51,316 research outputs found

    Towards the Usage of MBT at ETSI

    Full text link
    In 2012 the Specialists Task Force (STF) 442 appointed by the European Telcommunication Standards Institute (ETSI) explored the possibilities of using Model Based Testing (MBT) for test development in standardization. STF 442 performed two case studies and developed an MBT-methodology for ETSI. The case studies were based on the ETSI-standards GeoNetworking protocol (ETSI TS 102 636) and the Diameter-based Rx protocol (ETSI TS 129 214). Models have been developed for parts of both standards and four different MBT-tools have been employed for generating test cases from the models. The case studies were successful in the sense that all the tools were able to produce the test suites having the same test adequacy as the corresponding manually developed conformance test suites. The MBT-methodology developed by STF 442 is based on the experiences with the case studies. It focusses on integrating MBT into the sophisticated standardization process at ETSI. This paper summarizes the results of the STF 442 work.Comment: In Proceedings MBT 2013, arXiv:1303.037

    Performance of CAM based Safety Applications using ITS-G5A MAC in High Dense Scenarios

    Get PDF
    ETSI ITS-G5 is the current vehicle-to-vehicle communication technology in Europe, which will be standardized by ETSI TC ITS. It is based on IEEE 802.11p and therefore uses a CSMA/CA scheme for Media Access Control (MAC). In this paper we analyze the performance of CAM based safety applications using the ETSI ITS-G5 MAC technology in a challenging scenario with respect to MAC issues: A suitable freeway segment with 6 lanes in each direction. The freeway scenario is thoroughly modeled and implemented in the well known ns-3 simulation environment. Based on this model, the paper shows the performance of CAM based safety applications under MAC challenging conditions. Therefore we provide a set of simulation results resting upon a particular performance metric which incorporates the key requirements of safety applications. Finally we analyze two concrete example scenarios to make a point how reliable CAM based safety applications are in high dense traffic scenarios

    La España minera y metalúrgica

    Full text link
    Escuela Especial de Ingenieros de Minas: La escuela desde su creació

    A COVID-19 Recovery Strategy Based on the Health System Capacity Modeling. Implications on Citizen Self-management

    Get PDF
    Versión preprint depositada sin articulo publicado dada la actualidad del tema. *Solicitud de los autoresConfinement ends, and recovery phase should be accurate planned. Health System (HS) capacity, specially ICUs and plants capacity and availability, will remain the key stone in this new Covid-19 pandemic life cycle phase. Until massive vaccination programs will be a real option (vaccine developed, world wield production capacity and effective and efficient administration process), date that will mark recovery phase end, important decisions should be taken. Not only by authorities. Citizen self-management and organizations self-management will be crucial. This means: citizen and organizations day a day decision in order to control their own risks (infecting others and being infected). This paper proposes a management tool that is based on a ICUs and plants capacity model. Principal outputs of this tool are, by sequential order and by last best data available: (i) ICUs and plants saturation estimation data (according to incoming rate of patients), (ii) with this results new local and temporal confinement measure can be planned and also a dynamic analysis can be done to estimate maximum Ro saturation scenarios, and finally (iii) provide citizen with clear and accurate data allow them adapting their behavior to authorities’ previous recommendations. One common objective: to accelerate as much as possible socioeconomic normalization with a strict control over HS relapses risk

    Strategies for COVID-19 Pandemic Recovery. Applying Engineering Asset Management Principles

    Get PDF
    Versión preprint permitida por el editor Elsevier para subir a repositorios: http://sherpa.ac.uk/romeo/issn/2468-2667/es/Current COVID-19 pandemic available data for Spain, Andalusia an its eight provinces have been analyzed. Utilizing a model recently published to predict pandemic behavior, confinement measures and their economic impact are analyzed. Applying principles for effective and efficient management of engineering assets, decision-making implications of establishing confinement at national, regional or local (province) level are analyzed. The quarantine time is formulated as a function of the delay in taking confinement measures in the territories. The delay is measured in time since the free expansion in the territory is observed. Results discussions and analysis help to formulate a recommended strategy that is presented in the paper. We aim for: (i) design action plans by local level but(ii) controlled centralized by a unique decisionmaking center considering by country. Benefits of that strategy are measured in quarantine times beside GDP loss toll recovery. The strategy would be even more convenient when tackling with successive waves of the pandemic, requesting immediate action on local relapse

    Introduction of a pseudo-6th order ISDN splitter with bandstop topology

    Get PDF
    A newly developed ‘integrated services digital network’ (ISDN) splitter with bandstop (BS) topology is presented and compared to an actual ISDN splitter with a traditional lowpass (LP) topology. The LP-to-BS topology change reduced the amount of filter stages: a LP ISDN splitter requires an 8th order elliptic-like filter in order to be compliant to the standard ‘TS 101 952-1-4 V1.1.1’ [1] of the European Telecommunications Standards Institute (ETSI), whereas the BS ISDN splitter only needs a pseudo-6th order elliptic-like filter. The design of the new BS ISDN filter is discussed in the light of the enforced ETSI specifications. Furthermore, both the ISDN splitters are compared in the field of their specific stopband performance and their physical implementation. The area reduction that comes together with the introduction of the new ISDN splitter with BS topology is more than 25%

    Automated Network Service Scaling in NFV: Concepts, Mechanisms and Scaling Workflow

    Get PDF
    Next-generation systems are anticipated to be digital platforms supporting innovative services with rapidly changing traffic patterns. To cope with this dynamicity in a cost-efficient manner, operators need advanced service management capabilities such as those provided by NFV. NFV enables operators to scale network services with higher granularity and agility than today. For this end, automation is key. In search of this automation, the European Telecommunications Standards Institute (ETSI) has defined a reference NFV framework that make use of model-driven templates called Network Service Descriptors (NSDs) to operate network services through their lifecycle. For the scaling operation, an NSD defines a discrete set of instantiation levels among which a network service instance can be resized throughout its lifecycle. Thus, the design of these levels is key for ensuring an effective scaling. In this article, we provide an overview of the automation of the network service scaling operation in NFV, addressing the options and boundaries introduced by ETSI normative specifications. We start by providing a description of the NSD structure, focusing on how instantiation levels are constructed. For illustrative purposes, we propose an NSD for a representative NS. This NSD includes different instantiation levels that enable different ways to automatically scale this NS. Then, we show the different scaling procedures the NFV framework has available, and how it may automate their triggering. Finally, we propose an ETSI-compliant workflow to describe in detail a representative scaling procedure. This workflow clarifies the interactions and information exchanges between the functional blocks in the NFV framework when performing the scaling operation.Comment: This work has been accepted for publication in the IEEE Communications Magazin
    corecore