless Networks Training | The Fundamentals
5G Wireless Training for Non-Engineers
5G Wireless Training | 5G Technical Fundamentals
C-RAN Training | Cloud-RAN Training
D2D Communications Training | 5G Device to Device Communications
LTE Advanced Pro Training
LTE, LTE-A, and LTE-A Pro Migration to 5G Training
mmW Technology Training | Millimeter Wave Training
Mobile Broadband Transformation Training Bootcamp | 3GPP 5G Training
Next Generation Wireless Networks Crash Course
Non-Orthogonal Multiple Access (NOMA) Training | Future 5G Technologies
Vehicle-to-Vehicle Communications Training | V2V Communications Training | v2v Training
VoNR Training | Voice over New Radio | Voice over 5G Standalone
Learn More :
5G Security Training, 5G Training Course
https://www.tonex.com/5g-security-training-5g-training-course/
Identify the pillar that the Greek market is ready to adopt, discover what Greek Operators believe and prepare a Strategy Plan that Nokia should follow in order to cover customer’s demands and become leader in the Greek Market
5G is a critical strategic technology: those nations that master advanced communications technologies and ubiquitous connectivity will have a long-term economic and military advantage. This strategy provides the DoD approach to implementing the National Strategy to Secure 5G and aligns with the National Defense Authorization Act for Fiscal Year 2020 (FY2020), Section 254. The overall strategy is also consistent with National Defense Strategy guidance to lead in key areas of great power competition and lethality to ensure 5G's "impact on the battle network of the future.”
Neil McDonnell and the GovCon Chamber of Commerce is bringing this document to industry as part of our commitment to find and share information that will help small businesses better prepare to serve the federal market.
Broadband Wireless Access (BWA) has been serving enterprises and operators for years, to the great satisfaction of its users. However, the new IP-based standard developed by the IEEE 802.16 is likely to accelerate adoption of the technology. It will expand the scope of usage thanks to: the possibility of operating in licensed and unlicensed frequency bands,
unique performance under Non-Line-of-Sight (NLOS) conditions, Quality of Service (QoS) awareness, extension to nomadicity, and more. In parallel, the WiMAX forum, backed by industry leaders, will encourage the widespread adoption of broadband wireless access by establishing a brand for the technology and pushing interoperability between products.
Presentation held at Fachkongress des IT-Planungsrats, Stuttgart 2014 by Mojca Volk and Janez Sterle (University of Ljubljana) and Gerold Gruber, Citkomm, Deutschland
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
Countries around the world are bowing to USA concerns when it comes to cybersecurity risks related to 5G networks. This presentations looks at different angles of 5G policy.
Achievements and future works of ITU-T Study Group 9 on Broadband Cable and TV
Presented at WTSA-16 by Mr Arthur Webster, Chairman of ITU-T Study Group 9
Achievements and future works of ITU-T Study Group 15 on Networks, Technologies and Infrastructures for Transport, Access and Home
Presented at WTSA-16 by Mr Stephen J. Trowbridge, Chairman of ITU-T Study Group 15
Achievements and future works of ITU-T Study Group 17 on Security
Presented at WTSA-16 by Mr Heung-Youl Youm, Vice-chairman, on behalf of Mr Arkadiy Kremer, Chairman of ITU-T Study Group 17
ITU Security in Telecommunications & Information TechnologyITU
The ITU-T Security Manual offers a comprehensive overview of ITU-T’s work to build confidence and security in the use of information and communication technologies (ICTs).
The manual documents ITU-T’s efforts to respond to global cybersecurity challenges with international standards, complementary guidance documents and outreach to build capacity in the application of advanced ICT security mechanisms.
Introductory chapters highlight high-priority areas of ITU-T security work and basic requirements for the protection of ICT applications, services and information. Central to this introduction is an examination of standards’ role in meeting the security requirements borne of prevalent threats and vulnerabilities.
The manual outlines foundational security architectures as a basis for the discussion of more specific security considerations, following an iterative structure addressing key aspects of ICT security:
Generic security architectures for open systems and end-to-end communications, as well as examples of application-specific architectures, which establish frameworks for the consistent application of multiple facets of security.
Information security management, risk management and asset management, including management activities relevant to securing network infrastructure and the data used to monitor and control the telecommunications network.
The Directory and its role in supporting authentication and other security services. Particular attention is paid to the cryptographic concepts that rely on Directory services, providing an introduction to public key infrastructures, digital signatures and privilege-management infrastructures.
Identity management – a topic of growing importance to connected things, objects and devices – and the related topic of telebiometrics, the use of biometric characteristics for personal identification and authentication in telecommunications environments.
