Vulnerability test system for SIP network elements
|
|
- Edgar Nicholson
- 8 years ago
- Views:
Transcription
1 Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic Abstrakt he SIP server, as well as other servers providig services i exposed etwork, ofte becomes the aim of attacks. he article describes a web-based system of vureability ad peetratio tests which was developed as a tool for testig whether the key compoet of the VoIP SIP ifrastructure is adequately safeguarded ad secured agaist the most widespread security threats. he tests represet a group at oce the most used ad effective attacks owadays, they eable to compose the aalysis of security risks ad to poit out the weakesses of the tested system. he paper also icludes the descriptio of applicatios ad algorithms that are used for the tests geeratig. he system is desiged as a modular web applicatio, which eables a access without depedacy o operatig system ad addig ext test modules. At the ed, the results achieved i practical testig are sumarized ad ext fuctios suitable for the future system extesio are proposed. 1 Itroductio Systems desiged to test ad moitor etworks or other compoets are quite wide-spread these days. Examples of the priciple oes are Nessus [1], Retia [2], Sort [3] ad other. he majority of these systems allows for testig the whole etwork ifrastructures ad protocols used for commuicatio betwee compoets. Noe of these solutios, however, eables a complex testig of VoIP ifrastructure ad SIP servers which are the key ad most vulerable compoet of the etwork. he system we developed, uder a workig title SP (SIP Peetratio estig), was desiged as a peetratio tests simulator for SIP servers. Based o the aalysis of itersectios, the perso who iitiated the testig ( the tester ) receives feedback i the form of test results, as well as recommedatios how to mitigate potetial security risks that were discovered. he advatage of this solutio is that the system simulates real attacks from the exteral etwork, i.e. the system does ot eed to be placed i the same etwork as the target compoet DU (Device uder est). his is frequetly oe of prerequisites to be able to use other testig tools. he SP system was desiged ad implemeted primarily to test SIP servers. he system itself was developed as a web applicatio accessible through a stadard web browser ad therefore idepedet o the operatio system s platform. As the solutio was developed as a part of the research itet of the CESNE associatio, this system will also be icorporated ito its etwork ad will be accessible after sigig i usig the SSO (Sigle Sig-O) service - Shibboleth [4]. his should also prevet the system beig used for other tha testig purposes. Oce siged i, the tester eters the required data ito a web form ad chooses tests to be ru. he output of the applicatio oce the tests have bee completed is a report to the tester. his report cotais the results of the tests; ad i case some peetratios were successful it also cotais recommedatios ad measures to mitigate such attacks i the future. Figure 1 illustrates the cocept of the SP system. he followig chapter describes idividual testig methods i detail, their implemetatio, algorithms used ad the impact o the target SIP server. 2 echology Used, Algorithms ad Performace Although the system is primarily desiged for peetratio tests o SIP servers, i reality it ca perform full-scale attacks o a particular compoet ad provide feedback o it to the tester. hus, it is ecessary to esure that the developed system caot be abused by a third party. he system was desiged as a LAMP (Liux, Apache, MySQL, PHP) server [8] ad its complete admiistratio icludig the istallatio is carried out via a web iterface. For reasos stated above, the system will be icorporated ito the CESNE s etwork ad will oly be accessible to authorised persos oce they pass through the autheticatio. Oce the tester fills i the IP adess or domai ame of the cetral SIP server ad the adess to which the test results will be set to. Usig checkboxes, the tester may defie the rage of the modules offered for testig. Idividual modules are described below i detail. 