ANSI SCTE 165-19-2019 pdf download

ANSI SCTE 165-19-2019 pdf download

ANSI SCTE 165-19-2019 pdf download.CMS Subscriber Provisioning Specification
1.1 Purpose of Document
IPCablecom 1.5 service provisioning can be viewed as two distinct operations: Multimedia Terminal Adapter (MTA) provisioning and Call Management Server (CMS) subscriber provisioning. MTA initialization and provisioning is outlined in the IPCablecom MTA Device Provisioning Specification [2]. This document defines the interface used between the CMS and Provisioning Server for the exchange of service provisioning information. It is intended to facilitate interoperability of conforming hardware and software from multiple vendors. The interface employs a Web Service model. Specified in Web Service Description Language (WSDL 1.1), the interface transports XML encoded objects within SOAP 1.1 encoded messages over an HTTP 1.1 transport. This interface is secured via IPSec. The data model transported upon this interface is specifically designed to be extensible, allowing incorporation of as yet undefined IPCablecom features and specific vendor extensions.
3 TERMS AND DEFINITIONS
IPCablecom specifications use the following terms: Access Control Limiting the flow of information from the resources of a system only to authorized persons, programs, processes, or other system resources on a network. Active A service flow is said to be “active” when it is permitted to forward data packets. A service flow must first be admitted before it is active. Admitted A service flow is said to be “admitted” when the CMTS has reserved resources (e.g., bandwidth) for it on the DOCSIS network. Adaptive Timeout Retry with exponential timeout: 1st attempt – 1 sec and the last attempt – 16 secs. A-link A-Links are SS7 links that interconnect STPs and either SSPs or SCPs. ‘A’ stands for “Access.” Asymmetric Key An encryption key or a decryption key used in public key cryptography, where encryption and decryption keys are always distinct. Audio Server An Audio Server plays informational announcements in IPCablecom network. Media announcements are needed for communications that do not complete and to provide enhanced information services to the user. The component parts of Audio Server services are Media Players and Media Player Controllers. Authentication The process of verifying the claimed identity of an entity to another entity. Authenticity The ability to ensure that the given information is without modification or forgery and was in fact produced by the entity that claims to have given the information. Authorization The act of giving access to a service or device if one has permission to have the access. Cipher An algorithm that transforms data between plaintext and ciphertext. Ciphersuite A set which must contain both an encryption algorithm and a message authentication algorithm (e.g., a MAC or an HMAC). In general, it may also contain a key-management algorithm, which does not apply in the context of IPCablecom. Ciphertext The (encrypted) message output from a cryptographic algorithm that is in a format that is unintelligible.
Cleartext The original (unencrypted) state of a message or data. Also called plaintext. Confidentiality A way to ensure that information is not disclosed to anyone other than the intended parties. Information is encrypted to provide confidentiality. Also known as privacy. Cryptanalysis The process of recovering the plaintext of a message or the encryption key without access to the key. Cryptographic algorithm An algorithm used to transfer text between plaintext and ciphertext. Decipherment A procedure applied to ciphertext to translate it into plaintext. Decryption A procedure applied to ciphertext to translate it into plaintext. Decryption key The key in the cryptographic algorithm to translate the ciphertext to plaintext. Digital certificate A binding between an entity’s public key and one or more attributes relating to its identity, also known as a public key certificate. Digital signature A data value generated by a public-key algorithm based on the contents of a block of data and a private key, yielding an individualized cryptographic checksum. Downstream The direction from the head-end toward the subscriber location. Encipherment A method used to translate plaintext into ciphertext. Encryption A method used to translate plaintext into ciphertext. Encryption Key The key used in a cryptographic algorithm to translate the plaintext to ciphertext.ANSI SCTE 165-19-2019 pdf download

Leave a Reply

Your email address will not be published. Required fields are marked *