id
stringlengths 7
13
| title
stringlengths 7
396
| type
stringclasses 2
values | version
stringclasses 245
values | url
stringlengths 90
98
| scope
stringlengths 0
83.8k
|
---|---|---|---|---|---|
100 527
|
Digital cellular telecommunications system (Phase 2+) (GSM); Handover procedures (GSM 03.09 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100527/06.00.00_60/ts_100527v060000p.pdf
|
The present document contains a detailed description of the handover procedures to be used in GSM PLMNs. The purpose of the handover procedures, as described in the present document, are to ensure that the connection to the Mobile Station (MS) is maintained as it moves from one Base Station System (BSS) area to another. The present document considers the following two cases: i) Handover between Base Stations connected to the same MSC, this is termed an Intra-MSC handover. ii) Handover between Base Stations connected to different MSCs, this is termed an Inter-MSC handover. This category can be sub-divided into three further procedures: a) the Basic Inter-MSC Handover procedure, where the MS is handed over from a controlling MSC (MSC-A) to another MSC (MSC-B); b) the Subsequent Inter-MSC Handover procedure, where the MS is handed over from MSC-B to a third MSC (MSC-B'); c) the Subsequent Inter-MSC handback, where the MS is handed back from MSC-B to MSC-A. In both cases i) and ii) the same procedures as defined in the GSM 08.08 and the GSM 04.08 shall be used on the A-interface and on the Radio Interface, respectively. In case ii) the handover procedures shall transport the A-interface messages between MSC-A and MSC-B described in the Mobile Application Part (MAP), GSM 09.02. The split in functionality between the BSS and MSC is described in the GSM 08 series of Technical Specifications. The interworking between the GSM 09.02 protocol and the GSM 08.08 protocol is described in the GSM 09.10 Technical Specification. Handovers which take place on the same MSC are termed Intra-MSC handovers; this includes both Inter-BSS and Intra-BSS handovers. The present document also covers the requirements for handover in ongoing voice group calls, directed retry and the handover without a circuit connection between MSC-A and MSC-B. The present document does not consider the case of handovers between radio channels on the same BSS (Intra-BSS handover) or the handover of packet radio services. For voice broadcast calls, the speaker uses normal point-to-point handover procedures, whilst the listeners use idle mode cell reselection procedures, as for the voice group call listeners. Inter-MSC hand-over imposes a few limitations on the system. After inter-MSC hand-over: - call re-establishment is not supported. The list of GSM 08.08 features supported during and after Inter-MSC handover is given in GSM 09.08. In the Inter-MSC handover case, the interworking between a Phase 1 BSSMAP protocol possibly used by one MSC and the Phase 2 BSSMAP protocol used in the Phase 2 MAP protocol on the E-interface is performed by this MSC. NOTE: The message primitive names used in the SDL diagrams and message flows in the present document do not represent the actual messages specified in the GSM 04 and GSM 08 series or the services specified in the GSM 09 series of technical specifications. The primitive names are only intended to be indicative of their use in the present document. ETSI ETSI TS 100 527 V7.0.0 (1999-08) 6 (GSM 03.09 version 7.0.0 Release 1998)
|
100 525
|
Digital cellular telecommunications system (Phase 2+) (GSM); Restoration procedures (GSM 03.07 version 6.2.0 Release 1997)
|
TS
|
6.2.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100525/06.02.00_60/ts_100525v060200p.pdf
|
The data stored in location registers are automatically updated in normal operation; the main information stored in a location register defines the location of each mobile station and the subscriber data required to handle traffic for each mobile subscriber. The loss or corruption of these data will seriously degrade the service offered to mobile subscribers; it is therefore necessary to define procedures to limit the effects of failure of a location register, and to restore the location register data automatically. The present document defines the necessary procedures. The basic principle is that restoration should be based on radio contact to avoid faulty data being spread in the system. Subscriber data for supplementary services must also be correctly restored, although the impact on service of corruption of supplementary service data is less severe. Procedures for supporting these functions are defined in GSM 09.02 and 09.60. The MAP operation "IMSI Attach" is used only in MAP version 1; in MAP version 2 the same function is performed by the MAP operation "Update Location Area". References in this specification to IMSI attach apply only to MAP version 1 network entities. If the restoration of subscriber data in the VLR is triggered by Location Updating or IMSI Attach, the VLR retrieves subscriber data from the HLR by sending an "Update Location" request, which triggers one or more "Insert Subscriber Data" operations from the HLR. The "Update Location" request may also be used to send the LMSI to the HLR. If the restoration of subscriber data in the VLR is triggered by a "Provide Roaming Number" request, the behaviour of the VLR depends on whether it is implemented according to MAP version 1 or MAP version 2. For MAP version 2, the VLR retrieves subscriber data from the HLR by sending a "Restore Data" request, which triggers one or more "Insert Subscriber Data" operations from the HLR. The "Restore Data" request is also used to send the LMSI to the HLR. For MAP version 1, the VLR retrieves subscriber data from the HLR by sending a "Send Parameters" request with parameter type "Subscriber Data", which cannot be used to send the LMSI to the HLR. The VLR number and MSC number in the subscriber data in the HLR are updated by the "Update Location" procedure. The GGSN (Gateway GPRS Support Node) is the point of PDN interconnection with the GSM PLMN supporting GPRS. The GGSN contains routing information for GPRS users with a PDP context active. The necessary procedures needed to restore GGSN data information after a restart are described in this document. The SGSN (Serving GPRS Support Node) is the node that is serving the MS. The SGSN stores information regarding e.g. mobility management, routing and security. The necessary procedures needed to restore this SGSN information after a restart are described in this document. A Type A LMU (Location Measurement Unit) is a network node, accessed over the GSM air interface, that is functionally similar to an MS. All requirements associated with a non-GPRS MS in this specification apply also to a Type A LMU except where specified otherwise.
|
100 517
|
Digital cellular telecommunications system (Phase 2+) (GSM); MultiParty (MPTY) Supplementary Services - Stage 1 (GSM 02.84 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100517/07.00.00_60/ts_100517v070000p.pdf
|
The present document describes the Supplementary Services belonging to the group MultiParty Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in GSM 02.04. The group of Supplementary Services MultiParty Supplementary Services consists of one Supplementary Service: - MultiParty service (Clause 1).
|
100 522
|
Digital cellular telecommunications system (Phase 2+) (GSM); Network architecture (GSM 03.02 version 6.1.0 - Release 1997)
|
TS
|
6.1.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100522/06.01.00_60/ts_100522v060100p.pdf
|
The purpose of the present document is to present the possible architectures of the mobile system. Clause 3 of this specification contains a definition of the different functional entities needed to support the mobile service. In clause 4, the configuration of a PLMN is described as well as the organisation of the functional entities; the configuration presented is the most general in order to cope with all the possible implementations which can be imagined in the different countries. To illustrate that purpose, some examples of possible configurations are presented. Clause 5 of this specification contains a brief description of the interfaces involved which shows the principle of the organisation considered.
|
100 521
|
Digital cellular telecommunications system (Phase 2+) (GSM); Network functions (GSM 03.01 version 6.1.0 Release 1997)
|
TS
|
6.1.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100521/06.01.00_60/ts_100521v060100p.pdf
|
The present document defines network functions which are necessary to support services and facilities provided by PLMNs. A summary of the network functions is given in Table 1, where also an indication is given whether the network must support the function. The table also indicates whether or not a function requires internetworking signalling between PLMNs (i.e. use of Mobile Application Part, Technical Specification GSM 09.02). All functions require signalling on the radio path as specified in Technical Specification GSM 04.08.
|
100 520
|
Digital cellular telecommunications system (Phase 2+) (GSM); Call Barring (CB) Supplementary Services - Stage 1 (GSM 02.88 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100520/06.00.00_60/ts_100520v060000p.pdf
|
The present document describes the supplementary services belonging to the group Call Restriction Supplementary Services. The general aspects - including definitions and recommended provision - of the description of the GSM supplementary services are given in GSM 02.04. The Call Restriction supplementary services allow the possibility for a mobile subscriber to have barring of certain categories of outgoing or incoming calls at the mobile subscribers access. The group of Call Restriction Services includes two supplementary services: - barring of outgoing calls; - barring of incoming calls. By use of subscription options, the mobile subscriber can at provision time select a set of one or more barring programs to determine the categories of calls to be barred. The following categories are defined: - all outgoing calls; - outgoing international calls; - outgoing international calls except those directed to the home PLMN country; - all incoming calls; - incoming calls when roaming outside the home PLMN country. NOTE 1: Each category (barring program) is handled as a single supplementary service. NOTE 2: The call barring program "incoming calls when roaming outside the home PLMN country" is only relevant if as a general rule the called mobile subscriber pays the charges for the forwarded part of the call from his home PLMN country to any other country. The barring services can be offered to a mobile subscriber with a password option allowing the activation and deactivation by the subscriber. One password per mobile subscriber is supported by the network for all barring services. For the definition of the password, the description of its use and its management, see GSM 02.04
|
100 525
|
Digital cellular telecommunications system (Phase 2+) (GSM); Restoration procedures (GSM 03.07 version 7.1.0 Release 1998)
|
TS
|
7.1.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100525/07.01.00_60/ts_100525v070100p.pdf
|
The data stored in location registers are automatically updated in normal operation; the main information stored in a location register defines the location of each mobile station and the subscriber data required to handle traffic for each mobile subscriber. The loss or corruption of these data will seriously degrade the service offered to mobile subscribers; it is therefore necessary to define procedures to limit the effects of failure of a location register, and to restore the location register data automatically. The present document defines the necessary procedures. The basic principle is that restoration should be based on radio contact to avoid faulty data being spread in the system. Subscriber data for supplementary services must also be correctly restored, although the impact on service of corruption of supplementary service data is less severe. Procedures for supporting these functions are defined in GSM 09.02 and 09.60. The MAP operation "IMSI Attach" is used only in MAP version 1; in MAP version 2 the same function is performed by the MAP operation "Update Location Area". References in this specification to IMSI attach apply only to MAP version 1 network entities. If the restoration of subscriber data in the VLR is triggered by Location Updating or IMSI Attach, the VLR retrieves subscriber data from the HLR by sending an "Update Location" request, which triggers one or more "Insert Subscriber Data" operations from the HLR. The "Update Location" request may also be used to send the LMSI to the HLR. If the restoration of subscriber data in the VLR is triggered by a "Provide Roaming Number" request, the behaviour of the VLR depends on whether it is implemented according to MAP version 1 or MAP version 2. For MAP version 2, the VLR retrieves subscriber data from the HLR by sending a "Restore Data" request, which triggers one or more "Insert Subscriber Data" operations from the HLR. The "Restore Data" request is also used to send the LMSI to the HLR. For MAP version 1, the VLR retrieves subscriber data from the HLR by sending a "Send Parameters" request with parameter type "Subscriber Data", which cannot be used to send the LMSI to the HLR. The VLR number and MSC number in the subscriber data in the HLR are updated by the "Update Location" procedure. The GGSN (Gateway GPRS Support Node) is the point of PDN interconnection with the GSM PLMN supporting GPRS. The GGSN contains routing information for GPRS users with a PDP context active. The necessary procedures needed to restore GGSN data information after a restart are described in this document. The SGSN (Serving GPRS Support Node) is the node that is serving the MS. The SGSN stores information regarding e.g. mobility management, routing and security. The necessary procedures needed to restore this SGSN information after a restart are described in this document. A Type A LMU (Location Measurement Unit) is a network node, accessed over the GSM air interface, that is functionally similar to an MS. All requirements associated with a non-GPRS MS in this specification apply also to a Type A LMU except where specified otherwise.
|
100 518
|
Digital cellular telecommunications system (Phase 2+) (GSM); Closed User Group (CUG) Supplementary Services - Stage 1 (GSM 02.85 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100518/07.00.00_60/ts_100518v070000p.pdf
|
The present document describes the Supplementary Services belonging to the group Community Of Interest Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in GSM 02.04. The group of Community Of Interest Supplementary Services includes one Supplementary Service: - Closed user group (clause 1).
|
100 518
|
Digital cellular telecommunications system (Phase 2+) (GSM); Closed User Group (CUG) Supplementary Services - Stage 1 (GSM 02.85 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100518/06.00.00_60/ts_100518v060000p.pdf
|
The present document describes the Supplementary Services belonging to the group Community Of Interest Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in GSM 02.04. The group of Community Of Interest Supplementary Services includes one Supplementary Service: - Closed user group (clause 1).
|
100 517
|
Digital cellular telecommunications system (Phase 2+) (GSM); MultiParty (MPTY) Supplementary Services - Stage 1 (GSM 02.84 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100517/06.00.00_60/ts_100517v060000p.pdf
|
The present document describes the Supplementary Services belonging to the group MultiParty Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in GSM 02.04. The group of Supplementary Services MultiParty Supplementary Services consists of one Supplementary Service: - MultiParty service (Clause 1).
|
100 516
|
Digital cellular telecommunications system (Phase 2+) (GSM); Call Waiting (CW) and Call Holding (HOLD); Supplementary Services - Stage 1 (GSM 02.83 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100516/07.00.00_60/ts_100516v070000p.pdf
|
The present document describes the Supplementary Services belonging to the group Call Completion Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in specification GSM 02.04. The group of Call Completion Supplementary Services is divided into the following two Supplementary Services: - Call waiting (clause 1); - Call hold (clause 2).
