NGTP in a nutshell. Version /20/2010
|
|
|
- Dortha Cameron
- 10 years ago
- Views:
Transcription
1 NGTP in a nutshell Version /20/2010
2 Table of contents Page 2 1. About NGTP 2. NGTP Basic-Pattern: Components 3. NGTP Basic-Pattern : Communication concept 4. NGTP Basic-Pattern : Interfaces 5. NGTP Basic-Pattern : Message format 6. Flexibility and scalability 7. NGTP examples 8. Getting started 9. Imprint
3 1. About NGTP Page 3 NGTP stands for Next Generation Telematics Patterns NGTP provides distributed offboard architecture patterns for building flexible, scalable and cost efficient telematic backend systems NGTP provides an interface specification for the offboard elements of the architecture on a non-technical, semantic level NGTP is published under a Creative Commons licence NGTP provides a sample protocol implementation The actual Release provides the Basic-Pattern in a building block oriented view
4 General aspects Interface 1 Interface 2 Interface 6 Components & interfaces NGTP Group 1. The NGTP Basic-Pattern Page 4 PSAP Call Center (CC) Other Services Other Services Interface 5 Interface 8 proprietary Telematic Unit (TU) Dispatcher (DSPT) Service Handler (SH) Service Integrator (SI) Interface 3 Interface 4 Interface 7 Provisioning Data Provider (PDP) Customer Data Provider (CDP) Content Provider (CP) Security Logging / Auditing Monitoring
5 2. NGTP Basic-Pattern: Components Page 5 communicates (send & receive) with Telematic Units encodes / decodes dispatcher part of NGTP messages ignores service data part of NGTP messages selects bearer depending on selected use case keeps connection to TU even if bearer changes encodes / decodes service data part of NGTP messages enriches services with additional customer or vehicle information interpetes proprietary or OEM specific information hides OEM specific aspects from the Service Integrator (SI) Public Safety Answering Point (PSAP) handles only emergency calls only responsible for a dedicated region technical connectivity to the SI depends on country specific regulatory requirements provides operator based services, e.g. concierge uses a voice connection to the TU uses some kind of operator GUI provided by the SI communication module of a mobile device communicates with NGTP backend uses the NGTP message format Provides routing information to the DSPT based on service specific input parameters (e.g. customer location, service type etc.). Contains and delivers data about customers, vehicles and services. Provides content based on input parameters (e.g. region, category, ). works service oriented, not technology oriented no knowledge about TU specifics needed works location oriented (implements geographically different service variants with different partners) integrates all partners needed for a certain service (e.g. callcenters, content providers etc.)
6 3. NGTP Basic-Pattern: Communication concept Page 6 all activities of a use case are bundled in a so called NGTP Event, which is identified by a worldwide unique ID (eventid) NGTP distinguishes between triggers and operations: Triggers do only provide the eventid to a component (in case of new or updated events), whereas operations allow to send/retrieve the data of an event all interfaces (except interface 1and 8) work uni-directional via operations These principles enable a stateless communication and reduce implementation complexity enable the receiver of a trigger to decide if and when it wants to retrieve the new information increases backend flexibility regarding scaling
7 4. NGTP Basic-Pattern: Interfaces Page 7 enables the physical communication between backend and TU communicates bi-directional uses the NGTP message format Integrated operations don t care about the content of a message care about the transportation of any information connects a PSAP to the NGTP backend needed for enabling the architecture to establish an ecall handled by a PSAP NGTP doesn t pretend that a PSAP must be connected directly to the backend connect the call center software from the SI with the communication hardware from the CC agents often be realized bi-directional because of big portion of data exchange Delivers routing information from the PDP about the bearer that should be used the component that should be triggered for a given message type Delivers additional information to the SH about the corresponding customer or the corresponding vehicle of an event. access the data of an event (e.g. service data of received messages) perform service activities like termination of an event requests user and vehicle related data for the SI Deliver different types of online and offline content from the CP for sending it to the TU (via the SH and DSPT) or forwarding it to another service provider (e.g. CC).
