GNSS Data - GNSS serial interface

Description

This solution is used within Australia, the E.U. and the U.S.. It combines standards associated with GNSS Data with those for GNSS serial interface. The GNSS Data standards include upper–layer standards required to obtain location and time information from a satellite–positioning–system–based geolocation receiver. The GNSS serial interface standards include lower–layer standards that support communications between connected ITS equipment and geolocation equipment such as a GPS receiver.

Includes Standards

LevelDocNumFullNameDescription
MgmtNo Standard NeededNo Standard NeededThe services related to this portion of the stack are not critical within the scope of this solution.
SecurityNo Standard NeededNo Standard NeededThe services related to this portion of the stack are not critical within the scope of this solution.
ITS Application EntityNMEA 0183NMEA standardThis standard defines electrical signal requirements, data transmission protocol and time, and specific sentence formats for a 4800–baud serial data bus
FacilitiesNo Standard NeededNo Standard NeededThe services related to this portion of the stack are not critical within the scope of this solution.
TransNetNMEA 0183NMEA standardThis standard defines electrical signal requirements, data transmission protocol and time, and specific sentence formats for a 4800–baud serial data bus
AccessNMEA 0183NMEA standardThis standard defines electrical signal requirements, data transmission protocol and time, and specific sentence formats for a 4800–baud serial data bus

Readiness: High–Moderate

Readiness Description

One significant or possibly a couple minor issues. For existing deployments, the chosen solution likely has identified security or management issues not addressed by the communications solution. Deployers should consider additional security measures, such as communications link and physical security as part of these solutions. They should also review the management issues to see if they are relevant to their deployment and would require mitigation. For new deployments, the deployment efforts should consider a path to addressing these issues as a part of their design activities. The solution does not by itself provide a fully secure implementation without additional work.