Approaches to network security, including the security requirements for next-generation networks and mobile communications networks in transition from a single technologies (e.g. CDMA or GSM) to mobility across heterogeneous platforms using the Internet Protocol (IP). This section also tackles security provisions for home networks, cable television and ubiquitous sensor networks.
Cybersecurity and incident response, looking at how best to develop an effective response to cyber attacks, including the need to understand the source and nature of attacks when sharing associated information with monitoring agencies.
Application-specific security needs, emphasizing the security features defined in ITU-T standards for Voice over IP, Internet Protocol Television, Web services, and identification tags such as RFID tags.
Technical measures to counter common network threats such as spam, malicious code and spyware, including the importance of ti
Saguna edge computing solution for private enterprise networksSaguna
Private enterprise network solution using public LTE/5G infrastructure for Industry 4.0 manufacturing and Industrial IoT. Saguna Mobile Edge Computing solution delivers 5G URLLC performance, enterprise control of private data, easy to operate IT solution low OPEX and CAPEX
Achievements and future works of ITU-T Study Group 13 on Future networks including cloud computing, mobile and next-generation networks
Presented at WTSA-16 by Mr Leo Lehmann, Chairman of ITU-T Study Group 13
ITU Standardization of Telebiometric applications ITU
Our Goal at ITU-T SG17 is to develop telebiometric (remote life measurement) standards from sensor thru the gateway and into the cloud. The standards focus on how to acquire biological information and interaction, structure the data, encrypt, store, and authenticate.
Initially, biological data is acquired from a living entity e.g. a person. A Metric system is applied and the information is then structured and encrypted X. Implementing authentication standards ensures only the users permitted to view the telebiometric data have access.
Traditionally, biometrics has been a niche industry with a very limited scope. However at Q9/17, we have expanded the scope to all biological measurements combined with the necessary telecommunication infrastructure.
For more information on ITU-T SG17 – Security, please visit: http://www.itu.int/en/ITU-T/about/groups/Pages/sg17.aspx
Last update: Feb 2, 2021
With Standalone (SA) appearing in the U.S. in the not so distant future or ahead of schedule one year from now, there will be a lot more 5G association focuses – more entrances of chance for cyber criminals to reap private information.
AI and ML have just demonstrated their adequacy in various fields for order, ID and mechanization with higher exactness.
As 5G systems' essential selling point has been higher information rates and speed, it will be hard to handle wide scope of dangers from various focuses utilizing common/conventional defensive measures.
5G systems make a significantly extended, advanced digital assault weakness. In this way, the re-classified idea of these systems requires a likewise re-imagined digital technique.
Need to find out additional?
Tonex offers Tonex offers 5G Security Training, a 4-day hand on course that furnishes attendees with a solid and instinctive comprehension of what security in the remote frameworks is and how the security capacities are actualized.
The course is performed in both live onsite and offline.
Also, Tonex offers about two dozen 5G Training Courses that spread everything from 5G essentials to more particular regions, for example, C-RAN Training, NOMA Training, LTE Advanced Pro Training and mmWaves Technology Training.
5G Training Courses :
5G and mmWave Antenna Engineering Training
5G Citizens Band Radio Services (CBRS) Training
5G Cyber security Bootcamp | 3GPP Version
5G for Sales and Tech Sales/Support Training
5G NR Training | 5G New Radio (NR)
5G Security Training | 5G Wireless Security Training
5G Training for Non Engineers | 5G Wireless Training for Non Engineers
5G Training | 5G System Survey Training
5G Wi-Fi Offload Training | LTE-U | LAA
5G Wireless Crash Course
5G Wireless Networks Training | The Fundamentals
5G Wireless Training for Non-Engineers
5G Wireless Training | 5G Technical Fundamentals
C-RAN Training | Cloud-RAN Training
D2D Communications Training | 5G Device to Device Communications
LTE Advanced Pro Training
LTE, LTE-A, and LTE-A Pro Migration to 5G Training
mmW Technology Training | Millimeter Wave Training
Mobile Broadband Transformation Training Bootcamp | 3GPP 5G Training
Next Generation Wireless Networks Crash Course
Non-Orthogonal Multiple Access (NOMA) Training | Future 5G Technologies
Vehicle-to-Vehicle Communications Training | V2V Communications Training | v2v Training
VoNR Training | Voice over New Radio | Voice over 5G Standalone
Learn More :
5G Security Training, 5G Training Course
https://www.tonex.com/5g-security-training-5g-training-course/
Identify the pillar that the Greek market is ready to adopt, discover what Greek Operators believe and prepare a Strategy Plan that Nokia should follow in order to cover customer’s demands and become leader in the Greek Market
5G is a critical strategic technology: those nations that master advanced communications technologies and ubiquitous connectivity will have a long-term economic and military advantage. This strategy provides the DoD approach to implementing the National Strategy to Secure 5G and aligns with the National Defense Authorization Act for Fiscal Year 2020 (FY2020), Section 254. The overall strategy is also consistent with National Defense Strategy guidance to lead in key areas of great power competition and lethality to ensure 5G's "impact on the battle network of the future.”