8 Page 8 4. NGTP Basic-Pattern: Interfaces Example: Excerpt of the interface 2 operations Typical predefined operations from NGTP interfaces (extract) writeeventlog() geteventdata() sendtrigger() send() terminateevent() rerouteevent() Write a note to the event log e.g. for auditing purposes. Retrieve the data of one specific event. Instruct the dispatcher to send a trigger to the vehicle that informs it about available service information from the backend. Instruct the dispatcher to send the given information / service data into the vehicle. Terminate an active event. Change the type of an event e. g. from an ecall to an information call and reroute the voice call (to another Call Centre) according to the new event type.
9 5. NGTP Basic-Pattern: Message format Page 9 A NGTP message contains 5 parts: 1. Message header (processed by the DSPT) 2. Dispatcher data (encoded/decoded by the DSPT) 3. Dispatcher signature 4. Service data = message content (encoded/decoded by the Service Handler) 5. Message signature NGTP specifies: The basic structure of the messages The complete message header The mandatory attributes of the Dispatcher data The placeholder for the security features (e.g. signatures) NGTP does not specify: A fixed set of service types (only examples are given) The service data section itself (only examples are given) The security algorithms to use (only examples are given)
10 Sig NGTPServiceData (encoded) Sig NGTPDispatcherData (encoded) NGTP Message Header NGTP Group 5. NGTP Basic-Pattern: Message format Page 10 Corresponding message part Field size [byte] Field description, examples, possible vaues Field / parameter Mandatory or Optional field Msg-Part Field Byte M/O Short description / example ProtocolVersion 1 M 4 bit major, 4 bit minor SecurityContext 2 M Keys and Security algorithms NGTPHeaderLength 1 M includes the first 5 NGTP MessageHeader bytes and the NGTPDispatcherData part NGTPHeaderEncoding 1 M 0=ASN.1 PER aligned, 1=ASN.1 PER unaligned, 2=ASN.1 XML, 4 bit encoding version ServiceType M NGTP DSPT-Control=0, E-Call=1, VIN / DriveID M 17 characters EventCreationTime M INT seconds since 2000 BackendEventID O EventID only for BE and therefore optional DSPTMessageType M 0=Error, 1=CRQM, 2=UpServiceData,MonitoringRequest=255 MessageCounter M (DownlinkCounter 1, Uplinkcounter 1) DSPT ACK-Required M Boolean StatelessNGTPMessage M Boolean CRQM-Request M Boolean BasicPosition M # (lat,long) NetworkInfo O # MCC, MNC SimInfo O # MCC, MNC HMI-language O INT (0=German, 1=English, 2=French, 3=Chinese ) ICC-ID O # padding at the end with zeros ServiceDataMessageLength M NGTPServiceData + NGTPSignature (1-3 Byte "LengthLength" econding acc. to ITU X 609 for ASN.1 coding, equiv. ISO/IEC :2003); ServiceDataEncoding 4 bit encoding type 0=ASN.1 PER aligned, 1=ASN.1 PER unaligned, 2=ASN.1 XML, 4 bit encoding M version (for example 0x11 = V1.1) ServiceDataProtocolVersion M 8 bit major, 8 bit minor (for example 0x0100 = V1.0) NGTPDispatcherSignature O Signature for NGTPDispatcherData +NGTPMessageHeader NGTP ServiceData var. M NGTPMessageSignature O Signature for the complete NGTPMessage (NGTPMessageHeader + NGTPDispatcherData + NGTPDispatcherSignature + NGTPServiceData) Assembly of a NGTP message
11 6. Flexibility and scalability Page 11 NGTP offers the possibility to Run several (connected) backends in different places Distribute the backend components (e.g. geographically) Use multiple instances of certain components Add or exchange services easily
12 Page NGTP Basic-Pattern: Examples a) Establishing an emergency call (ecall) caption voice & data specific data specific The flow of the voice and/or data call is just one of many possible solutions. The final design depends on several aspects like country specific regulations for ecalls. The shown example has the advantage, that not all possible PSAPs must have an interface to the NGTP backend and the CC can verify if the call is really an emergency call or not. This example only shows the establishing of an ecall, not the handling and the termination.
