Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.IF-RFC9453 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2024-06-28 ÃÑÆäÀÌÁö 31
ÇѱÛÇ¥Áظí ÀÚ¿ø Á¦ÇÑÀû ³ëµå ³×Æ®¿öÅ© ±â¹Ý IPv6 Åë½ÅÀ» À§ÇÑ È°¿ë¼º ¹× À¯½ºÄÉÀ̽º
¿µ¹®Ç¥Áظí Applicability and Use Cases for IPv6 over Networks of Resource-constrained Nodes (6lo)
Çѱ۳»¿ë¿ä¾à º» ¹®¼­´Â »ç¹°ÀÎÅÍ³Ý ÀúÀü·Â ³×Æ®¿öÅ·À» À§ÇÑ ÃʱٰŸ® ¹«¼± Åë½Å ±â¼ú Áß, NFC(Near Field Communication), ÀúÀü·Â ºí·çÅõ½º, Z-Wave, MS-TP, LoBAC µî ÀúÀü·Â ¹«¼± ³×Æ®¿öÅ©±â¹ÝÀÇ IPv6 Åë½ÅÀ» À§ÇÑ È°¿ë¼º ¹× À¯½ºÄÉÀ̽º¸¦ ±â¼úÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This document discusses how IPv6 is applicable by using IPv6 over various technology, such as (Near Field Communication), BLE, Z-Wave, MS-TP, LoBAC in low-power wireless networks for Internet of Things.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAE.IF-RFC9453.pdf TTAE.IF-RFC9453.pdf            

ÀÌÀü
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data(Release 18)
´ÙÀ½
3rd Generation Partnership Project;Technical Specification Group Services and System Aspects;Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data(Release 18)