Draft NISTIR 7628 Revision 1, Guidelines for Smart Grid Cyber Security

Total Page:16

File Type:pdf, Size:1020Kb

Draft NISTIR 7628 Revision 1, Guidelines for Smart Grid Cyber Security The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication Number: NIST Interagency Report (NISTIR) 7628 Revision 1 Title: Guidelines for Smart Grid Cybersecurity: Volume 1: Smart Grid Cybersecurity Strategy, Architecture, and High- Level Requirements Volume 2: Privacy and the Smart Grid Volume 3: Supportive Analyses and References Publication Date: September 2014 • Final Publication: https://doi.org/10.6028/NIST.IR.7628r1 (direct link: http://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf). • Information on other NIST Computer Security Division publications and programs can be found at: http://csrc.nist.gov/ The following information was posted with the attached DRAFT document: Oct. 25, 2013 NIST IR 7628 Rev. 1 DRAFT Guidelines for Smart Grid Cybersecurity: Vol. 1 - Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements Vol. 2 - Privacy and the Smart Grid Vol. 3 - Supportive Analyses and References The National Institute of Standards and Technology (NIST) seeks comments on draft NISTIR 7628 Revision 1, Guidelines for Smart Grid Cyber Security. The comment period will be open from October 25 through December 23, 2013. Draft NISTIR 7628 Rev. 1 was completed by the NIST-led Smart Grid Cybersecurity Committee (formerly the Cyber Security Working Group) of the Smart Grid Interoperability Panel. The document has been updated to address changes in technologies and implementations since the release of NISTIR 7628 in September 2010. In addition, the document development strategy, cryptography and key management, privacy, vulnerability classes, research and development topics, standards review, and key power system use cases have been updated and expanded to reflect changes in the Smart Grid environment since 2010. The final version is expected to be posted in the spring of 2014. Below are 6 links - the first 3 are for the NISTIR 7628 Rev. 1 which are broken down into 3 separate files (Volume 1, Volume 2, and Volume 3 in that order). Then the last 3 links provided are Public comment period: October 25 – December 24, 2013. Email comments to: [email protected] . DRAFT NISTIR 7628 Revision 1 Guidelines for Smart Grid Cybersecurity: Vol. 1, Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements The Smart Grid Interoperability Panel – Smart Grid Cybersecurity Committee DRAFT NISTIR 7628 Revision 1 Guidelines for Smart Grid Cybersecurity: Vol. 1, Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements The Smart Grid Interoperability Panel– Smart Grid Cybersecurity Committee October 2013 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director National Institute of Standards and Technology Interagency Report 7628 Rev. 1, vol. 1 305 pages (October 2013) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by Federal agencies even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, Federal agencies may wish to closely follow the development of these new publications by NIST. Organizations are encouraged to review all draft publications during public comment periods and provide feedback to NIST. All NIST publications, other than the ones noted above, are available at http://csrc.nist.gov/publications. Comments on this publication may be submitted to: [email protected] Public comment period: October 25 – December 24, 2013 National Institute of Standards and Technology Attn: Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 Email: [email protected] Comment form available at: http://csrc.nist.gov/publications/drafts/nistir-7628- r1/nistir7628_r1_vol1_comments_template.xlsx Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of other than national security-related information in Federal information systems. Abstract This three-volume report, Guidelines for Smart Grid Cybersecurity, presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of Smart Grid-related characteristics, risks, and vulnerabilities. Organizations in the diverse community of Smart Grid stakeholders—from utilities to providers of energy management services to manufacturers of electric vehicles and charging stations— can use the methods and supporting information presented in this report as guidance for assessing risk and identifying and applying appropriate security requirements. This approach recognizes that the electric grid is changing from a relatively closed system to a complex, highly interconnected environment. Each organization’s cybersecurity requirements should evolve as technology advances and as threats to grid security inevitably multiply and diversify. Keywords advanced metering infrastructure; architecture; cryptography; cybersecurity; electric grid; privacy; security requirements; smart grid