Neil McDonnell and the GovCon Chamber of Commerce is bringing this document to industry as part of our commitment to find and share information that will help small businesses better prepare to serve the federal market.
Broadband Wireless Access (BWA) has been serving enterprises and operators for years, to the great satisfaction of its users. However, the new IP-based standard developed by the IEEE 802.16 is likely to accelerate adoption of the technology. It will expand the scope of usage thanks to: the possibility of operating in licensed and unlicensed frequency bands,
unique performance under Non-Line-of-Sight (NLOS) conditions, Quality of Service (QoS) awareness, extension to nomadicity, and more. In parallel, the WiMAX forum, backed by industry leaders, will encourage the widespread adoption of broadband wireless access by establishing a brand for the technology and pushing interoperability between products.
Presentation held at Fachkongress des IT-Planungsrats, Stuttgart 2014 by Mojca Volk and Janez Sterle (University of Ljubljana) and Gerold Gruber, Citkomm, Deutschland
Global Security threats from 5G leads to new selection of 5G vendorspaul young cpa, cga
Countries around the world are bowing to USA concerns when it comes to cybersecurity risks related to 5G networks. This presentations looks at different angles of 5G policy.
Conferencia guía para el debate del pensamiento crítico con docentes de bachillerato. Esta presentación ha servido para el debate en diferentes Instituciones Educativas. Concreción de objetivos de asignatura y proyectos empleando estandares universales y formas de elevar el nivel cognitivo de las asignaturas
Guia buenas prácticas uso racional de energia en el sector de la pymeEnrique Posada
Les comparto esta guía que preparé hace algún tiempo y que fue publicada por el ministerio del medio ambiente, en busca de las buenas prácticas en temas de energia
Using ICN to simplify data delivery, mobility management and secure transmissionITU
ICN provides a unified network and transport layer addressing content by name rather than by location. By disrupting traditional connection-oriented communication model, ICN simplifies data delivery, mobility management and secure transmission over an heterogeneous network access. In the demo, we select DASH video delivery as use case and show the benefits of ICN mobility management, in-network control (rate/loss) and network-assisted bitrate adaptation for a multi-homed user device.
We also illustrate how ICN can effectively reduce transport cost via native edge caching and multi-point/multi-source communications over the backhaul. To that aim, we orchestrate an ICN-enhanced virtualized network backhaul and shows its utilization over time.
Author : Giovanna Carofiglio, Cisco Systems
Presented at ITU-T Focus Group IMT-2020 Workshop and Demo Day, 7 December 2016.
More details on the event : http://www.itu.int/en/ITU-T/Workshops-and-Seminars/201612/Pages/Programme.aspx
Fifth-generation wireless (5G) is the latest iteration of cellular technology, engineered to greatly increase the speed and responsiveness of wireless networks. ... 5G will also enable a sharp increase in the amount of data transmitted over wireless systems due to more available bandwidth and advanced antenna technology
Call for Papers - International Journal of Next-Generation Networks (IJNGN) josephjonse
Next Generation Network (NGN) transports all information and services such as voice, data and media by encapsulating these into packets. Limitations of Internet era can be overcome by Next-generation network protocols and their advanced features and technologies. Research and development on Next-Generation Network (NGNs) have been carried out over the last few years. The International Journal of Next- Generation Network (NGN) is an open access peer-reviewed journal that focuses on architectural changes in telecommunication core and access networks. The Journal aims to present the latest developments and technical solutions in the areas of NGN system, multimedia services, and its related deployment, performance, security and mobility. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced NGN concepts and establish new collaborations in these areas. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the field of next Generation Network
Future Internet: Managing Innovation and TestbedShinji Shimojo
Innovation is a big key word for ICT research and development. However, a road toward innovation is facing full of uncertainties and there are many obstacles. key elements to overcome these obstacles seems to be agile management of people, software and hardware. In addition, we think involvement of users in R&D will have much effect on the management of uncertainty in R&D. In this talk, I talk on our approach to this user involvement in JGN-X, an international future internet testbed and Knowledge Capital, Osaka, an smart city experimental testbed.
