D6.6 MILS Console System
|
|
- Bruce Garrett
- 6 years ago
- Views:
Transcription
1 Project Number D6.6 MILS Console System Version 1.0 Final Public Distribution Frequentis, LynuxWorks Project Partners: Fondazione Bruno Kessler, fortiss, Frequentis, LynuxWorks, The Open Group, RWTH Aachen University, TTTech, Université Joseph Fourier, University of York Every effort has been made to ensure that all statements and information contained herein are accurate, however the D-MILS Project Partners accept no liability for any error or omission in the same Copyright in this document remains vested in the D-MILS Project Partners.
2 Project Partner Contact Information Fondazione Bruno Kessler fortiss Alessandro Ciamatti Harald Ruess Via Sommarive 18 Guerickestrasse Trento, Italy Munich, Germany Tel: Tel: Fax: Fax: cimatti@fbk.eu ruess@fortiss.org Frequentis LynuxWorks Wolfgang Kampichler Yuri Bakalov Innovationsstrasse 1 Rue Pierre Curie Vienna, Austria Saint-Cyr-l Ecole, France Tel: Tel: Fax: Fax: wolfgang.kampichler@frequentis.com ybakalov@lnxw.com RWTH Aachen University The Open Group Joost-Pieter Katoen Scott Hansen Ahornstrasse 55 Avenue du Parc de Woluwe 56 D Aachen, Germany 1160 Brussels, Belgium Tel: Tel: Fax: Fax: katoen@cs.rwth-aachen.de s.hansen@opengroup.org TTTech Université Joseph Fourier Wilfried Steiner Saddek Bensalem Schonbrunner Strasse 7 Avenue de Vignate Vienna, Austria Gieres, France Tel: Tel: Fax: Fax: wilfried.steiner@tttech.com saddek.bensalem@imag.fr University of York Tim Kelly Deramore Lane York YO10 5GH, United Kingdom Tel: Fax: tim.kelly@cs.york.ac.uk Page ii Version 1.0
3 Contents 1 Introduction 2 2 Objectives Objectives Design and Implementation Guidance Open design and implementation MILS compatible Architecture Description MCS Use Case: Frequentis Voice Service (FVS) Module Decomposition and Dependencies Functional Description Display Manager Device Assignment and Control Trusted Path Input and Output Channels Display Device MCS Clients Voice Client Data Client Design and Implementation Design MILS Console Subsystem Display Manager Device Assignment and Control Trusted Path Input Channel Output Channel Implementation References 14 Version 1.0 Page iii
4 List of Figures 1 MCS single I/O subject (Partition C) MCS decomposition MCS modules and dependencies MCS architecture MCS internal and external interfaces Trusted Path: Partition A Trusted Path: Partition B Page iv Version 1.0
5 Document Control Version Status Date 0.1 Initial outline, Exec Summary 16 March Architecture, Function, Design 29 September AADL corrections 03 October Cloned to make D7.2, limit scope to MCS 11 October AADL corrections, Implementation 03 November Final version Version 1.0 Page v
6 Page vi Version 1.0
7 Executive Summary The D-MILS Project has created a distributed MILS platform, formed from the composition of MILS foundational components. Of the several foundational components identified by the conventional MILS platform architecture, the D-MILS project has need of two components in addition to the separation kernel: the MILS Network Subsystem (MNS) and the MILS Console Subsystem (MCS). Since the Frequentis Voice Services demonstrator requires simultaneous operator interaction with multiple safety and security domains, the MCS, which has the rôle to provide such separation, is included in the technology requirements for D-MILS. MCS, in contrast to the MNS, is not central to the distributed MILS technology, and consequently a somewhat more modest implementation of MCS is undertaken in the D-MILS Project. Nonetheless, both subsystems are conceived in the spirit of their definition in the MILS platform architecture. As for the MNS, the implementation of MCS is intended to be functionally consistent with the MILS architecture definition, though it is not intended to implement all of the functional and assurance requirements specified for the high-assurance MCS foundational component. This approach permits a more complete future implementation, both in terms of functionality and assurance, to be developed by refinement or substitution of parts, without requiring changes to the architecture of the system or to the clients of the MCS. This document describes the implementation of MCS for D-MILS. MCS for D-MILS is implemented as a single subject running on each D-MILS node needing that feature. Since the MCS is required to simultaneously handle user interface data from multiple security/safety domains, it implements and enforces separation of such data as per its rôle in the MILS platform. The internal structure of the MCS is illustrated, the communication between the MCS and its clients is discussed, and the configuration and initialization of the MCS are described. Version 1.0 Page 1
8 1 Introduction This document, and the software it describes, constitute Deliverable D 6.6 of WP 6 (MILS Console System) of the EU FP7 Distributed MILS for Dependable Information and Communication Infrastructures (D-MILS) Project; Project Number The Distributed MILS Project (D-MILS Project) has created a D-MILS platform, formed from the composition of MILS foundational components. Of the several foundational components identified by the conventional MILS platform architecture, the D-MILS project has need of two components in addition to the MILS separation kernel: the MILS Network Subsystem (MNS) and the MILS Console Subsystem (MCS). This document describes the requirements, architecture, functionality, design, implementation, and assurance considerations for the MCS for distributed MILS (D-MILS). Page 2 Version 1.0
