hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
504c93785e5ad5926f2f5a2eca89b23b
101 977
5.1 TETRA Codec FEC
For the original TETRA Codec, within a TDMA timeslot of payload 432 bits, conveying two 30 ms speech codec frames, 102 bits are unprotected (Class 0), 112 bits are protected using a 2/3 rate RCPC code (Class 1) and 60 bits are protected with a 8/18 rate RCPC code (Class 2). 4 tail-bits and 8 CRC bits are also encoded a...
504c93785e5ad5926f2f5a2eca89b23b
101 977
5.2 PSQM or Peak-PSQM For Error Sensitivity?
In order to determine if PSQM or Peak PSQM provides are better indicator of Speech Class for the TETRA codec we ordered the distortion values in decreasing order of distortion and compared the predicted Class with the actual Class. The curves for the two distortion measures are presented in figures 5.3 and 5.4. Figure ...
504c93785e5ad5926f2f5a2eca89b23b
101 977
6 PSQM Values for GSM AMR Codec
504c93785e5ad5926f2f5a2eca89b23b
101 977
6.1 4,75 kbit/s Mode
See figures 6.1 and 6.2.
504c93785e5ad5926f2f5a2eca89b23b
101 977
6.2 5,15 kbit/s Mode
See figures 6.3 and 6.4.
504c93785e5ad5926f2f5a2eca89b23b
101 977
6.3 5,9 kbit/s Mode
See figures 6.5 and 6.6.
504c93785e5ad5926f2f5a2eca89b23b
101 977
6.4 6,7 kbit/s Mode
See figures 6.7 and 6.8. 13 ETSI TR 101 977 V1.1.1 (2001-07) 0 2 4 6 8 10 12 14 16 LSF V1 b7 LSF V1 b6 LSF V1 b5 LSF V1 b4 LSF V1 b3 LSF V1 b2 LSF V1 b1 LSF V1 b0 LSF V2 b7 LSF V2 b6 LSF V2 b5 LSF V2 b4 LSF V2 b3 LSF V2 b2 LSF V2 b1 LSF V2 b0 LSF V3 b6 LSF V3 b5 LSF V3 b4 LSF V3 b3 LSF V3 b2 LSF V3 b1 LSF V3 b0 SF1 ACB...
504c93785e5ad5926f2f5a2eca89b23b
101 977
7 Initial FEC Bit Allocations for GSM AMR Codec
The FEC protection of each of the 3GPP/GSM AMR modes must use the same RCPC Polynomials and puncture patterns as the original TETRA Codec. This places some restrictions on the possible FEC permutations available at each speech codec bit rate. Where the maximum FEC rate was set at 2/3 (Class 1 only), the Tail Bits of th...
504c93785e5ad5926f2f5a2eca89b23b
101 977
7.1 4,75 kbit/s Mode
The basic options for the FEC protection of the 4,75 kbit/s mode are shown in figure 7.1 with the Peak PSQM sensitivities in descending order along with their bit definitions. The bit allocations are also shown in table 7.1. Each speech coder frame comprises 95 bits and three speech frames are packed into each TDMA fra...
504c93785e5ad5926f2f5a2eca89b23b
101 977
7.2 5,15 kbit/s Mode
The basic options for the FEC protection of the 5,15 kbit/s mode are shown in figure 7.2 with the Peak PSQM sensitivities in descending order along with their bit definitions. The bit allocations are also shown in table 7.2. Each speech coder frame comprises 103 bits and three speech frames are packed into each TDMA fr...
504c93785e5ad5926f2f5a2eca89b23b
101 977
7.3 5,9 kbit/s Mode
The basic options for the FEC protection of the 5,9 kbit/s mode are shown in figure 7.3 with the Peak PSQM sensitivities in descending order along with their bit definitions. The bit allocations are also shown in table 7.3. Each speech coder frame comprises 118 bits and three speech frames are packed into each TDMA fra...
504c93785e5ad5926f2f5a2eca89b23b
101 977
7.4 6,7 kbit/s Mode
Due to the small number of FEC bits available for FEC protection of the 6,7 kbit/s mode, only one option was tried This is shown in figure 7.4 with the Peak PSQM sensitivities in descending order along with their bit definitions. The bit allocations are also shown in table 7.4. Each speech coder frame comprises 134 bit...