Rapidly IPv6 multimedia management schemes based LTE-A wireless networksIJECEIAES
Ensuring the best quality of smart multimedia services becomes an essential goal for modern enterprises so there is always a need for effective IP mobility smart management schemes in order to fulfill the following two main functions: (I) interconnecting the moving terminals around the extended indoor smart services. In addition, (II) providing session continuity for instant data transfer in real-time and multimedia applications with negligible latency, efficient bandwidth utilization, and improved reliability. In this context, it found out that the Generalized Multi-Protocol Label Switching (GMPLS) over LTE-A network that offers many advanced services for large numbers of users with higher bandwidths, better spectrum efficiency, and lower latency. In GMPLS, there is an elimination of the routing searches and choice of routing protocols on every core LTE-A router also it provides the architecture simplicity and increases the scalability. A comparative assessment of three types of IPv6 mobility management schemes over the LTE-A provided by using various types of multimedia. By using OPNET Simulator 17.5, In accordance with these schemes, it was proven that the IPv6-GMPLS scheme is the best choice for the system's operation, in comparison to the IPv6-MPLS and Mobile IPv6 for all multimedia offerings and on the overall network performance.
Presented at the FDP Emerging Trends in IOT Enabled Wireless Communication , 8TH – 12TH, August, 2022 (ONLINE MODE) Organized By Department of Electronics Communication Engineering In association with IQAC, Haldia Institute of Technology Haldia-721657, West Bengal.
This is the second part of my 5G project which consists of the architecture structure of 5G. What all it consists of, what all technologies it uses, what all layers it contain etc.
We are looking at the future of technology that has the structure of Nanocore, beneficial for future applications.
This is the report part 2 of presentation. It talks about the basic functional architecture, 5G architecture, 5G network layers and the hardware & software components of 5G.
CALL FOR PAPERS - International Journal of Next-Generation Networks(IJNGN)ijp2p
Next Generation Network (NGN) transports all information and services such as voice, data and media by encapsulating these into packets. Limitations of Internet era can be overcome by Nextgeneration network protocols and their advanced features and technologies. Research and development on Next-Generation Network (NGNs) have been carried out over the last few years. The International Journal of Next- Generation Network (NGN) is an open access peer-reviewed journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Review on a new generation wireless mobile network
I Pv6 Presentation 310510 V4
1. ITU-T SG13 IPv6 related work (in terms of NGN and NGUN) IPv6 and future networks perspectives Chaesub Lee Chairman of ITU-T SG 13 Smart IPv6 Building Working Group meeting , 31 May 2010, Geneva
2.
3. Definition of NGN ITU-T Rec. Y.2001 Next Generation Network (NGN) : a packet-based network able to provide telecommunication services and able to make use of multiple broadband , QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies . It enables unfettered access for users to networks and to competing service providers and/or services of their choice. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users. 1. One shot overview of NGN
17. ITU-D has a project on IPv6 with the aim to assist developing countries in the transition to the IPv6 ITU-D work on IPv6 4. Other Activities
18. Overall application model of NGUN Disaster/crisis management NGN, Internet, etc. NGUN Applications Logistics, SCM Disaster Surveillance Military Field Structural health monitoring Agricultural control RFID Reader Mobile RFID Reader SN Directory service NGUN Middleware NGUN Services Management NGUN Networks Ubiquitous web services Context modeling and management Contents management U-Health care Spatial info management End Devices/ Networks SN Gateway Access Network Access Network Access Network Access Network SN Gateway Sensor node Access Network Access Gateway SN Gateway 5. Use Cases
19.
20. Application to ‘Weather Information Service’ Sensor networks service provider #1 Value-added sensed data Sensed data National Disaster Monitoring Center Emergency Management Center Value-added service providers Weather info, local nature info, security, healthcare, etc. Consumer services SMS/Email/Call/Multimedia, etc. SNSP #2 SNSP #3 Raw data 5. Use Cases Raw or Value-added sensed data Collect/Analysis/ Process/Estimate environmental info
21. Application to Healthcare Services Monitoring vital signs Raw or value-added sensed data Emergency call Sensors on Patients Sensed data Value-added service providers Weather info, local nature info, security, healthcare, etc. Status report to family Connecting to hospital Connecting to insurance 5. Use Cases NGUN Healthcare service provider Collect/Analysis/ Process/Estimate vital body signs
IPv6-based NGN will be deployed gradually while near-term NGNs will be realized mainly based on IPv4. This implies that similar study of IPv6 related issues is also required for NGNs which includes transition from an IPv4-based NGN to an IPv6-based NGN, and inter-communication between them. This study should be also extended to cover other IP based networks which belong to Non-NGN domains.