Network Configuration Independence Mechanism
|
|
- Byron Spencer
- 8 years ago
- Views:
Transcription
1 3GPP TSG SA WG3 Security S3#19 S July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting in Phoenix new work item Security Aspects of Requirement for Network Configurtion Independence ws pproved. This contribution ddresses the Security needs of Configurtion Independence (k Network Hiding). It includes mechnisms needed to route SIP requests nd responses, ensuring tht informtion bout the S-CSCF is not provided to those not uthorized to receive it. A CR to is proposed. 2 Discussion Network Configurtion Independence requirement is stted in TS s follows: It is requirement tht it shll be possible to hide the network topology from other opertors. It shll be possible to restrict the following informtion from being pssed outside of n opertor s network: exct number of S-CSCFs, cpbilities of S-CSCFs, or cpcity of the network. The design for Configurtion Independence hs been discussed in both SA2 nd CN1. The mechnism being studied is to encrypt the S-CSCF ddress in SIP Vi, Record- Route, Route, nd Pth heders t n I-CSCF, nd then decrypt them in hndling the response to the SIP request. Further, the routing informtion given to P-CSCF during Registrtion my contin encrypted informtion, which would be decrypted by n I- CSCF in hndling SIP request. Depending on the opertor s configurtion, the I-CSCF tht encrypts the forementioned heders my or my not be the sme I-CSCF tht needs to decrypt the informtion; ll I- CSCFs of n opertor should hve the bility to decrypt ech other s dt. In the simplest conceivble implementtion, ll I-CSCFs shre key, which is distributed by whtever provisioning mechnisms lredy exist for the purposes of setting up security-relted informtion on the CSCFs. This key could lso be estblished by running ny number of shred-key genertion protocols. This key, which we shll cll Kv, will need to be regenerted periodiclly. When tht hppens, the previous key is lso kept for smll frction of the key lifetime in cse there re still sessions using the old key. With modern lgorithm such s AES, with 128-bit block nd 256-bit key, there is no rel reson to ever rekey during the lifetime of the system, unless, of course, the key gets compromised or otherwise exposed.
2 The informtion to be encrypted is ppended with rndom 128-bit Initiliztion Vector, nd pdded to multiple of 128 bits. The informtion is encrypted nd MAC-protected with block cipher (e.g., AES), in CBC-MAC mode. One of the proposed new modes for AES is one-pss integrity-protection nd encryption mode, nd tht should be used once it is stndrdized by NIST. All this is bse-64 encoded nd trnsmitted s single entry in the heder. This informtion is treted opquely by the other CSCFs. When n I-CSCF receives this opque heder, it decrypts it with the shred key, verifies the integrity, nd reconstructs the heders. The IV shll be rndom number; it cnnot be counter, becuse multiple CSCFs re using the sme key. With rndom vlue nd 128-bit IV, the probbility of two CSCFs picking the sme IV is roughly 2-64, which is more thn dequte. The informtion does not need to be uthenticted, s the thret model does not include mlicious tmpering of its contents; wht is being protected is the identities of ll the CSCFs of the home network. 3 Proposl It is proposed tht SA3 endorse the encryption bsed mechnism s method of implementing the network configurtion independence requirement nd tht LS to be sent to S2 with the following CR to TS
3 CHANGE REQUEST CR xx rev Current version: CR-Form-v3 For HELP on using this form, see bottom of this pge or look t the pop-up text over the symbols. Proposed chnge ffects: (U)SIM ME/UE Rdio Access Network Core Network X Title: Source: Network Configurtion Independence AT&T Wireless Work item code: 1515 Dte: Ctegory: C Relese: REL-5 Use one of the following ctegories: F (essentil correction) A (corresponds to correction in n erlier relese) B (Addition of feture), C (Functionl modifiction of feture) D (Editoril modifiction) Detiled explntions of the bove ctegories cn be found in 3GPP TR Use one of the following releses: 2 (GSM Phse 2) R96 (Relese 1996) R97 (Relese 1997) R98 (Relese 1998) R99 (Relese 1999) REL-4 (Relese 4) REL-5 (Relese 5) Reson for chnge: The mechnism for Network Configurtion Independence ws left open in TS This CR proposes the encryption-bsed method for Network Configurtion Independence, nd contins the necessry chnges to be pplied to the Registrtion flows in TS Summry of chnge: This CR modifies the registrtion flows to reflect the encryption-bsed method for Network Configurtion Independence requirement. Consequences if not pproved: Cluses ffected: nd Other specs Other core specifictions ffected: Test specifictions O&M Specifictions Other comments: How to crete CRs using this form: Comprehensive informtion nd tips bout how to crete CRs cn be found t: Below is brief summry: 1) Fill out the bove form. The symbols bove mrked contin pop-up help informtion bout the field tht they re closest to.