2.1 Scaig ad Moitorig Module I order to be able to carry out a efficiet ad precise attack o a SIP server, the potetial attacker eeds to fid out the most iformatio about a particular compoet. his is why we first developed a Scaig ad Moitorig ( S&M ) module for the SP system, which is used to test the security of the cetral agaist attacks aimed at obtaiig iformatio by meas of commo ad available tools (Figure 2). hese tools iclude for istace Nmap [9] or ever more popular SIPvicious [10]. SP system also uses these testig tools. By meas of these tools, it is possible to obtai a list of listeig ports or a list of user accouts created o the cetral cocered from a usecured server. Where the server is ot secured sufficietly, they ca obtai eve the most importat, that is passwords to idividual accouts. If the tester ticks the 36
2 test to be carried out, the Nmap applicatio is used first to establish ope ports. Give the time requiremets of the [s] test, the testig is Number of accouts E is derived from equatio (2) where E i is the umber of accouts that have bee reviewed by the system but ot defied o the SIP server. E = E + E ) E ( (2) i able 1: Udpflood est ime Duratio with Differet Badwidth ad Number of Geerated Packets by default restricted oly to several most frequetly used ports. Usig the web form, the tester ca set the rage of the tested ports. However the total time set for testig usig Nmap is 1800s (30 miutes). he list of available ports is subsequetly icluded i the asseset report together with recommedatios how to miimise such ports scaig. Aother test which the SP system ca carry out aims at establishig whether SIP server s security allows for obtaiig a list of user accouts. For this purpose, SIPvicious is used. By sedig out OPION ad ACK requests, the applicatio detects what accouts are defied o the SIP server. By default, the system tries the rage of accouts. Agai, the tester may defie ow rage of tested umbers E or import a text file cotaiig strigs of alpha-umeric characters or words E. ime required to check ad create a list of e [s] accouts ca be expressed by equatio (1) where c = is a time costat obtaied by repetitive measuremets o a sample of 1000 potetial accouts o differet target SIP servers. e Figure 1: SIP Peetratio ests System Scheme = E + E ) c ( (1) Figure 2: SP System S&M Module Oce the system has tested security of the SIP server agaist detectig accouts, possibility to detect passwords for idividual accouts is tested. Agai, this testig is carried out by SIPvicious. Usig a pre-defied rage of possible umeric passwords P or a imported text file with alpha-umeric characters or words P, it obtais a list of passwords for idividual accouts. ime requiremets o this test are expressed by the followig equatio (3). Number of Badwidth [Mbps] ad the Attack ime udp [s] Packets P ,12 45,25 22,63 11, ,24 90,50 45,26 22, ,36 135,75 67,89 33, , ,52 45, ,60 226,25 113,15 56, ,72 271,5 135,78 67, ,84 316,75 158,41 79, , ,04 90, ,08 407,25 203,67 101, ,20 452,5 226,3 113,1 p [ E P + P ] c = ) e p ( (3) + + = (4) Now we ca determie the estimated time required to carry out the complete S&M test (4). Usig the module, we ca verify whether the target SIP server is sufficietly secured agaist such scaig ad moitorig attacks. 2.2 Deial of Service Module Oe of the most frequetly occurrig attacks is DoS (Deial of Service). I reality, it cosists of several attacks with the same characteristic feature to lock up or restrict the availability of the attacked service so that it does ot fuctio properly. Several types of DoSs [11] ca be used to achieve this; our system tests the SIP server usig the most frequetly used oe, Flood DoS. he priciple of the attack is to sed a large volume of adjusted or otherwise deformed packets to the target compoet so that it is uable to provide its core services. As a result of the attack, CPU load icreases ad most of the available badwidth is cosumed, resultig i the SIP server beig uable to service regular calls, or oly a miimum amout of them. 37