504c93785e5ad5926f2f5a2eca89b23b
101 977
8 Coverage Performance of the FEC Schemes
According to four different channel conditions (Static, TU5, TU50 and HT200), and various C/I conditions, 'soft' channel errors were simulated using a TETRA MODEM and channel simulation package and applied to the FEC encoded data streams prior to FEC decoding and speech was synthesized. Each synthesized speech file was...
504c93785e5ad5926f2f5a2eca89b23b
101 977
8.1 4,75 kbit/s Mode
The results for the four options of FEC for the 4,75 kbit/s mode are shown in figures 8.1 to 8.8. Figures 8.1 and 8.2 are applicable to the static channel, figures 8.3 and 8.4 are applicable to the TU5 channel, figures 8.5 and 8.6 are applicable to the TU50 channel and figures 8.7 and 8.8 are applicable to the HT200 ch...
504c93785e5ad5926f2f5a2eca89b23b
101 977
8.2 5,15 kbit/s Mode
The results for the four options of FEC for the 5,15 kbit/s mode are shown in figures 8.9 to 8.16. As for the 4,75 kbit/s mode, there is a clear trade-off between performance according to the PSQM and the Peak PSQM metrics. Of the four possible FEC options, the method which appears to provide the best balance of perfor...
504c93785e5ad5926f2f5a2eca89b23b
101 977
8.3 5,9 kbit/s Mode
The results for the two options of FEC for the 5,9 kbit/s mode are shown in figures 8.17 to 8.24. The trade-off between PSQM and the Peak PSQM metric performance is again clear. Of the FEC options considered, the method which appears to provide the best balance of performance is Option 2.
504c93785e5ad5926f2f5a2eca89b23b
101 977
8.4 6,7 kbit/s Mode
The results for the FEC of the 6,7 kbit/s mode are shown in figures 8.25 to 8.32. ETSI ETSI TR 101 977 V1.1.1 (2001-07) 28 0 0.5 1 1.5 2 2.5 3 3.5 4 5 6 7 8 9 10 C/I (dB) PSQM TETRA AMR_475 #1 AMR_475 #2 AMR_475 #3 AMR_475 #4 Figure 8.1: Performance of the 3GPP/GSM AMR 4,75 kbit/s Mode for the Static Channel in Terms o...
504c93785e5ad5926f2f5a2eca89b23b
101 977
8.5 Performance of the Selected FEC Schemes
The results of the comparing the error-free speech with the channel impaired speech using ITU-T Recommendation P.861 [1] for the selected FEC schemes for all modes are shown in figures 8.33 to 8.40. The closeness of the performance of the 4,75 kbit/s mode and the TETRA Codec is apparent with little degradation across a...
504c93785e5ad5926f2f5a2eca89b23b
101 977
9.1 4,75 kbit/s Mode
For the 4,75 kbit/s mode, two listening experiments were performed. The first was a preference test on a three-point scale comparing TETRA to the AMR 4,75 kbit/s mode in a pair-wise fashion. The three possible options were; a) 4.75 Mode preferred to TETRA, b) TETRA preferred to the 4.75 Mode, or c) similar quality. The...
504c93785e5ad5926f2f5a2eca89b23b
101 977
9.2 5,15 kbit/s Mode
For the 5,15 kbit/s mode, two listening experiments were performed. The first was a preference test on a three-point scale comparing the AMR 5,15 kbit/s mode to the AMR 4,75 kbit/s mode in a pair-wise fashion as described above. The second test was to establish an approximate threshold of intelligibility/acceptability ...
504c93785e5ad5926f2f5a2eca89b23b
101 977
9.3 5,9 kbit/s Mode
As for the 5,15 kbit/s mode, two listening experiments were performed for the 5,9 kbit/s mode. The first was a preference test on a three-point scale comparing the AMR 5,9 kbit/s mode to the AMR 4,75 kbit/s mode in a pair-wise fashion as described above. The second test was to establish an approximate threshold of inte...
504c93785e5ad5926f2f5a2eca89b23b
101 977
9.4 6,7 kbit/s Mode
As for the 5,15 kbit/s and 5,9 kbit/s modes, two listening experiments were performed for the 6,7 kbit/s mode. The first was a preference test on a three-point scale comparing the AMR 6,7 kbit/s mode to the AMR 4,75 kbit/s mode in a pair- wise fashion as described above. The second test was to establish an approximate ...