ACKNOWLEDGMENTS This revision to the NISTIR was developed by members of the Smart Grid Interoperability Panel (SGIP) Smart Grid Cybersecurity Committee (SGCC) (formerly the Cyber Security Working Group (CSWG)), which is chaired by Marianne Swanson (NIST). Dave Dalva (Stroz Friedberg), Akhlesh Kaushiva (Department of Energy), and Scott Saunders (Sacramento Municipal Utility District) are the vice chairs and Mark Enstrom (Neustar) and Amanda Stallings (Ohio PUC) have served as the secretary. Tanya Brewer of NIST is the lead editor of this report. A special note of thanks goes to the subgroup leads, Frances Cleveland (Xanthus Consulting International), Victoria Pillitteri and Nelson Hastings (NIST), Rebecca Herold (Rebecca Herold & Associates, LLC), Elizabeth Sisley (Calm Sunrise Consulting, LLC), and Doug McGinnis (Exelon) who along with their subgroup team members contributed significantly to this revision. The dedication and commitment of all the individuals in developing the original document and now this revision is significant. In addition, appreciation is extended to the various organizations that have committed these resources to supporting this endeavor. Past and current members of the CSWG are listed in Appendix J of this report. Acknowledgement is also extended to the NIST Smart Grid Team and to Liz Lennon (NIST) for her superb technical editing of this report. Thanks is also extended to Bruce McMillin (Missouri University of Science and Technology), and to Harold Booth and Quynh Dang (NIST) for assistance in updating specific sections in the document. Finally, acknowledgment is extended to all the other individuals who have contributed their time and knowledge to ensure this report addresses the security needs of the Smart Grid. NISTIR 7628 Guidelines for Smart Grid Cybersecurity Rev. 1 TABLE OF CONTENTS EXECUTIVE SUMMARY ................................................................................................................... IX Content of the Report ............................................................................................................................. xi CHAPTER 1 DOCUMENT DEVELOPMENT STRATEGY ................................................................... 1 1.1 Cybersecurity and the Electric Sector ............................................................................................. 4 1.2 Scope and Definitions ..................................................................................................................... 4 1.3 Smart Grid Cybersecurity Document Development Strategy ......................................................... 6 1.4 Combined Cyber-physical Attacks ............................................................................................... 12 1.5 Outstanding Issues and Remaining Tasks .................................................................................... 13 CHAPTER 2 LOGICAL ARCHITECTURE AND INTERFACES OF THE SMART GRID ...................... 16 2.1 The Seven Domains to the Logical Reference Model .................................................................. 19 2.2 Logical Security Architecture Overview .....................................................................................
Recommended publications
  • MS Hatch-Waxman PTE REQUEST for EXTENSION of PATENT
    Docket No.: 029420.0155-US02 (PATENT) IN THE UNITED STATES PATENT AND TRADEMARK OFFICE In re United States Patent of: Alan J. Korman, et aL. Patent No.: 7,605,238 Issued: October 20, 2009 For: HUMAN CTLA-4 ANTIBODIES MS Hatch-Waxman PTE Commissioner for Patents Offce of Patent Legal Administration Room MDW 7D55 600 Dulany Street (Madison Building) Alexandria, VA 223 14 REQUEST FOR EXTENSION OF PATENT TERM UNDER 35 U.S.C. §156 Sir: Pursuant to 35 U.S.C. §156 and 37 C.F.R. §§1.710-1.791, Medarex, Inc., the current address of which is Route 206 and Province Line Road, Princeton, New Jersey 08540 ("Applicant" or "Medarex"), hereby requests an extension of U.S. Patent No. 7,605,238 (the "'238 patent"). As permitted by 37 C.F.R. §1.785(b) and MPEP §2761, Applicant is concurrently fiing a request for patent term extension of U.S. Patent No. 6,984,720 based upon the same regulatory review period. Medarex represents that it is the owner and assignee of the entire interest in and to Letters Patent of the United States No. 7,605,238 (Exhibit 1) granted to Alan J. Korman, Edward L. Halk, Nils Lonberg, Yashwant M. Deo and Tibor P. Keler (the "inventors") on October 20, 2009, for "Human CTLA-4 Antibodies and Their Uses" by virtue of an assignment from the DC; 3983891.1 Patent No.: 7,605,238 - 2- Docket No.: 029420.0155-US02 Alan J. Korman, Edward L. Halk and Nils Lonberg to Medarex, recorded in the United States Patent and Trademark Offce ("PTO") on March 6, 2003 at Reel 013817, Frame 0628 and an assignment from Yashwant M.