|
100 516
|
Digital cellular telecommunications system (Phase 2+) (GSM); Call Waiting (CW) and Call Holding (HOLD); Supplementary Services - Stage 1 (GSM 02.83 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100516/06.00.00_60/ts_100516v060000p.pdf
|
The present document describes the Supplementary Services belonging to the group Call Completion Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in specification GSM 02.04. The group of Call Completion Supplementary Services is divided into the following two Supplementary Services: - Call waiting (clause 1); - Call hold (clause 2).
|
100 520
|
Digital cellular telecommunications system (Phase 2+) (GSM); Call Barring (CB) Supplementary Services - Stage 1 (GSM 02.88 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100520/07.00.00_60/ts_100520v070000p.pdf
|
The present document describes the supplementary services belonging to the group Call Restriction Supplementary Services. The general aspects - including definitions and recommended provision - of the description of the GSM supplementary services are given in GSM 02.04. The Call Restriction supplementary services allow the possibility for a mobile subscriber to have barring of certain categories of outgoing or incoming calls at the mobile subscribers access. The group of Call Restriction Services includes two supplementary services: - barring of outgoing calls; - barring of incoming calls. By use of subscription options, the mobile subscriber can at provision time select a set of one or more barring programs to determine the categories of calls to be barred. The following categories are defined: - all outgoing calls; - outgoing international calls; - outgoing international calls except those directed to the home PLMN country; - all incoming calls; - incoming calls when roaming outside the home PLMN country. NOTE 1: Each category (barring program) is handled as a single supplementary service. NOTE 2: The call barring program "incoming calls when roaming outside the home PLMN country" is only relevant if as a general rule the called mobile subscriber pays the charges for the forwarded part of the call from his home PLMN country to any other country. The barring services can be offered to a mobile subscriber with a password option allowing the activation and deactivation by the subscriber. One password per mobile subscriber is supported by the network for all barring services. For the definition of the password, the description of its use and its management, see GSM 02.04
|
100 519
|
Digital cellular telecommunications system (Phase 2+) (GSM); Advice of Charge (AoC) Supplementary Services - Stage 1 (GSM 02.86 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100519/07.00.00_60/ts_100519v070000p.pdf
|
The present document describes the supplementary services belonging to the group Charging Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM supplementary services are given in GSM 02.04. Charging services are the supplementary services associated with charging aspects. The group of supplementary services Charging Supplementary Services comprises two services: - Advice of Charge (Information) - clause 1; - Advice of Charge (Charging) - clause 2. Advice of Charge (AoC) supplementary services will use the Charge Advice Information described in GSM 02.24. In principle, the same type of Mobile Station (MS) can be used for both services of Advice of Charge (AoC), except where the application demands special features - e.g. the payment mechanism in a payphone. Only one of these services may be subscribed to at any one time.
|
100 519
|
Digital cellular telecommunications system (Phase 2+) (GSM); Advice of Charge (AoC) Supplementary Services - Stage 1 (GSM 02.86 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100519/06.00.00_60/ts_100519v060000p.pdf
|
The present document describes the supplementary services belonging to the group Charging Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM supplementary services are given in GSM 02.04. Charging services are the supplementary services associated with charging aspects. The group of supplementary services Charging Supplementary Services comprises two services: - Advice of Charge (Information) - clause 1; - Advice of Charge (Charging) - clause 2. Advice of Charge (AoC) supplementary services will use the Charge Advice Information described in GSM 02.24. In principle, the same type of Mobile Station (MS) can be used for both services of Advice of Charge (AoC), except where the application demands special features - e.g. the payment mechanism in a payphone. Only one of these services may be subscribed to at any one time.
|
100 524
|
Digital cellular telecommunications system (Phase 2+) (GSM); Signalling requirements relating to routeing of calls to mobile subscribers (GSM 03.04 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100524/06.00.00_60/ts_100524v060000p.pdf
|
When a subscriber wants to call a mobile station (MS), the network needs to know the location of the called MS in order to route the call to the appropriate Mobile services Switching Centre (MSC) - see GSM 03.12 on location registration. The present document describes how the routeing process can be performed, and considers the effect on the routeing process of the capabilities of the exchanges involved. The present document assumes that the Mobile Station ISDN Number includes a specific National Destination Code which identifies the Home PLMN (HPLMN) of the called MS (referred to below as 'the HPLMN'). If the numbering plan for MSs is fully integrated into the fixed network numbering plan, the method of routeing may be different. In the diagrams in clause 6, the originating local exchange is shown as being part of an ISDN. The same routeing principles apply if the originating local exchange is part of a PSTN. Short Messages are routed in the same way as circuit-switched calls; the SMS Gateway MSC must be able to interrogate the HLR of the MS for which the short message is intended, in order to route the short message to the visited MSC.
|
100 513
|
Digital cellular telecommunications system (Phase 2+) (GSM); Operator Determined Barring (ODB) (GSM 02.41 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100513/06.00.00_60/ts_100513v060000p.pdf
|
The present document describes the network feature Operator Determined Barring (ODB). This allows the network operator or service provider to regulate, by means of an exceptional procedure, access by the subscribers to GSM services, by the barring of certain categories of outgoing or incoming calls or of roaming. ODB shall take effect immediately and shall terminate ongoing calls and bar future calls. The purpose of this network feature is to be able to limit the service provider's financial exposure to new subscribers, or to those who have not promptly paid their bills. It may only be applied to the service provider's own subscribers.
|
100 512
|
Digital cellular telecommunications system (Phase 2+) (GSM); Procedure for call progress indications (GSM 02.40 version 7.0.1 Release 1998)
|
TS
|
7.0.1
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100512/07.00.01_60/ts_100512v070001p.pdf
|
The present document defines requirements for call progress and related information to be provided to users of the GSM system.
|
100 512
|
Digital cellular telecommunications system (Phase 2+) (GSM); Procedures for call progress indications (GSM 02.40 version 6.0.0 release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100512/06.00.00_60/ts_100512v060000p.pdf
|
The present document defines requirements for call progress and related information to be provided to users of the GSM system.
|
100 508
|
Digital cellular telecommunications system (Phase 2+) (GSM); International Mobile station Equipment Identities (IMEI) (GSM 02.16 version 7.2.0 Release 1998)
|
TS
|
7.2.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100508/07.02.00_60/ts_100508v070200p.pdf
|
The present document defines the principal purpose and use of International Mobile station Equipment Identities (IMEI). GSM 03.03 describes the technical manner of numbering, addressing and identification.
|
100 515
|
Digital cellular telecommunications system (Phase 2+) (GSM); Call Forwarding (CF) Supplementary Services - Stage 1 (GSM 02.82 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100515/06.00.00_60/ts_100515v060000p.pdf
|
The present document describes the supplementary services belonging to the group CALL OFFERING SUPPLEMENTARY SERVICES. The general aspects, including definitions and recommended provision, of the description of the GSM supplementary services are given in specification GSM 02.04. The group of supplementary services CALL OFFERING SUPPLEMENTARY SERVICES is divided into four different supplementary services: - Call forwarding unconditional (section 1); - Call forwarding on mobile subscriber busy (section 2); - Call forwarding on no reply (section 3); - Call forwarding on mobile subscriber not reachable (section 4). Indication of active Call forwarding supplementary service. An indication that a Call forwarding service is currently active and operative on a number will be given to the forwarding party each time an outgoing call is made. There will be one indication for Unconditional call forwarding and another common indication for the Conditional call forwarding services. Note on the use of the forwarded-to number at registration. If the forwarded-to number is a number in the HPLMN country, it may be entered by the served mobile subscriber in three different formats, independent of her actual location, according to the schemes: 1) National (significant) number. 2) National (trunk) prefix plus national (significant) number. 3) International prefix*, country code, national (significant) number. Scheme 3) Storage of numbers in this format is mandatory for all GSM PLMN operators. If the forwarded-to number is a number in another country than the HPLMN country, it shall be entered by the served mobile subscriber, independent of her actual location, according to the following scheme: - International prefix (NOTE), country code, national (significant) number. NOTE: The MMI for entering of international prefix is defined in GSM 02.30 and 02.07. Principles for interaction with the Barring of Outgoing Calls supplementary services. Numbers allowed to call according to the Barring of Outgoing call service condition are allowed as forwarded-to numbers for the served mobile subscriber. Numbers not allowed to call according to the Barring of Outgoing call service condition are not allowed as forwarded-to numbers for the served mobile subscriber. For Unconditional Call Forwarding the forwarded leg is treated as an outgoing call from the HPLMN country. For the Conditional Call Forwarding services the forwarded leg is treated as an outgoing call from the LPLMN (HPLMN or VPLMN) country. Principles for interaction with the Barring of Incoming Calls supplementary services. When Barring of all incoming calls is active for the served mobile subscriber - no Call forwarding services are allowed for her. When Barring of all incoming calls when roaming outside the HPLMN country is active and operative - i.e. the served mobile subscriber is roaming outside the HPLMN country, the Conditional Call Forwarding services are not allowed. ETSI ETSI TS 100 515 V7.0.1 (1999-07) 8 (GSM 02.82 version 7.0.1 Release 1998)
|
100 514
|
Digital cellular telecommunications system (Phase 2+) (GSM); Line identification Supplementary Services - Stage 1 (GSM 02.81 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100514/07.00.00_60/ts_100514v070000p.pdf
|
The present document describes the Supplementary Services belonging to the group Line Identification Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in GSM 02.04. The group of Line Identification Supplementary Services is divided into the following four Supplementary Services: CLIP - Calling line identification presentation (clause 1); CLIR - Calling line identification restriction (clause 2); COLP - Connected line identification presentation (clause 3); COLR - Connected line identification restriction (clause 4). Definition of line identity: The line identity is made up of a number of information units: - the subscriber's national ISDN/MSISDN number (MSISDN number is the number stored in the VLR); - the country code; - optionally, subaddress information. The GSM PLMN cannot be responsible for the content of this subaddress. (For definition of the subaddress see CCITT Recommendation E.164 [3] subclause 11.2). In a full ISDN environment, the line identity shall include all the address information necessary to unambiguously identify a subscriber. The calling line identity is the line identity of the calling party. The connected line identity is the line identity of the connected party. If for the line identity of the calling party or the connected party additional line identification is received (additional calling party/connected party number) in a GSM PLMN this additional line identification shall be used for the presentation purpose of the line identification presentation services. Definition of Presentation and Screening Indicators: In addition to or instead of the line identity, the network may give a Presentation Indicator (PI) and/or a Screening Indicator (SI) to the served subscriber. The following information may be given: - Presentation Indicator showing: a) presentation allowed, or b) presentation restricted, or c) number not available due to interworking; - Screening Indicator showing: a) user provided, verified and passed, or b) user provided, not screened, or c) network provided. If the line identity is that of a GSM PLMN subscriber, then: the national number and the country code shall always be provided by the network; the subaddress shall only be included if it is provided by the user (or user equipment); the screening indicator shall indicate "network provided". ETSI ETSI TS 100 514 V7.0.0 (1999-08) 7 (GSM 02.81 version 7.0.0 Release 1998)
|
100 514
|
Digital cellular telecommunications system (Phase 2+) (GSM); Line identification Supplementary Services - Stage 1 (GSM 02.81 version 6.0.0 Release 1997)
|
TS
|
6.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100514/06.00.00_60/ts_100514v060000p.pdf
|
The present document describes the Supplementary Services belonging to the group Line Identification Supplementary Services. The general aspects, including definitions and recommended provision, of the description of the GSM Supplementary Services are given in GSM 02.04. The group of Line Identification Supplementary Services is divided into the following four Supplementary Services: CLIP - Calling line identification presentation (clause 1); CLIR - Calling line identification restriction (clause 2); COLP - Connected line identification presentation (clause 3); COLR - Connected line identification restriction (clause 4). Definition of line identity: The line identity is made up of a number of information units: - the subscriber's national ISDN/MSISDN number (MSISDN number is the number stored in the VLR); - the country code; - optionally, subaddress information. The GSM PLMN cannot be responsible for the content of this subaddress. (For definition of the subaddress see CCITT Recommendation E.164 [3] subclause 11.2). In a full ISDN environment, the line identity shall include all the address information necessary to unambiguously identify a subscriber. The calling line identity is the line identity of the calling party. The connected line identity is the line identity of the connected party. If for the line identity of the calling party or the connected party additional line identification is received (additional calling party/connected party number) in a GSM PLMN this additional line identification shall be used for the presentation purpose of the line identification presentation services. Definition of Presentation and Screening Indicators: In addition to or instead of the line identity, the network may give a Presentation Indicator (PI) and/or a Screening Indicator (SI) to the served subscriber. The following information may be given: - Presentation Indicator showing: a) presentation allowed, or b) presentation restricted, or c) number not available due to interworking; - Screening Indicator showing: a) user provided, verified and passed, or b) user provided, not screened, or c) network provided. If the line identity is that of a GSM PLMN subscriber, then: the national number and the country code shall always be provided by the network; the subaddress shall only be included if it is provided by the user (or user equipment); the screening indicator shall indicate "network provided". ETSI ETSI TS 100 514 V7.0.0 (1999-08) 7 (GSM 02.81 version 7.0.0 Release 1998)
|
100 513
|
Digital cellular telecommunications system (Phase 2+) (GSM); Operator Determined Barring (ODB) (GSM 02.41 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100513/07.00.00_60/ts_100513v070000p.pdf
|
The present document describes the network feature Operator Determined Barring (ODB). This allows the network operator or service provider to regulate, by means of an exceptional procedure, access by the subscribers to GSM services, by the barring of certain categories of outgoing or incoming calls or of roaming. ODB shall take effect immediately and shall terminate ongoing calls and bar future calls. The purpose of this network feature is to be able to limit the service provider's financial exposure to new subscribers, or to those who have not promptly paid their bills. It may only be applied to the service provider's own subscribers.