504c93785e5ad5926f2f5a2eca89b23b
101 977
10 Conclusions
FEC schemes were designed and evaluated for four GSM/3GPP AMR codec modes (4.75, 5.15, 5.9 and 6,7 kbit/s) as part of the TETRA system. Both objective (ITU-T Recommendation P.861 [1]) and subjective (expert listener) evaluation of the various codec modes was performed. The 4,75 kbit/s AMR mode was shown to provide a cl...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
1 Scope
The present document describes test methods for the low pass section of POTS/ADSL splitters. These splitters are intended to be installed at the Local Exchange side of the local loop and at the user side near the NTP. In the case of splitters at the user side, the present document describes test methods for the master ...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ETSI ETR 328: "Transmission and Multiplexing (TM); Asymmetric Digital Subscriber Line (ADSL); Requirements and performance". [2] ETSI TS 101 388: "Transmission and Multiplexing (TM); Access transmission systems on metallic access cables;...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
3 Definitions and abbreviations
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: A-wire and B-wire: wires in the 2-wire local loop connection provided from the exchange to the NTP on-hook: state of the POTS equipment at either end of a POTS loop connection when the NTP terminal equipment is in the quiescent state N...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: ADSL Asymmetric Digital Subscriber Line CPE Customer Premise Equipment dBm Absolute power level expressed in decibels relative to 1 mW dBV Absolute voltage level expressed in decibels relative to 1 Volt DC Direct Current ITU International Tele...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
4 Introduction
The present document is part 1 of a multi-part deliverable supporting different aspects of European Specific DSL splitters. It has been produced based on the activities of ETSI STF 215. The present document describes test methods for the low pass part of ADSL/POTS splitters. The test methods of the present document are...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
5 Test conditions and general notes
For each test, feeding bridge and holding circuit must comply to the requirements as specified in TBR 38 [7] with respect to the low frequency range. Similar performance is required for the high frequency range (up to 1 MHz). An equivalent accuracy may be obtained by calibrating the feeding bridge and holding circuit a...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.1 Insertion Loss in the Pass Band (POTS)
Void.
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.2 Insertion Loss Distortion in the Pass Band (POTS)
Table 1 Test case name: Insertion Loss in the Pass Band (POTS) and Insertion Loss Distortion in the Pass Band (POTS) Reference: TS 101 952-1-1 [10], clauses 6.4.1, 6.4.2 and 6.5 Test purpose: To evaluate the Insertion Loss in the Pass Band (POTS) as well as the Insertion Loss Distortion in the Pass Band (POTS) in Off-H...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.3 Return loss in the pass band (POTS)
Table 4 Test case name: Return Loss Reference: TS 101 952-1-1 [10], clause 6.6 Test purpose: To evaluate the splitter return loss when tested with the test parameters as given in the related standards Test configuration: See Test Set-up; DUT not configured Test set-up: Signal Source Splitter (DUT) Impedance Analyser Z2...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.4 Group delay distortion in the pass band (POTS)
Table 7 Test case name: Group delay distortion in the pass band (POTS) Reference: TR 101 728 [9], clause 5.11 TS 101 952-1-1 [10], clause 6.12 Test purpose: To measure the increase in group delay distortion in the POTS band caused by the splitter with ADSL load, relative to the lowest measured delay without the splitte...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.5 Isolation (Insertion Loss) at 32 kHz to 1 100 kHz
Table 10 Test case name: Isolation (Insertion loss) at 32 kHz to 1 100 kHz Reference: TR 101 728 [9], clause 5.8 TS 101 952-1-1 [10], clause 6.9 Test purpose: To measure the isolation of the POTS port from the ADSL signals in the frequency range from 32 kHz to 1 100 kHz which may impact voice-band services through non-...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.6 Distortion and intermodulation
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.6.1 Distortion
Table 13 Test case name: Distortion Reference: TR 101 728 [9], clause 5.10.1 Test purpose: To measure the harmonic distortion caused by non-linearities of the splitter Test configuration: See Test Set-up; DUT not configured ETSI ETSI TR 101 953-1-1 V1.1.1 (2002-11) 18 Test set-up: Holding Circuit Splitter (DUT) LINE po...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.6.2 Intermodulation
Table 17 Test case name: Intermodulation Reference: TS 101 952-1-1 [10], clause 6.11 Test purpose: To measure the intermodulation products caused by non-linearities of the splitter Test configuration: See Test Set-up; DUT not configured ETSI ETSI TR 101 953-1-1 V1.1.1 (2002-11) 20 Test set-up: Holding Circuit Splitter ...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.7 DC requirements