13 Page NGTP Basic-Pattern: Examples a) Establishing an emergency call (ecall) Step Description Step Description 1 An emergency call was initiated at the mobile device. This could happen automatically e.g. by accident sensors in the car or manually through activation by the driver or another occupant. 2 The telematics unit sends a NGTP message to the Dispatcher and establishes an emergency voice call 7 The SH fetches the new information from the DSPT and decodes them 8 The SH enriches the event data with additional information from the CDP 3 The Dispatcher retrieves the new message, decodes the message header, creates an internal EventID and queries the PDP how to handle the new message. The PDP instructs the Dispatcher to trigger the Call Center 4 The Dispatcher sends a new event trigger with the new eventid to the call center, to inform it about the new emergency call. The call center accepts the call The SH answers the request from the SI (step 6) with the available information The SI answers the request from the CC (step 5) with the available information 5 The CC requests the new / additional information about the event from the SI 6 The SI forwards the request for the new information to the SH 11 The CC handles the additional information. After ensuring that it is a real case of emergency, the CC involves the corresponding PSAP and sends it the MSD (Minimum Set of Data)
14 Page NGTP Basic-Pattern: Examples b) Send Point of interest (POI) to the TU caption Send POI flow Confirmation flow WWW As the ecall example, the data flow of sending a POI and confirming it, is just one of many possible solutions. One question cares about the main event for the confirmation. Should the backend wait for a feedback from the TU or is it enough to receive the POI from the user? Or does the user really need a feedback about the shipment of the POI?
15 Page NGTP Basic-Pattern: Examples b) Send Point of interest (POI) to the TU Step Description (send POI) Step Description (confirm POI shipment) 1 A user selects a POI, e. g. in a web applikation like Google maps, enters a receiver address and orders to post it 2 The SI converts the POI to a common format (optional) and forwards the POI and address to the SH 3 The SH checks if the user has sufficient privileges for sending a POI and fetches the technical address from the CDP 4 The SH encodes the messagedata and instructs the Dispatcher to send the POI to the given technical address 5 The Dispatcher queries the PDP, how the data should be send and creates the corresponding NGTP message 6 The Dispatcher sends the message, according to the information from the PDP, to the TU. 7 The TU confirms the receipt of the message with the POI 8 The Dispatcher sends an event update trigger to the TSP to inform it about a new message status (message sent to TU) 9 The SI requests the new event data from the SH 10 The SH requests the new event data from the Dispatcher and receives the new message status => answering step 9 11 The SI sends the status of sending the POI to the vehicle back to the user
16 8. Getting started Page 16 The following steps are recommended in order to implement an NGTP based telematics platform a) Definition of the business requirements Clarification which services (E-Call, I-Call, RemoteServices ) are to be offered? Definition of the countries where the services should be available (=> are there any regional specific regulatory requirements that must be mentioned?) Which TUs should communicate with the backend? Who is allowed to use a service and what about charging? b) Technical preconditions Which communication channels are used by the TUs (Voice, SMS, IP, HTTP )? Which bearers can be used to trigger the TU s (Voice, SMS, IP )? Are there any requirements concerning hosting (Legal restrictions or existing datacenters)? c) Partnering Which NGTP components are developed by which partners? Which NGTP components are operated/hosted by which partners (in which country)? Which partner cares about the bearers?