|
100 488
|
Speech and multimedia Transmission Quality (STQ); Telephony for hearing impaired people; Characteristics of telephone sets that provide additional receiving amplification for the benefit of the hearing impaired
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/100400_100499/100488/01.02.01_60/ts_100488v010201p.pdf
|
The present document specifies extra audio amplification & related characteristics of telephony terminals to meet the need of hard-of-hearing people. This revision of ETSI ETS 300 488 [1] takes into account the narrowband and wideband speech, and covers all types of speech terminals. It takes into account the severity of the hearing loss (3 categories) and also includes, the capability to modify the slope of the receiver frequency response in order to improve the intelligibility of speech. NOTE: The present document applies to handset, headphone and Hands-free sets. When headphones are not explicitly indicated, the requirements and test methods defined for handsets apply to each earphone.
|
100 396-6
|
Terrestrial Trunked Radio (TETRA); Direct Mode Operation (DMO); Part 6: Security
|
TS
|
2.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039606/02.01.01_60/ts_10039606v020101p.pdf
|
The present document defines the Terrestrial Trunked Radio system (TETRA) Direct Mode of operation. It specifies the basic Air Interface (AI), the interworking between Direct Mode Groups via Repeaters and interworking with the TETRA Trunked system via Gateways. It also specifies the security aspects in TETRA Direct Mode and the intrinsic services that are supported in addition to the basic bearer and teleservices. The present document describes the security mechanisms in TETRA Direct Mode. It provides mechanisms for confidentiality of control signalling, user speech and data at the AI, using encryption algorithms from two different air interface encryption algorithm sets. It also provided some implicit authentication as a member of a group by knowledge of a shared secret encryption key. The use of AI encryption gives both confidentiality protection against eavesdropping, and some implicit authentication.
|
100 396-4
|
Terrestrial Trunked Radio (TETRA); Technical requirements for Direct Mode Operation (DMO); Part 4: Type 1 repeater air interface
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039604/01.02.01_60/ts_10039604v010201p.pdf
|
The present document defines the Terrestrial Trunked Radio (TETRA) Direct Mode Operation (DMO). It specifies the basic air interface, the inter-working between Direct Mode (DM) groups via repeaters, and inter-working with the TETRA Voice plus Data (V+D) system via gateways. It also specifies the security aspects in TETRA DMO, and the intrinsic services that are supported in addition to the basic bearer and teleservices. This part applies to the TETRA Direct Mode Repeater (DM-REP) air interface and contains the specifications, where applicable, of the physical, data link and network layers according to the ISO model. The specifications contained herein apply to a DM-REP as a stand-alone unit supporting a single call on the air interface (type 1 DM-REP). They also cover the operation of a Direct Mode Mobile Station (DM-MS) with a type 1 DM-REP. NOTE 1: The specifications for a Direct Mode Repeater/Gateway (DM-REP/GATE) combined implementation are provided in ETS 300 396-5 [5], together with the specifications for a Direct Mode Gateway (DM-GATE). NOTE 2: The specifications for a DM-REP as a stand-alone unit supporting two calls on the air interface (type 2 DM-REP) are provided in EN 300 396-7 [7]. The protocol for a DM-MS operating with a type 1 DM-REP is specified in clauses 5 through 8, 10 and 11. Much of this protocol is defined in the form of a "delta document" relative to the specifications provided in ETS 300 396-2 [2] and ETS 300 396-3 [3] for direct MS-MS operation. These clauses define where the protocol in parts 2 and 3 applies without change, or where it applies with the specified amendments, replacements or additions. Where no reference to parts 2 or 3 exists, the subclause should be regarded as independent. The protocol for the DM-REP is specified in clauses 9 and 12. The normative annex mainly specifies the parameter values used in the protocol.
|
100 394-1
|
Terrestrial Trunked Radio (TETRA); Testing specification; Part 1: Radio
|
TS
|
4.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039401/04.01.01_60/ts_10039401v040101p.pdf
|
The present document recommends methods for testing whether TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment achieve the performance specified in ETSI EN 300 392-2 [1]. Specific test methods for DMO equipment are recommended in annex F of the present document. The purpose of these specifications is to provide a sufficient quality of radio transmission and reception for equipment operating in a TETRA system and to minimize harmful interference to other equipment. The present document is applicable to TETRA systems operating at radio frequencies in the range of 137 MHz to 1 GHz. Versions V3.3.1 [i.5] and earlier of the present document specified the methods used for type testing. The minimum technical characteristics of TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment and radio test methods to be used for providing presumption of conformity, are now specified in ETSI EN 303 758 [i.4].
|
100 508
|
Digital cellular telecommunications system (Phase 2+) (GSM); International Mobile station Equipment Identities (IMEI) (GSM 02.16 version 6.2.0 Release 1997)
|
TS
|
6.2.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100508/06.02.00_60/ts_100508v060200p.pdf
|
The present document defines the principal purpose and use of International Mobile station Equipment Identities (IMEI). GSM 03.03 describes the technical manner of numbering, addressing and identification.
|
100 500
|
Digital cellular telecommunications system (Phase 2+); Principles of telecommunication services supported by a GSM Public Land Mobile Network (PLMN) (GSM 02.01 version 8.2.1 Release 1999)
|
TS
|
8.2.1
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100500/08.02.01_60/ts_100500v080201p.pdf
|
The present document coversthe definition of the telecommunication services supported by a GSM PLMN. The purpose of the present document is to provide a method for the characterization and the description of these telecommunication services.
|
100 392-19-2
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 19: Interworking between TETRA and Broadband systems; Sub-part 2: Format for the transport of TETRA speech over mission critical broadband systems
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921902/01.01.01_60/ts_1003921902v010101p.pdf
|
The present document defines a media format for the transport of TETRA air interface circuit mode speech over IP networks at the 20 ms packet delivery rate typically used by broadband networks. The present document does not apply to the transportation of TETRA speech over the TETRA ISI. The transportation of TETRA speech over the TETRA ISI is defined by ETSI TS 100 392-3-8 [1].
|
100 500
|
Digital cellular telecommunications system (Phase 2+) (GSM); Principles of telecommunication services supported by a GSM Public Land Mobile Network (PLMN) (GSM 02.01 version 6.2.0 Release 1997)
|
TS
|
6.2.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100500/06.02.00_60/ts_100500v060200p.pdf
|
The present document coversthe definition of the telecommunication services supported by a GSM PLMN. The purpose of the present document is to provide a method for the characterization and the description of these telecommunication services.
|
100 392-11-8
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 11: Supplementary services stage 2; Sub-part 8: Area Selection (AS)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921108/01.01.01_60/ts_1003921108v010101p.pdf
|
The present document specifies the stage 2 description of the Supplementary Service Area Selection (SS-AS) for the Terrestrial Trunked Radio (TETRA). SS-AS enables a user to select an area where a call will be set up. Man-Machine Interface (MMI) and charging principles are outside of the scope of the present document. Supplementary service specifications are produced in three stages according to the method defined in CCITT Recommendation I.130 [1]. The stage 2 description identifies the functional capabilities and the information flows needed to support the supplementary service as specified in its stage 1 description (see ETS 300 392-10-8 [8]). The stage 2 description is followed by the stage 3 description, which specifies the protocols at the air interface and at the various Inter-System Interfaces (ISI) to support the service. The present document is applicable to TETRA Voice plus Data terminal equipment and networks.
|
100 521
|
Digital cellular telecommunications system (Phase 2+) (GSM); Network functions (GSM 03.01 version 7.0.0 Release 1998)
|
TS
|
7.0.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100521/07.00.00_60/ts_100521v070000p.pdf
|
The present document defines network functions which are necessary to support services and facilities provided by PLMNs. A summary of the network functions is given in Table 1, where also an indication is given whether the network must support the function. The table also indicates whether or not a function requires internetworking signalling between PLMNs (i.e. use of Mobile Application Part, Technical Specification GSM 09.02). All functions require signalling on the radio path as specified in Technical Specification GSM 04.08.
|
100 515
|
Digital cellular telecommunications system (Phase 2+) (GSM); Call Forwarding (CF) Supplementary Services - Stage 1 (GSM 02.82 version 7.0.1 Release 1998)
|
TS
|
7.0.1
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100515/07.00.01_60/ts_100515v070001p.pdf
|
The present document describes the supplementary services belonging to the group CALL OFFERING SUPPLEMENTARY SERVICES. The general aspects, including definitions and recommended provision, of the description of the GSM supplementary services are given in specification GSM 02.04. The group of supplementary services CALL OFFERING SUPPLEMENTARY SERVICES is divided into four different supplementary services: - Call forwarding unconditional (section 1); - Call forwarding on mobile subscriber busy (section 2); - Call forwarding on no reply (section 3); - Call forwarding on mobile subscriber not reachable (section 4). Indication of active Call forwarding supplementary service. An indication that a Call forwarding service is currently active and operative on a number will be given to the forwarding party each time an outgoing call is made. There will be one indication for Unconditional call forwarding and another common indication for the Conditional call forwarding services. Note on the use of the forwarded-to number at registration. If the forwarded-to number is a number in the HPLMN country, it may be entered by the served mobile subscriber in three different formats, independent of her actual location, according to the schemes: 1) National (significant) number. 2) National (trunk) prefix plus national (significant) number. 3) International prefix*, country code, national (significant) number. Scheme 3) Storage of numbers in this format is mandatory for all GSM PLMN operators. If the forwarded-to number is a number in another country than the HPLMN country, it shall be entered by the served mobile subscriber, independent of her actual location, according to the following scheme: - International prefix (NOTE), country code, national (significant) number. NOTE: The MMI for entering of international prefix is defined in GSM 02.30 and 02.07. Principles for interaction with the Barring of Outgoing Calls supplementary services. Numbers allowed to call according to the Barring of Outgoing call service condition are allowed as forwarded-to numbers for the served mobile subscriber. Numbers not allowed to call according to the Barring of Outgoing call service condition are not allowed as forwarded-to numbers for the served mobile subscriber. For Unconditional Call Forwarding the forwarded leg is treated as an outgoing call from the HPLMN country. For the Conditional Call Forwarding services the forwarded leg is treated as an outgoing call from the LPLMN (HPLMN or VPLMN) country. Principles for interaction with the Barring of Incoming Calls supplementary services. When Barring of all incoming calls is active for the served mobile subscriber - no Call forwarding services are allowed for her. When Barring of all incoming calls when roaming outside the HPLMN country is active and operative - i.e. the served mobile subscriber is roaming outside the HPLMN country, the Conditional Call Forwarding services are not allowed. ETSI ETSI TS 100 515 V7.0.1 (1999-07) 8 (GSM 02.82 version 7.0.1 Release 1998)
|
100 392-15
|
<empty>
|
TS
|
1.5.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039215/01.05.01_60/ts_10039215v010501p.pdf
|
The present document defines TETRA frequency bands, duplex spacings and channel numbering for the Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D). The informative annex A gives an example of the radio channel definition.
|
100 392-12-22
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 12: Supplementary services stage 3; Sub-part 22: Dynamic Group Number Assignment (DGNA)
|
TS
|
1.6.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921222/01.06.01_60/ts_1003921222v010601p.pdf
|
The present document defines the stage 3 specifications of the Supplementary Service Dynamic Group Number Assignment (SS-DGNA) for the Terrestrial Trunked Radio (TETRA). The SS-DGNA enables a user to dynamically define group identities and group related parameters to the TETRA system and to the subscribers in the system. These definitions are used to enable group call invocations to dynamically defined groups. The SS-DGNA specification defines the creation, modification, deletion and interrogation of group definitions in the Switching and Management Infrastructure (SwMI), in the Mobile Station (MS). The present document does not include the specification for access priority used for random access in uplink and call priority used by SwMI for resource allocation in a group call. Access priority and call priority can be specified and applied for groups using Supplementary Services Access Priority (SS-AP), Priority Call (SS-PC) and Pre-emptive Priority Call (SS-PPC). Thus, the definition procedure of these priorities is outside the scope of the present document. Man Machine Interface (MMI) and charging principles are also outside the scope of the present document. Supplementary service stage 3 specification is preceded by the stage 1 and the stage 2 specifications of the service. Stage 1 describes the functional capabilities from the user's point of view. Stage 2 defines the functional behaviour in terms of functional entities and information flows. Stage 3 gives the precise description of the supplementary service from the implementation point of view. It defines the protocols for the service and the encoding rules for the information flows. It defines the processes for the functional entities and their behaviour. The described protocols and their behaviour apply for the SwMI and for the MS and can be applied over the Inter-System Interface (ISI) between TETRA systems.
|
100 392-18-4
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) and Direct Mode Operation (DMO); Part 18: Air interface optimized applications; Sub-part 4: Net Assist Protocol 2 (NAP2)
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921804/01.02.01_60/ts_1003921804v010201p.pdf
|
The present document defines Net Assist Protocol 2 that is optimized for TETRA air interface. It defines services: • allowing information to be passed to a location determining entity also called MS (Mobile Station); • allowing a location determining entity to request assistance information to an assistance server. The information passed to the location determining entity by the assistance server, when relevant, reflects the content and format of the equivalent information (navigation data) which passes from satellites to the location determining entity. The protocol is capable of supporting more than one position determining technology. Presently it covers multiple GNSS, and is extensible to all network positioning methods.
