Show simple item record

Backhaul Architecture Model: Secured Connectivity over Untrusted or Trusted Networks

contributor authorISA - International Society of Automation
date accessioned2017-09-04T18:21:41Z
date available2017-09-04T18:21:41Z
date copyright41211
date issued2012
identifier otherHZIDBFAAAAAAAAAA.pdf
identifier urihttp://yse.yabesh.ir/std;jsessionid=140DFA769FB254D34CF99C4DBF63916A/handle/yse/204103
description abstractGeneral
This document presents an architecture model for interconnecting automation system elements over untrusted backhaul networks. The focus is on wireless physical la yer but is not limited to wireless.
Figure 1 provides an example of the variety of (potentially simultaneous) uses for backhaul networks. In this example, the "Backhaul Network" cloud could represent a shor t-distance network such as the user-owned network within a building or site, or it could represent a potentially heterogeneous long-distance network (for example, satellite or cellular communication networks) that are provided as a service effectively by multiple third parties. These backhaul links may be provided by one or more commercial providers such as satellite communications providers, cellular, LTE (see Clause 3), WiMax data services, etc. Alternatively, the backhaul may also be provided by the user—for example, Wi-Fi services, point-to-point microwave links, etc
languageEnglish
titleISA TR100.15.01num
titleBackhaul Architecture Model: Secured Connectivity over Untrusted or Trusted Networksen
typestandard
page46
statusActive
treeISA - International Society of Automation:;2012
contenttypefulltext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record