This amendment specifies YANG data models and MIB modules that allow configuration and status reporting for bridges and end systems with the capabilities for Frame Replication and Elimination for Reliability…
This amendment specifies procedures, managed objects, and protocols for bridges and end systems that provide identification and replication of packets for redundant transmission, identification of duplicate packets, and elimination of…
This amendment defines security extensions to IEEE Std 802.15.4 adding AES-256-CCM plus a cipher suite/authentication method registry and a process for inclusion of additional algorithms. The registry defines a capability…
This document provides guidance for organizations in the application of ISO 9001:2015 to the acquisition, supply, development, operation and maintenance of computer software and related support services. This document does…
The inductive environment that exists in the vicinity of electric power and wire-line telecommunications systems and the interfering effects that may be produced are addressed. An interface that permits either…
Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified. Such procedures include the following cryptographic modes of operation for the AES…
This document defines a normalized taxonomy for systems of systems (SoS) to facilitate communications among stakeholders. It also briefly explains what a taxonomy is and how it applies to the…
Modifications to both the IEEE 802.11 physical layer (PHY) and medium access control (MAC) sublayer for high-efficiency operation in frequency bands between 1 GHz and 7.125 GHz are defined in…