3 o geerate Flood DoS, the SP system uses two applicatios: udpflood [12] ad iviteflood [12]. Whe usig udpflood, the system geerates UDP packets of 1400 bytes which are directed at SIP default port 5060 of the target SIP server. he tester defies the umber of geerated packets ad the system tests whether the packets arrived at the SIP server ad whether they cause some restrictio of the service availability, see Figure 3. Sice we kow the packet s size ad therefore also the size of the Etheret framework Fs udp, we ca, based o the umber of geerated packets P ad the badwidth provided the test (5). B, determie time w udp [s] required to carry out viteflood, is used for testig, the system geerates INVIE requests at the SIP server which are directed at a existig accout. his method is very successful as most of today s SIP servers require a autheticatio for INVIE requests. able 2 provides a overview of time-cosumig usig iviteflood test ad time-cosumig compariso of these two applicatios o differet umber of geerated packets at a badwidth of 100Mbps is the show o Figure 4. As the INVIE requests geerated by our system do ot cotai ay autheticatio strig, the SIP server returs SIP aswer 407 Proxy Autheticatio Required. With the large volume of icomig requests, the load of SIP server s CPU icreases. he tester ca set the value of a accout i the system maually, or it ca be radomly selected from the previously obtaied list of accouts E. As i the previous case, we ca, based o the umber of geerated packets P ad the badwidth provided B, determie time [s] required to carry out the test (6). w ivite Figure 3: SP System DoS Module = ( Fs P ) / B (5) udp udp w able 2: Iviteflood est ime Duratio with Differet Badwidth ad Number of Geerated Packets Number of Badwidth [Mbps] ad the Attack ime udp [s] Packets P ,2 36,48 18,24 9, ,4 72,96 36,48 18, ,6 109,44 54,72 27, ,8 145,92 72,96 36, ,4 91,2 45, ,2 218,88 109,44 54, ,4 255,36 127,68 63, ,6 291,84 145,92 72, ,8 328,32 164,16 82, ,8 182,4 91,2 able 1 provides a overview of time required usig udpflood test for differet umbers of geerated packets P ad w differet badwidth B.Whe the other applicatio, i- Figure 4: Udpflood ad Iviteflood Applicatios imecosumig Compariso with Differet Numbers of Geerated Packets ad 100 Mbps Badwidth = ( Fs P ) / B (6) ivite ivite w Figure 5: Impact of chage i badwidth o CPU load i case of udpflood attack Figure 5 illustrates the impact of the chage i badwidth o CPU load whe simulatig a udpflood attack. he chart also clearly shows resistace of the two popular ope-source SIP servers, Asterisk PBX [5] ad OpeSIPS [6, 7], to UDP Flood DoS attacks. Both cetrals have bee istalled o the same HW of Dell PowerEdge R510 server to elimiate ay 38
4 potetial differece i computatioal performace. o chage badwidths, we used HW emulator of the Simea etworks. CPU load o idividual cetrals was measured by meas of dstat [13]. he chart shows that OpeSIPS is may times more resistat to UDP DoS attacks tha Asterisk. otal time required to carry out DoS tests is determied as follows (7). + dos udp ivite dos = (7) oday, oe of the most popular attacks o the Iteret is spam. It is estimated that spams accout for 80-90% of total attacks o the Iteret. Security experts predict that Spam over Iteret elephoy (SPI) will be a major threat i the future. he level of aoyace is eve greater tha with classical spam. Out team i CESNE had developed SPIFILE [14] which served as a testig tool while developig security agaist such type of attacks. he SP system uses the core of this applicatio, together with Sipp [15], to simulate a SPI attack o the target SIP server (Figure 7). I the form, the tester defies the value of a SIP accout the called party to which the SPI call will be directed ad the the value ad password to a SIP accout the caller through which the call will be iitiated. Where the tester fails to defie these values, the system automatically assigs a accout ad a appropriate password from the list created while scaig ad moitorig the cetral. Results ad success rate of DoS tests carried out are icluded i the report for the tester. 2.3 Registratio Maipulatio Module Oce the potetial perpetrator obtais iformatio about existig accouts, he ca maipulate these accouts quite easily. he SP system we developed ca also test SIP servers security, i.e. measures agaist maipulatig the registratio, see Figure 6. Figure 6: SP System RM Module o carry out this test, the system uses reghijacker [12] which substitutes the legitimate accout registratio with a fake, o-existig oe. his type of attack ca easily be expaded to a so called MIM, Ma-i-the-Middle [11]. I this attack, a o-existet user is substituted by a SIP registratio ad all icomig sigallig ad media to the legitimate registratio will be re-directed to the ewly created registratio. I this case, the tester eeds to defie the value of the SIP accout which is to be stole i the system ad where autheticatio of REGISER request is allowed, also a password to this accout. Where the tester fails to defie these values, the system automatically assigs a accout ad its password from the list created while scaig ad moitorig the cetral. ime required to carry out the test is isigificat compared to operatioal times of other modules. 