17 8. Getting started Page 17 d) Technical specifications and cross-cutting aspects: Bearer selection Selection of NGTP protocol version and encoding Specification of interface technology (webservices, MQS, Corba, RPC, ) for each interface Specification of security mechanisms Specification of common logging and monitoring requirements for the components e) Implementation of the components from left to right (DSPT=> SH => SI ) f) Integration of the components Local tests Comprehensive tests g) Go! h) Evaluate monitoring results
18 Page 18 Imprint NGTP Group members NGTP Group The copyright of the specifications of NGTP as you can find it on the NGTP homepage is handled by the Creative Commons Attribution Share Alike (by-sa) License. To view a copy of this license, visit by NGTP Group
Results for Next Generation 112: Emergency services operational requirements survey
Next Generation 112 Results for Next Generation 112: Emergency services operational requirements survey Title: Results for Next Generation 112: Emergency services operational requirements survey Version:
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
The Telematics Interface with PSAPs. ATX North America - Europe
The Telematics Interface with PSAPs ATX North America - Europe Automakers Served Toyota Safety Connect TM Lexus Enform TM BMW Assist TM Mercedes-Benz Tele Aid TM Peugeot Services Mobiles TM Rolls-Royce
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Volvo On Call. An OEM view on European ecall
Volvo On Call An OEM view on European ecall Volvo On Call Strategy Brake assist BLIS Crumple zones Safety belt SIPS Airbag SAFETY Telematics/ On Call WHIPS DSTC ABS Lane Departure warning Personal Safety
The ecall Program: Overview and Design Considerations
The ecall Program: Overview and Design Considerations Contents Introduction... 3 Program Status... 3 How ecall works... 4 Making ecall work for your business... 5 Important Standards... 6 Functional architecture
Real-World advanced Emergency Call Handling for cars Saving Lives and Reducing Costs. Pierre Lecointe - PSA Peugeot Citroën.
Real-World advanced Emergency Call Handling for cars Saving Lives and Reducing Costs Pierre Lecointe - PSA Peugeot Citroën. Agenda PSA Peugeot Citroën : Corporate presentation PSA Emergency Call System
StoneGate SSL VPN Technical Note 2068. Adding Bundled Certificates
StoneGate SSL VPN Technical Note 2068 Adding Bundled Certificates Table of Contents Introduction................................... page 3 Overview..................................... page 3 Splitting
POSMan Great Solution to Large POS Networks
Název aplikace...best for the best POSMan Great Solution to Large POS Networks th (V 1.1, released on 18. August 2006) Remark: This is a confidential document that might be used by the second party only
Oracle IVR Integrator
Oracle IVR Integrator Concepts and Procedures Release 11i for Windows NT July 2001 Part No. A86103-03 1 Understanding Oracle IVR Integrator This topic group provides overviews of the application and its
PARCA Certified PACS Associate (CPAS) Requirements
PARCA Certified PACS Associate (CPAS) Requirements Copyright notice: Copyright 2005 PACS Administrators in Radiology Certification Association (PARCA). All rights reserved. All rights reserved. This publication
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
TRANSPORT SERVICE. RFID Vehicle Outbound Logistics Management Case Study
TRANSPORT SERVICE RFID Vehicle Outbound Logistics Management Case Study NV TRANSPORT SERVICE NV Transport Service (TS) a subsidiary of Hödlmayr International AG and Autologic Holding plc is the releasing
Zorba Asset Tracking Solution
Asset Tracking Solution State-of-the art fleet management and vehicle tracking solution to increase your productivity. Affordable installation and operating costs Easy to install and operate User friendly
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
Rotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
ODEX Enterprise. Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2
ODEX Enterprise Introduction to ODEX Enterprise 3 for users of ODEX Enterprise 2 Copyright Data Interchange Plc Peterborough, England, 2013. All rights reserved. No part of this document may be disclosed
WHITE PAPER. The PLM Domino Effect. - Jagmeet Singh and Jeff Kavanaugh
WHITE PAPER The PLM Domino Effect - Jagmeet Singh and Jeff Kavanaugh Summary When we were children, we all played dominos. We may have played the formal numeric alignment version, but another variant is
SIP Protocol as a Communication Bus to Control Embedded Devices
229 SIP Protocol as a Communication Bus to Control Embedded Devices Ramunas DZINDZALIETA Institute of Mathematics and Informatics Akademijos str. 4, Vilnius Lithuania [email protected] Abstract.