9 2 Objectives The technical requirements for the MILS Console System are based on the WP1 requirements for the Frequentis Voice Services demonstrator (D 1.2) [2], the D-MILS Technology Requirements (D,1.3) [1], and the general characteristics of MILS console subsystems as described in the MILS platform architecture [3]. 2.1 Objectives The objective is to provide a standalone subject (or subjects) implementing a MILS console system that supports Frequentis voice service, as well as other common user interface devices, and has a configuration function compatible with the DMCC and the configuration functions of the MILS network and the separation kernel. 2.2 Design and Implementation Guidance Open design and implementation In keeping with the European Commission s emphasis on effective dissemination and exploitation, is intended that the D-MILS technology be easily adopted and applied by as broad a community of developers and industries as possible. Other projects should be able to adapt it and other research extend it MILS compatible Numerous concepts and definitions are already established within the MILS community. Additional emerging standards are being developed that are needed for the achievement of long held community goals for MILS and the growth of MILS to be capable of handling more diverse use cases. Consequently, although not all of these considerations might be germane if D-MILS were being done in a vacuum, they are relevant because of the bigger picture and future plans to build upon Distributed MILS and to further augment the capabilities of MILS. Version 1.0 Page 3
10 3 Architecture Description 3.1 MCS Use Case: Frequentis Voice Service (FVS) A distributed MILS (D-MILS) architecture for FVS is presented in D 7.2. One of the FVS positions is an integrated working position, which utilizes the concept of an MCS. The FVS test bed for D-MILS verification includes voice and data services providing radio and data communication features. Each element provides a distinct feature set needed to implement the required end-to-end communication services. The working position integrates voice and data services and therefore has access to different domains. MCS for D-MILS is implemented as a single subject running on each D-MILS node needing that feature. Since the MCS is required to simultaneously handle user interface data from both the voice service and data service domains, it implements and enforces separation of such data. The basic internal structure of the MCS is illustrated in figure 1. Figure 1: MCS single I/O subject (Partition C) Partition C hosts the MCS and maintains node internal connections (red arrows) to its clients, partition A (voice) and partition B (data) domain. Such connections are part of the D-MILS configuration and permit flows between partitions A - C and B - C but strictly separate A from B. For the particular purpose of performance validation it has been decided to implement input and output channels via TCP/IP. This approach takes advantage of the D-MILS architecture but also simplifies the assignment and control of client channels as they connect via D-MILS node internal network interfaces. 3.2 Module Decomposition and Dependencies There are two groups of modules that are considered - modules that comprise the MCS and modules that are external to the MCS but either map an I/O devices or provide a certain function essential Page 4 Version 1.0
11 to the Frequentis voice service. Modules that are internal to the MCS (corresponding partition in brackets): Display Manager (C) Trusted Path (C) Device assign and control (C) Display Device (C) Input channels (C) Output channels (C) FVS modules that are not part of the MCS: Voice client (A) USB subsystem (A) Data client (B) Monitor (C) USB subsystem (C) Media input and output devices are allocated to the voice service specific subject (USB subsystem partition A) by a device allocation subsystem that is independent of the MCS, as in figure 2. Figure 2: MCS decomposition Remaining input and output devices (USB subsystem partition C) that are monitor, keyboard and mouse are managed by the MCS. The MCS subject implements display manager, trusted path and device assignment and it defines MILS ports interconnecting these entities. Further there are input and output channels towards client partitions. The voice client supports a browser based user interface (BUI) providing output for display by any Internet browser or any web rendering engine. Thus we differentiate between a monitor, specifically a piece of computer equipment and a display device that is responsible for rendering and display of the requested contents on the screen in the following sections. Version 1.0 Page 5
12 4 Functional Description Figure 3 provides a schematic overview of functional elements described within this section. Figure 3: MCS modules and dependencies 4.1 Display Manager The display manager mediates all output to the display. It is responsible for enforcing the display policy and therefore partitions the display device in time and/or space. A guiding principle for the operation of the trusted display manager is that the current partitioning is readily apparent to the human user. The trusted display manager must present the output of clients in a sufficiently visually unambiguous manner so that the user will not make security-related errors based on a misinterpretation of information presented on the display device arising from the manner in which the information is presented. For example, a trusted display region (described in the next section) could continuously display the security attributes of the (topmost) window under the cursor. 4.2 Device Assignment and Control The MCS provides the ability to associate groups of input and output devices with input and output channels, and to assign channels, and thereby the associated devices, to clients. An association of several devices together to a channel constrains the devices to be assigned simultaneously. For example, a keyboard and a mouse may be constrained to always be assigned to the same client at any given time. Device assignment via channels may be of different types; for instance devices may be used in certain periods of processing by one client at a time. This concept is also known as "Serial Sharing". The MCS may also provide the ability to assign an input or output device to a client for the Page 6 Version 1.0