4 2) Obtin the ltest version for the relese of the specifiction to which the chnge is proposed. Use the MS Word "revision mrks" feture (lso known s "trck chnges") when mking the chnges. All 3GPP specifictions cn be downloded from the 3GPP server under ftp:// For the ltest version, look for the directory nme with the ltest dte e.g contins the specifictions resulting from the September 2000 TSG meetings. 3) With "trck chnges" disbled, pste the entire CR form (use CTRL-A to select it) into the specifiction just in front of the cluse contining the first piece of chnged text. Delete those prts of the specifiction which re not relevnt to the chnge request Registrtion informtion flow User not registered The ppliction level registrtion cn be initited fter the registrtion to the ccess is performed, nd fter IP connectivity for the signlling hs been gined from the ccess network. For the purpose of the registrtion informtion flows, the subscriber is considered to be lwys roming. For subscribers roming in their home network, the home network shll perform the role of the visited network elements nd the home network elements. Visited Network Home Network UE P-CSCF I-CSCF HSS S-CSCF 1. Register 2. Register 3. Cx-Query 4. Cx-Query Resp 5. Cx-Select-pull 6. Cx-Select-pull Resp 7. Register 8. Cx-put 9. Cx-put Resp 10. Cx-Pull 11. Cx-Pull Resp OK OK OK Figure 5.1: Registrtion User not registered 1. After the UE hs obtined signlling chnnel through the ccess network, it cn perform the IM registrtion. To do so, the UE sends the Register informtion flow to the proxy (subscriber identity, home networks domin nme). 2. Upon receipt of the register informtion flow, the P-CSCF shll exmine the home domin nme to discover the entry point to the home network (i.e. the I-CSCF). The proxy shll send the Register informtion flow to the I-CSCF (P-CSCFs nme, subscriber identity, visited network contct nme).
5 A nme-ddress resolution mechnism is utilised in order to determine the ddress of the home network from the home domin nme. When the I-CSCF receives the registrtion informtion flow from the proxy, it shll exmine the subscriber identity nd the home domin nme, nd employ the services of nme-ddress resolution mechnism, to determine the HSS ddress to contct. 3. The I-CSCF shll send the Cx-Query informtion flow to the HSS (subscriber identity, visited domin nme). The P-CSCF nme is the contct nme tht the opertor wishes to use for future contct to tht P- CSCF. The HSS shll check whether the user is registered lredy. The HSS shll indicte whether the user is llowed to register in tht visited network ccording to the User subscription nd opertor limittions/restrictions if ny. 4. Cx-Query Resp is sent from the HSS to the I-CSCF. If the checking in HSS ws not successful the Cx-Query Resp shll reject the registrtion ttempt. 5. At this stge, it is ssumed tht the uthentiction of the user hs been completed (lthough it my hve been determined t n erlier point in the informtion flows). The I-CSCF shll send Cx- Select-Pull (subscriber identity) to the HSS to request the informtion relted to the required S- CSCF cpbilities which shll be input into the S-CSCF selection function. 6. The HSS shll send Cx-Select-Pull Resp (required S-CSCF cpbilities) to the I-CSCF. 7. The I-CSCF, using the nme of the S-CSCF, shll determine the ddress of the S-CSCF through nme-ddress resolution mechnism. I-CSCF lso determines the nme of suitble home network contct point, possibly bsed on informtion received from the HSS. The home network contct point my either be the S-CSCF itself, or suitble I-CSCF in cse network configurtion hiding is desired. If n I-CSCF is chosen s the home network contct point, it my be distinct from the I- CSCF tht ppers in this registrtion flow, nd it will be cpble of decrypting the S-CSCF nme from the home contct informtion. I-CSCF shll then send the register informtion flow (P-CSCFs nme, subscriber identity, visited network contct nme, home network contct point in cse network configurtion hiding is desired) to the selected S-CSCF. The home network contct point will be used by the P-CSCF to forwrd session initittion signlling to the home network. 