欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T Y 2213-2008 NGN service requirements and capabilities for network aspects of applications and services using tag-based identification (Study Group 13)《基于标签识别技术的网络应用业务方面的下一代网络.pdf

    • 资源ID:806384       资源大小:861.58KB        全文页数:36页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T Y 2213-2008 NGN service requirements and capabilities for network aspects of applications and services using tag-based identification (Study Group 13)《基于标签识别技术的网络应用业务方面的下一代网络.pdf

    1、 International Telecommunication Union ITU-T Y.2213TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2008) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Service aspects: Service capabilities and service architecture NGN

    2、 service requirements and capabilities for network aspects of applications and services using tag-based identification Recommendation ITU-T Y.2213 ITU-T Y-SERIES RECOMMENDATIONS GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS GLOBAL INFORMATION INFRASTRUCTUR

    3、E General Y.100Y.199 Services, applications and middleware Y.200Y.299 Network aspects Y.300Y.399 Interfaces and protocols Y.400Y.499 Numbering, addressing and naming Y.500Y.599 Operation, administration and maintenance Y.600Y.699 Security Y.700Y.799 Performances Y.800Y.899 INTERNET PROTOCOL ASPECTS

    4、General Y.1000Y.1099 Services and applications Y.1100Y.1199 Architecture, access, network capabilities and resource management Y.1200Y.1299 Transport Y.1300Y.1399 Interworking Y.1400Y.1499 Quality of service and network performance Y.1500Y.1599 Signalling Y.1600Y.1699 Operation, administration and m

    5、aintenance Y.1700Y.1799 Charging Y.1800Y.1899 NEXT GENERATION NETWORKS Frameworks and functional architecture models Y.2000Y.2099 Quality of Service and performance Y.2100Y.2199 Service aspects: Service capabilities and service architecture Y.2200Y.2249 Service aspects: Interoperability of services

    6、and networks in NGN Y.2250Y.2299 Numbering, naming and addressing Y.2300Y.2399 Network management Y.2400Y.2499 Network control architectures and protocols Y.2500Y.2599 Security Y.2700Y.2799 Generalized mobility Y.2800Y.2899 For further details, please refer to the list of ITU-T Recommendations. Rec.

    7、 ITU-T Y.2213 (09/2008) i Recommendation ITU-T Y.2213 NGN service requirements and capabilities for network aspects of applications and services using tag-based identification Summary Recommendation ITU-T Y.2213 describes high-level service requirements and NGN capability requirements needed to supp

    8、ort applications and services using tag-based identification. Several examples of applications and services using tag-based identification are also described with scenarios. The scope of this Recommendation is limited to applications and services using tag-based identification and they are distingui

    9、shed by the following three mandatory elements: ID tag, ID terminal and identifier. Source Recommendation ITU-T Y.2213 was approved on 12 September 2008 by ITU-T Study Group 13 (2005-2008) under Recommendation ITU-T A.8 procedure. Keywords Bar code, capabilities, capability requirements, ID tag, ID

    10、terminal, identifier, identifier resolution, RFID, service requirements and tag-based identification. ii Rec. ITU-T Y.2213 (09/2008) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication tec

    11、hnologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Tele

    12、communication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some a

    13、reas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized o

    14、perating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “sh

    15、all“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the p

    16、ractice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation dev

    17、elopment process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are ther

    18、efore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2009 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T Y.2213 (09/2008) iii CONTENTS Page 1 Scope 1 2 Refere

    19、nces. 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation. 2 4 Abbreviations and acronyms 3 5 Conventions 4 6 Tag-based identification applications and services description and high-level reference service architecture . 4 6.1 Basic characteristics of tag-based i

    20、dentification applications and services . 4 6.2 Impact of tag-based identification applications and services on the network. 5 6.3 Reference service architecture model. 5 7 Service requirements of tag-based identification applications and services 6 7.1 Multi-identifier interpretation requirements.

    21、6 7.2 Identifier resolution 6 7.3 ID terminal and ID tag management 7 7.4 Content distribution control 7 7.5 Privacy management 7 7.6 Location-based services support. 8 7.7 Service quality control 8 7.8 Application transaction and traffic requirements . 8 8 NGN capabilities for tag-based identificat

    22、ion applications and services . 8 8.1 Requirements for extensions or additions to NGN release 1 capabilities 9 8.2 Requirements supported by existing NGN release 1 capabilities 10 Appendix I Non-NGN high-level service requirements . 11 I.1 General requirements for identifiers. 11 I.2 Requirements fo

    23、r identification of identifier schemes . 11 I.3 Requirements related to application data encoding 11 I.4 Requirements for identification service interworking 12 I.5 Requirements for location information management. 12 I.6 Requirements related to management of application mobility. 12 I.7 Requirement

    24、s related to traceability. 12 I.8 Requirements related to identifier filtering 13 Appendix II Classification of tag-based identification applications and services 14 II.1 Overview of tag-based identification applications and services 14 II.2 Classification of tag-based identification applications an

    25、d services 15 II.3 Examples of tag-based identification applications and services 15 iv Rec. ITU-T Y.2213 (09/2008) Page II.4 Evaluation of tag-based identification applications and services. 16 Appendix III Example scenarios of tag-based identification applications and services. 20 III.1 Closed-dom

    26、ain tag-based identification applications and services 20 III.2 B2B tag-based identification applications and services . 21 III.3 B2C tag-based identification applications and services . 22 III.4 B2B2C tag-based identification applications and services 23 III.5 C2C tag-based identification applicati