Glossary of Terms and Definitions
Glossary of Terms and Definitions 911 Governing Authority 911 Governing Authority means a municipality or other state or local government agency, or an authorized agent of one or more municipalities or
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Priority Access to PSAPs. Informational Packet
Priority Access to PSAPs Informational Packet March 7, 2007 General Motors, [GM] and the stylized logo GM; OnStar, and the stylized logo OnStar all rights reserved OnStar Seeking Priority Access to PSAPs
1 Log visualization at CNES (Part II)
1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after
Digital Preservation. OAIS Reference Model
Digital Preservation OAIS Reference Model Stephan Strodl, Andreas Rauber Institut für Softwaretechnik und Interaktive Systeme TU Wien http://www.ifs.tuwien.ac.at/dp Aim OAIS model Understanding the functionality
PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000
PROCEDURE 1310.26 Issued: October 5, 2001 Effective Date: September 14, 2000 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Customer Service Center Functional Standard Executive Branch Departments and
SAP Note 455140 - Configuration of e-mail, fax, paging or SMS using SMTP
Note Language: English Version: 18 Validity: Valid Since 25.10.2010 Summary Symptom How do you configure e-mail, fax, paging or SMS in the SAP Web Application Server using SMTP? Which prerequisites and
Developers Integration Lab (DIL) System Architecture, Version 1.0
Developers Integration Lab (DIL) System Architecture, Version 1.0 11/13/2012 Document Change History Version Date Items Changed Since Previous Version Changed By 0.1 10/01/2011 Outline Laura Edens 0.2
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers
Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers Oxford University Press 2007. All rights reserved. 1 OSI (open systems interconnection)
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
Realizing the Big Data potential - from data to business intelligence
Cloud and the Internet of Things Realizing the Big Data potential - from data to business intelligence Brett Frische RSS m2mair Cloud EMEA May 19, 2015 794 Employees Worldwide 100 Million+ Modules Shipped
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
IEC 61131-3. The Fast Guide to Open Control Software
IEC 61131-3 The Fast Guide to Open Control Software 1 IEC 61131-3 The Fast Guide to Open Control Software Introduction IEC 61131-3 is the first vendor-independent standardized programming language for
From Delphi to the cloud
From Delphi to the cloud Introduction Increasingly data and services hosted in the cloud become accessible by authenticated REST APIs for client applications, be it web clients, mobile clients and thus
Electronic processing of invoice receipts as Managed Services pay-per-use
Transition to e-invoicing Electronic processing of receipts as Managed Services pay-per-use www.seeburger.com Managing the transition to e-invoicing Green lights for e-invoicing With the European directive
COMMISSION RECOMMENDATION. of 8.9.2011
EUROPEAN COMMISSION Brussels, 8.9.2011 C(2011) 6269 final COMMISSION RECOMMENDATION of 8.9.2011 on support for an EU-wide ecall service in electronic communication networks for the transmission of in-vehicle
QUICK GUIDE TO TIE GETTING STARTED WITH TIE FOR INDEPENDENTS
GETTING STARTED WITH TIE FOR INDEPENDENTS CONTENTS 1 WELCOME TO TECHNICAL INFORMATION EXCHANGE... 3 2 INTRODUCTION... 4 2.1 Why do we have TIE?... 4 2.2 How do I get access to TIE?... 4 2.3 How do I log
Suppliers' Information Note. Broadcast Access: 140MBit/s. Service and Interface Description
SIN 473 Issue 2.1 December 2014 Suppliers' Information Note For The BT Network Broadcast Access: 140MBit/s Service and Interface Description Each SIN is the copyright of British Telecommunications plc.