13 duration of a session, known as "Semi-permanent Assignment", or completely assigned to the client. Finally, certain devices may handle output from multiple clients at the same time, or handle input for multiple clients, called "Concurrent Sharing". 4.3 Trusted Path The trusted path is a logically distinct communication path between the MCS and the user that is used for security relevant communications. The trusted path may be initiated either by the user, to perform an MCS built-in security relevant function, or by MCS, to inform the user of a security relevant event, or status information. When communicating with the trusted path or a trusted subsystem, input and output between the trusted function and the user flows over distinct channels. 4.4 Input and Output Channels The MCS mediates all access by client partitions or subjects to human interface devices (HID) comprising the console input and console output devices. The client sends data to the console output devices on output channels, and receives data from the console input devices on input channels. For each client there are zero or more input channels, one or more output channels. 4.5 Display Device The rendering engine responsible for displaying the requested content. For example if the requested content is HTML, it is responsible for parsing the HTML and CSS and displaying the parsed content on the screen. This allows to implement a trusted display independent of the physical device (video system/monitor) of the underlying platform but requires a single i/o partition. 4.6 MCS Clients Voice Client The voice client is a VoIP client that supports SIP (signaling) and RTP (media) and connects to preconfigured VoIP services (e.g. gateways to analoge radios) or voice clients located at remote D-MILS nodes. User interaction, originating from a remote browser based user interface (BUI), establishes, controls and terminates radio and telephone dialogs Data Client The data client is a simple load balancer for TCP based protocols. As such it relays and filters HTTP traffic between the display device and data services located at remote D-MILS nodes. The data clients maintains a list of data services the MCS is permitted to access. Version 1.0 Page 7
14 5 Design and Implementation This section describes the design and implementation of the MILS Console System. 5.1 Design Figure 4 illustrates how the MCS policy architecture is designed. The MCS itself is a native application that supports web content rendering and extends JavaScript to support custom functions. This is used in order to implement the trusted path by capturing display events and maintaining specific callbacks to such events within the MCS. In fact, each client partition supports an HTML based user interface locally stored to and accessed by the MCS application through the device assignment and control function. The trusted display mode is configured to simultaneously display two windows containing information from the voice and data partition. Further, the MCS input and output channel offers web sockets (WS) via HTTP for duplex communication. MILS ports internal to the MCS are part of the MCS subject and implemented using inter-process communication facilities of the partitions operating system (dashed lines), whereas, ports interconnecting MCS and client partitions utilize instances of network connections from the D-MILS node local loopback interface. Figure 4: MCS architecture A Webkit webview represents a concurrently shared display device allowing to implement a trusted display independent of video system/monitor in use. Since this is a plain user mode implementation, neither specific kernel drivers required nor does it require to develop extra modules for a specific target platform. The Webkit webview allows implementing C functions as call back for JavaScript provided to the BUI in order to implement the trusted path. The following paragraphs describe each functional element following the rules of MILS-AADL. Page 8 Version 1.0
15 5.1.1 MILS Console Subsystem The MCS core implements four external interfaces that connect to MCS clients (data), keyboard (event), mouse (event) and he display device (data). Interfaces internal to the MCS are in general data interfaces that read configuration files, exchange render objects or request callback functions, see figure 5. Specific interfaces (event, data) are clockwise numbered depending on where they connect. Figure 5: MCS internal and external interfaces system MCS features Input: out data port; Output: in data port; Keyboard: in event port; Mouse: in event port Display: out data port; end MCS; system implementation MCS.Impl subcomponents display_manager: thread tmanager.impl; input_channel: thread tinput.impl; output_channel: thread toutput.impl; device_assignment: thread tassignment.impl; trusted_path: thread tpath.impl; flows port Output -> output_channel._indata4; port input_channel._outdata4 -> Input; port display_manager._outdata2 -> Display; connections port Keyboard -> trusted_path._inevent2; port Mouse -> trusted_path._inevent3; end MCS.Impl; Version 1.0 Page 9
16 5.1.2 Display Manager thread tmanager features _indata3: in data port; _indata4: in data port; _outdata2: out data port; end tmanager; thread implementation tmanager.impl flows port trusted_path._outdata1 -> _indata3; port output_channel._outdata2 -> _indata4; port _outdata2 -> Display; end tmanager.impl; Device Assignment and Control thread tassignment features _outdata1: out data port; _outdata2: out data port; _outdata4: out data port; end tassignment; thread implementation tassignment.impl flows port _outdata1 -> output_channel._indata3; port _outdata2 -> trusted_path._indata1; port _outdata4 -> input_channel._indata1; end tassignment.impl; Trusted Path thread tpath features _inevent2: in event port; _inevent3: in event port; _indata1: in data port; _outdata1: out data port; _outdata4: out data port; end tpath; thread implementation tpath.impl flows port device_assignment._outdata2 -> _indata1; port _outdata1 -> display_manager._indata3; port _outdata4 -> input_channel._indata2; connections port Keyboard -> _inevent2; port Mouse -> _inevent3; end tpath.impl; Input Channel thread tinput features _indata1: in data port; _indata2: in data port; _outdata4: out data port; end tinput; thread implementation tinput.impl flows port device_assignment._outdata4 -> _indata1; port trusted_path._outdata4 -> _indata2; port _outdata4 -> Input; end tinput.impl; Page 10 Version 1.0