    27、ons and services . 24 Bibliography 25 Rec. ITU-T Y.2213 (09/2008) v Introduction Numerous applications have already incorporated identifiers to support differentiated services, where identifiers are mainly used for logical identification. Emerging applications, whose examples are described in Append

    28、ices II and III, require also that logical identification be associated with physical objects. This Recommendation expects that a relationship between physical and logical objects is maintained and assumes that applications and services using tag-based identification are based on such a relationship

    29、. This relationship makes a wide variety of business opportunities available: for example, passport numbers may be applied to physical objects for identification and each physical object, i.e., passport, may be associated with a logical object such as a text content, application program, mobile exec

    30、utable code, or data record. Applications and services using tag-based identification adopted and deployed widely in various business fields have used identifiers as a means for identifying physical and logical objects. Consequently, their market volume is being expanded dramatically. In addition to

    31、 use cases of identifier in business fields, physical and logical objects with an identifier can enable applications and services using tag-based identification in consumer fields as well. Existing applications and services using tag-based identification have been exploited in business-to-business (

    32、B2B) fields, but currently they are expanding to business-to-consumer (B2C) and business-to-business-to-consumer (B2B2C) fields as shown in clause II.3. Both B2B and B2C/B2B2C tag-based identification applications and services basically have similar service requirements. Additionally, B2C/B2B2C-spec

    33、ific service requirements and related challenges for NGN are also examined in this Recommendation, such as privacy management, identifier resolution, management, etc. Identifier information in such applications and services using tag-based identification works as the key information used to retrieve

    34、 related contents, execute certain application programs, point to a specific information resource, make an association with a specific object, and so on. The identification feature supporting hyperlink-like access will enable NGN applications and services to be performed and provided to consumers in

    35、 easier and more convenient ways. For example, consumers do not have to type a URL in a phone user interface because the tag-based identification supports that automatically. Since a number of applications and services using tag-based identification are expected to be deployed widely in NGN, the NGN

    36、 architecture framework and the NGN functional entities have to support them. Rec. ITU-T Y.2213 (09/2008) 1 Recommendation ITU-T Y.2213 NGN service requirements and capabilities for network aspects of applications and services using tag-based identification 1 Scope This Recommendation covers extensi

    37、ons to NGN release 1 capabilities in order to support tag-based identification applications and services in the NGN environment and builds upon b-ITU-T Y.Sup1 and ITU-T Y.2201. The scope of this Recommendation is limited to tag-based identification applications and services distinguished by the foll

    38、owing three mandatory elements: ID tag, ID terminal and Identifier. These applications and/or services use identifiers only read from ID tags by ID terminals. This Recommendation covers: description and scope of tag-based identification applications and services with some example scenarios; high-lev

    39、el service requirements of tag-based identification applications and services; and extended or new NGN capabilities based on the high-level service requirements. Functional requirements and related NGN architecture extensions for support of the described capabilities are out of scope of this Recomme

    40、ndation. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject t

    41、o revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document withi

    42、n this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T X.668 Recommendation ITU-T X.668 (2008) | ISO/IEC 9834-9:2008, Information technology Open Systems Interconnection Procedures for the operation of OSI Registration Authorities: Registration of ob

    43、ject identifier arcs for applications and services using tag-based identification. ITU-T Y.2201 Recommendation ITU-T Y.2201 (2007), NGN release 1 requirements. ITU-T Y.2701 Recommendation ITU-T Y.2701 (2007), Security requirements for NGN release 1. 3 Definitions 3.1 Terms defined elsewhere This Rec

    44、ommendation uses the following terms defined elsewhere: 3.1.1 application network interface (ANI) b-ITU-T Y.2012: Interface which provides a channel for interactions and exchanges between applications and NGN elements. The ANI offers capabilities and resources needed for realization of applications.

    45、 3.1.2 end user b-ITU-T M.3050.1: The actual user of the products or services offered by the enterprise. The end user consumes the product or service. 2 Rec. ITU-T Y.2213 (09/2008) 3.1.3 identifier b-ITU-T Y.2091: A series of digits, characters and symbols or any other form of data used to identify

    46、subscriber(s), user(s), network element(s), function(s), network entity(ies) providing services/applications, or other entities (e.g., physical or logical objects). Identifiers can be used for registration or authorization. NOTE Identifiers can be either public to all networks, shared between a limi

    47、ted number of networks or private to a specific network (private identifiers are normally not disclosed to third parties). 3.1.4 name b-ITU-T Y.2091: The identifier of an entity (e.g., subscriber, network element) that may be resolved/translated into an address. 3.1.5 service b-ITU-T Z.100: A set of

    48、 functions and facilities offered to a user by a provider. 3.1.6 user b-ITU-T Y.2091: It can be an end user, a person, a subscriber, a system, an equipment, a terminal (e.g., FAX, PC), a (functional) entity, a process, an application, a provider, or a corporate network. 3.2 Terms defined in this Rec

    49、ommendation This Recommendation defines the following terms: 3.2.1 associated information: The information which is associated with an identifier. NOTE Example associated information instances are URL, URN, IP address, E.164 number, etc. 3.2.2 B2B tag-based identification applications and services: This term refers to tag-based identification applications and services based on business relationships which involve exchanges of identification information between business partners. 3.2.3 B2B2C tag-based identification appli


    注意事项

    本文(ITU-T Y 2213-2008 NGN service requirements and capabilities for network aspects of applications and services using tag-based identification (Study Group 13)《基于标签识别技术的网络应用业务方面的下一代网络.pdf)为本站会员(deputyduring120)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开