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
ALERT & Cisco CallManager
Micromedia International Technical specification Author : Pierre Chevrier Pages : 28 Company : Micromedia International Date : 26/05/2011 Réf. : ETT_20090618_000001.docx ALERT & Cisco CallManager This
Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: /RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with input
Front-End Performance Testing and Optimization
Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client
ELDIS Software Police and safety
ELDIS Software Police and safety creating safety by technology! 1 Product information ELDIS ELDIS The safety expert in the police environment Increased safety thanks to many years of experience Eurofunk
CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks
CIT 480: Securing Computer Systems Vulnerability Scanning and Exploitation Frameworks Vulnerability Scanners Vulnerability scanners are automated tools that scan hosts and networks for potential vulnerabilities,
MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT
MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT Asmaa Ahmed Hussein 1, Elkhedr Hassan Eibrahim 2, Aziza Asem 1 1 Faculty of Computer Sciences and information systems,
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
IT service Management & Symantec Altiris Integration
IT service Management & Symantec Altiris Integration 2012 version for ITSM Pat Group: Helpdeskadvanced for ITSM en-1.00 It's a scalable software solution, flexible, highly configurable for IT process management
Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION:
Enterprise Architecture For Next Generation Telecommunication Service Providers CONTACT INFORMATION: phone: +1.301.527.1629 fax: +1.301.527.1690 email: [email protected] web: www.hsc.com PROPRIETARY NOTICE
Ministry of Interior. Bulgarian National 112 System. April 28-th, 2010 EENA Operations Committee
Ministry of Interior Bulgarian National 112 System April 28-th, 2010 EENA Operations Committee Legal Framework Bulgarian Government issued a Decree 192/09.08.2007, introducing 112 Emergency System. Decision
Design and Implementation of Production Management Information System for Jiujiang Railway Track Depot
Management Information System for Jiujiang Railway Track Depot 1 Information Technology Center Jiujiang University Jiujiang, Jiangxi, 332005, China E-mail: [email protected] Upon analyzing the actual situation
Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
ACCELERATOR 6.3 ALARMS AND OPERATIONAL MEASUREMENTS
ACCELERATOR 6.3 ALARMS AND OPERATIONAL MEASUREMENTS October 2014 Tango Networks, Inc. phone: +1 469-229-6000 3801 Parkwood Blvd, Suite 500 fax: +1 469-467-9840 Frisco, Texas 75034 USA www.tango-networks.com
ODBC Client Driver Help. 2015 Kepware, Inc.
2015 Kepware, Inc. 2 Table of Contents Table of Contents 2 4 Overview 4 External Dependencies 4 Driver Setup 5 Data Source Settings 5 Data Source Setup 6 Data Source Access Methods 13 Fixed Table 14 Table
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0
Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/
Client/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
etrust Audit irecorder Reference Guide for Microsoft NT Event Log 1.5 SP2
etrust Audit irecorder Reference Guide for Microsoft NT Event Log 1.5 SP2 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s
Load Testing RIA using WebLOAD. Amir Shoval, VP Product Management [email protected]
Load Testing RIA using WebLOAD Amir Shoval, VP Product Management [email protected] Agenda Introduction to performance testing Introduction to WebLOAD Load testing Rich Internet Applications 2 Introduction
State of Idaho Transportations Department Online Insurance Verification System User Guide For Insurance Companies (Version 1.0)
State of Idaho Transportations Department Online Insurance Verification System User Guide For Insurance Companies (Version 1.0) 1 Contents INTRODUCTION... 4 Background... 4 Exemptions... 4 Participation...
B. KTT Web-based File Transfer
B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.