17 5.1.6 Output Channel thread toutput features _indata2: in data port; _indata4: in data port; _outdata2: out data port; end toutput; thread implementation toutput.impl flows port device_assignment._outdata1 -> _indata2; port Output -> _indata4; port _outdata2-> display_manager._indata4; end toutput.impl; 5.2 Implementation WebkitGTK, as the foundation of the MCS implementation, implements an HTML renderer and therefore allows a static configuration of the display device that is assigning different display areas to client partitions. Trusted Path and Display Manager are functions called by the MCS application and read configuration files that are considered as part of Device Assignment and Control. The following code example describes the main tasks of the Display Manager that are registering a callback function with view events (keyboard and mouse) in order to implement the Trusted Path and loading the main view of the display. void funcdisplaymanager() {... g_signal_connect (G_OBJECT (web_view), "window-object-cleared", G_CALLBACK(window_object_cleared_cb), web_view); webkit_web_view_load_uri (WEBKIT_WEB_VIEW (web_view), "file://dac/mcs-ui.html"); }... Display areas are assigned by loading the following file (mcs-ui.html) <!DOCTYPE html> <html> <head>... </head> <body> <iframe allowtransparency="true" src="file://dac/mcs-ui-voice.html"...></iframe> <iframe allowtransparency="true" src="file://dac/mcs-ui-data.html"...></iframe> </body> </html> which puts the user interface that connects to the voice client partition on top of the data client partition user interface. The registered callback function implements the Trusted Path with code fragments that highlight and indicate the active partition within a dedicated screen area (label) as listed below. Version 1.0 Page 11
18 void functrustedpath() {... gtk_label_set_attributes(gtk_label (g_tp_label), attrlist); gtk_label_set_text (GTK_LABEL (g_tp_label), stringplaintext); }... Further, when loading html files that are specific to client partitions, JavaScript code is loaded and initiated that implements Input- and Output Channel per domain. function initwebsocket() { window.websocket = window.websocket window.mozwebsocket; connection = new WebSocket( ws://... ); } function SendData(element, state) { connection.send(json.stringify({id: id, el: element, st: parseint(state)})); } function ReceivedData(json_message) {... } var getmessage = JSON.parse(json_message); var element = getmessage.el; var state = getmessage.st; var id = getmessage.id; Figure 6 shows the MCS with a split user interface - the top display region shows the user interface which connects to Partition A (voice), whereas the section below connects to the data domain (Partition B). The bottom status line indicates the active partition according to the Trusted Path. Figure 6: Trusted Path: Partition A Page 12 Version 1.0
19 As soon as the user changes to the data domain (mouse move or mouse click) the Trusted Path status line changes to Partition B and the corresponding user interface region is highlighted with a red frame, as shown in figure 7. Figure 7: Trusted Path: Partition B Summarized, the MCS implements Display Manager, Trusted Path and reads static configuration from a file system local to Partition C (considered as Device Assignment and Control). Both, Inputand Output channels are instantiated per display region and directly connect to corresponding partitions without any interference. Version 1.0 Page 13
20 References [1] Requirements for distributed MILS technology. Technical Report D1.3, Version 1.2, D-MILS Project, August [2] Safety and security requirements for Frequentis Voice Service demonstrator. Technical Report D1.2, Version 1.3, D-MILS Project, March [3] Rance DeLong. MILS Platform Protection Profile, Draft version 0.4, To appear. 3 Page 14 Version 1.0
D2.3 General principles for mapping AADL models to GSN
Project Number 318772 D2.3 General principles for mapping AADL models to GSN Version 1.1 Final Release Public Distribution University of York Project Partners: Fondazione Bruno Kessler, fortiss, Frequentis,
More informationD2.1 Specification of MILS-AADL
Project Number 318772 D2.1 Specification of MILS-AADL Version 1.4 Final Public Distribution RWTH Aachen University Project Partners: Fondazione Bruno Kessler, fortiss, Frequentis, LynuxWorks, The Open
More informationD4.5 OS Allocation and Migration Support Final Release
Project Number 611411 D4.5 OS Allocation and Migration Support Final Release Version 1.01 Final Public Distribution University of York, aicas, Bosch and University of Stuttgart Project Partners: aicas,
More informationD 3.6 FPGA implementation of self-timed NOC
Project Number 288008 D 3.6 FPGA implementation of self-timed NOC Version 1.0 Final Public Distribution Technical University of Denmark Project Partners: AbsInt Angewandte Informatik, Eindhoven University
More informationThis is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett.
This is a sample chapter of WebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web by Alan B. Johnston and Daniel C. Burnett. For more information or to buy the paperback or ebook editions, visit
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationCompositional Security Evaluation: The MILS approach
Compositional Security Evaluation: The MILS approach John Rushby and Rance DeLong Computer Science Laboratory SRI International Menlo Park CA USA Primary affiliation: LynuxWorks John Rushby, Rance DeLong,
More informationWhite Paper. Integrating Vocality for Mining. Author Neal Nystrom, Edgar Higueros. Revision v1.3. Publish Date March 2017
White Paper Integrating Vocality for Mining Author Neal Nystrom, Edgar Higueros Revision v1.3 Publish Date March 2017 VOCALITY WHITE PAPER - INTEGRATING VOCALITY FOR MINING Table of Contents Introduction
More informationISO/IEC INTERNATIONAL STANDARD
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 15953 First edition 1999-12-15 Information technology Open Systems Interconnection Service definition for the Application
More informationPENS Symposium SESAR Project Overview
PENS Symposium SESAR 15.2.10 Project Overview Speaker Organisation Date and venue Boleslaw GASZTYCH EUROCONTROL 18 th October 2012, Brussels The European Organisation for the Safety of Air Navigation Agenda
More informationAn Information Model for High-Integrity Real Time Systems
An Information Model for High-Integrity Real Time Systems Alek Radjenovic, Richard Paige, Philippa Conmy, Malcolm Wallace, and John McDermid High-Integrity Systems Group, Department of Computer Science,
More informationDominique Carrega, Emmanuel Fournier, Hervé Muyal (Tecsi).