2.4 SPI Module rm Figure 7: SP System SPI Module If the attack was successful, a SIP call is iitiated from the caller s accout, ad the ed device with the registered accout of the called party starts rigig. Oce the call is aswered, a pre-recorded message is played ad the call termiated. ime required to carry out the test is determied by the legth of the pre-recorded message. he fial report o peetratio tests which the tester receives via , will, besides iformatio o all previous tests, also cotai a aalysis ad success rate of the SPI module s test. Figure 8: Divisio of the SP system ito idividual modules Figure 8 illustrates the divisio of the SP system ito idividual modules ad shows time itervals ecessary to carry out idividual tests i respective modules. ime requiremets of the whole SP system ca be expressed by equatio (8). Its value depeds o may factors ad ca radically chage i accordace with the type of tests requested by the tester. Its value is for referece oly spt = (8) dos rm spit spit 39
5 3 estig ad Coutermeasures Although the SP system is still i the phase of itesive testig ad developmet, basic operatioal tests of all available modules were carried out. Each test is accompaied by a short descriptio of coutermeasure s priciples ad methods [12] which should limit or completely mitigate potetial security gaps that were revealed durig SIP server s testig. from a attack. I this case, there is recommeded to divide the ifrastructure ito idividual VLANs so that the detectio for itruder was as difficult as possible. 3.2 Deial of Service Module estig ad Coutermeasures Usig udpflood, the tester set UDP packets directly to port Badwidth was set to 100Mbit/s, Asterisk processed 90% calls. Oce the test was completed, Asterisk recovered to a full operatio mode. o be able to compare, we substituted Asterisk by OpeSIPS i this test. Call processig uder the same attack was etirely error-free. Whe testig usig iviteflood o the accout 7001, we foud out that this attack is much more destructive i terms of computatioal power. As early as at INVIE request whe ivite 9s, CPU load for both Asterisk ad OpeSIPS reached 100% ad failed to process a sigle icomig or outgoig call. Oce the test was completed, both cetrals recovered to a full operatio mode (Figure 10b). Figure 9: SIP Peetratio ests System estbed Figure 9 describes the basic testig topology. he system rus at IP adess , IP adess of Asterisk (VoIP PBX) is Asterisk was istalled at Dell PowerEdge R510 server. 3.1 Scaig ad Moitorig Module estig ad Coutermeasures he first step was to record SIP server s IP adess ad the e- mail adess to sed the fial report to. Next, the S&M module ad subsequetly Nmap ad SIPvicious applicatios were lauched. Values for Nmap were set by default, value of E for SIPvicious was set to rage betwee he device foud all three registered accouts E ad listed ope CP ad UDP ports at Asterisk. Oce P was set to ad a text file P cotaiig test ad 7003ab strig, the test to obtai passwords to idividual accouts was also successful (Figure 10a). otal time icurred o testig module 235s. If we had to protect ad prevet SIP server from scaig ad moitorig, the a implemetatio of firewall is the effective solutio or a itrusio detectio system that is able to distiguish scaig ad moitorig. he ext effective solutio is to divide the etwork logical ifrastructure ito VLANs ad decompose the provided services ito more physical servers (FP, HP servers). he prevetio of accouts ad passwords detectio is difficult, moreover, the tools for detectio apply the stadard SIP methods ad is ot trivial to distiguish legitimate behaviour Figure 10: SIP Peetratio ests System estbed. a) Scaig ad Moitorig ests, b) DoS ests, c) Registratio Maipulatio ests, d) SPI ests he possibilities, how to protect from Flood DoS attacks, are the followig: to divide the etowork ifrastructure ito separate VLANs, to have i use solely LS, to implemet L2 etwork elemets with DoS detectio or to apply SIP firewall that ca detect DoS attacks ad miimalize their impact. 