METR Regulation System --> Other METR Regulation Systems:
METR information
This triple is bi-directional. See also
Other METR Regulation Systems --> METR Regulation System: METR information
Definitions
METR information (Information Flow): Transport-related regulations, ordinances, statutes, warnings, and advisories that have official status and are legally-binding upon traveling entities (whether human or automated). Each rule is associated with its meaning, associated location(s), and conditional characteristics (e.g., effective times, applicable vehicle classes). This flow supports targeted transfer of rules to end user systems and may be initiated based on a query or pushed in a manner that provides user systems with access to rules that are relevant to their current conditions (e.g., vehicle classification, user classification, location, timeframe). Each rule is associated with an expiration time, after which it is no longer considered fully trustworthy. This flow supports bulk transfer of rules between back-office systems.
METR Regulation System (Source Physical Object): The 'METR Regulation System' creates and maintains electronic versions of traffic regulations for eventual consumption by traveler systems and other interested parties. Once approved, each rule is signed and traceable to a specific Rule-Maker. Depending on local policies and division of labor, the METR Regulation Center might need to coordinate with a METR Verification Center, a Maintenance and Construction Management System, and METR Discrepancy Handling Centers.
Other METR Regulation Systems (Destination Physical Object): 'Other METR Regulation Systems' supports information exchange between METR Regulation Systems. A METR Regulation System may exchange METR information with other METR regulation systems to enhance the trustworthiness, both in terms of accuracy and completeness.
Included In
This Triple is in the following Service Packages:
- None
This triple is associated with the following Functional Objects:
- None
This Triple is described by the following Functional View Data Flows:
- None
This Triple has the following triple relationships:
None |
Communication Solutions
- METR: Regulation Requirements - Secure Internet (ITS) (22)
- METR: Regulation Requirements - Apache Kafka (23)
- METR: Regulation Requirements - OMG DDS (23)
- METR: Regulation Requirements - OASIS MQTT (29)
- METR: Regulation Requirements - OASIS AMQP (40)
- (None-Data) - Secure Internet (ITS) (43)
Selected Solution
Solution Description
ITS Application Entity
ISO 24315-4 ISO 24315-8 |
Click gap icons for more info.
|
||
Mgmt
Apache Zookeeper |
Facilities
(None) Apache Kafka Apache Zookeeper |
Security
IETF RFC 8446 |
|
TransNet
|
|||
Access
Internet Subnet Alternatives |
Note that some layers might have alternatives, in which case all of the gap icons associated with every alternative may be shown on the diagram, but the solution severity calculations (and resulting ordering of solutions) includes only the issues associated with the default (i.e., best, least severe) alternative.
Characteristics
Characteristic | Value |
---|---|
Time Context | Recent |
Spatial Context | Regional |
Acknowledgement | True |
Cardinality | Unicast |
Initiator | Source |
Authenticable | True |
Encrypt | False |
Interoperability | Description |
---|---|
Regional | Interoperability throughout the geopolitical region is highly desirable, but if implemented differently in different transportation management jurisdictions, significant benefits will still accrue in each jurisdiction. Regardless, this Information Flow Triple should be implemented consistently within a transportation jurisdiction (i.e., the scope of a regional architecture). |
Security
Information Flow Security | ||||
---|---|---|---|---|
Confidentiality | Integrity | Availability | ||
Rating | Low | High | Moderate | |
Basis | Since all rules are intended for public/machine consumption, there is little reason to obfuscate the information. Only in the case of an instance of the flow that is targeted to a specific vehicle or class of vehicles might encryption be warranted, as that distribution may imply the behavior or desired action of the target vehicles. | Rules could be used to guide vehicle behavior, and if incorrect could lead to vehicles breaking actual rules with potentially highly damaging consequences. | Updates are probably infrequent so often this flow can be a less than HIGH availability. In cases of high update (e.g., work zones, incidents), it could be HIGH. |
Security Characteristics | Value |
---|---|
Authenticable | True |
Encrypt | False |