ATIS J-STD-102-2011 JOINT ATIS TIA CMAS FEDERAL ALERT GATEWAY TO CMSP GATEWAY INTERFACE TEST SPECIFICATION.pdf
《ATIS J-STD-102-2011 JOINT ATIS TIA CMAS FEDERAL ALERT GATEWAY TO CMSP GATEWAY INTERFACE TEST SPECIFICATION.pdf》由会员分享,可在线阅读,更多相关《ATIS J-STD-102-2011 JOINT ATIS TIA CMAS FEDERAL ALERT GATEWAY TO CMSP GATEWAY INTERFACE TEST SPECIFICATION.pdf(125页珍藏版)》请在麦多课文档分享上搜索。
1、 JOINT STANDARD J-STD-102 JOINT ATIS/TIA CMAS FEDERAL ALERT GATEWAY TO CMSP GATEWAY INTERFACE TEST SPECIFICATION ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and
2、communications industry. More than 200 companies actively formulate standards in ATIS 17 Committees, covering issues including: IPTV, Cloud Services, Energy Efficiency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, Architectural Platform
3、s and Emerging Networks. In addition, numerous Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machine, Networked Car, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American Organizational Partne
4、r for the 3rd Generation Partnership Project (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunications Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). For more information, please visit . The Telecomm
5、unications Industry Association (TIA) is the leading trade association representing the global information and communications technology (ICT) industries through standards development, government affairs, business opportunities, market intelligence, certification and world-wide environmental regulat
6、ory compliance. With support from its 600 members, TIA enhances the business environment for companies involved in telecommunications, broadband, mobile wireless, information technology, networks, cable, satellite, unified communications, emergency communications and the greening of technology. TIA
7、is accredited by ANSI. Notice of Disclaimer October, 2009.1Ref 2 FCC 08-184, Federal Communications Commission Third Report and Order and Further Notice of Proposed Rulemaking In the Matter of The Commercial Mobile Alert System; August 7th, 2008.2Ref 3 Federal Information Processing Standards Public
8、ation 5-2, Codes for the Identification of the States, the District of Columbia and the Outlying Areas of the United States, and Associated Areas; National Institute of Standards and Technology (NIST); May 1987.3Ref 4 IETF RFC 5280 Ref 4, Internet X.509 Public Key Infrastructure Certificate and Cert
9、ificate Revocation List (CRL) Profile; May 2008.4Ref 5 IETF RFC 2560, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol OCSP; June 1999.4Ref 6 IETF RFC 4301, Security Architecture for the Internet Protocol; December 2005.4Ref 7 IETF RFC 4303, IP Encapsulating Security Paylo
10、ad (ESP); December 2005.4Ref 8 IETF RFC 4306, Internet Key Exchange (IKEv2) Protocol; December 2005.4Ref 9 IETF RFC 4718, IKEv2 Clarifications and Implementation Guidelines; October 2006.4Ref 10 IETF RFC 4305, Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ES
11、P) and Authentication Header (AH); December 2005.4Ref 11 IETF RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPSec; September 2003.4Ref 12 IETF RFC 3447, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1; February 2003.41This document is available from
12、 the Alliance for Telecommunications Industry Solutions (ATIS) 2This document is available from the Federal Communications Commission. 3This document is available from the National Institute of Technology and Standards (NIST). 4This document is available from the Internet Engineering Task Force (IET
13、F). J-STD-102 3 Ref 13 IETF RFC 4868, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPSec; May 2007.4Ref 14 IETF RFC 2404, The Use of HMAC-SHA-1-96 within ESP and AH; November 1998.4Ref 15 IETF RFC 2616, Hypertext Transfer Protocol - HTTP/1.1; June 1999.4Ref 16 IETF RFC 1122, Requirements
14、for Internet Hosts Communication Layers; October 1989.4Ref 17 IETF RFC 793, Transmission Control Protocol; September 1981.4Ref 18 IETF STD 5 (RFC 791), Internet Protocol; September 1981.4Ref 19 IETF STD 5 (RFC 792), Internet Control Message Protocol; September 1981.4Ref 20 IETF RFC 2460, Internet Pr
15、otocol, Version 6 (IPv6) Specification; December 1998.4Ref 21 IETF RFC 2464, Transmission of IPv6 Packets over Ethernet Networks; December 1998.4Ref 22 IETF RFC 4291, IP Version 6 Addressing Architecture; February 2006.4Ref 23 IETF RFC 4443, Internet Control Message Protocol (ICMPv6) for the Interne
16、t Protocol Version 6 (IPv6); February 2006.4Ref 24 Federal Information Processing Standards Publication 180-3, Secure Hash Standard; National Institute of Standards and Technology (NIST); October, 2008.33 DEFINITIONS, ACRONYMS, or (b) to such classes of eligible users as to be effectively available
17、to a substantial portion of the public, as specified by regulation by the Federal Communications Commission. 3.1.2 CMSP Gateway: A CMSP administered system, identified by a unique IP address or Fully Qualified Domain Name (FQDN), interfacing to the Federal Alert Gateway and exchanging information pe
18、r this Standard. 3.1.3 CMSP Gateway Group: A CMSP Gateway Group is the set of CMSP Gateways whose IP addresses or Fully Qualified Domain Names are visible to the Federal Alert Gateway across the Reference Point “C” interface. A CMSP Gateway Group will consist of one or two CMSP Gateways. 3.1.4 Analy
19、sis Verification Method: This is a method in which hardware or software designs are compared with known scientific and technical principles, procedures, and practices to estimate the capability of the proposed design to meet the mission and system requirements. 3.1.5 Inspection Verification Method:
20、This method is used to determine compliance without using special laboratory equipment, procedures, or services and consists of a nondestructive static-state examination of hardware, software, and/or technical data and documentation. 3.1.6 Demonstration Verification Method: This is a method in which
21、 qualitative determination of properties is made for a configuration item, including software and/or the use of technical data and J-STD-102 4 documentation. The items being verified are observed, but not quantitatively measured, in a dynamic state. 3.1.7 Test Verification Method: This is a method i
22、n which performance is measured before, during, or after the controlled application of functional and/or environmental stimuli. Quantitative measurements are analyzed to determine the degree of compliance. The process uses standardized laboratory equipment, procedures, and/or services. 3.1.8 Operati
23、onal Testing: Operational testing is the field test, under realistic conditions, of any system or component, for determining that system or components overall effectiveness and suitability for use before field trials or general usage of the system or component. Operational testing provides informati
24、on for the overall assessment of how well a system will provide the desired capability when operated by typical users in the expected environment. 3.2 Acronyms Annex C, Expected CMAC Messages; and Annex D, Expected ACK Messages. This clause is divided into the following test case categories: Federal
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATISJSTD1022011JOINTATISTIACMASFEDERALALERTGATEWAYTOCMSPGATEWAYINTERFACETESTSPECIFICATIONPDF

链接地址:http://www.mydoc123.com/p-541593.html