3.3 Registratio Maipulatio Module estig ad Coutermeasures Whe testig possibility for registratio maipulatio, we etered values of accout 7003 ad its password 7003ab maually ito the system. Oce the test was completed, we established whether the attack was successful. he aim of the attack was to de-register accout 7003 ad to direct all icomig calls to a fake accout which does ot exist. hus, calls were 40
6 termiated as ucoected. he call to 7003 was ot put through, see Figure 10c. he CP protocol is recommeded at trasport level to prevet a registratio hijackig because the maipulatio with CP requires higher complexity. Next optio, how to miimalize this threat, is to use REGISER message autheticatio. We could decrease the registratio iterval, as well, it is quite simple but effective. 3.4 SPI Module estig ad Coutermeasures As stated above, we used SPIFILE applicatio, developed by this paper s authors, to test the cetral s vulerability to SPI attacks. he tester etered maually ito the system the value of a accout 7002 o which a SPI attack was to be iitiated, as well as the value of a accout 7003 ad password to it (7003ab) which was supposed to iitiate the SPI call. Oce the test was lauched, SPIFILE registered o the participat 7003 ad the started to geerate a call to accout he ed device registered o 7002 bega rigig, ad oce the call was aswered, a recordig with a advertisemet was played (Figure 10d). A few methods exist how to restrict the SPI propagatio, which are more or less efficiet, but their combiatio brig quit strog protectio agaist the type of attack. Amog these methods the utilizatio of the various automatically or maually editable lists belog, o their base the call is permitted or prohibited, evetually a iteractio with voice meu ca be the effective protectio agaist call bots. Authors developed ow solutio ANISPI [14] that exploits the specific huma behaviour ad automatically modifies the Blacklist table without participatio of called party, the approach is based o the statistical Blacklist. Refereces [1] R. Rogers, Nessus Network Auditig. Sygress, 2d editio, [2] R. Chocheliski ad I. Baroak, "Private elecommuicatio Network Based o NGN", I 32d Iteratioal Coferece o elecommuicatios ad Sigal Processig, 2009, Duakiliti, HUNGARY, pp [3] J. Bates, C. Gallo, M. Bocci, S. Walker ad. aylor, "Coverged Multimedia Networks", Wiley, 364 p., [4] M. Vozak, Voice over IP. VSB-echical Uiversity of Ostrava: College extbook, 1st. ed., Ostrava, [5] S. Witermezer ad S. Bosch, Practical Asterisk 1.4 ad 1.6: From Begier to Expert. Addiso-Wesley Professioal; 1 editio, [6] F. Gocalves, "Buildig elephoy Systems with OpeSIPS 1.6", Packt Publishig, 274p., [7] D. Sisalem, J. Floroiu, J. Kutha, U. Abed ad H. Schulzrie, SIP Security, Wiley, 350p., [8] J. Lee ad B. Ware, Ope Source Developmet with LAMP: Usig Liux, Apache, MySQL, Perl, ad PHP, Addiso-Wesley Professioal, [9] G.F. Lyo, Nmap Network Scaig: he Official Nmap Project Guide to Network Discovery ad Security Scaig. Nmap Project, [10] M. Vozak ad J. Rozho, SIP Ifrastructure Performace estig, I 9th Iteratioal Coferece o elecommuicatios a Iformatics, Cataia, Italy, 2010, pp [11] F. Rezac, M. Vozak ad J. Ruzicka, "Security Risks i IP elephoy", I CESNE Coferece 2008, 2008, Prague, pp [12] D. Edler ad M. Collier, Hackig Exposed VoIP: VoIP Security Secrets ad Solutios. McGraw-Hill Compaies, [13] I. Pravda ad J. Voazka, Voice quality plaig for NGN icludig mobile etworks, 12th Iteratioal Coferece o Persoal Wireless Commuicatios (PWC 2007), 2007, Prague. [14] M. Vozak ad F. Rezac, he implemetatio of SPAM over Iteret telephoy ad defece agaist this attack, preseted at SP 2009: 32d Iteratioal Coferece o elecommuicatios ad Sigal Processig, Duakiliti, HUNGARY, Aug 26-27, 2009, pp Coclusio ad Future Work he aim of the authors was to develop a tool to carry out peetratio tests o SIP servers. he system that was desiged ad implemeted cosists of several modules that are able to geerate selected types of attacks which the authors deem most popular. he system the