SNMP and Network Management
SNMP and Network Management Nixu Oy Nixu Ltd PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 [email protected] http://www.nixu.fi Contents Network Management MIB naming
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
GSM. Quectel Cellular Engine. HTTP Service AT Commands GSM_HTTP_ATC_V1.2
GSM Cellular Engine HTTP Service AT Commands GSM_HTTP_ATC_V1.2 Document Title HTTP Service AT Commands Version 1.2 Date 2015-04-13 Status Document Control ID Release GSM_HTTP_ATC_V1.2 General Notes offers
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key
HRPD Support for Emergency Services
GPP X.S000-0 Version.0 Date: July 00 HRPD Support for Emergency Services COPYRIGHT GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright
Message exchange with. Finnish Customs
Message exchange with Finnish Customs Introduction to message exchange with Finnish Customs Finnish Customs 3.6.2015 Message Exchange Support Contents Introduction... 3 1 Electronic services of Finnish
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Smart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Enhancing A Software Testing Tool to Validate the Web Services
Enhancing A Software Testing Tool to Validate the Web Services Tanuj Wala 1, Aman Kumar Sharma 2 1 Research Scholar, Department of Computer Science, Himachal Pradesh University Shimla, India 2 Associate
earthnet online The ESA Earth Observation Multi-Mission User Information Services
r bulletin 93 february 1998 earthnet online The ESA Earth Observation Multi-Mission User Information Services G. Landgraf & L. Fusco Remote Sensing Exploitation Department, ESA Directorate of Application
Trace Desktop Workforce / Fleet Management System
Trace Desktop Workforce / Fleet Management System Introduction TRACE is an extension of SD s Geographical Information System (SPACE) which incorporates a range of GPS tracking devices that enable users
Monitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Advanced Networking Voice over IP: RTP/RTCP The transport layer
Advanced Networking Voice over IP: RTP/RTCP The transport layer Renato Lo Cigno Requirements For Real-Time Transmission Need to emulate conventional telephone system Isochronous output timing same with
DocuSign Connect Guide
Information Guide 1 DocuSign Connect Guide 2 Copyright 2003-2014 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign Intellectual
REST web services. Representational State Transfer Author: Nemanja Kojic
REST web services Representational State Transfer Author: Nemanja Kojic What is REST? Representational State Transfer (ReST) Relies on stateless, client-server, cacheable communication protocol It is NOT
Oracle Business Rules Business Whitepaper. An Oracle White Paper September 2005
Oracle Business Rules Business Whitepaper An Oracle White Paper September 2005 NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and
Handling of "Dynamically-Exchanged Session Parameters"
Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com Version 5.0 English Edition 2011 April 1, 2011 Page 1 of 28 Table of Contents 1 Overview... 3 1.1 What are "dynamically-exchanged
ATSC Standard: ATSC Security and Service Protection Standard
ATSC Standard: ATSC Security and Service Protection Standard Doc. A/106 28 September 2015 Advanced Television Systems Committee 1776 K Street, N.W. Washington, D.C. 20006 202-872-9160 1 The Advanced Television
Remote control circuitry via mobile phones and SMS
Remote control circuitry via mobile phones and SMS Gunther Zielosko 1. Introduction In application note No. 56 ( BASIC-Tiger sends text messages, in which we described a BASIC-Tiger sending text messages
What is our purpose?
Who we are? Since 1995 we have become one of the largest suppliers of electronic automotive accessories and telemetry devices in the Baltic States. Baltic Car Equipment is investing extensively into R&D
vcommander will use SSL and session-based authentication to secure REST web services.
vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Support Guide for Codification of Medicines
Support Guide for Codification of Medicines To comply with RDC 54/2013 (Version 2) Support: Introduction... 3 Expected Benefits... 3 Applications... 4 Secondary Packaging:... 4 Identification: GTIN Codification:
Fixes for CrossTec ResQDesk
Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue
An In-vehicle ecall Platform for Efficient Road Safety
An In-vehicle ecall Platform for Efficient Road Safety W. Ait-Cheik-Bihi, A. Chariette, M. Bakhouya, A. Nait-Sidi-Moh, J. Gaber, M. Wack Université de Technologie de Belfort-Montbéliard Rue Thierry Mieg,
IONA Security Platform
IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise
