ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf

上传人:progressking105 文档编号:799567 上传时间:2019-02-02 格式:PDF 页数:34 大小:537.77KB
下载 相关 举报
ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf_第1页
第1页 / 共34页
ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf_第2页
第2页 / 共34页
ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf_第3页
第3页 / 共34页
ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf_第4页
第4页 / 共34页
ITU-T L 64-2012 ID tag requirements for infrastructure and network elements management (Study Group 15)《基础结构和网元管理的ID标签要求 15号研究组》.pdf_第5页
第5页 / 共34页
点击查看更多>>
资源描述

1、 International Telecommunication Union ITU-T L.64TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2012) SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT ID tag requirements for infrastructure and network elements management Recommendation ITU-T L.6

2、4 Rec. ITU-T L.64 (10/2012) i Recommendation ITU-T L.64 ID tag requirements for infrastructure and network elements management Summary Telecommunication networks require the correct allocation of network elements and periodically planned maintenance to deliver services quickly and efficiently, to mi

3、nimize out-of-service risk and to guarantee service level agreement satisfaction. It is particularly important to focus on the issue of optical-fibre-based infrastructures and the related huge amount of transmitted information. Network elements that undergo allocation and maintenance operations can

4、be of several types and can differ in terms of position, dimensions, services, field work and scheduled times for periodically planned maintenance. Identification (ID) data technology can be applied to solutions that focus on the proper management of infrastructure and network elements. The ID uniqu

5、ely identifies an element of interest in terms of its allocation and maintenance. Recommendation ITU-T L.64 deals with support systems for infrastructure elements management using ID technology, and provides the criteria for ID tag design. History Edition Recommendation Approval Study Group 1.0 ITU-

6、T L.64 2007-02-06 6 2.0 ITU-T L.64 2012-10-29 15 ii Rec. ITU-T L.64 (10/2012) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardiza

7、tion Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which me

8、ets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts

9、 purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is

10、 voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“

11、and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may i

12、nvolve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this R

13、ecommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent databas

14、e at http:/www.itu.int/ITU-T/ipr/. ITU 2013 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T L.64 (10/2012) iii Table of Contents Page 1 Scope 1 2 References. 1 3 Definitions 1 4 Abbreviations and acr

15、onyms 2 5 Conventions 2 6 Identification data . 2 6.1 General requirements for ID . 2 6.2 ID tag 2 Appendix I Italian experience: RFID tag solution for telephony poles 6 Appendix II Japanese experience: Administration system for optical fibres in a central office and access network . 8 II.1 Introduc

16、tion 8 II.2 Outline 8 II.3 Function 9 Appendix III Chinese experience I: An intelligent ODN system . 13 III.1 Introduction 13 III.2 Outline 14 III.3 Functions 15 III.4 Conclusion 18 Appendix IV Chinese experience II: RFID tag solution for ODN . 19 IV.1 Introduction 19 IV.2 Outline 19 IV.3 Function 2

17、0 Bibliography. 25 Rec. ITU-T L.64 (10/2012) 1 Recommendation ITU-T L.64 ID tag requirements for infrastructure and network elements management 1 Scope This Recommendation deals with support systems for infrastructure and network elements management using ID technology for telecommunication networks

18、. In particular, it indicates the criteria for ID tag design in order to be adapted to different applications requirements. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At

19、 the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed b

20、elow. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ISO/IEC 15394 ISO/IEC 15394:2009, Packaging Bar code and two-dimensional symbols for s

21、hipping, transport and receiving labels. ISO/IEC 15438 ISO/IEC 15438:2006, Information technology Automatic identification and data capture techniques PDF417 Bar code symbology specification. ISO/IEC 16022 ISO/IEC 16022:2006, Information technology Automatic identification and data capture technique

22、s Data Matrix bar code symbology specification. ISO/IEC 18000-1 ISO/IEC 18000-1:2013, Information technology Radio frequency identification for item management Part 1: Reference architecture and definition of parameters to be standardized. ISO/IEC 18000-2 ISO/IEC 18000-2:2013, Information technology

23、 Radio frequency identification for item management Part 2: Parameters for air interface communications below 135 kHz. ISO/IEC 18000-3 ISO/IEC 18000-3:2013, Information technology Radio frequency identification for item management Part 3: Parameters for air interface communications at 13.56 MHz. ISO

24、/IEC 18000-4 ISO/IEC 18000-4:2013, Information technology Radio frequency identification for item management Part 4: Parameters for air interface communications at 2.45 GHz. ISO/IEC 18000-6 ISO/IEC 18000-6:2013, Information technology Radio frequency identification for item management Part 6: Parame

25、ters for air interface communications at 860 MHz to 960 MHz General. ISO/IEC 18004 ISO/IEC 18004:2006, Information technology Automatic identification and data capture techniques QR Code 2005 bar code symbology specification. 3 Definitions For the purpose of this Recommendation, the definitions give

26、n in ISO/IEC 15394, ISO/IEC 15438, ISO/IEC 16022, ISO/IEC 18000-1, ISO/IEC 18000-2, ISO/IEC 18000-3, ISO/IEC 18000-4, ISO/IEC 18000-6 and ISO/IEC 18004 apply. 2 Rec. ITU-T L.64 (10/2012) 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: DB Database GSM G

27、lobal System for Mobile communication HF High Frequency ID Identification (data) ISM Industrial, Scientific, Medical LAN Local Area Network LF Low Frequency MTBF Mean Time Between Failures ODF Optical Distribution Frame ODN Optical Distribution Network OSS Operations Support System PDA Personal Digi

28、tal Assistant PON Passive Optical Network QR Quick Response RFID Radio Frequency Identification UHF Ultra High Frequency 5 Conventions None. 6 Identification data 6.1 General requirements for ID 1) ID should be unique. 2) ID should be capable of being read easily. 3) ID should be capable of being in

29、put into an OSS when intended target elements are installed and when they are connected or disconnected. 4) ID should not include facility information. ID should only have information that can be converted to facility information in the facility database over an OSS. 6.2 ID tag ID tags are ready to

30、be mounted on the network element or already provided as an embedded tag. They should be permanently mounted on the network element or in such a manner that makes them difficult to remove. ID tags may be based on either the QR code defined in clause 6.2.2, or on electronic ID which may have two impl

31、ementations such as RFID (an example of non-contact-type ID) defined in clause 6.2.1 and/or contact-type ID defined in clause 6.2.3. Rec. ITU-T L.64 (10/2012) 3 6.2.1 RFID tag RFID tags usually consist of three parts: chip, antenna and case. They are different for several sets of features: physical,

32、 electrical, chemical, mechanical and thermal characteristics. Since in network telecommunication infrastructure and network elements the environmental conditions are quite different, it is impossible to define a unique kind of RFID tag suitable for all the applications. Consideration is needed in o

33、rder to provide an appropriate solution or solutions for differing networking element ID requirements. Appropriate applications for RFID are when hostile environments affect the long-term durability and readability of visible text or barcode data, and/or the ID data set is large. 6.2.1.1 Frequency T

34、he frequency spectrum available for in-field implementation is not homogenous worldwide. LF band (less than 135 kHz) is recommended for traditional RFID application where a low transfer rate and small tag memory are acceptable. It is recommended to check for the presence of other technologies in the

35、 same band (i.e., ISDN transmission). ISM HF band (13.56 MHz) is recommended for short-range RFID applications and provides excellent immunity to environmental noise and electrical interference. This is the typical condition in maintenance activities where reader antennae can be moved very close to

36、the tag. It is recommended to check for the presence of other technologies in the same band (i.e., VDSL plan 998). UHF band (860-960 MHz) is recommended for logistic applications where fixed antennae must read moving tags automatically and anti-collision for parallel tag reading must be supported. I

37、t is recommended to check for the presence of other technologies in the same band (i.e., GSM). ISM microwave band (2.45 GHz) is recommended for long-range applications where, for security reasons or other causes, tags cannot be directly attached to the network element or where direct access to netwo

38、rk element/tag must be avoided. It is recommended to check for the presence of other technologies in the same band (i.e., wireless LAN). 6.2.1.2 Power supply In short-range applications (LF and HF bands), the use of maintenance-free passive tags (no battery) is recommended. In long-range application

39、s (UHF and microwave bands), (semi-)active tags are typically used in order to achieve transmission between a tag and reader. 6.2.1.3 Transmission distance In short-range applications (LF and HF bands) transmission distance is not an issue, although metallic substrates can greatly reduce the read di

40、stance unless compensatory tuning is applied to tags. It is recommended that the tag be readable even through a protective plastic cover, where one is present. Short-range transmission at 13.56 MHz requires a low force magnetic field that causes no disturbance to other circuits and which avoids unde

41、sired tag reading (this needs testing/confirmation that there is no interference risk to VDSL, especially plan 998-12 MHz used in USA). In long-range applications (UHF and microwave bands), it is recommended to check for possible interference in the wave propagation direction. 6.2.1.4 Tag reading di

42、scrimination Tags situated in very close proximity to each other can result in misreading the intended individual tag and capturing an adjacent tag. This situation can readily arise with cable sheaths in congested areas. Consideration should be given to appropriate designs of scanning head/antenna t

43、o eliminate this risk. 4 Rec. ITU-T L.64 (10/2012) 6.2.1.5 Data storage It is recommended that the RFID tag be provided with a non-volatile memory chip embedded. Memory must be sized in order to store all appropriate information. The data structure should be determined by users for their application

44、s. It is recommended that memory be readable and writable in order to allow upgrade of the content, as a result of maintenance actions. In the presence of confidential data stored on the tag, it is recommended to consider and solve security issues. Data stored on the tag can be used to certify in-fi

45、eld activity deployment. Data stored on the tag allow in-field operators to retrieve information. 6.2.1.6 Case The tag case performs the double function of chip protection and tag adaptation to the network element where it must be attached. It is recommended that new network elements be supplied wit

46、h an embedded tag. This solution facilitates and quickens the deployment of the RFID-based network element management system. This may require the development of new design solutions to allow for the integration in cables. This solution should reduce the risks to operators of protruding tags. In ind

47、oor applications, it is recommended that the RFID tag case provides protection against water and dust and that it remains readable if mounted on a metal surface. In outdoor applications, it is recommended that the RFID tag case provide protection against water, dust and UV rays and that it remains r

48、eadable if mounted on a metal surface. Mechanical impact and crush resistance is required for external use, such as underground joint housings, where they may be stood on. Consideration should be given to the protection from electromagnetic trauma such as lightning strikes, and ensuring adequate iso

49、lation from any electrical ground path. In particular, environmental conditions where chemical substances are present, further protection is recommended. The use and design of stand-alone tags should consider the safety of operators from protrusions on network elements. Tags must be easily detectable and accessible by the operator during maintenance activities throughout the life expectancy of all their future networks. These aspects must be considered both when a stand-alone tag is attached and

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1