欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf

    • 资源ID:799567       资源大小:537.77KB        全文页数:34页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf

    1、 International Telecommunication Union ITU-T L.64TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2012) SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT ID tag requirements for infrastructure and network elements management Recommendation ITU-T L.6

    2、4 Rec. ITU-T L.64 (10/2012) i Recommendation ITU-T L.64 ID tag requirements for infrastructure and network elements management Summary Telecommunication networks require the correct allocation of network elements and periodically planned maintenance to deliver services quickly and efficiently, to mi

    3、nimize out-of-service risk and to guarantee service level agreement satisfaction. It is particularly important to focus on the issue of optical-fibre-based infrastructures and the related huge amount of transmitted information. Network elements that undergo allocation and maintenance operations can

    4、be of several types and can differ in terms of position, dimensions, services, field work and scheduled times for periodically planned maintenance. Identification (ID) data technology can be applied to solutions that focus on the proper management of infrastructure and network elements. The ID uniqu

    5、ely identifies an element of interest in terms of its allocation and maintenance. Recommendation ITU-T L.64 deals with support systems for infrastructure elements management using ID technology, and provides the criteria for ID tag design. History Edition Recommendation Approval Study Group 1.0 ITU-

    6、T L.64 2007-02-06 6 2.0 ITU-T L.64 2012-10-29 15 ii Rec. ITU-T L.64 (10/2012) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardiza

    7、tion Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which me

    8、ets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts

    9、 purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is

    10、 voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“

    11、and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may i

    12、nvolve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this R

    13、ecommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent databas

    14、e at http:/www.itu.int/ITU-T/ipr/. ITU 2013 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T L.64 (10/2012) iii Table of Contents Page 1 Scope 1 2 References. 1 3 Definitions 1 4 Abbreviations and acr

    15、onyms 2 5 Conventions 2 6 Identification data . 2 6.1 General requirements for ID . 2 6.2 ID tag 2 Appendix I Italian experience: RFID tag solution for telephony poles 6 Appendix II Japanese experience: Administration system for optical fibres in a central office and access network . 8 II.1 Introduc

    16、tion 8 II.2 Outline 8 II.3 Function 9 Appendix III Chinese experience I: An intelligent ODN system . 13 III.1 Introduction 13 III.2 Outline 14 III.3 Functions 15 III.4 Conclusion 18 Appendix IV Chinese experience II: RFID tag solution for ODN . 19 IV.1 Introduction 19 IV.2 Outline 19 IV.3 Function 2

    17、0 Bibliography. 25 Rec. ITU-T L.64 (10/2012) 1 Recommendation ITU-T L.64 ID tag requirements for infrastructure and network elements management 1 Scope This Recommendation deals with support systems for infrastructure and network elements management using ID technology for telecommunication networks

    18、. In particular, it indicates the criteria for ID tag design in order to be adapted to different applications requirements. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At

    19、 the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed b

    20、elow. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ISO/IEC 15394 ISO/IEC 15394:2009, Packaging Bar code and two-dimensional symbols for s

    21、hipping, transport and receiving labels. ISO/IEC 15438 ISO/IEC 15438:2006, Information technology Automatic identification and data capture techniques PDF417 Bar code symbology specification. ISO/IEC 16022 ISO/IEC 16022:2006, Information technology Automatic identification and data capture technique

    22、s Data Matrix bar code symbology specification. ISO/IEC 18000-1 ISO/IEC 18000-1:2013, Information technology Radio frequency identification for item management Part 1: Reference architecture and definition of parameters to be standardized. ISO/IEC 18000-2 ISO/IEC 18000-2:2013, Information technology

    23、 Radio frequency identification for item management Part 2: Parameters for air interface communications below 135 kHz. ISO/IEC 18000-3 ISO/IEC 18000-3:2013, Information technology Radio frequency identification for item management Part 3: Parameters for air interface communications at 13.56 MHz. ISO

    24、/IEC 18000-4 ISO/IEC 18000-4:2013, Information technology Radio frequency identification for item management Part 4: Parameters for air interface communications at 2.45 GHz. ISO/IEC 18000-6 ISO/IEC 18000-6:2013, Information technology Radio frequency identification for item management Part 6: Parame

    25、ters for air interface communications at 860 MHz to 960 MHz General. ISO/IEC 18004 ISO/IEC 18004:2006, Information technology Automatic identification and data capture techniques QR Code 2005 bar code symbology specification. 3 Definitions For the purpose of this Recommendation, the definitions give

    26、n in ISO/IEC 15394, ISO/IEC 15438, ISO/IEC 16022, ISO/IEC 18000-1, ISO/IEC 18000-2, ISO/IEC 18000-3, ISO/IEC 18000-4, ISO/IEC 18000-6 and ISO/IEC 18004 apply. 2 Rec. ITU-T L.64 (10/2012) 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: DB Database GSM G

    27、lobal System for Mobile communication HF High Frequency ID Identification (data) ISM Industrial, Scientific, Medical LAN Local Area Network LF Low Frequency MTBF Mean Time Between Failures ODF Optical Distribution Frame ODN Optical Distribution Network OSS Operations Support System PDA Personal Digi

    28、tal Assistant PON Passive Optical Network QR Quick Response RFID Radio Frequency Identification UHF Ultra High Frequency 5 Conventions None. 6 Identification data 6.1 General requirements for ID 1) ID should be unique. 2) ID should be capable of being read easily. 3) ID should be capable of being in