    [Show full text]
  • B2bi 2.5 Support Reference Catalog 3 Accessibility
    B2Bi Version 2.5 April 2019 Support Reference Catalog Copyright © 2019 Axway All rights reserved. This documentation describes the following Axway software: Axway B2Bi 2.5 No part of this publication may be reproduced, transmitted, stored in a retrieval system, or translated into any human or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without the prior written permission of the copyright owner, Axway. This document, provided for informational purposes only, may be subject to significant modification. The descriptions and information in this document may not necessarily accurately represent or reflect the current or planned functions of this product. Axway may change this publication, the product described herein, or both. These changes will be incorporated in new versions of this document. Axway does not warrant that this document is error free. Axway recognizes the rights of the holders of all trademarks used in its publications. The documentation may provide hyperlinks to third-party web sites or access to third-party content. Links and access to these sites are provided for your convenience only. Axway does not control, endorse or guarantee content found in such sites. Axway is not responsible for any content, associated links, resources or services associated with a third-party site. Axway shall not be liable for any loss or damage of any sort associated with your use of third-party content. Contents Accessibility 4 Accessibility features of B2Bi 4 Keyboard
    [Show full text]
  • The File Cmfonts.Fdd for Use with Latex2ε
    The file cmfonts.fdd for use with LATEX 2".∗ Frank Mittelbach Rainer Sch¨opf 2019/12/16 This file is maintained byA theLTEX Project team. Bug reports can be opened (category latex) at https://latex-project.org/bugs.html. 1 Introduction This file contains the external font information needed to load the Computer Modern fonts designed by Don Knuth and distributed with TEX. From this file all .fd files (font definition files) for the Computer Modern fonts, both with old encoding (OT1) and Cork encoding (T1) are generated. The Cork encoded fonts are known under the name ec fonts. 2 Customization If you plan to install the AMS font package or if you have it already installed, please note that within this package there are additional sizes of the Computer Modern symbol and math italic fonts. With the release of LATEX 2", these AMS `extracm' fonts have been included in the LATEX font set. Therefore, the math .fd files produced here assume the presence of these AMS extensions. For text fonts in T1 encoding, the directive new selects the new (version 1.2) DC fonts. For the text fonts in OT1 and U encoding, the optional docstrip directive ori selects a conservatively generated set of font definition files, which means that only the basic font sizes coming with an old LATEX 2.09 installation are included into the \DeclareFontShape commands. However, on many installations, people have added missing sizes by scaling up or down available Metafont sources. For example, the Computer Modern Roman italic font cmti is only available in the sizes 7, 8, 9, and 10pt.
    [Show full text]
  • Oracle® Database Installation Guide
    Oracle® Database Installation Guide 18c for Microsoft Windows E83888-01 August 2018 Oracle Database Installation Guide, 18c for Microsoft Windows E83888-01 Copyright © 1996, 2018, Oracle and/or its affiliates. All rights reserved. Primary Authors: Tanaya Bhattacharjee, Sunil Surabhi Contributing Authors: Prakash Jashnani, Mark Bauer, Bharathi Jayathirtha Contributors: Barb Glover, Eric Belden, Sudip Datta, David Friedman, Alex Keh, Peter LaQuerre, Rich Long, Matt McKerley, Sham Rao Pavan, Hanlin Qian, Sujatha Tolstoy, Sergiusz Wolicki, Sue Mavris, Mohammed Shahnawaz Quadri, Vishal Saxena, Krishna Itikarlapall, , Santanu Datta, Christian Shay, Aneesh Khanderwal, Michael Coulter, Robert Achacoso, Malai Stalin, David Price, Ramesh Chakravarthula This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S.
    [Show full text]
  • Latex2ε Font Selection
    LATEX 2" font selection c Copyright 1995{2000, LATEX3 Project Team. All rights reserved. 2 September 2000 Contents 1 Introduction 2 A 1.1 LTEX 2" fonts . 2 1.2 Overview . 2 1.3 Further information . 3 2 Text fonts 4 2.1 Text font attributes . 4 2.2 Selection commands . 6 2.3 Internals . 7 2.4 Parameters for author commands . 8 2.5 Special font declaration commands . 9 3 Math fonts 10 3.1 Math font attributes . 10 3.2 Selection commands . 11 3.3 Declaring math versions . 12 3.4 Declaring math alphabets . 12 3.5 Declaring symbol fonts . 13 3.6 Declaring math symbols . 14 3.7 Declaring math sizes . 16 4 Font installation 16 4.1 Font definition files . 16 4.2 Font definition file commands . 16 4.3 Font file loading information . 18 4.4 Size functions . 18 5 Encodings 20 5.1 The fontenc package . 20 5.2 Encoding definition file commands . 20 5.3 Default definitions . 23 5.4 Encoding defaults . 24 5.5 Case changing . 25 1 6 Miscellanea 25 6.1 Font substitution . 25 6.2 Preloading . 26 6.3 Accented characters . 26 6.4 Naming conventions . 27 7 If you need to know more . 28 1 Introduction A This document describes the new font selection features of the LTEX Document Preparation System. It is intended for package writers who want to write font- loading packages similar to times or latexsym. This document is only a brief introduction to the new facilities and is intended A for package writers who are familiar with TEX fonts and LTEX packages.