aalyses to what extet is the target compoet secured, afts assesets cotaiig tests results ad proposes factual recommedatios to esure security agaist the threat cocered. he asseset report is set as a text documet to a . he system is curretly uder itesive testig. It is plaed that i the future, it will be exteded to iclude other testig modules ad fuctios such as for istace testig of the whole VoIP ifrastructure ad heavy testig of idividual compoets. Ackowledgmet his project has bee supported by a research itet Optical Network of Natioal Research ad Its New Applicatios (MŠM ). he report icludes the result achieved by authors i a research activity Multimedia traissios ad collaborative eviromet, 41
SIP Threats Detection System
SIP Threats Detectio System MIROSLAV VOZNAK, FILIP REZAC Departmet of Telecommuicatios VSB Techical Uiversity of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.vozak@vsb.cz, filip.rezac@vsb.cz
More informationSIP Penetration Test System
CESNET Technical Report 10/2010 SIP Penetration Test System FILIP ŘEZÁ, MIROSLAV VOZ ÁK Received 5. 11. 2010 Abstract e SIP server, as well as other servers providing services in exposed network, o en
More informationSIP Penetration Testing in CESNET Best Practice Document
SIP Penetration Testing in CESNET Best Practice Document Produced by CESNET led working group on Multimedia transmissions and collaborative environment (CBPD142) Author: Miroslav Voznak December 2010 TERENA
More informationSECURITY ANALYSIS SYSTEM TO DETECT THREATS ON A SIP VOIP INFRASCTRUCTURE ELEMENTS
SECURITY ANALYSIS SYSTEM TO DETECT THREATS ON A SIP VOIP INFRASCTRUCTURE ELEMENTS Filip REZAC 1, Miroslav VOZNAK 1, Karel TOMALA 1, Jan ROZHON 1, Jiri VYCHODIL 1 1 Department of Telecommunications, Faculty
More information(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
More informationModified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
More informationConfiguring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
More informationAuthentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
More informationDomain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
More informationBaan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
More informationAnalyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
More informationCHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
More informationDomain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues
Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio
More informationDomain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
More informationDomain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
More informationBaanERP. BaanERP Windows Client Installation Guide
BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to
More informationJune 3, 1999. Voice over IP
Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig
More informationSecurity Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
More informationLesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
More informationINVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
More informationYour organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
More informationEngineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
More informationVladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
More information*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
More informationADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
More informationINVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
More informationHCL Dynamic Spiking Protocol
ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7
More informationUnicenter TCPaccess FTP Server
Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes
More informationSYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety
Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety
More informationConfidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
More informationEthernet Option Board
Etheret Optio Board Assembly ad Iitializatio Guide for Addig Etheret Commuicatios to a ADP etime Timeclock Documet Part Number: 470552-00 Documet Revisio: B The iformatio i this documet is subject to chage
More informationclient communication
CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.