Project Number: Project Title: Deliverable Type: (K/N)* AC343 MOVE K CEC Deliverable Number: AC343 / TEC / WP1 / DS / K / 1 / Contractual Date of Delivery to the CEC: July 1998 Actual Date of Delivery
More informationVoipSwitch User Portal for Rich Communiation Suite RCS features, HTML 5, WebRTC powered FOR DESKTOP AND MOBILES
VoipSwitch User Portal for Rich Communiation Suite RCS features, HTML 5, WebRTC powered FOR DESKTOP AND MOBILES Overview The VoipSwitch User Portal (VUP) is a self-care customer portal for VoIP service
More informationSecurity Assurance Framework for Networked Vehicular Technology
D7.2 SAFERtec Website Security Assurance Framework for Networked Vehicular Technology Abstract SAFERtec proposes a flexible and efficient assurance framework for security and trustworthiness of Connected
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationT-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication within a criminal investigation
www.coe.int/tcy Strasbourg, 12 November 2013 (draft) T-CY (2013) 26 Cybercrime Convention Committee (T-CY) T-CY Guidance Note #8 Obtaining subscriber information for an IP address used in a specific communication
More informationIRMOS Newsletter. Issue N 5 / January Editorial. In this issue... Dear Reader, Editorial p.1
IRMOS Newsletter Issue N 5 / January 2011 In this issue... Editorial Editorial p.1 Highlights p.2 Special topic: The IRMOS Repository p.5 Recent project outcomes p.6 Keep in touch with IRMOS p.8 Dear Reader,
More informationD7.1 Website and Fact Sheet
D7.1 Website and Fact Sheet Document Number D7.1 Document Title Website and Fact Sheet Version 3.1 Status Work Package Deliverable Type Final WP7 Report Contractual Date of Delivery 30.11.2013 Actual Date
More informationImplementing a Numerical Data Access Service
Implementing a Numerical Data Access Service Andrew Cooke October 2008 Abstract This paper describes the implementation of a J2EE Web Server that presents numerical data, stored in a database, in various
More informationLecture 1 Overview - Data Communications, Data Networks, and the Internet
DATA AND COMPUTER COMMUNICATIONS Lecture 1 Overview - Data Communications, Data Networks, and the Internet Mei Yang Based on Lecture slides by William Stallings 1 OUTLINE Data Communications and Networking
More informationOracle Communications WebRTC Session Controller
Oracle Communications WebRTC Session Controller Concepts Release 7.0 E40976-01 November 2013 Oracle Communications WebRTC Session Controller Concepts, Release 7.0 E40976-01 Copyright 2013, Oracle and/or
More informationHAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008,
HAMES Review at SRI, 7 October 2008 partly based on Layered Assurance Workshop 13, 14 August 2008, BWI Hilton and based on Open Group, 23 July 2008, Chicago Component Security Integration John Rushby Computer
More informationIEEE-SA Conformity Assessment Program for IEEE 1588 in Mobile Networks AUTHORS:
IEEE-SA Conformity Assessment Program for IEEE 1588 8 in Mobile Networks AUTHORS: John C. Eidson Tim Frost Geoffrey M. Garner Sebastien Jobert Bob Mandeville Michael Mayer Michel Ouellette Charles A. Webb
More informationISO INTERNATIONAL STANDARD. Intelligent transport systems Communications access for land mobiles (CALM) Architecture
INTERNATIONAL STANDARD ISO 21217 First edition 2010-04-15 Intelligent transport systems Communications access for land mobiles (CALM) Architecture Systèmes intelligents de transport Accès aux communications
More informationETSI TS V1.1.1 ( )
Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Requirements of the NGN network to support Emergency Communication from Citizen
More informationMaintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007
Maintaining High Availability for Enterprise Voice in Microsoft Office Communication Server 2007 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL
More informationApplication Notes for Dialogic PowerVille LB with Avaya Aura Session Manager Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Dialogic PowerVille LB with Avaya Aura Session Manager Issue 1.0 Abstract These Application Notes describe configuration steps required
More informationThis document is a preview generated by EVS
EESTI STANDARD EVS-EN 12795:2003 Road transport and traffic telematics - Dedicated Short Range Communication (DSRC) - DSRC data link layer: medium access and logical link control Road transport and traffic
More informationDesigning a System Engineering Environment in a structured way
Designing a System Engineering Environment in a structured way Anna Todino Ivo Viglietti Bruno Tranchero Leonardo-Finmeccanica Aircraft Division Torino, Italy Copyright held by the authors. Rubén de Juan
More informationSignaling System 7 (SS7) By : Ali Mustafa
Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network
More informationSecurity Information for SAP Asset Strategy and Performance Management
Master Guide SAP Asset Strategy and Performance Management Document Version: 1.0 2017-11-30 Security Information for SAP Asset Strategy and Performance Management Typographic Conventions Type Style Example
More informationECSEL Research and Innovation actions (RIA) AMASS
ECSEL Research and Innovation actions (RIA) AMASS Architecture-driven, Multi-concern and Seamless Assurance and Certification of Cyber-Physical Systems Prototype for seamless interoperability (a) D5.4
More information3GPP Advances Towards Transport
3GPP Advances Towards Transport Ingo Wendler (SBB CFF FFS), UIC 3GPP Date: 04./05. July 2018 ETSI, Sophia Antipolis Version: 1.1.1 (1) Focus subject (2) Design principles 5G System (3) System Principles:
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationNG112 Transition Models - Implementation Activities
EENA NG112 Technical Committee Document NG112 Transition Models Implementation Activities Title: NG112 Transition Models - Implementation Activities Version: 2.0 Revision Date: 15/07/2015 Status of the
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 19500-2 This is a preview of "ISO/IEC 19500-2:2012". Click here to purchase the full version from the ANSI store. Second edition 2012-04-15 Information technology Object
More informationMarket monitoring and web frequentation note No. 1 (month 10)
