|
汽车零部件采购、销售通信录 填写你的培训需求,我们帮你找 招募汽车专业培训老师
Contents.............................................................................................................................................................................. 3
Abbreviations ...................................................................................................................................................................... 5
List of Figures ..................................................................................................................................................................... 7
Executive Summary ........................................................................................................................................................... 8
1 Introduction of V2X...................................................................................................................................................10
1.1 Introduction.....................................................................................................................................................10
1.2 General description of the Connected Car Eco-System .............................................................................11
1.3 Description of V2X connectivity.....................................................................................................................13
1.4 Use cases and application requirements .....................................................................................................16
2 Technology overview of C-V2X...............................................................................................................................19
2.1 Description of C-V2X Technology.................................................................................................................20
2.2 Architecture of C-V2X Technology ...............................................................................................................21
3 Advantages of C-V2X...............................................................................................................................................22
3.1 Performance comparison between IEEE 802.11p (DSRC) and LTE-V2X................................................22
3.2 Scalability........................................................................................................................................................25
3.3 Harmonized Cellular Technology..................................................................................................................26
3.4 Penetration rate challenge for sidelink communication...............................................................................27
3.5 Dissemination of information using cellular broadcast ................................................................................29
3.6 Functional redundancy and resilience..........................................................................................................31
3.7 Ease of Upgrading Existing Network Technologies.....................................................................................31
3.7.1 Evolving existing LTE network to deploy C-V2X.....................................................................................32
3.7.2 Evolution to RSUs and support of V2I .....................................................................................................36
3.7.3 3GPP Evolution to 5G...............................................................................................................................37
3.8 Opportunities to include additional traffic participants like vulnerable road users......................................40
3.9 Future proof and support of automated driving............................................................................................41
3.10 Comparison of Cost Aspects.........................................................................................................................42
4 C-V2X Operation ......................................................................................................................................................44
4.1 C-V2X Operation Modes ...............................................................................................................................44
4.1.1 PC5 Operating Scenarios .........................................................................................................................44
4.1.2 LTE-V2X Uu based Operating Scenario with DL Broadcast..................................................................45
4.2 Multi-Operator Scenarios...............................................................................................................................46
4.2.1 Inter-PLMN for V2X communication over PC5 (direct V2V link)............................................................46
4.2.2 Inter-PLMN for V2X communication over Uu ..........................................................................................47
4.3 Duration of existence of LTE in the networks...............................................................................................48
4.4 Spectrum and Regulations............................................................................................................................48
4.5 Security Aspects of LTE-V2X / PC5 .............................................................................................................50
4.5.1 High-level Description of Security Requirements for V2X ......................................................................51
4.5.2 High-level Description of IEEE 802.11p and LTE-V2X PC5 Communications Security.......................51
4.5.3 High-level description of LTE Uu Communications Security..................................................................52
4.5.4 High-level description of Application-layer Security in IEEE 802.11p and LTE-V2X............................53
4.5.5 Enhancements Planned for V2X Security in 3GPP................................................................................54
4.5.6 Summary of advantages of LTE- V2X Security.......................................................................................54
4.6 Privacy ............................................................................................................................................................56
4.6.1 Tracking......................................................................................................................................................56
4.6.2 Trusted Parties ..........................................................................................................................................58
4.6.3 Other Layers ..............................................................................................................................................59
4.7 Certification.....................................................................................................................................................60
4.8 Added value of the Mobile Network Operators ............................................................................................6 |
|