Page 31 - ITU-T Focus Group on Aviation Applications of Cloud Computing for Flight Data Monitoring - Avionics and Aviation Communications Systems
P. 31
ITU-T Focus Group on Aviation Applications of Cloud Computing for Flight Data Monitoring
Avionics and Aviation Communications Systems
In view of the above, further considerations on frequency spectrum allocations and bandwidth requirements
may be envisaged in order to properly examine the feasibility of using future data link systems and recent
developments in commercial aeronautical data link services, which covers the latest developments from various
commercial broadband technologies and services for the aeronautical environment throughout the world.
12. Issues and limitations
12.1 Introduction
There are a range of strategic and technical issues which must be explored across the work of the entire sub
working groups. To ensure that these issues are documented, the following have been identified to date.
12.2 Future data stream solutions
Given the limited time devoted to this Report, it has not been possible to define or develop future solutions
for data streaming which could reduce the consequences associated with aircraft operating in abnormal
circumstances. There is an opportunity to progress this future design work using this Report as the baseline
of existing capabilities.
12.3 Data compression
This involves encoding information using fewer bits than the original representation. It is useful because it
helps reduce resource usage, such as data storage space or transmission capacity. Lossless (no information
is lost) compression reduces bits by identifying and eliminating statistical redundancy and involves trade-offs
among various factors, including the degree of compression, space-time complexity and the computational
resources required.
In order to make an efficient use of the frequency spectrum and to make best use of available bandwidth,
data compression is a must. There are plenty of mechanisms already developed and tested that might be
ready to implement, for example, Recommendation ITU-T V.44 (11/2000) offers a compression ratio of 6:1
(for pure text).
12.4 Cybersecurity
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability
of data by which digital equipment, information and services are protected from unintended or unauthorized
access, change or destruction. The goal is to protect data both in transit and at rest and includes, but not
limited to, encryption, integrity and authentication methods. Countermeasures can be put in place in order
to ensure security of data. Some of these measures include, but are not limited to, access control, awareness
training, audit and accountability, risk assessment, penetration testing, vulnerability management, and security
assessment and authorization.
21