EURO-TOPTEN PLUS Extension and strengthening of the European Topten Inititiatives and of the market for innovative and efficient products Market monitoring and web frequentation note No. 1 (month 10) Deliverable
More informationClimbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios
Climbing Towards Trust, Privacy and Identity Management in Emerging ICT-based Scenarios First Endeavour: Requirements 26 November 2008 @ ICT 2008, Lyon Katja Liesebach Chair for Mobile Business & Multilateral
More informationReport of the Working Group on mhealth Assessment Guidelines February 2016 March 2017
Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'
More informationThis document is a preview generated by EVS
CEN WORKSHOP CWA 15264-1 April 2005 AGREEMENT ICS 35.240.15 English version Architecture for a European interoperable eid system within a smart card infrastructure This CEN Workshop Agreement has been
More informationWireless Mesh Test Suite
Wireless Mesh Test Suite Highlights Determines network s ability to self-heal and recover from RF interference effects or outages Benchmarks performance of wireless mesh network equipment over varying
More informationT H E TOLLY. No March StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) Transactions per second
No. 200235 March 2001 StreamCore StreamGroomer Module 200 Flow Regulator and StreamGroomer Manager (SGM) TCP/IP WAN Access Link Flow Regulation System Performance Evaluation Premise: Network professionals
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for configuring Aculab s ApplianX IP Gateway to interoperate with Avaya Aura Communication Manager R6.3 and Avaya Aura Session Manager R6.3
More informationJaringan Komputer (CCNA-1)
Jaringan Komputer (CCNA-1) #2 Configuring a Network Operating System Susmini I. Lestariningati, M.T Introduction (1) Home networks typically interconnect a wide variety of end devices including PCs, laptops,
More informationCourse 20337B: Enterprise Voice and Online Services with Microsoft Lync Server 2013 Exam Code: Duration:40 Hrs
Course 20337B: Enterprise Voice and Online Services with Microsoft Lync Server 2013 Exam Code: 70-337 Duration:40 Hrs Course Outline Module 1: Voice Architecture This module introduce Enterprise Voice
More informationNEXOF-RA NESSI Open Framework Reference Architecture IST- FP
NEXOF-RA NESSI Open Framework Reference Architecture IST- FP7-216446 Deliverable D7.4 RA Specification Sample Siemens AG HP Engineering Thales Due date of deliverable: 01/03/2009 Actual submission date:
More information"Charting the Course... MOC A Deploying Voice Workloads for Skype for Business Online and Server Course Summary
Description Course Summary This five-day instructor-led course teaches how to design, plan, and deploy the various voice solutions available with Skype for Business Online and Skype for Business Server
More informationIoT-A: main Architectural Reference Model concepts
IoT-A: main Architectural Reference Model concepts Alessandro Bassi IoT-A Technical Coordinator 1 st iot-forum, Berlin Nov 23rd, 2011 IoT-A Fact Sheet Flagship FP7 IP project,call 5, Objective 1.3 Total
More informationApplication Notes for Unique Communications CAIRS Fault Management with Avaya Aura Communication Manager - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Unique Communications CAIRS Fault Management with Avaya Aura Communication Manager - Issue 1.0 Abstract These Application Notes describe
More informationBT SIP Trunk Configuration Guide
CUCM 9.1 BT SIP Trunk Configuration Guide This document covers service specific configuration required for interoperability with the BT SIP Trunk service. Anything which could be considered as normal CUCM
More informationBCM94309MP Mini-PCI Card. User's Manual
Quanta Computer Inc. BCM94309MP Mini-PCI Card User's Manual Jun. 26, 2003 (Draft 1.0) User manual 1 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted
More informationETSI TR V1.1.1 ( )
TR 101 303 V1.1.1 (2001-06) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); Service and Network Management Framework; Overview and Introduction 2 TR 101
More informationAbstract. _ 1 of 22 2N_VB_SM63_SIP. MC; Reviewed: SPOC 03/25/2014
Avaya Solution & Interoperability Test Lab Application Notes for Configuring 2N VoiceBlue Next 1.17 with Avaya Aura Communication Manager 6.3 Using a SIP Trunk - Issue 1.0 Abstract These Application Notes
More informationPhysical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,
More informationASSIGNMENT- I Topic: Functional Modeling, System Design, Object Design. Submitted by, Roll Numbers:-49-70
ASSIGNMENT- I Topic: Functional Modeling, System Design, Object Design Submitted by, Roll Numbers:-49-70 Functional Models The functional model specifies the results of a computation without specifying
More informationD R A F T ICD 1.8/4.4. Target Acquisition System to Telescope Control System. Bret Goodrich, Eric Hansen. Version: Draft A2. Issued By: Software Group
ICD 1.8/4.4 Target Acquisition System to Telescope Control System Version: Draft A2 Issued By: Software Group Date: 25 June 2013 Bret Goodrich, Eric Hansen Revision Control 1. Revision Version Draft1 Date:
More informationAvaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface
Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable
More informationDeploying Voice Workloads for Skype for Business Online and Server 2015
Deploying Voice Workloads for Skype for Business Online and Server 2015 40409; 5 Days, Instructor-led Course Description This five-day instructor-led course teaches how to design, plan, and deploy the
More informationEUROPEAN ANTI-FRAUD OFFICE
EUROPEAN ANTI-FRAUD OFFICE Anti-Fraud Information System (AFIS) General Information Subject Version / Status Pre-IMS User Manual - General Information 1.0 / Final Release Date 23/12/2008 Document Reference
More informationWhite Paper Subcategory. Overview of XML Communication Technologies
Subcategory Overview of XML Communication Technologies Executive Summary A significant shift has occurred in the communications infrastructures deployed today. This shift is the result of the acceptance
More informationPRIVACY STATEMENT August 2018
PRIVACY STATEMENT August 2018 1 ABOUT GDPR GDPR, or the General Data Protection Regulation is a new set of EU regulations set to come into force, as a replacement to the existing Data Protection Act. It