8. The S-CSCF shll send Cx-Put (subscriber identity, S-CSCF nme) to the HSS. The HSS stores the S-CSCF nme for tht subscriber. 9. The HSS shll send Cx-Put Resp to the I-CSCF to cknowledge the sending of Cx-Put. 10. On receipt of the Cx-Put Resp informtion flow, the S-CSCF shll send the Cx-Pull informtion flow (subscriber identity) to the HSS in order to be ble to downlod the relevnt informtion from the subscriber profile to the S-CSCF. The S-CSCF shll store the P-CSCFs nme, s supplied by the visited network. This represents the nme tht the home network forwrds the subsequent terminting session signlling to for the UE. 11. The HSS shll return the informtion flow Cx-Pull Resp (user informtion) to the S-CSCF. The user informtion pssed from the HSS to the S-CSCF shll include one or more nmes/ddresses informtion which cn be used to ccess the pltform(s) used for service control while the user is registered t this S-CSCF. The S-CSCF shll store the informtion for the indicted user. In ddition to the nmes/ddresses informtion, security informtion my lso be sent for use within the S-CSCF. 12. The S-CSCF shll return the 200 OK informtion flow (serving network contct informtion) to the I-CSCF. If n I-CSCF is chosen s the home network contct point, the I-CSCF shll encrypt the S- CSCF ddress in the serving network contct informtion. 13. The I-CSCF shll send informtion flow 200 OK (serving network contct informtion) to the P- CSCF. The I-CSCF shll relese ll registrtion informtion fter sending informtion flow 200 OK.
6 14. The P-CSCF shll store the serving network contct informtion, nd shll send informtion flow 200 OK to the UE Re-Registrtion informtion flow User currently registered Editor s Note: the definition of re-registrtion timers requires further study, however it is noted tht the timers in the UE re shorter thn the registrtion relted timers in the network. Periodic ppliction level re-registrtion is initited by the UE either to refresh n existing registrtion or in response to chnge in the registrtion sttus of the UE. Re-registrtion follows the sme process s defined in subcluse Registrtion Informtion Flow User not registered. Visited Network Home Network UE P-CSCF I-CSCF HSS S-CSCF 1. Register 2. Register 3. Cx-Query 4. Cx-Query Resp 5. Register 6. Cx-put 7. Cx-put Resp 8. Cx-Pull 9. Cx-Pull Resp OK OK OK Figure 5.2: Re-registrtion - user currently registered 1. Prior to expiry of the greed registrtion timer, the UE initites re-registrtion. To re-register, the UE sends new REGISTER request. The UE sends the REGISTER informtion flow to the proxy (subscriber identity, home networks domin nme). 2. Upon receipt of the register informtion flow, the P-CSCF shll exmine the home domin nme to discover the entry point to the home network (i.e. the I-CSCF). The proxy does not use the entry point cched from prior registrtions. The proxy shll send the Register informtion flow to the I- CSCF (P-CSCFs nme, subscriber identity, visited network contct nme). A nme-ddress resolution mechnism is utilised in order to determine the ddress of the home network from the home domin nme. When the I-CSCF receives the registrtion informtion flow from the proxy, it shll exmine the subscriber identity nd the home domin nme, nd employ the services of nme-ddress resolution mechnism, to determine the HSS ddress to contct.
