This Recommendation aims to provide a better understanding of the energy efficiency of mobile networks in particular considering the networks' evolution in different periods of time. The focus of this Recommendation is on metrics for energy efficiency and methods of assessing (and...
This drawing documents two product assurance class levels consisting of high reliability (device class Q and M) and space application (device class V). A choice of case outlines and lead finishes are available and are reflected in the Part or Identifying Number (PIN). When available, a choice of...
This document specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control method, to provide Bridged Networks and VLANs.
This Recommendation analyses security threats to connected vehicles in two parts: threats against interfaces which are used to communicate between a vehicle and its external devices, and threats against external devices which communicate with the vehicle. This Recommendation specifies security...
This standard applies: a) throughout the engineering access planning process and during the delivery of work; and b) to all Network Rail employees and contractors who plan and manage the movements of engineering trains / OTMs / OTP in worksites on Network Rail Managed...
The first (bottom) layer of defense is provided by the air to ground communication providers. Although those details will remain out of the scope of this document, this layer would typically include lists of allowed and blocked web sites, restrictions on Transmission Control Protocol (TCP)...
This specification applies to all cross-track cables regardless of cable asset owner. This includes cables that may be managed by Station Infrastructure Managers or third parties that are required to cross Network Rail tracks. It applies to all renewal, enhancement and maintenance work...
This manual is applicable to all involved in the management of boundary measures and describes the requirements for: a) boundary measure classifications; b) boundary measure specifications; c) a register of assets; d) inspection of boundary measures protecting Network Rail's operational...
Enhance Linux security, application platforms, and virtualization solutions with SELinux to work within your boundaries, your rules, and your policiesKey Features* Learn what SELinux is, and how it acts as a mandatory access control system on Linux* Apply and tune SELinux enforcement...
This part of IEC 60839 defines procedures for communication between network clients and devices. This series of interoperability standards makes it possible to build an alarm and electronic security system with clients and devices from different manufacturers using common and well defined...
IEC TR 61850-90-12:2020, which is a Technical Report, is intended for an audience familiar with electrical power automation based on IEC 61850 and related power system management, and particularly for data network engineers and system integrators. It is intended to help them to understand...
This part of the IEC 61784-3 series explains some common principles that can be used in the transmission of safety-relevant messages among participants within a distributed network which use fieldbus technology in accordance with the requirements of IEC 61508 (all parts)1 for functional...
The scope of this standard is to define the Media Access Control (MAC) Service provided by all IEEE 802® MACs, and the Internal Sublayer Service (ISS) provided within MAC Bridges, in abstract terms of the following: a) Their semantics, primitive actions, and events; and b) The...
Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examplesKey Features* Updated with the latest features and additions that come with Hyperledger Fabric 2* Write your own smart contracts and services using Java and...
The scope of this standard is to define a protocol and management elements, suitable for advertising information to stations attached to the same IEEE 802 LAN, for the purpose of populating physical topology and device discovery management information databases. The protocol facilitates the...
This document specifies a protocol for point-to-point transmission of alarms and faults, as well as communications monitoring, between a Supervised Premises Transceiver and a Receiving Centre Transceiver using the Internet Protocol (IP). The protocol is intended for use over any network that...
The current and future infrastructure to satisfy the changing needs of citizens in the EU will grant access to wider postal stakeholders, including customers, postal suppliers, supply chain service providers, (i.e. customs, fiscal authorities collecting VAT and related duties, transport...
This manual contains: a) key principles for the management of risk; b) asset knowledge; and c) the impact of vegetation on other assets. The manual applies to inspecting, managing and maintaining lineside vegetation and all who are involved in those activities. Out of scope for this process are: a)...