More information3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions
3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN
More informationODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
More informationsummary of cover CONTRACT WORKS INSURANCE
1 SUMMARY OF COVER CONTRACT WORKS summary of cover CONTRACT WORKS INSURANCE This documet details the cover we ca provide for our commercial or church policyholders whe udertakig buildig or reovatio works.
More informationCCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
More informationDomain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
More informatione-trader user guide Introduction
User guide e-trader user guide Itroductio At UK Geeral our aim is to provide you with the best possible propositio for you ad your customers. We believe i offerig brokers a choice of how they trade with
More informationOutput Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
More informationAgency Relationship Optimizer
Decideware Developmet Agecy Relatioship Optimizer The Leadig Software Solutio for Cliet-Agecy Relatioship Maagemet supplier performace experts scorecards.deploymet.service decide ware Sa Fracisco Sydey
More informationE-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
More informationDesktop Management. Desktop Management Tools
Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig
More informationHypergeometric Distributions
7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you
More informationElectrostatic solutions for better efficiency
Electrostatic solutios for better efficiecy idustry for egieers, professioals ad techicias i developmet, productio ad istallatio. www.kerste.de/e Electrostatic solutios kerste has bee the leadig supplier
More informationEstimating Probability Distributions by Observing Betting Practices
5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,
More informationComposable Tools For Network Discovery and Security Analysis
Composable Tools For Network Discovery ad Security Aalysis Giovai Viga Fredrik Valeur Jigyu Zhou Richard A. Kemmerer Reliable Software Group Departmet of Computer Sciece Uiversity of Califoria Sata Barbara
More informationIT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user
IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our
More informationMeasures of Spread and Boxplots Discrete Math, Section 9.4
Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,
More informationDetermining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationCase Study. Normal and t Distributions. Density Plot. Normal Distributions
Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca
More informationChair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
More informationTruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology
TruStore: The storage system that grows with you Machie Tools / Power Tools Laser Techology / Electroics Medical Techology Everythig from a sigle source. Cotets Everythig from a sigle source. 2 TruStore
More informationCREATIVE MARKETING PROJECT 2016
CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members
More informationA Secure Implementation of Java Inner Classes
A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio
More informationContactPro Desktop for Multi-Media Contact Center
CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers
More informationDesign and Implementation of a Publication Database for the Vienna University of Technology
Desig ad Implemetatio of a Publicatio Database for the Viea Uiversity of Techology Karl Riedlig Istitute of Idustrial Electroics ad Material Sciece, TU Wie, A-040 Viea karl.riedlig@tuwie.ac.at Abstract:
More informationFPO. A global telecom s strategy. for Canada
FPO A global telecom s strategy for Caada A global telecom s strategy for Caada Global telecommuicatios compaies that support multi-atioal corporatios (MNC) are tasked with providig a cosistet cliet experiece
More informationIntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.
ItelliSOURCE Comverge s eterprise software platform provides the foudatio for deployig itegrated demad maagemet programs. ItelliSOURCE Demad maagemet programs such as demad respose, eergy efficiecy, ad
More informationProfessional Networking
Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market
More informationDAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
More informationOptimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY
Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,
More informationCOMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
More informationPUBLIC RELATIONS PROJECT 2016
PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig
More informationNeolane Reporting. Neolane v6.1
Neolae Reportig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of
More informationDetecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1
Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig
More informationDocument Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
More informationConfidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.
Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).
More informationNeolane Leads. Neolane v6.1
Neolae Leads Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of this
More informationiprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor
iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous
More informationA Balanced Scorecard
A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio
More informationBasic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion
Theory ad Aalog-to-Digital Coversio Itroductio/Defiitios Aalog-to-digital coversio Rate Frequecy Aalysis Basic Measuremet Issues Reliability the extet to which a measuremet procedure yields the same results
More information1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
More informationCCH Accounts Production
CCH Accouts Productio accouts productio facig today s challeges Preparig statutory ad fiacial accouts is a core activity for our practice, as it is for may professioal firms. Although legislatio ad accoutig
More informationRecovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
More informationPENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.
PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.
More informationinsight reporting solutions
reportig solutios Create ad cotrol olie customized score reports to measure studet progress ad to determie ways to improve istructio. isight Customized Reportig empowers you to make data-drive decisios.
More informationAdvanced Protection for Web Services
RealSetry TM SSL overview Advaced Protectio for Web Services SSL Accelerator Itrusio Detectio System Reverse Proxy Applicatio-Firewall Web services deploymet The pricipal reasos which delay the deploymet
More informationCenter, Spread, and Shape in Inference: Claims, Caveats, and Insights
Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the
More informationA guide to School Employees' Well-Being
A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to
More informationSystems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised
More informationPre-Installation Network Planning Forms--S8700 Media Server
Pre-Istallatio Network Plaig Forms--S8700 Media Server S8700 Media Server with a Avaya G600 Media Gateways S8700 Media Server with Avaya MCC1/SCC1 Gateways Before you istall ad cofigure a Avaya media server,
More informationCHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
More informationHow To Solve The Homewor Problem Beautifully
Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log
More informationauction a guide to selling at Residential
Residetial a guide to sellig at auctio Allsop is the market leader for residetial ad commercial auctios i the UK Aually sells up to 700 millio of property at auctio Holds at least seve residetial ad six
More informationTaking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
More informationBio-Plex Manager Software
Multiplex Suspesio Array Bio-Plex Maager Software Extract Kowledge Faster Move Your Research Forward Bio-Rad cotiues to iovate where it matters most. With Bio-Plex Maager 5.0 software, we offer valuable
More informationWindWise Education. 2 nd. T ransforming the Energy of Wind into Powerful Minds. editi. A Curriculum for Grades 6 12
WidWise Educatio T rasformig the Eergy of Wid ito Powerful Mids A Curriculum for Grades 6 12 Notice Except for educatioal use by a idividual teacher i a classroom settig this work may ot be reproduced
More informationA Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design
A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:
More informationIntroducing Rational Suite
Itroducig Ratioal Suite Product Versio Ratioal Suite 2000.02.10 Release Date April 2000 Part Number 800-023314-000 support@ratioal.com http://www.ratioal.com IMPORTANT NOTICE Copyright Notice Copyright
More informationConvention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
More informationInventoryControl. The Complete Inventory Tracking Solution for Small Businesses
IvetoryCotrol The Complete Ivetory Trackig Solutio for Small Busiesses Regular Logo 4C Productivity Solutios for Small Busiesses Logo Outlie Get i cotrol of your ivetory with Wasp Ivetory Cotrol the complete
More informationThe Canadian Council of Professional Engineers
The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig
More informationHypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
More informationoptimise your investment in Microsoft technology. Microsoft Consulting Services from CIBER
optimise your ivestmet i Microsoft techology. Microsoft Cosultig Services from Microsoft Cosultig Services from MICROSOFT CONSULTING SERVICES ca help with ay stage i the lifecycle of adoptig Microsoft
More information5: Introduction to Estimation
5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample
More informationCreating an Agile BI Environment
White Paper Creatig a Agile BI Eviromet The rapidly chagig IT ecoomy has iflueced the Busiess Itelligece (BI) systems to look at iovative ways to be equally fast ad flexible. There is a eed to be more
More informationBaanERP 5.0c. EDI User Guide
BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationMaking training work for your business
Makig traiig work for your busiess Itegratig core skills of laguage, literacy ad umeracy ito geeral workplace traiig makes sese. The iformatio i this pamphlet will help you pla for ad build a successful
More informationni.com/sdr Software Defined Radio
i.com/sdr Software Defied Radio Rapid Prototypig With Software Defied Radio The Natioal Istrumets software defied radio (SDR) platform provides a itegrated hardware ad software solutio for rapidly prototypig
More information