7 3. The I-CSCF shll send the Cx-Query informtion flow to the HSS (subscriber identity, visited domin nme). 4. The HSS shll check whether the user is registered lredy nd return n indiction indicting tht n S-CSCF is ssigned. The Cx-Query Resp (indiction of entry contct point, e.g. S-CSCF) is sent from the HSS to the I-CSCF. 5. At this stge, it is ssumed tht the uthentiction of the user hs been completed (lthough it my hve been determined t n erlier point in the informtion flows). The I-CSCF, using the nme of the S-CSCF, shll determine the ddress of the S-CSCF through nme-ddress resolution mechnism. I-CSCF lso determines the nme of suitble home network contct point, possibly bsed on informtion received from the HSS. The home network contct point my either be the S- CSCF itself, or suitble I-CSCF in cse network configurtion hiding is desired. If n I-CSCF is chosen s the home network contct point, it my be distinct from the I-CSCF tht ppers in this registrtion flow, nd it will be cpble of decrypting the S-CSCF nme from the home contct informtion. I-CSCF shll then send the register informtion flow (P-CSCFs nme, subscriber identity, visited network contct nme, home network contct point in cse network configurtion hiding is desired) to the selected S-CSCF. The home network contct point will be used by the P- CSCF to forwrd session initittion signlling to the home network. 6. The S-CSCF shll send Cx-Put (subscriber identity, S-CSCF nme) to the HSS. The HSS stores the S-CSCF nme for tht subscriber. Note: Optionlly s n optimistion, the S-CSCF cn detect tht this is re-registrtion nd omit the Cx-Put request. 7. The HSS shll send Cx-Put Resp to the S-CSCF to cknowledge the sending of Cx-Put. 8. On receipt of the Cx-Put Resp informtion flow, the S-CSCF shll send the Cx-Pull informtion flow (subscriber identity) to the HSS in order to be ble to downlod the relevnt informtion from the subscriber profile to the S-CSCF. The S-CSCF shll store the P-CSCFs nme, s supplied by the visited network. This represents the nme tht the home network forwrds the subsequent terminting session signlling to for the UE. Note: Optionlly s n optimistion, the S-CSCF cn detect tht this re-registrtion nd omit the Cx-Pull request. 9. The HSS shll return the informtion flow Cx-Pull-Resp (user informtion) to the S-CSCF. The S- CSCF shll store the user informtion for tht indicted user. 10. The S-CSCF shll return the 200 OK informtion flow (serving network contct informtion) to the I-CSCF. If n I-CSCF is chosen s the home network contct point, the I-CSCF shll encrypt the S- CSCF ddress in the serving network contct informtion. 11. The I-CSCF shll send informtion flow 200 OK (serving network contct informtion) to the P- CSCF. The I-CSCF shll relese ll registrtion informtion fter sending informtion flow 200 OK. 12. The P-CSCF shll store the serving network contct informtion, nd shll send informtion flow 200 OK to the UE.
