GNSS Data - GNSS serial interface
Description
This solution is used within Australia, the E.U. and the U.S.. It combines standards associated with GNSS Data with those for GNSS serial interface. The GNSS Data standards include upper–layer standards required to obtain location and time information from a satellite–positioning–system–based geolocation receiver. The GNSS serial interface standards include lower–layer standards that support communications between connected ITS equipment and geolocation equipment such as a GPS receiver.
Includes Standards
Level | DocNum | FullName | Description |
---|---|---|---|
Mgmt | No Standard Needed | No Standard Needed | The services related to this portion of the stack are not critical within the scope of this solution. |
Security | No Standard Needed | No Standard Needed | The services related to this portion of the stack are not critical within the scope of this solution. |
ITS Application Entity | NMEA 0183 | NMEA standard | This standard defines electrical signal requirements, data transmission protocol and time, and specific sentence formats for a 4800–baud serial data bus |
Facilities | No Standard Needed | No Standard Needed | The services related to this portion of the stack are not critical within the scope of this solution. |
TransNet | NMEA 0183 | NMEA standard | This standard defines electrical signal requirements, data transmission protocol and time, and specific sentence formats for a 4800–baud serial data bus |
Access | NMEA 0183 | NMEA standard | This standard defines electrical signal requirements, data transmission protocol and time, and specific sentence formats for a 4800–baud serial data bus |
Readiness: High–Moderate
Readiness Description
One significant or possibly a couple minor issues. For existing deployments, the chosen solution likely has identified security or management issues not addressed by the communications solution. Deployers should consider additional security measures, such as communications link and physical security as part of these solutions. They should also review the management issues to see if they are relevant to their deployment and would require mitigation. For new deployments, the deployment efforts should consider a path to addressing these issues as a part of their design activities. The solution does not by itself provide a fully secure implementation without additional work.