|
100 392-12-8
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 12: Supplementary services stage 3; Sub-part 8: Area Selection (AS)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921208/01.01.01_60/ts_1003921208v010101p.pdf
|
The present document defines the stage 3 description of the Supplementary Service Area Selection (SS-AS) for the Terrestrial Trunked Radio (TETRA). SS-AS enables the calling user to establish a call in restricting the area where the participating users in a group call or the connected user in an individual call may be located. Man Machine interface and Charging clauses are outside the scope of the present document. Supplementary service specifications are produced in three stages according to the method described in CCITT Recommendation I.130 [1]. The stage 1 description specifies the service from the user's point of view (see ETS 300 392-10-11 [8]). The stage 2 description identifies the functional capabilities and the information flows needed to support the service as specified in its stage 1 description (see ETS 300 392-11-11 [9]). The present stage 3 description specifies the protocols at the air interface and at the various Inter-System Interfaces (ISI) to support SS-AS. NOTE: According to CCITT Recommendation I.130 [1], the stage 3 description of any telecommunication service addresses the network implementation aspects. Consequently it comprises two steps: the specifications of all protocols at the various reference points involved in any of the service procedures (notably the service operation) are the first step of the stage 3 description, and the specifications of the functions of the corresponding network entities are its second step. The latter have not been provided since they can be derived from the specification of the functional entity actions in the stage 2 description. The present document is applicable to Voice plus Data individual calls or group calls; more specifically to the following entities: - the MS/LS of the calling user in an individual call or a group call; - the originating Switching and Management Infrastructure (SwMI) in an individual call or a group call; - the group home SwMI and the participating SwMIs for a group call; - the terminating SwMI for an individual call; and - optionally, the home SwMI of the group or of the MS/LSs involved, for managing the supplementary service.
|
100 392-18-2
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) and Direct Mode Operation (DMO); Part 18: Air interface optimized applications; Sub-part 2: Net Assist Protocol (NAP)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921802/01.01.01_60/ts_1003921802v010101p.pdf
|
The present document defines Net Assist Protocol that is optimized for TETRA air interface. It defines services: • allowing information to be passed to a location determining entity; • allowing a location determining entity to request assistance information. The information passed to the location determining entity, when relevant, reflects the content and format of the equivalent information (navigation data) which passes from satellites to the location determining entity. The protocol is capable of supporting more than one position determining technology.
|
100 392-9
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 9: General requirements for supplementary services
|
TS
|
1.6.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039209/01.06.01_60/ts_10039209v010601p.pdf
|
The present document is applicable to any TETRA terminal equipment (Mobile Station (MS)) and to any TETRA network (Switching and Management Infrastructure (SwMI)) which support at least one TETRA Supplementary Service (SS). In addition, its routeing requirements of supplementary service information are applicable to any TETRA network with a Voice plus Data (V+D) Inter-System Interface (ISI) to another TETRA network which supports at least one TETRA SS.
|
100 392-7
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 7: Security
|
TS
|
4.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039207/04.01.01_60/ts_10039207v040101p.pdf
|
The present document defines the Terrestrial Trunked Radio system (TETRA) supporting Voice plus Data (V+D). It specifies the air interface, the inter-working between TETRA systems and to other systems via gateways, the terminal equipment interface on the mobile station, the connection of line stations to the infrastructure, the security aspects in TETRA networks, the management services offered to the operator, the performance objectives, and the supplementary services that come in addition to the basic and teleservices. The present part describes the security mechanisms in TETRA V+D. It provides mechanisms for confidentiality of control signalling and user speech and data at the air interface, authentication and key management mechanisms for the air interface and for the Inter-System Interface (ISI). Clause 4 describes the authentication and key management mechanisms for the TETRA air interface. The following authentication services have been specified for the air-interface in ETSI ETR 086-3 [i.3], based on a threat analysis: • authentication of an MS by the TETRA infrastructure; • authentication of the TETRA infrastructure by an MS; • mutual authentication of MS and TETRA infrastructure. The key management mechanisms specified in clause 4 enable the provision of key material for the air interface encryption mechanisms specified in clause 6. Clause 5 describes the mechanisms and protocol for enable and disable of both the mobile station equipment and the mobile station user's subscription. Air interface encryption may be provided as an option in TETRA. Where employed, clause 6 describes the confidentiality mechanisms using encryption on the air interface, for circuit mode speech, circuit mode data, packet data and control information. Clause 6 describes both encryption mechanisms and mobility procedures. It also details the protocol concerning control of encryption at the air interface. Encryption mechanisms and control protocol are specified for two different air interface encryption algorithm sets. Annex A specifies the Protocol Data Units and Information Elements required to fulfil the protocols specified in clauses 4, 5 and 6. Annex B specifies boundary conditions, dimensioning and summaries of the cryptographic algorithms, parameters and processes specified in the present document. Annex C specifies timer values used within the protocols. Annex D provides considerations for a transition process between the usage of encryption algorithms from different air interface encryption algorithm sets. The present document does not address the detail handling of protocol errors or any protocol mechanisms when TETRA is operating in a degraded mode. These issues are implementation specific and therefore fall outside the scope of the TETRA standardization effort. The detail description of the Authentication Centre is outside the scope of the present document.
|
100 392-3-11
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 11: General design, SIP/IP
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920311/01.01.01_60/ts_1003920311v010101p.pdf
|
The present document defines the transport of Inter System Interface (ISI) PDUs using the Session Initiation Protocol (SIP) as transport layer and the Session Description Protocol (SDP) as media control protocol. It specifies: SIP methods and header fields used for transport of ISI PDUs; and the SDP content; and use the ISI Mediation Function which coordinates the communication between TETRA systems. The ISI Mediation Function specification applies to an IP based TETRA Switching and Management Infrastructure (SwMI) which supports the ISI.
|
100 392-5
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) and Direct Mode Operation (DMO); Part 5: Peripheral Equipment Interface (PEI)
|
TS
|
2.6.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039205/02.06.01_60/ts_10039205v020601p.pdf
|
The present document specifies the functional and technical aspects of TETRA Peripheral Equipment Interface (PEI) that is the interface between a Terminal Equipment type 2 (TE2) and a Mobile Termination type 2 (MT2) at reference point RT.
|
100 392-5
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 5: Peripheral Equipment Interface (PEI)
|
TS
|
1.3.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039205/01.03.01_60/ts_10039205v010301p.pdf
|
The present document specifies the functional and technical aspects of TETRA Peripheral Equipment Interface (PEI) that is the interface between a Terminal Equipment type 2 (TE2) and a Mobile Termination type 2 (MT2) at reference point RT.
|
100 392-3-15
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 15: Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM)
|
TS
|
1.4.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920315/01.04.01_60/ts_1003920315v010401p.pdf
|
The present document defines the mobility management of interworking at the Inter-System Interface (ISI) for Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D). The TETRA V+D Inter-working - basic operation part defines the Inter-System Interface (ISI) between the SwMIs as specified in the following sub-parts: • Transport layer independent, General design [i.5]. • General design, PSS1 over E.1 [13]. • General design, SIP/IP [i.6]. • Transport layer independent Additional Network Feature Individual Call (ANF-ISIIC) [9]. • Transport layer independent Additional Network Feature Group Call (ANF-ISIGC) [10]. • Transport layer independent Additional Network Feature Short Data Service (ANF-ISISDS) [i.2]. • Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM) (the present document). • Generic Speech Format Implementation [i.4]. NOTE: These TSs are produced in analogy with Recommendation ITU-T I.130 [4]. The present document contains the ANF-ISIMM part. The ANF-ISIMM part defines additional Mobility Management (MM) services to the SwMIs. If supported, the ANF-ISIMM services complement the intra-SwMI-MM, authentication and key management services. In support of these, the ANF-ISIMM enables the invocation and operation of these services between the SwMIs over the ISI. Thus, ANF-ISIMM offers the following services: • Migration and restricted migration. • Individual subscriber and group profile update. • Supplementary Service profile update. • De-registration. • Group attachment/detachment. • Linked group attachment/detachment. • Individual subscriber and group database recovery. • Authentication, one-directionally or mutually between the individual subscriber and the home SwMI. • Over-The-Air-Re-keying (OTAR) for Static Cipher Key (SCK) generation and SCK delivery. For the following service are only included in the stage 1 descriptions: • Group Linking/unlinking. • GTSI attachment/detachment to a linking participating group from another SwMI. ETSI ETSI TS 100 392-3-15 V1.4.1 (2024-01) 20
|
100 392-3-14
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 14: Transport layer independent Additional Network Feature Short Data Service (ANF-ISISDS)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920314/01.01.01_60/ts_1003920314v010101p.pdf
|
The TETRA V+D interworking - at the Inter-System Interface (ISI) part defines the interworking between TETRA networks over the corresponding interface: the Inter-System Interface (ISI). It comprises the following sub-parts: Transport layer independent General design [3]; General Design, PSS1 over E.1 [i.2]; General Design, SIP/IP [i.3]; Transport layer independent Additional Network Feature - ISI Individual Call (ANF-ISIIC) [i.4]; Transport layer independent Additional Network Feature - ISI Group Call (ANF-ISIGC) [2]; Transport layer independent Additional Network Feature - ISI Short Data service (ANF-ISISDS) (the present document); Transport layer independent Additional Network Feature - ISI Mobility Management (ANF-ISIMM) [i.5]; Generic Speech Format Implementation [i.6]. The present document specifies the Additional Network Function (ANF) - Inter-System Interface (ISI) Short Data service (ANF-ISISDS) which is part of the Interworking at the Inter-System Interface (ISI) of the Terrestrial Trunked Radio system (TETRA) supporting Voice and Data (V+D). This service comprises of: TETRA short message transmission over the ISI to individual and group addresses; TETRA pre-defined status message transmission over the ISI to individual and group addresses. ANF-ISISDS enables short data and status messages to be transferred between a user registered in one TETRA network to another user registered in another TETRA network, operating at the ISI of both SwMIs. Like all other Additional Network Feature (ANF) specifications, those of ANF-ISISDS are produced in three stages, according to the method described in Recommendation ITU-T I.130 [4]. The present document contains the stage 1 and 2 descriptions of ANF-ISIIC, and stage 3 description. The stage 1 description specifies the ANF as seen by its users, which are essentially the CMCE SDS entities in both TETRA networks. The stage 2 description identifies the functional entities involved in the ANF and the information flows between them. The stage 3 description of ANF-ISISDS specifies its protocol.
|
100 392-3-13
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 13: Transport layer independent Additional Network Feature Group Call (ANF-ISIGC)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920313/01.01.01_60/ts_1003920313v010101p.pdf
|
The present document defines the group call communication of interworking at the Inter-System Interface (ISI) for Terrestrial Trunked Radio system (TETRA) supporting Voice plus Data (V+D). The TETRA V+D interworking - basic operation part defines the interworking between TETRA networks over the corresponding interface: the Inter-System Interface (ISI). It comprises the following sub-parts: Transport Layer Independent Specification ISI general design [2]; General Design, PSS1 over E.1 [i.7]; General Design, SIP/IP [i.8]; Transport Layer Independent Additional Network Feature - ISI Individual Call (ANF-ISIIC) [3]; Transport Layer Independent Additional Network Feature Group Call (ANF-ISIGC) (the present document); Transport Layer Independent Additional Network Feature Short Data service (ANF-ISISD) [i.9]; Transport Layer Independent Additional Network Feature Mobility Management (ANF-ISIMM) [4]; Generic Speech Format Implementation [i.10]. The present document is the ANF-ISIGC sub-part 3-13. In analogy with Recommendation ITU-T I.130 [i.3], the stage one, stage two and stage three of the three level structure is used to describe the TETRA Inter-System Interface services as provided by European Private or Public Trunked Radio System operators: Stage 1, is an overall service description, from the service subscriber's and user's standpoint; Stage 2, identifies the functional capabilities and information flows needed to support the services described in stage 1; and NOTE: The information flows in stage 2 have been drawn as Message Sequence Charts (MSC). Stage 3, defines the signalling system protocols and functions needed to implement the services described in stage 1. The present document details the Interworking Basic Operation of the Terrestrial Trunked Radio system (TETRA). Specifically the present document details the stage 1 aspects (overall service description) of the ANF-ISIGC as seen from the TETRA Switching and Maintenance Infrastructure point of view at the Inter-System Interface (ISI). It details the stage 2 aspects (functional partitioning) of ANF-ISIGC which includes the identification of the functional entities and the flows between them, and finally it details the stage 3 signalling protocols for the ANF-ISIGC services, i.e. the protocols at the relevant reference points between the functional entities defined in stage 2. The ANF-ISIGC service specifies: TETRA Group Call Clear Speech over the ISI, acknowledged and unacknowledged; TETRA Group Call End-to-End Encrypted Speech over the ISI; TETRA Group Call Circuit Mode one slot data over the ISI; TETRA Group Call Circuit Mode one slot End-to-End Encrypted data over the ISI; TETRA Group Call Circuit Mode N × 2,4 kbit/s, N × 4,8 kbit/s or N × 7,2 kbit/s data, with N = 2, 3 or 4; TETRA Group Call Circuit Mode N × 2,4 kbit/s N × 4,8 kbit/s or N × 7,2 kbit/s End-to-End Encrypted data, with N = 2, 3 or 4. ETSI ETSI TS 100 392-3-13 V1.1.1 (2018-05) 12
|
100 392-3-12
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 12: Transport layer independent Additional Network Feature Individual Call (ANF-ISIIC)
|
TS
|
1.3.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920312/01.03.01_60/ts_1003920312v010301p.pdf
|
The present document defines the Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D). It specifies: • the interworking of individual calls between TETRA networks; • the supplementary services interaction with individual calls between TETRA networks. The TETRA V+D interworking - basic operation part defines the interworking between TETRA networks over the corresponding interface: the Inter-System Interface (ISI). It comprises the following sub-parts: • Transport layer independent General design [2]; • General Design, PSS1 over E.1 [3]; • General Design, SIP/IP [4]; • Transport layer independent Additional Network Feature - ISI Individual Call (ANF-ISIIC) (the present document); • Transport layer independent Additional Network Feature - ISI Group Call (ANF-ISIGC) [5]; • Transport layer independent Additional Network Feature - ISI Short Data service (ANF-ISISDS) [i.8]; • Transport layer independent Additional Network Feature - ISI Mobility Management (ANF-ISIMM) [6]; • Generic Speech Format Implementation [i.7]. The present document is the ANF-ISIIC sub-part. Like all other Additional Network Feature (ANF) specifications, those of ANF-ISIIC are produced in three stages, according to the method described in Recommendation ITU-T I.130 [i.4]. The present document contains the stage 1 and 2 descriptions of ANF-ISIIC, and stage 3 description. The stage 1 description specifies the ANF as seen by its users, which are essentially the individual call control entities in both TETRA networks. The stage 2 description identifies the functional entities involved in the ANF and the information flows between them. And the stage 3 description of ANF-ISIIC specifies its protocol. NOTE 1: According to Recommendation ITU-T I.130 [i.4], the stage 3 description of a bearer or tele-service addresses the network implementation aspects. Consequently, it comprises two steps: the specifications of all protocols at the various reference points involved in any of the service procedures (notably the service operation) are the first step of the stage 3 description, and the specifications of the functions of the corresponding network entities are its second step. NOTE 2: The SDL diagrams have not been provided since they can be derived from the specification of the functional entity actions in the stage 2 description. The present document applies to TETRA networks which support inter-TETRA individual calls. More specifically, it applies to their Circuit Mode Control Entities (CMCE), as defined in clause 14.2 of ETSI EN 300 392-2 [1], and to their ANF-ISIIC entities defined in the stage 2 description. The relation between the ANF-ISIIC and the transport layer protocol is described in the General Design documents [2], [3] and [4]. ETSI ETSI TS 100 392-3-12 V1.3.1 (2021-09) 11
|
100 392-16
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 16: Network Performance Metrics
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039216/01.02.01_60/ts_10039216v010201p.pdf
|
The present document defines a series of network performance metrics that are applicable to TETRA networks, whose measurement and reporting makes it possible to know the impact of adding new terminals or new infrastructure to an existing TETRA network. Network performance parameters, inherent within a network, include those, which affect to the quality of an "end-to-end" connection as experienced by a subscriber. A network performance parameter may be considered as a function of the operation of the elements involved to form a connection, network load, network signalling and the processing required to realize a connection. The present document contains voice quality test methods and values for full duplex calls as well as the transmission level plan for simplex calls; e.g. nominal sending level, sending level performance values and test methods. Requirements on some measured values are outside the scope of the present document.