    [Show full text]
  • Involvement of CDP/Cux in the Regulation of Histone H4 Gene Expression, Proliferation and Differentiation: a Dissertation
    University of Massachusetts Medical School eScholarship@UMMS GSBS Dissertations and Theses Graduate School of Biomedical Sciences 2003-05-07 Involvement of CDP/Cux in the Regulation of Histone H4 Gene Expression, Proliferation and Differentiation: a Dissertation Mai X. Luong University of Massachusetts Medical School Let us know how access to this document benefits ou.y Follow this and additional works at: https://escholarship.umassmed.edu/gsbs_diss Part of the Amino Acids, Peptides, and Proteins Commons, Cells Commons, and the Genetic Phenomena Commons Repository Citation Luong MX. (2003). Involvement of CDP/Cux in the Regulation of Histone H4 Gene Expression, Proliferation and Differentiation: a Dissertation. GSBS Dissertations and Theses. https://doi.org/ 10.13028/10ah-dx47. Retrieved from https://escholarship.umassmed.edu/gsbs_diss/34 This material is brought to you by eScholarship@UMMS. It has been accepted for inclusion in GSBS Dissertations and Theses by an authorized administrator of eScholarship@UMMS. For more information, please contact [email protected]. INVOLVEMENT OF CDP/CUX IN THE REGULATION OF HISTONE H4 GENE EXPRESSION, PROLIFERATION AND DIFFERENTIATION A Dissertation Presented Mai Xuan Luong Submitted to the Faculty of the University of Massachusetts Graduate School of Biomedical Sciences, Worcester in partial fulfillment of the requirement for the degree of: DOCTOR OF PHILOSOPHY IN BIOMEDICAL SCIENCES MAY 7, 2003 CELL BIOLOGY Jeanne B. Lawrence, Chairman of Committee Stephen N. Jones, Member of Committee Tony Ip, Member of Committee Timothy F. Kowalik, Member of Committee Alain Nepveu, Member of Committee Janet L. Stein, Dissertation Mentor Gary S. Stein, Dissertation Mentor Anthony Carruthers, Dean of the : - DEDICA TION This thesis is dedicated to my parents, Xieu Tho Tran and Thuan Luong, who have encouraged and supported me in all my endeavors.
    [Show full text]
  • Windows NLS Considerations Version 2.1
    Windows NLS Considerations version 2.1 Radoslav Rusinov [email protected] Windows NLS Considerations Contents 1. Introduction ............................................................................................................................................... 3 1.1. Windows and Code Pages .................................................................................................................... 3 1.2. CharacterSet ........................................................................................................................................ 3 1.3. Encoding Scheme ................................................................................................................................ 3 1.4. Fonts ................................................................................................................................................... 4 1.5. So Why Are There Different Charactersets? ........................................................................................ 4 1.6. What are the Difference Between 7 bit, 8 bit and Unicode Charactersets? ........................................... 4 2. NLS_LANG .............................................................................................................................................. 4 2.1. Setting the Character Set in NLS_LANG ............................................................................................ 4 2.2. Where is the Character Conversion Done? .........................................................................................
    [Show full text]
  • Patents and Standards
    Patents and Standards A modern framework for IPR-based standardization FINAL REPORT A study prepared for the European Commission Directorate-General for Enterprise and Industry This study was carried out for the European Commission by and as part of the DISCLAIMER By the European Commission, Directorate-General for Enterprise and Industry The information and views set out in this publication are those of the author(s) and do not necessarily reflect the official opinion of the Commission. The Commission does not guarantee the accuracy of the data included in this study. Neither the Commission nor any person acting on the Commission’s behalf may be held responsible for the use which may be made of the information contained therein. ISBN 978-92-79-35991-0 DOI: 10.2769/90861 © European Union, 2014. All rights reserved. Certain parts are licensed under conditions to the EU. Reproduction is authorized provided the source is acknowledged. About ECSIP The European Competitiveness and Sustainable Industrial Policy Consortium, ECSIP Consortium for short, is the name chosen by the team of partners, subcontractors and individual experts that have agreed to work as one team for the purpose of the Framework Contract on ‘Industrial Competitiveness and Market Performance’. The Consortium is composed of Ecorys Netherlands (lead partner), Cambridge Econometrics, CASE, CSIL, Danish Technological Institute, Decision, Eindhoven University of Technology (ECIS), Euromonitor, Fratini Vergano, Frost & Sullivan, IDEA Consult, IFO Institute, MCI and wiiw, together with a group of 28 highly-skilled and specialised individuals. ECSIP Consortium p/a ECORYS Nederland BV Watermanweg 44 3067 GG Rotterdam P.O. Box 4175 3006 AD Rotterdam The Netherlands T.
    [Show full text]
  • Infoprint Transforms to AFP for Z/OS
    IBM Version 2 Release 4 Infoprint Transforms to AFP for z/OS IBM G550-0443-06 Note Before using this information and the product it supports, read the information in “Notices” on page 133. This edition applies to Version 2 Release 4 of IBM® Infoprint Transforms to AFP for z/OS® (program number 5655–N60) and to all subsequent releases and modifications until otherwise indicated in new editions. This edition replaces G550–0443–05. © Copyright International Business Machines Corporation 2005, 2018. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................ vii Tables.................................................................................................................. ix About this publication...........................................................................................xi Who should read this publication............................................................................................................... xi How to read syntax diagrams......................................................................................................................xi Where to find more information.................................................................................................................xii Preventive Service Planning information............................................................................................
    [Show full text]
  • Oracle Files Administrator's Guide
    Oracle® Files Administrator’s Guide Release 2 (9.0.4) Part No. B10872-02 April 2004 Oracle Files Administrator’s Guide, Release 2 (9.0.4) Part No. B10872-02 Copyright © 2002, 2004, Oracle. All rights reserved. Primary Author: Marla Azriel Contributing Authors: Neal Kaplan, Alan Wiersba The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software--Restricted Rights (June 1987).
    [Show full text]
  • Examination and Processing of Human Semen
    WHO laboratory manual for the Examination and processing of human semen FIFTH EDITION WHO laboratory manual for the Examination and processing of human semen FIFTH EDITION WHO Library Cataloguing-in-Publication Data WHO laboratory manual for the examination and processing of human semen - 5th ed. Previous editions had different title : WHO laboratory manual for the examination of human semen and sperm-cervical mucus interaction. 1.Semen - chemistry. 2.Semen - laboratory manuals. 3.Spermatozoa - laboratory manuals. 4.Sperm count. 5.Sperm-ovum interactions - laboratory manuals. 6.Laboratory techniques and procedures - standards. 7.Quality control. I.World Health Organization. ISBN 978 92 4 154778 9 (NLM classifi cation: QY 190) © World Health Organization 2010 All rights reserved. Publications of the World Health Organization can be obtained from WHO Press, World Health Organization, 20 Avenue Appia, 1211 Geneva 27, Switzerland (tel.: +41 22 791 3264; fax: +41 22 791 4857; e-mail: [email protected]). Requests for permission to reproduce or translate WHO publications— whether for sale or for noncommercial distribution—should be addressed to WHO Press, at the above address (fax: +41 22 791 4806; e-mail: [email protected]). The designations employed and the presentation of the material in this publication do not imply the expres- sion of any opinion whatsoever on the part of the World Health Organization concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. Dotted lines on maps represent approximate border lines for which there may not yet be full agreement. The mention of specifi c companies or of certain manufacturers’ products does not imply that they are endorsed or recommended by the World Health Organization in preference to others of a similar nature that are not mentioned.
    [Show full text]
  • IEEE P802.3Aq Comments 06
    IEEE P802.3aq Comments 06/ Cl 00 SC P L # 1 Cl 00 SC P L # 3 Dallesasse, John Emcore Corporation Thaler, Pat Agilent Technologies Comment Type T Comment Status X Comment Type T Comment Status X As drafted, the standard allows the existance of a ""compliant"" equalizer with adaptation Is there a reason for not defining LWM, in other words, LRM combined with WIS as is done times too slow to ensure stable operation in an office environment. Such an equalizer for the other 10GBASE-R PHYs? needs to be excluded from the ability to claim compliance to the standard, or the standard Suggested Remedy is broken. A dynamic receiver test is required. Add LWM or perhaps add a brief statement that the Clause 68 PMD does not support WIS. Suggested Remedy Add a dynamic test for the receiver. The suggested way to achieve such a test is based Response Response Status O upon the block diagram in Figure 68-10. Rather than have a single ISI generator, the source signal from the combined gaussian noise generator and pattern generator is split and fed into two parallel ISI generators with fixed but different impulse responses. The Cl 00 SC P L # 4 output from these ISI generators are each fed into variable amplifiers whose gain is Lindsay, Tom ClariPhy Communicati modulated at a frequency representative of the rate of change of the fiber modal distribution when subjected to the types of mechanical perturbations called out in GR-63- Comment Type E Comment Status X CORE or IEC 61300-2-1, 2nd Edition, 2003-01.
    [Show full text]