[Cesg-all] Results of CESG Polls closing 12 July 2019
CCSDS Secretariat
thomas.gannett at tgannett.net
Mon Jul 15 16:50:12 UTC 2019
CESG E-Poll Identifier: CESG-P-2019-06-001
Approval to publish CCSDS 141.0-B-1, Optical
Communications Physical Layer (Blue Book, Issue 1)
Results of CESG poll beginning 30 June 2019 and ending 12 July 2019:
Abstain: 1 (16.67%) (Merri)
Approve Unconditionally: 4 (66.67%) (Shames, Burleigh, Calzolari, Wilmot)
Approve with Conditions: 1 (16.67%) (Barkley)
Disapprove with Comment: 0 (0%)
CONDITIONS/COMMENTS:
Erik Barkley (Approve with
Conditions): 1) There are no dispositions
indicated in the RID report. Please include the
dispositions of the RIDs in the RID report.
2) Patent considerations:
a) The recommendations states: No patents are
known to relate to this Recommended Standard.
b) The test report states: JPL has not filed any
patents specific to the proposed 141.0-R-1
standard [1]. Implementers are cautioned that
there are many patents on the general topic of
physical layer optical communications.
a) and b) above seem to be at odds -- Please
update the recommendation and/or test report as appropriate.
Total Respondents: 6
All Areas responded to this question.
SECRETARIAT INTERPRETATION OF RESULTS: Approved with Conditions
PROPOSED SECRETARIAT ACTION: Generate
CMC poll after conditions have been addressed
* * * * * * * * * * * * * * * * * * * * * * * *
CESG E-Poll Identifier: CESG-P-2019-06-002
Approval to publish CCSDS 142.0-B-1, Optical
Communications Coding and Synchronization (Blue Book, Issue 1)
Results of CESG poll beginning 30 June 2019 and ending 12 July 2019:
Abstain: 1 (16.67%) (Merri)
Approve Unconditionally: 3 (50%) (Barkley, Burleigh, Wilmot)
Approve with Conditions: 2 (33.33%) (Shames, Calzolari)
Disapprove with Comment: 0 (0%)
CONDITIONS/COMMENTS:
Peter Shames (Approve with
Conditions): Please state if Terms in Annex D
are normative or non-normative. There is no indication.
Gian Paolo Calzolari (Approve with
Conditions): A small problem still be fixed as per attached file.
Total Respondents: 6
All Areas responded to this question.
SECRETARIAT INTERPRETATION OF RESULTS: Approved with Conditions
PROPOSED SECRETARIAT ACTION: Generate
CMC poll after conditions have been addressed
* * * * * * * * * * * * * * * * * * * * * * * *
CESG E-Poll Identifier: CESG-P-2019-06-003
Approval to publish CCSDS 352.0-B-2, CCSDS
Cryptographic Algorithms (Blue Book, Issue 2)
Results of CESG poll beginning 30 June 2019 and ending 12 July 2019:
Abstain: 0 (0%) Approve
Unconditionally: 6 (100%) (Barkley, Merri, Shames, Burleigh, Moury, Wilmot)
Approve with Conditions: 0 (0%) Disapprove with Comment: 0 (0%)
CONDITIONS/COMMENTS:
Scott Burleigh (Approve
Unconditionally): A comment, not a condition:
SIS has questions regarding this Recommended
Standard generally, not the pink sheets. Section
3.1 mandates that all CCSDS missions use AES for
encryption: what about missions that require
authentication and integrity but don't need
encryption? Are CCSDS missions precluded from
using encryption algorithms other than AES, or
are they allowed to use other encryption
algorithms so long as they also implement AES,
even though they don't use it? Maybe these are
just questions of clarity in language, but they raise some concern.
Jonathan Wilmot (Approve Unconditionally): Suggestions not conditions.
Section 1.1 using standardized, well-known
algorithms, the use of high-quality cryptography
and authentication is ensured is not accurate as
there are many older standardized, well-known
algorithms that are not considered high quality
any more. Maybe include the phrase state of the
art for this section and section 2.1
Section 1.5 Suggest rewording of towards
joy-sticking of instruments to towards
distributed direct control of instruments
Section 2.2 Additional background that may or not
be applicable to this document. For onboard TTE
networks, confidentiality and authentication can
also be provided by the hardware network schedule
and application partitioning. Only configured end
points and applications are able to see the
traffic. This allows high speed confidential
authenticated data including voice and video to
be exchanged without the overhead of encryption.