More informationContract-based design, model checking, and model-based safety assessment
Contract-based design, model checking, and model-based safety assessment An integrated view Alessandro Cimatti Fondazione Bruno Kessler, Trento, Italy Take away message Beyond model checking: new generation
More informationUtilizing Linux Kernel Components in K42 K42 Team modified October 2001
K42 Team modified October 2001 This paper discusses how K42 uses Linux-kernel components to support a wide range of hardware, a full-featured TCP/IP stack and Linux file-systems. An examination of the
More informationEUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA
Ref. Ares(2011)514527-12/05/2011 EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATION SOCIETY AND MEDIA Electronic Communications Policy Implementation of Regulatory Framework (I) Brussels, 6th May 2011
More informationA MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) A MODEL FOR INTERCONNECTION IN IP-BASED NETWORKS Vilnius, October 2005 Page
More informationETSI TS V1.1.1 ( )
TS 101 376-4-1 V1.1.1 (2001-03) Technical Specification GEO-Mobile Radio Interface Specifications; Part 4: Radio interface protocol specifications; Sub-part 1: Mobile Earth Station-Gateway Station System
More informationSemantics-Based Integration of Embedded Systems Models
Semantics-Based Integration of Embedded Systems Models Project András Balogh, OptixWare Research & Development Ltd. n 100021 Outline Embedded systems overview Overview of the GENESYS-INDEXYS approach Current
More informationData and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications
Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks
More informationRKN 2015 Application Layer Short Summary
RKN 2015 Application Layer Short Summary HTTP standard version now: 1.1 (former 1.0 HTTP /2.0 in draft form, already used HTTP Requests Headers and body counterpart: answer Safe methods (requests): GET,
More informationDeploying Voice Workloads for Skype for Business Online and Server
Course Code: M40409 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Deploying Voice Workloads for Skype for Business Online and Server Overview This five-day instructor-led course teaches how to
More informationD7.2 CREATE project leaflet and website
Project acronym: CREATE Project title: Congestion reduction in Europe Achieving Transport Efficiency D7.2 CREATE project leaflet and website Work Package 7 Dissemination, Capacity building, knowledge transfer
More informationUNIVERSITY OF CAGLIARI
UNIVERSITY OF CAGLIARI DIEE - Department of Electrical and Electronic Engineering Infrastrutture ed Applicazioni Avanzate nell Internet NFV ACK: content taken from Foundations of Modern Networking, SDN,
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of ) ) GN Docket No. 09-191 Preserving the Open Internet ) ) Broadband Industry Practices ) WC Docket No. 07-52 COMMENTS
More informationCisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using Traffic Mirroring, Release 4.0.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using Traffic Mirroring, Release 4.0.x 1 Overview 2 Configuring Traffic Mirroring
More informationThis document is a preview generated by EVS
CEN WORKSHOP CWA 16871-1 March 2015 AGREEMENT ICS 33.020 English version Requirements and Recommendations for Assurance in Cloud Security - Part 1: Contributed recommendations from European projects This
More informationCommunication Networks - 3 general areas: data communications, networking, protocols
Communication Networks - Overview CSE 3213 Fall 2011 1 7 September 2011 Course Content 3 general areas: data communications, networking, protocols 1. Data communications: basic concepts of digital communications
More informationCSE3213 Computer Network I
CSE3213 Computer Network I Introduction Course page: http://www.cse.yorku.ca/course/3213 1 Course Contents 3 general areas: data communications, networking, and protocols 1. Data communications: basic
More informationProposed Convention for Numbering of NERC Reliability Standards Draft September 9, 2004
Proposed Convention for ing of NERC Reliability s Draft September 9, 2004 Introduction The Version 0 Drafting Team proposes to initiate a new convention for numbering NERC reliability standards concurrent
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 18000-4 First edition 2004-08-15 Information technology Radio frequency identification for item management Part 4: Parameters for air interface communications at 2,45 GHz
More informationApplication Notes for configuring Unified Dispatch Unibook platform with Avaya IP Office Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for configuring Unified Dispatch Unibook platform with Avaya IP Office 9.1 - Issue 1.0 Abstract These Application Notes describe the configuration
More informationMPEG's Dynamic Adaptive Streaming over HTTP - An Enabling Standard for Internet TV. Thomas Stockhammer Qualcomm Incorporated
MPEG's Dynamic Adaptive Streaming over HTTP - An Enabling Standard for Internet TV Thomas Stockhammer Qualcomm Incorporated ABSTRACT Internet video is experiencing a dramatic growth in both fixed and mobile
More informationIVI. Interchangeable Virtual Instruments. IVI-3.10: Measurement and Stimulus Subsystems (IVI-MSS) Specification. Page 1
IVI Interchangeable Virtual Instruments IVI-3.10: Measurement and Stimulus Subsystems (IVI-MSS) Specification March, 2008 Edition Revision 1.0.1 Page 1 Important Information The IVI Measurement and Stimulus
More informationCisco UCS Director API Integration and Customization Guide, Release 5.4
Cisco UCS Director API Integration and Customization Guide, Release 5.4 First Published: November 03, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationEquitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation
Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012
More informationSecurity Information for SAP Asset Strategy and Performance Management
Master Guide SAP Asset Strategy and Performance Management Document Version: 2.0 2018-03-09 Security Information for SAP Asset Strategy and Performance Management Typographic Conventions Type Style Example
More informationMulticast Audio. .: :. Step by Step Guide. 20 April, Copyright 2016 Prolancer Pty Ltd, Sydney, Australia.