|
100 347
|
Services and Protocols for Advanced Networks (SPAN); V5.2 interface for the support of Access Network (AN); Release notes for V5.2
|
TS
|
1.2.2
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/100347/01.02.02_60/ts_100347v010202p.pdf
|
The present document keeps track of enhancements to the V5.2 standard, starting after the published version (1999-12). Only those modifications are collected, which have been agreed upon within SPAN13 (former SPAN9) sessions. As a reference to the source of these agreed modifications, relevant parts of the meeting reports are copied into an annex. The present document is applicable to EN 300 347-1 [1] and EN 300 347-2 [2].
|
100 394-1
|
Terrestrial Trunked Radio (TETRA); Conformance testing specification; Part 1: Radio
|
TS
|
2.3.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039401/02.03.01_60/ts_10039401v020301p.pdf
|
The present document recommends methods for testing whether TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment achieve the performance specified in ETSI EN 300 392-2 [1]. Specific test methods for DMO equipment are recommended in annex F of the present document. The purpose of these specifications is to provide a sufficient quality of radio transmission and reception for equipment operating in a TETRA system and to minimize harmful interference to other equipment. The present document is applicable to TETRA systems operating at radio frequencies in the range of 137 MHz to 1 GHz. Versions V3.3.1 [i.5] and earlier of the present document specified the methods used for type testing. The minimum technical characteristics of TETRA Voice plus Data (V+D) Base Station (BS) and Mobile Station (MS) equipment and TETRA Direct Mode Operation (DMO) equipment and radio test methods to be used for providing presumption of conformity, are now specified in ETSI EN 303 758 [i.4].
|
100 392-12-16
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 12: Supplementary services stage 3; Sub-part 16: Pre-emptive Priority Call (PPC)
|
TS
|
1.3.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921216/01.03.01_60/ts_1003921216v010301p.pdf
|
The present document defines the stage 3 specifications of the Supplementary Service Pre-emptive Priority Call (SS-PPC) for the Terrestrial Trunked Radio (TETRA). SS-PPC enables a user to have preferential access to the network resources in a TETRA system in times of congestion including pre-emption of calls. SS-PPC is applicable for pre-emptive priorities including the emergency priority. SS-PPC includes the capability to pre-empt resources needed for higher priority calls and the capability to pre-empt users from ongoing calls in order to move them to a higher priority calls. SS-PPC specifies the definition, activation, deactivation and interrogation for the usage of pre-emptive call priorities in the TETRA system. The Switching and Management Infrastructure (SwMI) applies the SS-PPC priorities when it allocates the resources for calls. The SS-PPC operations are defined for the SwMI and for the Mobile Station (MS). SS-PPC is defined to subscribers of one TETRA system, but the subscribers may be located in several TETRA systems and the information flows may be delivered over the Inter System Interface (ISI). SS-PPC is invoked for calls within one TETRA system or for calls that extend over ISI to several TETRA systems. Man-Machine Interface (MMI) and charging principles are outside the scope of the present document. Supplementary Service stage 3 specification is preceded by the stage 1 and the stage 2 specifications of the service. Stage 1 describes the functional capabilities from the user's point of view. Stage 2 defines the functional behaviour in terms of Functional Entities (FEs) and information flows. Stage 3 gives a precise description of the supplementary service from the implementation point of view. It defines the protocol for the service and the encoding rules for the information flows. It defines the processes for the FEs and their behaviour. The described protocols and behaviour apply to the SwMI, for the MS and may be applied over the ISI between TETRA systems. Aspects relating to all supplementary services are detailed in ETSI EN 300 392-9 [3].
|
100 500
|
Digital cellular telecommunications system (Phase 2+) (GSM); Principles of telecommunication services supported by a GSM Public Land Mobile Network (PLMN); (GSM 02.01 version 7.1.0 Release 1998)
|
TS
|
7.1.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100500/07.01.00_60/ts_100500v070100p.pdf
|
The present document coversthe definition of the telecommunication services supported by a GSM PLMN. The purpose of the present document is to provide a method for the characterization and the description of these telecommunication services.
|
100 392-18-3
|
<empty>
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921803/01.02.01_60/ts_1003921803v010201p.pdf
|
The present document defines the Direct mode operation Over The Air Management protocol for the TETRA V+D air interface. It defines the following services: • Direct Mode Operation over the air management service. • Interrogation of Direct Mode Operation groups and their status.
|
100 522
|
Digital cellular telecommunications system (Phase 2+) (GSM); Network architecture (GSM 03.02 version 7.1.0 Release 1998)
|
TS
|
7.1.0
|
http://www.etsi.org/deliver/etsi_ts/100500_100599/100522/07.01.00_60/ts_100522v070100p.pdf
|
The purpose of the present document is to present the possible architectures of the mobile system. Clause 3 of this specification contains a definition of the different functional entities needed to support the mobile service. In clause 4, the configuration of a PLMN is described as well as the organisation of the functional entities; the configuration presented is the most general in order to cope with all the possible implementations which can be imagined in the different countries. To illustrate that purpose, some examples of possible configurations are presented. Clause 5 of this specification contains a brief description of the interfaces involved which shows the principle of the organisation considered.
|
100 392-18-1
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D) and Direct Mode Operation (DMO); Part 18: Air interface optimized applications; Sub-part 1: Location Information Protocol (LIP)
|
TS
|
1.7.2
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003921801/01.07.02_60/ts_1003921801v010702p.pdf
|
The present document defines Location Information Protocol that is optimized for TETRA air interface. It defines services: • Unsolicited location information reporting. • Immediate location information reporting. • Triggered location information reporting.
|
100 392-3-10
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 10: General design, PSS1 over E.1
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920310/01.01.01_60/ts_1003920310v010101p.pdf
|
The present document defines the transport of the Inter-System Interface (ISI) using PSS1 as transport layer. It specifies: the PSS1 signalling used for transport of ISI APDUs; and the general protocol mechanism, called ISI Mediation Function which coordinates the communication between TETRA systems. The ISI Mediation Function applies to any TETRA Switching and Management Infrastructure (SwMI) which supports the ISI.
|
100 324
|
Services and Protocols for Advanced Networks (SPAN); V5.1 interface for the support of Access Network (AN); Release notes for V5.1
|
TS
|
1.2.2
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/100324/01.02.02_60/ts_100324v010202p.pdf
|
The present document keeps track of enhancements to the V5.1 standard, starting after the published version V2.1.1 (2000-04). Only those modifications are collected, which have been agreed upon within SPAN13 (former SPAN9) sessions. As a reference to the source of these agreed modifications, relevant parts of the meeting reports are copied into an annex. The present document is applicable to the V5.1 base standard [1] and PICS [2].
|
100 289
|
Digital Video Broadcasting (DVB); Support for use of the DVB Scrambling Algorithm version 3 within digital broadcasting systems
|
TS
|
1.2.1
|
http://www.etsi.org/deliver/etsi_ts/100200_100299/100289/01.02.01_60/ts_100289v010201p.pdf
|
The present document provides for support for the implementation of the DVB Common Scrambling version 3 algorithm (CSA v3) within digital broadcasting systems. Considering that there will be several Conditional Access solutions based on ISO/IEC 13818-1 (MPEG-2) [1] and the DVB specifications, the present document specifies the common signalling aspects as well as operational guidelines relevant for CA solutions. The present document provides hence the basis for co-existence of multiple Conditional Access Systems in a single Transport Stream.
|
100 220-1
|
ElectroMagnetic Compatibility and Radio Spectrum Matters (ERM); Short Range Devices (SRDs); Measurement Specification for Wideband Transmitter Stability
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100200_100299/10022001/01.01.01_60/ts_10022001v010101p.pdf
|
The present document covers the measurement specification for transmitter wideband stability and refers to the EN 300 220-1 [1]. The frequency error parts of the EN 300 220-1 [1] subclause 8.1 Frequency Error and subclause 8.6 Range of Modulation Bandwidth in particular the subclause 8.6.3 Limits, shall be replaced by the present document. The conditions for the measurements of the frequency error as defined in the clause 5, Test Conditions, Power Sources and ambient temperatures shall be maintained for the present document. This is an interim solution for Conformity Assessment purpose until the EN 300 220-1 [1] is revised with regard to this technical specification as well as to comply with the EU Directive 99/5. It is to note that the technical Parameters of the present document have been aligned with the recently issued CEPT/ERC/REC 70-03 [2] issue June 7th 1999.
|
188 007
|
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Network and Service Management; WG8 Specification Guidelines
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/188000_188099/188007/02.01.01_60/tr_188007v020101p.pdf
| |
188 004
|
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); NGN Management; OSS vision
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/188000_188099/188004/01.01.01_60/tr_188004v010101p.pdf
|
The present document provides a high level view of the scope and context of requirements for NGN Management covering: business, regulatory, legal, operational and technical requirements for: • Service aggregation and Resource/Network aggregation. • Customer centric service requirements. • Service management and personalization. • Resource/Network Management. • Value chains amongst Service Providers.
|
187 023
|
<empty>
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187023/01.01.01_60/tr_187023v010101p.pdf
|
The present document presents the structure of the Assurance Profiles.
|
187 020
|
Radio Frequency Identification (RFID); Coordinated ESO response to Phase 1 of EU Mandate M436
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187020/01.01.01_60/tr_187020v010101p.pdf
|
The present document provides the results of the coordinated response of the European Standards Organizations (ESOs) to Phase 1 of EC mandate M436 on the subject of Radio Frequency Identification Devices (RFID) in relation to privacy, data protection and information security. The present document outlines a standardization roadmap for privacy and security of RFID. The development of the roadmap involved analyses of RFID from a number of perspectives: • analysis of OECD guidelines [i.17] and relevant data protection; • analysis of privacy and its link to behaviour; • analysis of EU directives on data protection and privacy and their implications on RFID; • review of the role of PETs for RFID (see clause 7); and • analysis of security threats to RFID and their implications (see Annex C). The resulting requirements set defines the data protection, privacy and security needs of RFID and was used as input to the standards gaps analysis and the development of requirements to PIA for RFID and RFID PEN testing frameworks. An outline of the PIA framework requirements is given in clause 9. Overview of the standardization gaps and requirements for RFID PEN testing is given in clause 10. The standardisation gaps analysis and resulting overall RFID standardisation roadmap is given in clause 4. The present document recommends a plan of activities for Phase 2 of EC Mandate M436 as follows: • identifies the use of existing technical measures described by standardisation in order to promote confidence and trust (by end users organizations and the general public) in RFID technology and its applications; • identifies where new technical measures described by standardisation are required in order to promote confidence and trust (by end users organizations and the general public) in RFID technology and its applications. These measures will be developed in the course of phase 2 of the mandate. In addition the present document describes the results of modelling the role of RFID in privacy and personal data as defined by European Directives alongside a Threat Vulnerability and Risk Analysis (TVRA) of the use of RFID technology and its applications, including the results of a generic and an industry specific Privacy Impact Assessment (a guide to PIA is given in Annex A). NOTE: Many of the risks identified as part of the present document are equally applicable in other tracking scenarios (e.g. CCTV, car number/licence plate recognition, face recognition, mobile phone cell tracking). Under the terms of the Mandate, the present document covers only those areas in the data acquisition part that are specific to RFID. The other tracking scenarios are included in the work of the Article 29 Data Protection Working Party.