It may be that encryption need only be applied at
local area network external ingress and egress
interface points. Note that in TTE all data is signed (CRC) in the hardware
Total Respondents: 6
All Areas responded to this question.
SECRETARIAT INTERPRETATION OF RESULTS: Approved Unconditionally
PROPOSED SECRETARIAT ACTION: Generate CMC poll
* * * * * * * * * * * * * * * * * * * * * * * *
CESG E-Poll Identifier: CESG-P-2019-06-004
Approval to release CCSDS 401.0-P-29.1, Radio
Frequency and Modulation SystemsPart 1: Earth
Stations and Spacecraft (Red/Pink Sheets, Issue 29.1) for CCSDS Agency review
Results of CESG poll beginning 30 June 2019 and ending 12 July 2019:
Abstain: 1 (16.67%) (Merri)
Approve Unconditionally: 5 (83.33%) (Barkley,
Shames, Burleigh, Calzolari, Wilmot)
Approve with Conditions: 0 (0%) Disapprove with Comment: 0 (0%)
Total Respondents: 6
All Areas responded to this question.
SECRETARIAT INTERPRETATION OF RESULTS: Approved Unconditionally
PROPOSED SECRETARIAT ACTION: Generate CMC poll
* * * * * * * * * * * * * * * * * * * * * * * *
CESG E-Poll Identifier: CESG-P-2019-06-005
Approval to release CCSDS 902.13-R-1, Abstract
Event Definition (Red Book, Issue 1) for CCSDS Agency review
Results of CESG poll beginning 30 June 2019 and ending 12 July 2019:
Abstain: 1 (16.67%) (Calzolari)
Approve Unconditionally: 3 (50%) (Barkley, Burleigh, Wilmot)
Approve with Conditions: 2 (33.33%) (Merri, Shames)
Disapprove with Comment: 0 (0%)
CONDITIONS/COMMENTS:
Mario Merri (Approve with Conditions): The
comment associated with the Identifier field in
Table 3-1 states: "NOTE If the planning
information is regenerated, then the identifier
for a particular event may change."
This is not consistent with the needs of a
Planning System (particularly a partially or
fully automated one) that needs to correlate the
events from one event file to the next generation
of that file covering the same or an overlapping
period of time. Despite the standard does not
preclude the same ID being used, it should
instead recommend that the ID remains constant
across multiple generations/iterations of the same event.
If this were not the case, there would be an
additional (possibly manual) process required to
correlate successive instances of the same event
exchanged between FDS and MPS which is far from ideal.
Peter Shames (Approve with
Conditions): This document should be relevant to
the MOIMS Planning group as well. Please ensure
that they review and comment upon it.
In Annex A2.2: There should be a defined AR Role
to permit a person to update the Schema registry
In Annex A2.3: Plese reconsider whether updates
to the Epoch_Time_Systems registry should be a
fre for all or managed, as in controlled by the
WG or by the CSS Area in the absence of an active WG.
In Annex B2: The Schemas all have White Book "w"
names, they should have Blue Book names. The XML
schema registry
"service_management_xml_schemas/902Schema/902x13" is "Not found".
Scott Burleigh (Approve Unconditionally): A
comment, not a condition: in 3.2.20.2, I think
it would improve clarity to change from "The
TimeParameter class shall contain one and only
one instance of a time parameter specialized from
the AbstractEventTime class (see 3.2.14)" to
"Each instance of the TimeParameter class shall
contain one and only one instance of a time
parameter specialized from the AbstractEventTime class (see 3.2.14)."
Jonathan Wilmot (Approve
Unconditionally): Nothing in addition to other reviewer's comments
Total Respondents: 6
All Areas responded to this question.
SECRETARIAT INTERPRETATION OF RESULTS: Approved with Conditions
PROPOSED SECRETARIAT ACTION: Generate
CMC poll after conditions have been addressed
* * * * * * * * * * * * * * * * * * * * * * * *
More information about the CESG-All
mailing list