.: www.totalrecallvr.com :. Multicast Audio Step by Step Guide 20 April, 2016 Author(s): Emil Andonov Copyright 2016 Prolancer Pty Ltd, Sydney, Australia. The text of and illustrations in this document
More informationApplication Notes for configuring IP Integration AskMe Snap-In to interoperate with Avaya Breeze TM 3.2 and Avaya Aura Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for configuring IP Integration AskMe Snap-In to interoperate with Avaya Breeze TM 3.2 and Avaya Aura 8.0 - Issue 1.0 Abstract These Application
More informationSupport-EAM. Publishable Executive Summary SIXTH FRAMEWORK PROGRAMME. Project/Contract no. : IST SSA. the 6th Framework Programme
Support-EAM Supporting the creation of an eaccessibility Mark SIXTH FRAMEWORK PROGRAMME Project/Contract no. : IST-2-004754-SSA Project acronym: Project full title: Instrument: Thematic Priority: SUPPORT-
More informationSLHC-PP DELIVERABLE REPORT EU DELIVERABLE: Document identifier: SLHC-PP-D v1.1. End of Month 03 (June 2008) 30/06/2008
SLHC-PP DELIVERABLE REPORT EU DELIVERABLE: 1.2.1 Document identifier: Contractual Date of Delivery to the EC Actual Date of Delivery to the EC End of Month 03 (June 2008) 30/06/2008 Document date: 27/06/2008
More informationSafety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study
Safety Case Composition Using Contracts - Refinements based on Feedback from an Industrial Case Study Jane Fenn and Richard Hawkins BAE SYSTEMS, Brough, UK Phil Williams General Dynamics (United Kingdom)
More informationModeling Requirements, Architectures, Behaviour...
Modeling Requirements, Architectures, Behaviour... The System Modeling Language (SysML) and the SYSMOD modeling approach Budapest University of Technology and Economics Department of Measurement and Information
More informationWebsite Implementation D8.1
Website Implementation D8.1 Project Number: FP6-045389 Deliverable id: D 8.1 Deliverable name: Website Implementation Date: 31 March 2007 COVER AND CONTROL PAGE OF DOCUMENT Project Acronym: Project Full
More informationPriority Communications Workshop Bratislava, Slovakia 23 September 2008
Introduction to Priority Communications Workshop Bratislava, Slovakia 23 September 2008 Karl Rauscher Chair Emeritus, IEEE COMSOC Technical Committee on Communications Quality & Reliability (CQR) Executive
More informationENGINEERING CALCULATIONS IN SCIA DESIGN FORMS A link between 3D CAE software and customised design checks
EUROSTEEL 2014, September 10-12, 2014, Naples, Italy ENGINEERING CALCULATIONS IN SCIA DESIGN FORMS A link between 3D CAE software and customised design checks Zuzana Hekrdlová a, Peter Van Tendeloo b,
More informationDeliverable D7.4 Field Validation Test Report
VIVALDI PROJECT DOCUMENT WORK PACKAGE 7 Deliverable D7.4 Field Validation Test Report Revision 1.2 Project full title: Advancing interactive Broadband satellite access by optimal convergence of session
More informationAVANTUS TRAINING PTE PTE LTD LTD
[MS20337]: Enterprise Voice and Online Services with Microsoft Lync Server 2013 Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Microsoft Lync Server Delivery Method : Instructor-led
More informationEnterprise Voice and Online Services with Microsoft Lync Server 2013
Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course # Exam: Prerequisites Technology: Delivery Method: Length: 20337 70-337 20336 Microsoft Lync Server Instructor-led (classroom)
More informationPublicly PAS Available Version: Specification Date: 19 September 1998
Publicly PAS 0001-3-5 Available Version: 0.0.1 Specification Date: 19 September 1998 Source: TETRAPOL Forum Work Item No: 0001 Key word: TETRAPOL TETRAPOL Specifications; Part 3: Air Interface Protocol;
More informationThis document is a preview generated by EVS
TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CLC/TR 50600-99-3 August 2018 ICS 35.020; 35.110; 35.160 English Version Information technology - Data centre facilities and infrastructures - Part
More informationSpontania Administrators Manual
Spontania Administrators Manual ClearOne 5225 Wiley Post Way Suite 500 Salt Lake City, UT 84116 Telephone 1.800.945.7730 1.801.975.7200 Spontania Support 801-974-3612 TechSales 1.800.705.2103 FAX 1.801.977-0087
More information