|
100 392-7
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 7: Security
|
TS
|
2.4.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039207/02.04.01_60/ts_10039207v020401p.pdf
|
The present document defines the Terrestrial Trunked Radio system (TETRA) supporting Voice plus Data (V+D). It specifies the air interface, the inter-working between TETRA systems and to other systems via gateways, the terminal equipment interface on the mobile station, the connection of line stations to the infrastructure, the security aspects in TETRA networks, the management services offered to the operator, the performance objectives, and the supplementary services that come in addition to the basic and teleservices. The present part describes the security mechanisms in TETRA V+D. It provides mechanisms for confidentiality of control signalling and user speech and data at the air interface, authentication and key management mechanisms for the air interface and for the Inter-System Interface (ISI). Clause 4 describes the authentication and key management mechanisms for the TETRA air interface. The following authentication services have been specified for the air-interface in ETSI ETR 086-3 [i.3], based on a threat analysis: • authentication of an MS by the TETRA infrastructure; • authentication of the TETRA infrastructure by an MS; • mutual authentication of MS and TETRA infrastructure. The key management mechanisms specified in clause 4 enable the provision of key material for the air interface encryption mechanisms specified in clause 6. Clause 5 describes the mechanisms and protocol for enable and disable of both the mobile station equipment and the mobile station user's subscription. Air interface encryption may be provided as an option in TETRA. Where employed, clause 6 describes the confidentiality mechanisms using encryption on the air interface, for circuit mode speech, circuit mode data, packet data and control information. Clause 6 describes both encryption mechanisms and mobility procedures. It also details the protocol concerning control of encryption at the air interface. Encryption mechanisms and control protocol are specified for two different air interface encryption algorithm sets. Annex A specifies the Protocol Data Units and Information Elements required to fulfil the protocols specified in clauses 4, 5 and 6. Annex B specifies boundary conditions, dimensioning and summaries of the cryptographic algorithms, parameters and processes specified in the present document. Annex C specifies timer values used within the protocols. Annex D provides considerations for a transition process between the usage of encryption algorithms from different air interface encryption algorithm sets. The present document does not address the detail handling of protocol errors or any protocol mechanisms when TETRA is operating in a degraded mode. These issues are implementation specific and therefore fall outside the scope of the TETRA standardization effort. The detail description of the Authentication Centre is outside the scope of the present document.
|
100 392-3-9
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 9: Transport layer independent, General design
|
TS
|
1.3.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920309/01.03.01_60/ts_1003920309v010301p.pdf
|
The present document defines the general aspects of interworking at the Inter-System Interface (ISI) for Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D). Those specify the general concepts which are the basis of the ISI operation between TETRA systems. It introduces the Additional Network Features (ANFs) used at the ISI, and specifies: • the general protocol mechanism upon which the definition of each ANF is based; and • the security related functions over the ISI. The specification of the general transport layer independent protocol mechanism applies to any TETRA Switching and Management Infrastructure (SwMI) which supports the ISI. The security requirements for the ISI only apply to SwMIs which support authentication or end-to-end encryption over the ISI. Besides the ISI general design, the present sub-part, interworking at the Inter-System Interface comprises the following other sub-parts: • General design, PSS1 over E.1 [3]; • General design, SIP/IP [4]; • Transport layer independent Additional Network Feature Individual Call (ANF-ISIIC) [5]; • Transport layer independent Additional Network Feature Group Call (ANF-ISIGC) [6]; • Transport layer independent Additional Network Feature Short Data Service (ANF-ISISDS) [7]; • Transport layer independent Additional Network Feature, Mobility Management (ANF-ISIMM) [8]; and • Generic Speech Format Implementation [9].
|
100 392-3-8
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 8: Generic Speech Format Implementation
|
TS
|
1.3.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920308/01.03.01_60/ts_1003920308v010301p.pdf
|
The present document specifies speech transmission format implementation independent of SwMI type. The present document defines the format of user information that is transported between two SwMIs using the TETRA ISI. The present document covers how TETRA air interface circuit mode traffic is encoded for transport over various media.
|
100 392-3-2
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 2: Additional Network Feature Individual Call (ANF-ISIIC)
|
TS
|
1.1.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920302/01.01.01_60/ts_1003920302v010101p.pdf
|
The present document defines the Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D). It specifies: - general design aspects (e.g. reference points, numbering and addressing, or protocol architecture); - the system bearer and mobility management services, and the corresponding air interface protocols; - the interworking between TETRA networks; - the interworking of TETRA networks with other networks, via gateways; - the peripheral equipment interface on the mobile station; - the Line Station (LS) interface with TETRA networks; - the security protocols and mechanisms applicable to TETRA networks and to TETRA terminal equipment; - the supplementary services applicable to the basic TETRA tele- or bearer services. The TETRA V+D interworking - basic operation part defines the interworking between TETRA networks over the corresponding interface: the Inter-System Interface (ISI). It comprises the following subparts: - ISI general design; - Additional Network Feature - ISI Individual Call (ANF-ISIIC); - Additional Network Feature - ISI Group Call (ANF-ISIGC); - Additional Network Feature - ISI Short Data service (ANF-ISISD); - Additional Network Feature - ISI Mobility Management (ANF-ISIMM); - 8 kbit/s encoding of user information at the ISI. The present document is the ANF-ISIIC sub-part. ANF-ISIIC enables calls to be set-up by a user registered in one TETRA network to another user registered in another TETRA network, operating at the ISI of both SwMIs. It also supports call restoration when a user has migrated to another TETRA network during an established call. Additionally, ANF-ISIIC allows TETRA signalling information to be passed from a TETRA SwMI to another TETRA SwMI supporting the TETRA individual call procedures as defined in clauses 11 and 14 of EN 300 392-2 [1]. Like all other Additional Network Feature (ANF) specifications, those of ANF-ISIIC are produced in three stages, according to the method described in ITU-T Recommendation I.130 [11]. The present document contains the stage 1 and 2 descriptions of ANF-ISIIC, and its partial stage 3 description. The stage 1 description specifies the ANF as seen by its users, which are essentially the individual call control entities in both TETRA networks. The stage 2 description identifies the functional entities involved in the ANF and the information flows between them. And the partial stage 3 description of ANF-ISIIC specifies its protocol. NOTE: According to ITU-T Recommendation I.130 [11], the stage 3 description of a bearer or tele-service addresses the network implementation aspects. Consequently, it comprises two steps: the specifications of all protocols at the various reference points involved in any of the service procedures (notably the service operation) are the first step of the stage 3 description, and the specifications of the functions of the corresponding network entities are its second step. The latter have not been provided since they can be derived from the specification of the functional entity actions in the stage 2 description. The present document applies to TETRA networks which support inter-TETRA individual calls. More specifically, it applies to their Circuit Mode Control Entities (CMCE), as defined in subclause 14.2 of EN 300 392-2 [1], and to their ANF-ISIIC entities defined in the stage 2 description. ETSI ETSI TS 100 392-3-2 V1.1.1 (2000-10) 10
|
100 392-2
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 2: Air Interface (AI)
|
TS
|
3.10.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039202/03.10.01_60/ts_10039202v031001p.pdf
|
The present document defines the Air Interface (AI) for the Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D) Conventional Access (CA) and Direct Access (DA) and contains the specifications of the physical layer, the data link layer and the network layer according to the ISO model. First, it establishes the TETRA radio aspects (layer 1): • it defines and specifies the modulation; • it defines and specifies the radio transmission and reception; • it defines and specifies the synchronization; • it defines and specifies the channel coding; • it defines and specifies the channel multiplexing; • it defines and specifies the control over the radio link. Secondly, it establishes the services, messages and protocols used for voice and circuit mode data transfer, starting with the upper layers: • it defines and specifies the services provided by the CC sub-entity; • it defines and specifies the services provided by the SS sub-entity; • it defines and specifies the services provided by the SDS sub-entity; • it defines and specifies the protocol used by the Circuit Mode Control Entity (CMCE) to communicate across the air interface in order to offer the services of the Call Control (CC), Supplementary Service (SS) and Short Data Service (SDS) sub-entities; • it defines and specifies the services and protocol used for the management of the users' mobility inside and across TETRA networks, namely the ones of the Mobility Management (MM) entity and the MLE; • it defines and specifies the services and protocol used in the data link layer subdivided in two sub-entities, the Logical Link Control (LLC) and the Medium Access Control (MAC) entities. Thirdly, it establishes the services, messages and protocols used for packet data transfer: • it defines and specifies the services provided by the Sub-Network Specific Data Control Protocol (SNDCP) sub-entity; • it defines and specifies the protocol used by Sub-Network Specific Data Control Protocol (SNDCP). 48 ETSI TS 100 392-2 V3.10.1 (2023-03) ETSI
|
100 392-2
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 2: Air Interface (AI)
|
TS
|
2.6.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039202/02.06.01_60/ts_10039202v020601p.pdf
|
The present document defines the Air Interface (AI) for the Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D) Conventional Access (CA) and Direct Access (DA) and contains the specifications of the physical layer, the data link layer and the network layer according to the ISO model. First, it establishes the TETRA radio aspects (layer 1): • it defines and specifies the modulation; • it defines and specifies the radio transmission and reception; • it defines and specifies the synchronization; • it defines and specifies the channel coding; • it defines and specifies the channel multiplexing; • it defines and specifies the control over the radio link. Secondly, it establishes the services, messages and protocols used for voice and circuit mode data transfer, starting with the upper layers: • it defines and specifies the services provided by the CC sub-entity; • it defines and specifies the services provided by the SS sub-entity; • it defines and specifies the services provided by the SDS sub-entity; • it defines and specifies the protocol used by the Circuit Mode Control Entity (CMCE) to communicate across the air interface in order to offer the services of the Call Control (CC), Supplementary Service (SS) and Short Data Service (SDS) sub-entities; • it defines and specifies the services and protocol used for the management of the users' mobility inside and across TETRA networks, namely the ones of the Mobility Management (MM) entity and the MLE; • it defines and specifies the services and protocol used in the data link layer subdivided in two sub-entities, the Logical Link Control (LLC) and the Medium Access Control (MAC) entities. Thirdly, it establishes the services, messages and protocols used for packet data transfer: • it defines and specifies the services provided by the Sub-Network Specific Data Control Protocol (SNDCP) sub-entity; • it defines and specifies the protocol used by Sub-Network Specific Data Control Protocol (SNDCP). 48 ETSI TS 100 392-2 V3.10.1 (2023-03) ETSI
|
100 392-1
|
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 1: General network design
|
TS
|
1.5.1
|
http://www.etsi.org/deliver/etsi_ts/100300_100399/10039201/01.05.01_60/ts_10039201v010501p.pdf
|
The present document defines addressing for Terrestrial Trunked Radio system (TETRA) supporting Voice plus Data (V+D). It also gives background information of the air interface, the interworking between TETRA systems and to other systems via gateways, the terminal equipment interface on the Mobile Station (MS), the security aspects in TETRA networks, the management services offered to the operator, the performance objectives, and the supplementary services that come in addition to the basic and tele-services used as a basis for TETRA standardization. The present document defines and specifies the TETRA addressing and identities and their organization in groups corresponding to the different functions. It establishes the background of the TETRA general network design for standardization purposes: • it gives information about the circuit mode and packet mode reference points for the MS and switching and management infrastructure; • it gives information about a model of the air interface protocol stack, different functions of layers and sublayers; • it gives information about the functions provided by the circuit mode teleservices used for speech and basic services used for data transfer; • it gives information about the functions related to the management of the users' mobility across networks and inside a network including roaming and migration; • it gives information about the functions related to the transport of short data messages as a service specific to TETRA; • it gives information about the functions related to the support of packet data service in a way specific to TETRA; • it gives information about the supplementary services that mainly extend the capabilities of the circuit mode basic and teleservices; • it gives information about the various possibilities of individual circuit mode call scenarios and provides guidance on priority concepts for packet data and circuit mode services and on the service quality. NOTE: This part of the multi-part document may, by its nature as a general design statement, require updating when later parts of the multi-part document are completed and maintained (in order to avoid any non-alignment). If a discrepancy occurs between this part and any other part of the multi-part document, then the other part will take precedence. The present document may be maintained mainly on those clauses, which are referred from other parts or standards. ETSI ETSI TS 100 392-1 V1.5.1 (2018-04) 16
|
187 019
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187019/03.01.01_60/tr_187019v030101p.pdf
|
The present document addresses issues related to interoperator NNI interface interconnection. Security issues on NNI interconnections between the different subsystems of the NGN will also be addressed. The present document will identify the impact on 3GPP and TISPAN specifications.
|
187 015
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187015/03.01.01_60/tr_187015v030101p.pdf
|
The present document describes a Prevention of Unsolicited Communications (PUC) service for use in the NGN. The present document defines the method by which a terminating party is prevented from receiving UC. The present document addresses the NGN objectives (including the legal implications) that are met by the PUC service and identifies the requirements to be met by the NGN for PUC. The present document derives from TR 187 009 [i.11]. The present document covers deployment of the NGN in the following scenarios: • Home networks, focusing on interconnection from the CNG with the NGN and interaction between the CNG and CND. And proposing UC detection & handling on the CNG. • Enterprise networks, focusing in interconnection between the NGCN and the NGN and the interaction between the UE and the NGCN and NGN. And proposing UC detection and handling for NGCN devices. • Single user scenario, focusing on interconnection between the UE and the NGN and proposing a UC detection & handling framework for entities of the NGN. NOTE: The specification of PUC for Common IMS are defined in 3GPP 33.937 [i.12].
|
187 014
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187014/02.01.01_60/tr_187014v020101p.pdf
|
The present document is a guide to the use of the ETSI eTVRA web-application. NOTE: The eTVRA web-application acts as a tool for entering analysis results following completion of an analysis using the ETSI TVRA method defined in TS 102 165-1 [i.1].
|
187 013
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187013/03.01.01_60/tr_187013v030101p.pdf
|
The present document presents the result of a study of options for the IPTV security architecture supporting TISPAN NGN Release 3 that satisfies the security requirements for IPTV given in TS 187 001 [i.1]. The present document offers the results of analysis of the options for security architecture and mechanisms to provide IPTV service protection where service protection refers to the protection offered during the period when IPTV media is transmitted in the NGN. A security architecture for a general content protection framework to allow comparison of existing content protection solutions (e.g. DRM systems) is required for the NGN, but is not covered by the present document. Content protection includes the provision of post-delivery protection of IPTV media and may include controls to ensure that the user can only use the content in accordance with the license it has been granted, e.g. the times of the content can be viewed. NOTE: The functional architecture for IMS based IPTV without security entities conforms to TS 182 027 [i.5]. The functional architecture for dedicated IPTV subsystem without security entities conforms to TS 182 028 [i.6].
|
187 012
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187012/02.01.01_60/tr_187012v020101p.pdf
|
The present document identifies the impact on the NGN in achieving compliance to the data retention directive [i.1]. The present document makes a number of recommendations to operators and manufacturers that may be sufficient to ensure compliance, and identifies where future standardisation may be required. The present document applies to TISPAN NGN services as specified by TR 180 001 [i.12] (for release 1 specific capabilities) and TR 180 002 [i.13] (for release 2 specific capabilities), and where the NGN user is identified as specified in TS 184 002 [i.11].The present document is structured in the following way: • NGN analysis with respect to Data Retention: - annex containing an analysis of the existing Directive and the available provisions in the NGN; - annex providing a comparison of terms between Directive and NGN. • Identification of the data that is expected to be retained in the NGN under the DR Directive and a mapping to determine if the data is available in the NGN. The present document does not define the handover domain which is specified in TS 102 657 [i.2] nor does the document cover any conformance aspects relating to IMS. However where other standards bodies are directly impacted by the DR Directive in the NGN the present document identifies in outline form the affected publications from such SDOs. The present document does not address the application of Data Retention in Customer Premises Networks (CPN) or Next Generation Corporate Networks (NGCN).
|
187 011
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187011/02.01.01_60/tr_187011v020101p.pdf
|
The present document defines a method, based on the application of ISO/IEC 15408-2 [i.10], for concisely and unambiguously declaring security requirements expressed in ETSI standards. The purpose of the present document is to provide support to developers of ETSI standards in using the security functional components of ISO/IEC 15408-2 [i.10]. In particular it explains the elements in the ISO/IEC 15408-2 [i.10] functional capabilities and describes how they fit within a structured security requirements engineering method. Required elements are defined with respect to the NGN and, where appropriate, are illustrated with examples from the NGN Security programme.
|
187 010
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187010/02.01.01_60/tr_187010v020101p.pdf
|
The present document summarizes the work that is ongoing in relation to management of trusted identifiers (often referred to as the generic term Identity Management (IdM)) within a number of international standardization bodies and industry fora. From this summary, it identifies common themes which are relevant to IdM within ETSI's NGN activities and then presents the results of an IdM Threat Vulnerability and Risk Analysis (TVRA) based upon the method described in TS 102 165-1 [i.1]. The present document derives and presents a set of objectives and requirements for providing security of Identity and IdM in the NGN. NOTE: The issues raised in the present document have been analysed with respect to the NGN but apply equally to existing and alternative telecommunications networks.
|
187 009
|
Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Feasibility study of prevention of unsolicited communication in the NGN
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187009/02.01.01_60/tr_187009v020101p.pdf
|
The present document seeks to determine if UC is a risk to the NGN user or to the NGN Operator (a CSP using NGN technology to provide services). The present document offers justification for UC countermeasures by presenting the results of a Threat Vulnerability and Risk Analysis (TVRA) that quantifies the likelihood and impact of UC in the NGN where UC is initiated in a variety of forms described using a number of scenarios for illustration. The present document defines the term unsolicited communication in the context of the NGN. Where risk is shown from UC in the NGN the present document considers means to mitigate the risk using metrics of applicability, effectiveness and architectural instantiation. NOTE: Whilst this document is a technical report it identifies requirements for future work. In all cases these requirements are considered indicative pending their ratification in formal ETSI Technical Specifications within the TISPAN Work Programme.
|
187 008
|
<empty>
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187008/01.01.01_60/tr_187008v010101p.pdf
|
The present document gives the results of a NAT traversal feasibility study for the NGN in TISPAN. The term NAT Traversal is used to describe the problem of establishing connections between hosts where the IP address and port of the host is modified by a Network Address Translation (NAT) entity placed at some addressing boundary in the NGN. The term NAT in the present document refers to Network Address Port Translation (NAPT) in addition to NAT, where NAPT devices translate port numbers in addition to IP addresses. The study also considers the impact where the NAT device exhibits characteristics associated with firewalls. The document describes: • Requirements for NGN R2 and open issues with the NGN R1 approach for NAT traversal. • Reference architecture for NGN R2. • Existing NAT traversal methods. • Feasibility/applicability/limitations of those methods to solve the identified issues for NGN applications/services in an NGN environment; analysis of the potential impacts to other TISPAN documents. • Scenarios for NAT traversal in NGN R2 (residential networks). • The security problems associated with NAT and NAT Traversal.
|
187 007
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187007/02.01.01_60/tr_187007v020101p.pdf
|
The present document reports on the feasibility of providing media security for TISPAN NGN Release 2 as defined by TR 180 002 [i.2]. Media security in the present document refers to the capability to securely transport interactive and non-interactive voice, video (including conferencing scenarios), and other multimedia data (including text based) in the user plane of a Next Generation Network (NGN). The present document provides the results of an analysis of the stage 1 definition of media security requirements and service capabilities; and presents the analysis in support of these requirements for each of simplex and duplex communication in both point-to-point and point-to-multipoint architectures. The scenarios analysed are also considered with respect to the regulatory environment of NGN. The present document presents, in clause 7, a series of stage 2 architectural models that may implement the stage 1 model for each of the NGN media deployment scenarios. The present document provides in clause 8 some guidance for stage 3 design of security protocol(s) for media security. NOTE 1: Media Security for IMS is not covered by the present document but is addressed by 3GPP TR 33.828 [i.17]. NOTE 2: Whilst the present document is a technical report it identifies requirements for future work. In all cases these requirements are considered indicative pending their ratification in formal ETSI Technical Specifications within the TISPAN Work Programme.
|
187 002
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187002/03.01.01_60/tr_187002v030101p.pdf
|
The present document presents the results of the Threat Vulnerability Risk Analysis (TVRA) for the NGN. The present document follows the method and proforma for carrying out a TVRA defined in TS 102 165-1 [i.4] and incorporates material of the NGN threat and risk analysis herein. The present document identifies security-relevant interfaces in the NGN, identifies security-relevant scenarios for use in the NGN, analyses NGN in terms of security threats and risks by performing a security threat and risk analysis, and classifies the identified vulnerabilities and the associated risk presented to the NGN. This threat and risk analysis makes a number of assumptions that are believed to hold for typical deployment scenarios of the NGN. NOTE 1: Depending on the actual instantiation of the NGN some of the assumptions declared in the present document may not fully hold and this may alter the associated risks. NOTE 2: Whilst the present document is a technical report it identifies requirements for future work. In all cases these requirements are considered indicative pending their ratification in formal ETSI Technical Specifications within the TISPAN Work Programme.
|
187 002
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187002/02.01.01_60/tr_187002v020101p.pdf
|
The present document presents the results of the Threat Vulnerability Risk Analysis (TVRA) for the NGN. The present document follows the method and proforma for carrying out a TVRA defined in TS 102 165-1 [i.4] and incorporates material of the NGN threat and risk analysis herein. The present document identifies security-relevant interfaces in the NGN, identifies security-relevant scenarios for use in the NGN, analyses NGN in terms of security threats and risks by performing a security threat and risk analysis, and classifies the identified vulnerabilities and the associated risk presented to the NGN. This threat and risk analysis makes a number of assumptions that are believed to hold for typical deployment scenarios of the NGN. NOTE 1: Depending on the actual instantiation of the NGN some of the assumptions declared in the present document may not fully hold and this may alter the associated risks. NOTE 2: Whilst the present document is a technical report it identifies requirements for future work. In all cases these requirements are considered indicative pending their ratification in formal ETSI Technical Specifications within the TISPAN Work Programme.
|
187 002
|
<empty>
|
TR
|
1.2.2
|
http://www.etsi.org/deliver/etsi_tr/187000_187099/187002/01.02.02_60/tr_187002v010202p.pdf
|
The present document presents the results of the Threat Vulnerability Risk Analysis (TVRA) for the NGN. The present document follows the method and proforma for carrying out a TVRA defined in TS 102 165-1 [i.4] and incorporates material of the NGN threat and risk analysis herein. The present document identifies security-relevant interfaces in the NGN, identifies security-relevant scenarios for use in the NGN, analyses NGN in terms of security threats and risks by performing a security threat and risk analysis, and classifies the identified vulnerabilities and the associated risk presented to the NGN. This threat and risk analysis makes a number of assumptions that are believed to hold for typical deployment scenarios of the NGN. NOTE 1: Depending on the actual instantiation of the NGN some of the assumptions declared in the present document may not fully hold and this may alter the associated risks. NOTE 2: Whilst the present document is a technical report it identifies requirements for future work. In all cases these requirements are considered indicative pending their ratification in formal ETSI Technical Specifications within the TISPAN Work Programme.
|
185 013
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/185000_185099/185013/03.01.01_60/tr_185013v030101p.pdf
|
The objective of the present document is to define the set of codecs supported by CNDs for NGN services, on the basis of the service requirements contained in TS 181 005 [i.1] and TS 185 005 [i.4], and with reference to the CNDs architecture defined in TS 185 006 [i.11] (for communication services) and TS 185 009 [i.5] (for IPTV services). Work will address AV/broadcast codecs for IPTV and Conversational codecs for telephony services. It will be fully consistent with the set of codecs identified in TS 181 005 [i.1]. When TS 181 005 [i.1] already specifies a list of codecs for voice services, no new codecs will be added, no codec will be removed nor downgraded in status (mandatory, recommended optional) within this list. For each service (mainly person to person communication and IPTV) work will be focused on defining subset of default/mandatory which is the only way to guarantee interoperability and avoid transcoding a minimum set of codecs to be supported will be defined.
|
185 012
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/185000_185099/185012/03.01.01_60/tr_185012v030101p.pdf
|
The present document presents the results of a study into the feasibility of providing security mechanisms to be implemented in a Customer Premises Network (CPN) that allow the CPN to comply with the security objectives and requirements of the CPN. The present document identifies the placement of measures in the Customer Network Gateway (CNG) and in the Customer Network Devices (CNDs) that support the end-to-end security architecture of NGN release 3 as defined in TR 180 001 [i.20] (NGN-R3 release definition) and TS 187 003 [i.18] (security architecture). The present document completes task 7 of the TVRA method defined in TS 102 165-1 [i.21] with due account of the remainder of the TVRA for CPNs presented in TR 185 008 [i.13] and TR 187 002 [i.17].
|
185 008
|
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Analysis of security mechanisms for customer networks connected to TISPAN NGN R2
|
TR
|
2.0.0
|
http://www.etsi.org/deliver/etsi_tr/185000_185099/185008/02.00.00_60/tr_185008v020000p.pdf
|
The present document present an analysis of the security mechanisms that could be supported in the customer environment (Customer Network Gateway or Customer Devices) with reference to the overall end to end security architecture for the NGN defined by WG7. As examples, these mechanisms can be related to authentication (for connectivity and for services), firewalling and network access/parental control, virus protection, intrusion detection, Anti Spam capabilities. The activity will be performed in close relationship with WG7. The reactions to threats or the protections against threats described in the present document will involve only the CPN, not the external network.
|
185 007
|
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Analysis of protocols for customer networks connected to TISPAN NGN
|
TR
|
2.0.0
|
http://www.etsi.org/deliver/etsi_tr/185000_185099/185007/02.00.00_60/tr_185007v020000p.pdf
|
The present document contains informative text for analysing the set of protocols that can be used in the Customer Premises Networks (CPN) on the interfaces defined by stage 2 documents TS 185 003 [8] and TS 185 006 [7] related to service and transport layers. It will constitute a basic document produced by WG5, with a strong collaboration with WG3, to be used as the starting point for future technical specifications on that field.
|
185 004
|
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); High level customer network architectures
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/185000_185099/185004/01.01.01_60/tr_185004v010101p.pdf
|
The objective of the present document is to analyse the possible architectures for the customer environment, combining different possibilities in terms of elements to be considered. In particular, the analysed architectures will cover the possibility of managing one or more than one entry points from the WAN side, using one or more than one customer gateway, or possibly excluding the adoption of a customer gateway. Different alternatives for Customer Network Gateway ownership will also be examined. The detailed architectures of customer devices and customer network gateways will be addressed in other WIs and will take into account the possible alternatives analysed in the present document. The customer network is intended to support residential or small office scenarios, so that the scope of the document does not include corporate scenarios which are to be covered by other documents.
|
184 012
|
<empty>
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/184000_184099/184012/01.01.01_60/tr_184012v010101p.pdf
|
The present document describes different use cases for the usage of the DNS protocol (e.g. Service Location, NP/ENUM, address resolution) in IP based operators networks. The DNS base protocol itself is defined in RFC 1035 [i.16]. The present document describes the behaviour and details for DNS protocol usage in IP based operators networks, transport options for DNS messages, DNS protocol behaviour and configuration as well as options to make the usage of the DNS protocol more reliable (e.g. timer characteristics etc.). The use cases described here and options to make the usage of the DNS protocol more reliable are principal ones for network operators and not intended to be exhaustive.
|
184 008
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/184000_184099/184008/02.01.01_60/tr_184008v020101p.pdf
|
The present document provides an overview of some of the relevant options that can be used to implement Infrastructure ENUM (I-ENUM), which in the present document is defined as the use of the technology specified in RFC 3761 [i.1] by the carrier of record to map a telephone number into a URI. That URI then identifies a specific point of interconnection to that communication provider's network that could enable the originating party to establish communication over an IPX to the associated terminating party. An assessment of the options is given and recommendations made in order to provide a secure and reliable implementation of I-ENUM for TISPAN networks to facilitate routeing and interconnection within NGNs.
|
184 007
|
<empty>
|
TR
|
2.2.1
|
http://www.etsi.org/deliver/etsi_tr/184000_184099/184007/02.02.01_60/tr_184007v020201p.pdf
|
The present document investigates the need to introduce a Naming/Numbering Address Resolution framework into TISPAN NGN conformant communication networks. To this end the following topics are covered: • Analysis of the consequences of creating a Naming/Numbering Address Resolution framework. • Gap Analysis of current TISPAN NGNs specifications in comparison to existing/emerging solutions of NAR methods. • Identification of items for standardization as a result of the analysis described in the bullet above. Furthermore the present document investigates the Naming/Numbering Address Resolution (NAR) in NGNs and identifies Naming/Numbering Address Resolution (NAR) use cases used in NGN environments.
|
184 005
|
<empty>
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/184000_184099/184005/01.01.01_60/tr_184005v010101p.pdf
|
The present document describes the public identifiers, in the numeric format, used in NGNs: international E.164 numbers, E.164 numbers in the national formats and different types of non-E.164 numbers. It describes the processing of dialled digits to achieve these numbers and the usage of all these kinds of numbers. For E.164 numbers also the processing to a target name in an NGN environment for further name/number to address translation is explained. The processing (treatment) of non-E.164 numbers is FFS but some initial discussion could be found in annex A.
|
184 003
|
<empty>
|
TR
|
3.1.1
|
http://www.etsi.org/deliver/etsi_tr/184000_184099/184003/03.01.01_60/tr_184003v030101p.pdf
|
The present document focuses on number portability (NP) for telephone numbers from national numbering plans (NNP) for Next Generation Networks (NGNs). These national numbering plans are based on ITU-T Recommendation E.164 [i.19]. Identifier Portability, i.e. portability of other public identifiers than telephone numbers (e.g. name based SIP URIs or SIP/tel URIs with a specific phone-context) is outside the scope of the present document, but it is recognized that this could be the topic of a future separate study. The present document identifies ways to support portability of telephone numbers (e.g. E.164 numbers) between Service Providers (SP) - so called "service provider portability" (SPP). The term operator in the present document is used instead of Service Provider and the report identifies functionality needed to support the following portability scenarios: • Between NGN operators; • From NGN operators to PSTN/ISDN SPs; • From PSTN/ISDN SPs to NGN operators. NOTE: The types of telephone numbers that are subject to portability is a national matter, and are therefore not addressed in the present document. The support for number portability can be divided in two distinct processes: a) the process of porting a telephone number from one operator to another; and b) the process to establish a call to a telephone number that may be ported. The first process a) would include the actions from: • the request of the telephone number to be ported; • the distribution and storage of NP Data (NPD) that the telephone number is ported from one operator to another operator, and at which time the porting takes effect; • making the necessary NPD available to the data base environment that are accessible in real time from the communication processing systems; • allowing communication establishment to the operator that currently serves the telephone number. The second process b) would include information: • how data bases in the real time environment can be accessed and NPD can be retrieved; • from where the NPD can be retrieved; • how the NPD can be carried and used and transformed to NP Routing Information (NRI) for the establishment of the communication to the current operator. The detailed process of porting a telephone number and storage and distribution of NPD is essentially an administrative process, that may differ very much from country to country. The present document considers mainly the following: • NGN network architecture specific for number portability; • how the NPD obtained from the real time data base environment is used to route sessions, based on NRI, within and between networks. However, some information relating to the process of porting a telephone number is provided in annex A, and how to populate and make NPD and ENUM data available to the real time environment is provided in annexes B and C. Clause 5 gives an high level framework concerning different kind of DBs in the real time and in the non-real time environment of the NGN on different levels (i.e. operator, national and international level). ETSI ETSI TR 184 003 V3.1.1 (2010-06) 6
|
183 014
|
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); PSTN/ISDN Emulation; Development and Verification of PSTN/ISDN Emulation
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/183000_183099/183014/01.01.01_60/tr_183014v010101p.pdf
|
The present document presents the results of an analysis of bearer, basic and supplementary services currently provided in PSTN and ISDN implementations. The purpose of the analysis was to identify further areas of standardization to ensure that such services can be reliably emulated within the NGN thus enabling network operators to fulfil the technical regulatory obligations on European ECN providers of Publicly Available Telephone Service. It was assumed during the analysis that PSTN and ISDN signalling would be presented in the Integrated Services User Part (ISUP) as defined in EN 300 356-1 [3] and EN 300 356-2 [4] and that signalling within the NGN would be encapsulated in SIP-I as defined in EN 383 001[1] and ITU-T Recommendation H.248.1 [29].
|
183 050
|
<empty>
|
TR
|
2.1.1
|
http://www.etsi.org/deliver/etsi_tr/183000_183099/183050/02.01.01_60/tr_183050v020101p.pdf
|
The present document contains the record of assignment of names, numbers and identifiers used in TISPAN protocol specifications, managed by TISPAN, and which are required to be globally unique. In particular, it contains the assignments and sub-structure of ASN.1 Object Identifier trees assigned to TISPAN and the assignments and sub-structure of any URI or URN schemes which TISPAN manages. The present document also contains information on names, numbers and identifiers used in TISPAN protocol specifications, but which are assigned by other authorities. This may include assignments from the IETF, ETSI, W3C, etc. Names, addresses, numbers and identifiers and their associated schemes, used in networks, assigned or managed or monitored by TISPAN Working Group 4 are outside the scope of the present document. All aspects of numbering, addressing and naming of a telecommunications network are outside the scope of the present document.
|
183 050
|
<empty>
|
TR
|
1.1.1
|
http://www.etsi.org/deliver/etsi_tr/183000_183099/183050/01.01.01_60/tr_183050v010101p.pdf
|
The present document contains the record of assignment of names, numbers and identifiers used in TISPAN protocol specifications, managed by TISPAN, and which are required to be globally unique. In particular, it contains the assignments and sub-structure of ASN.1 Object Identifier trees assigned to TISPAN and the assignments and sub-structure of any URI or URN schemes which TISPAN manages. The present document also contains information on names, numbers and identifiers used in TISPAN protocol specifications, but which are assigned by other authorities. This may include assignments from the IETF, ETSI, W3C, etc. Names, addresses, numbers and identifiers and their associated schemes, used in networks, assigned or managed or monitored by TISPAN Working Group 4 are outside the scope of the present document. All aspects of numbering, addressing and naming of a telecommunications network are outside the scope of the present document.
|
183 046
|
<empty>
|
TR
|
3.3.1
|
http://www.etsi.org/deliver/etsi_tr/183000_183099/183046/03.03.01_60/tr_183046v030301p.pdf
|
The present document specifically describes the differing SDP usage between SIP [i.2] and H.248 [i.3] together with the implied mapping capability that is performed by the MGC/Call Server. SDP [i.1] has been widely selected as the protocol of choice within VoIP (or multimedia; MMoIP) to describe the media requirements of a given session/call/connection. However, the different VoIP control protocols that utilise SDP each specify differing requirements in their use of SDP. There is therefore a need for a MGC/Call Server to arbitrate between these variations in the use of SDP and perform the interworking between them. SDP [i.1] has been widely selected as the protocol of choice within VoIP (or multimedia; MMoIP) to describe the media requirements of a given session/call/connection. However, the different VoIP control protocols that utilize SDP each specify differing requirements in their use of SDP. There is therefore a need for a MGC/Call Server to arbitrate between these variations in the use of SDP and perform the interworking between them. Specifically for the present document, the differing SDP usage between SIP [i.2] and H.248 [i.3] will be described together with the implied mapping capability that is performed by the MGC/Call Server. Any network element (e.g. a MGCF) which handles both H.248/SDP signalling and SIP/SDP signalling provides any necessary interworking between both signalling protocols (see figure 1). Such interworking comprises in general: • interworking between SIP and H.248 signalling on message and procedural level (out of scope of the present document); and • interworking between the two SDP segments (SDP-SDP interworking; the scope of the present document). The function providing SDP-to-SDP interworking between SIP/SDP and H.248/SDP signalling is, in the present document, termed a "SDP Mapper" (see also clause 3.1). The SDP Mapper performs SDP-SDP interworking capability to reconcile the different uses of SDP between control protocols H.248 and SIP. In order to perform this role, the SDP Mapper takes into account i) which parts of SDP are required to be sent on an interface, and ii) which parts of SDP are received on an interface. For a given session/call, which use the two different control protocols at each end, some SDP parameters may be transited whilst others may not. The SDP Mapper ensures that the differing requirements with regard to SDP handling at each end are mutually satisfied. H.248 Media Gateway (MG or MGW) H.248 Media Gateway Controller (MGC) Network Element handling both H.248/SDP and SIP/SDP Signalling Scope of this Technical Report H.248/SDP Gateway Control Protocol (text encoding mode) SIP e.g. SIP Proxy, SIP User Agent, etc SDP Mapper SIP/SDP SIP-I Session Initiation Protocol Figure 1: Scope ETSI ETSI TR 183 046 V3.3.1 (2009-08) 7
|
183 046
|
<empty>
|
TR
|
2.0.0
|
http://www.etsi.org/deliver/etsi_tr/183000_183099/183046/02.00.00_60/tr_183046v020000p.pdf
|
The present document specifically describes the differing SDP usage between SIP [i.2] and H.248 [i.3] together with the implied mapping capability that is performed by the MGC/Call Server. SDP [i.1] has been widely selected as the protocol of choice within VoIP (or multimedia; MMoIP) to describe the media requirements of a given session/call/connection. However, the different VoIP control protocols that utilise SDP each specify differing requirements in their use of SDP. There is therefore a need for a MGC/Call Server to arbitrate between these variations in the use of SDP and perform the interworking between them. SDP [i.1] has been widely selected as the protocol of choice within VoIP (or multimedia; MMoIP) to describe the media requirements of a given session/call/connection. However, the different VoIP control protocols that utilize SDP each specify differing requirements in their use of SDP. There is therefore a need for a MGC/Call Server to arbitrate between these variations in the use of SDP and perform the interworking between them. Specifically for the present document, the differing SDP usage between SIP [i.2] and H.248 [i.3] will be described together with the implied mapping capability that is performed by the MGC/Call Server. Any network element (e.g. a MGCF) which handles both H.248/SDP signalling and SIP/SDP signalling provides any necessary interworking between both signalling protocols (see figure 1). Such interworking comprises in general: • interworking between SIP and H.248 signalling on message and procedural level (out of scope of the present document); and • interworking between the two SDP segments (SDP-SDP interworking; the scope of the present document). The function providing SDP-to-SDP interworking between SIP/SDP and H.248/SDP signalling is, in the present document, termed a "SDP Mapper" (see also clause 3.1). The SDP Mapper performs SDP-SDP interworking capability to reconcile the different uses of SDP between control protocols H.248 and SIP. In order to perform this role, the SDP Mapper takes into account i) which parts of SDP are required to be sent on an interface, and ii) which parts of SDP are received on an interface. For a given session/call, which use the two different control protocols at each end, some SDP parameters may be transited whilst others may not. The SDP Mapper ensures that the differing requirements with regard to SDP handling at each end are mutually satisfied. H.248 Media Gateway (MG or MGW) H.248 Media Gateway Controller (MGC) Network Element handling both H.248/SDP and SIP/SDP Signalling Scope of this Technical Report H.248/SDP Gateway Control Protocol (text encoding mode) SIP e.g. SIP Proxy, SIP User Agent, etc SDP Mapper SIP/SDP SIP-I Session Initiation Protocol Figure 1: Scope ETSI ETSI TR 183 046 V3.3.1 (2009-08) 7
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.