TSG-RAN Meeting #10 RP-000585 Bangkok, Thailand, 6-8 December 2000
TSG-RAN Meeting #10 RP-000585 Bngkok, Thilnd, 6-8 December 2000 Title: Agreed CRs to TS 25.101 Source: TSG RAN WG4 Agend Item:5.4.3 CR Tdoc Num TS number Title Type Sttus Cur Ver New Ver R4-000885 25.101
More informationTSG-RAN Meeting #10 RP-000591 Bangkok, Thailand, 6-8 December 2000
TSG-RAN Meeting #10 RP-000591 Bngkok, Thilnd, 6-8 December 2000 Title: Agreed CRs to TS 25.133 Source: TSG RAN WG4 Agend Item:5.4.3 CR Tdoc Num TS number Title Type Sttus Cur Ver New Ver R4-000805 25.133
More informationCRs to R99 and older releases on Work Item GPRS
3GPP TSG CN Plenry Meeting #10, Bngkok, Thilnd 6 th 8 th December 2000 Tdoc NP-000670 Source: TSG CN WG 1 Title: Agend item: 7.13 Document for: CRs to R99 nd older releses on Work Item GPRS APPROVAL Introduction:
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationTSGS#27(05)0115. Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan
Technical Specification Group Services and System Aspects Meeting #27, 14-17 March 2005,Tokyo, Japan TSGS#27(05)0115 Source: TSG SA WG2 Title: CR(s) to 23.981 Agenda item: 7.2.3 Document for: APPROVAL
More information3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. 3GPP TSG-CN1 Meeting #24 Tdoc N1-021455 Budapest, Hungary, 13. 17.
3GPP TSG CN Plenary Meeting #16 5 th - 7 th June 2002. Marco Island, USA. NP-020155 Title: Liaison Statement on 3GPP Network Domain Name usage for IMS Source: CN1 Agenda item: 5.1 Document for: INFORMATION
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationMorgan Stanley Ad Hoc Reporting Guide
spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationQuick Reference Guide: Reset Password
Quick Reference Guide: Reset Pssword How to reset pssword This Quick Reference Guide shows you how to reset your pssword if you hve forgotten it. There re three wys to reset your SingPss pssword: 1) Online
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationVersion X3450. Version X3510. Features. Release Note Version X3510. Product: 24online Release Number: X3510
Relese Note Version X3510 Version X3510 Product: 24online Relese Number: X3510 Customer Support: For more informtion or support, plese visit us t www.24onlinebilling.com or emil support@24onlinebilling.com
More informationtrademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007
trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More informationArchitecture and Data Flows Reference Guide
Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge
More informationETSI TS 133 203 V5.1.0 (2002-03)
TS 133 203 V5.1.0 (2002-03) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G security; Access security for IP-based services (3GPP TS 33.203 version 5.1.0 Release 5) 1 TS 133
More informationAdvanced SIP Series: SIP and 3GPP Operations
Advanced S Series: S and 3GPP Operations, Award Solutions, Inc Abstract The Session Initiation Protocol has been chosen by the 3GPP for establishing multimedia sessions in UMTS Release 5 (R5) networks.
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationT H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607
More informationWarm-up for Differential Calculus
Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationSection 7-4 Translation of Axes
62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationCHANGE REQUEST. 2 (GSM Phase 2) A (corresponds to a correction in an earlier release) R96 (Release 1996) B (addition of feature),
TSG-CN Meeting #25 Palm Springs, USA. 8 th to 10 th September 2004. Tdoc NP-040427 revision of Tdoc N1-041566 in NP-040380 TSG-CN1 Meeting #35 Sophia Antipolis, France, 16-20 August 2004 Tdoc N1-04xxxx
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationELECTRONIC DEVELOPMENT APPLICATION (EDA) SYSTEM
ELECTRONIC DEVELOPMENT APPLICATION (EDA) SYSTEM OPERATIONS MANUAL Version : 1.7 Lst Updte : 24 th Aug 2005 URBAN REDEVELOPMENT AUTHORITY EDA Opertions mnul Ver 1.6 (01042004) pg 1 Tle of Contents Section
More informationUNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE
UNIVERSITY AND WORK-STUDY EMPLOYERS WEBSITE USER S GUIDE Tble of Contents 1 Home Pge 1 2 Pge 2 3 Your Control Pnel 3 4 Add New Job (Three-Step Form) 4-6 5 Mnging Job Postings (Mnge Job Pge) 7-8 6 Additionl
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationPre-Approval Application
Pre-Approvl Appliction In tody s rel estte mrket, Pre-Approved mortgge provides you the buyer with powerful tool in the home purchse process! Once you hve received your Pre-Approvl, you cn shop for your
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More informationLicense Manager Installation and Setup
The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationQoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification
C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of
More informationHP Application Lifecycle Management
HP Appliction Lifecycle Mngement Softwre Version: 11.00 Tutoril Document Relese Dte: Novemer 2010 Softwre Relese Dte: Novemer 2010 Legl Notices Wrrnty The only wrrnties for HP products nd services re set
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationE-Commerce Comparison
www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationINJURY MANAGEMENT & REHABILITATION
OBJECTIVES To estblish systemtic pproch to injury mngement nd rehbilittion throughout the City immeditely following work relted illness, injury nd disbility. To estblish tht it is the responsibility of
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationETSI TS 132 454 V10.0.0 (2011-04) Technical Specification
TS 132 454 V10.0.0 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Key Performance Indicators (KPI) for the IP Multimedia Subsystem
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More information5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.
5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationNovel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm
Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationAll pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
More informationWireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones
Wireless Wkeups Revisited: Energy Mngement for VoIP over Wi-Fi Smrtphones Yuvrj Agrwl, Rnveer Chndr,AlecWolmn, Prmvir Bhl, Kevin Chin, Rjesh Gupt Microsoft Reserch, Microsoft Corportion, University of
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationUNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510.
UNITED STATES DEPARTMENT OF AGRICULTURE Wshington, D.C. 20250 ACTION BY: All Divisions nd Offices FGIS Directive 2510.1 12-11-73 FEDERAL TORT CLAIMS I PURPOSE This Instruction: A Sets forth the bsic provisions
More informationPrescriptive Program Rebate Application
Prescriptive Progrm Rebte Appliction Check the pproprite progrm box for your rebte. OID Internl Use Only Cooling FSO (Fluid System Optimiztion) Foodservice Equipment Heting Lighting Motors & Drives Customer
More informationPay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details
With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing
More informationTHE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION
KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system
More informationOverview of International Roaming (WORLD WING)
Overses Use Overview of Interntionl Roming (WORLD WING)... 306 Services Aville Overses... 306 Checking efore Using Overses... 307 Mking Clls Overses... 309 Receiving Clls Overses... 312 Setting Network
More informationETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
More informationVersion 001 Summer Review #03 tubman (IBII20142015) 1
Version 001 Summer Reiew #03 tubmn (IBII20142015) 1 This print-out should he 35 questions. Multiple-choice questions my continue on the next column or pge find ll choices before nswering. Concept 20 P03
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationDEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000 CHIEF INFORMATION OFFICER December 9. 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
More informationthe machine and check the components
Quick Setup Guide Strt Here HL-2270DW Before using this mchine for the first time, red this Quick Setup Guide to setup nd instll your mchine. To view the Quick Setup Guide in other lnguges, plese visit
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationMATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationUNLOCKING TECHNOLOGY IVECO
UNLOCKING TECHNOLOGY IVECO IVECO - CONTENTS PPLICTIONS PGE DS136 IVECO 3 DS177 IVECO CN 3 DIGNOSTIC SOCKETS LOCTIONS IVECO 4 GENERL OPERTION 5 6 TIPS & HINTS 15 2 Version: 2.3 July 2011 Copyright 2009
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationSPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationThe Morgan Stanley FTSE Protected Growth Plan. Investor Pack
The Morgn Stnley FTSE Protected Growth Pln Investor Pck The Morgn Stnley FTSE Protected Growth Pln Introduction The current investment environment with its extreme levels of uncertinty nd voltility, mkes
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationParticipation and investment decisions in a retirement plan: the influence of colleagues choices
Journl of Public Economics 85 (2002) 121 148 www.elsevier.com/ locte/ econbse Prticiption nd investment decisions in retirement pln: the influence of collegues choices Esther Duflo,b, *, Emmnuel Sez MIT,
More information