    29、put into an OSS when intended target elements are installed and when they are connected or disconnected. 4) ID should not include facility information. ID should only have information that can be converted to facility information in the facility database over an OSS. 6.2 ID tag ID tags are ready to

    30、be mounted on the network element or already provided as an embedded tag. They should be permanently mounted on the network element or in such a manner that makes them difficult to remove. ID tags may be based on either the QR code defined in clause 6.2.2, or on electronic ID which may have two impl

    31、ementations such as RFID (an example of non-contact-type ID) defined in clause 6.2.1 and/or contact-type ID defined in clause 6.2.3. Rec. ITU-T L.64 (10/2012) 3 6.2.1 RFID tag RFID tags usually consist of three parts: chip, antenna and case. They are different for several sets of features: physical,

    32、 electrical, chemical, mechanical and thermal characteristics. Since in network telecommunication infrastructure and network elements the environmental conditions are quite different, it is impossible to define a unique kind of RFID tag suitable for all the applications. Consideration is needed in o

    33、rder to provide an appropriate solution or solutions for differing networking element ID requirements. Appropriate applications for RFID are when hostile environments affect the long-term durability and readability of visible text or barcode data, and/or the ID data set is large. 6.2.1.1 Frequency T

    34、he frequency spectrum available for in-field implementation is not homogenous worldwide. LF band (less than 135 kHz) is recommended for traditional RFID application where a low transfer rate and small tag memory are acceptable. It is recommended to check for the presence of other technologies in the

    35、 same band (i.e., ISDN transmission). ISM HF band (13.56 MHz) is recommended for short-range RFID applications and provides excellent immunity to environmental noise and electrical interference. This is the typical condition in maintenance activities where reader antennae can be moved very close to

    36、the tag. It is recommended to check for the presence of other technologies in the same band (i.e., VDSL plan 998). UHF band (860-960 MHz) is recommended for logistic applications where fixed antennae must read moving tags automatically and anti-collision for parallel tag reading must be supported. I

    37、t is recommended to check for the presence of other technologies in the same band (i.e., GSM). ISM microwave band (2.45 GHz) is recommended for long-range applications where, for security reasons or other causes, tags cannot be directly attached to the network element or where direct access to netwo

    38、rk element/tag must be avoided. It is recommended to check for the presence of other technologies in the same band (i.e., wireless LAN). 6.2.1.2 Power supply In short-range applications (LF and HF bands), the use of maintenance-free passive tags (no battery) is recommended. In long-range application

    39、s (UHF and microwave bands), (semi-)active tags are typically used in order to achieve transmission between a tag and reader. 6.2.1.3 Transmission distance In short-range applications (LF and HF bands) transmission distance is not an issue, although metallic substrates can greatly reduce the read di

    40、stance unless compensatory tuning is applied to tags. It is recommended that the tag be readable even through a protective plastic cover, where one is present. Short-range transmission at 13.56 MHz requires a low force magnetic field that causes no disturbance to other circuits and which avoids unde

    41、sired tag reading (this needs testing/confirmation that there is no interference risk to VDSL, especially plan 998-12 MHz used in USA). In long-range applications (UHF and microwave bands), it is recommended to check for possible interference in the wave propagation direction. 6.2.1.4 Tag reading di

    42、scrimination Tags situated in very close proximity to each other can result in misreading the intended individual tag and capturing an adjacent tag. This situation can readily arise with cable sheaths in congested areas. Consideration should be given to appropriate designs of scanning head/antenna t

    43、o eliminate this risk. 4 Rec. ITU-T L.64 (10/2012) 6.2.1.5 Data storage It is recommended that the RFID tag be provided with a non-volatile memory chip embedded. Memory must be sized in order to store all appropriate information. The data structure should be determined by users for their application

    44、s. It is recommended that memory be readable and writable in order to allow upgrade of the content, as a result of maintenance actions. In the presence of confidential data stored on the tag, it is recommended to consider and solve security issues. Data stored on the tag can be used to certify in-fi

    45、eld activity deployment. Data stored on the tag allow in-field operators to retrieve information. 6.2.1.6 Case The tag case performs the double function of chip protection and tag adaptation to the network element where it must be attached. It is recommended that new network elements be supplied wit

    46、h an embedded tag. This solution facilitates and quickens the deployment of the RFID-based network element management system. This may require the development of new design solutions to allow for the integration in cables. This solution should reduce the risks to operators of protruding tags. In ind

    47、oor applications, it is recommended that the RFID tag case provides protection against water and dust and that it remains readable if mounted on a metal surface. In outdoor applications, it is recommended that the RFID tag case provide protection against water, dust and UV rays and that it remains r

    48、eadable if mounted on a metal surface. Mechanical impact and crush resistance is required for external use, such as underground joint housings, where they may be stood on. Consideration should be given to the protection from electromagnetic trauma such as lightning strikes, and ensuring adequate iso

    49、lation from any electrical ground path. In particular, environmental conditions where chemical substances are present, further protection is recommended. The use and design of stand-alone tags should consider the safety of operators from protrusions on network elements. Tags must be easily detectable and accessible by the operator during maintenance activities throughout the life expectancy of all their future networks. These aspects must be considered both when a stand-alone tag is attached and


    注意事项

    本文(ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf)为本站会员(progressking105)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开