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.7.1 DC resistance to earth
Table 21 Test case name: DC resistance to earth Reference: TR 101 728 [9], clause 5.1 TS 101 952-1-1 [10], clause 6.2.1 Test purpose: To evaluate the DC resistance between a-wire and earth as well as b-wire and earth. This test only applies to splitters which provide a terminal which is connected to ground (see note) T...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.7.2 DC Resistance between a-wire and b-wire (open ports)
Table 24 Test case name: DC Resistance between a-wire and b-wire (open ports) Reference: TS 101 952-1-1 [10], clause 6.2.2; TR 101 728 [9], clause 5.1 Test purpose: To evaluate the DC series resistance between a-wire and b-wire of the various ports when all the ports are left open Test configuration: See Test Set-up; D...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.7.3 DC series resistance
Table 27 Test case name: DC series resistance Reference: TS 101 952-1-1 [10], clause 6.2.3 TR 101 728 [9], clause 5.1 Test purpose: To evaluate the DC series resistance between a-wire and b-wire of the LINE port, when a termination is connected to the POTS port and an open circuit is applied to the xDSL port Test confi...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.8 Ringing frequency requirements
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.8.1 Voltage drop at 25 Hz and 50 Hz
Table 30 Test case name: Voltage drop at 25 Hz and 50 Hz (ringing frequency requirements) Reference: TR 101 728 [9], clause 5.3.1 Test purpose: To measure the voltage drop at 25 Hz and 50 Hz when tested with the test parameters as given in the related standards Test configuration: See Test Set-up; DUT not configured ET...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.8.2 Total harmonic distortion at 25 Hz and 50 Hz
Table 33 Test case name: Total harmonic distortion at 25 Hz and 50 Hz (Ringing frequency requirements) Reference: TS 101 952-1-1 [10], clause 6.3.3 Test purpose: To measure the total harmonic distortion at 25 Hz and 50 Hz when tested with the test parameters as given in the related standards Test configuration: See Tes...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.9 Ringing Impedance
Table 36 Test case name: Impedance at 25 Hz and 50 Hz (ringing frequency requirements) Reference: TR 101 728 [9], clause 5.4 Test purpose: To evaluate the ringing impedance at 25 Hz and 50 Hz when tested with the test parameters as given in the related standards Test configuration: See Test Set-up; DUT not configured T...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.10 Unbalance about earth
Table 40 Test case name: Unbalance about earth for the low pass filter Reference: TS 101 952-1-1 [10], clause 6.8 Test purpose: To evaluate the Unbalance about earth of the low pass filter when tested with the test parameters as given in the related standards Test configuration: See Test Set-up; DUT not configured Test...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.11 Noise
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.11.1 Noise in the band from 300 Hz to 4 000 Hz (POTS band)
Table 43 Test case name: Noise in the Band from 300 Hz to 4 000 Hz (POTS Band) Reference: TR 101 728 [9], clause 5.9 TS 101 952-1-1 [10] Test purpose: to evaluate the unwanted noise signal which is produced in the splitter itself without any other signals applied Test configuration: see Test Set-up; DUT not configured ...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.11.2 Noise in the band from 26 kHz to 1 100 kHz (ADSL band)
Table 46 Test case name: Noise in the band from 26 kHz to 1 100 kHz (ADSL band) Reference: TR 101 728 [9], clause 5.9 Test purpose: To evaluate the unwanted noise signal which is produced in the splitter itself without any other signals applied. Test configuration: See Test Set-up; DUT not configured NOTE This test onl...
1188cc386243f37a30d42df3ce3b4b03
101 953-1-1
6.12 Metering at 12 kHz or 16 kHz
Table 49 Test case name: Metering at 12 kHz or 16 kHz Reference: TR 101 728 [9], clause 5.12 TS 101 952-1-1 [10], clause 6.7 Test purpose: To measure the insertion loss at a frequency of 12 kHz or 16 kHz of metering signals Test configuration: See Test Set-up; DUT not configured ETSI ETSI TR 101 953-1-1 V1.1.1 (2002-11...
c5937175d0844f0d1c6367fc4efb0735
102 010
1 Scope
The present document describes the scenarios, services and related features for a wireless access to IP-networks using the Digital Enhanced Cordless Telecommunications (DECT) system. The reference configuration, network architecture and the network functional entities are described. Specific issues are further investig...
c5937175d0844f0d1c6367fc4efb0735
102 010
2 References
For the purposes of this Technical Report (TR), the following references apply: [1] ETSI EN 300 175-1: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview". [2] ETSI EN 300 175-2: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 2: Physical Laye...
c5937175d0844f0d1c6367fc4efb0735
102 010
3 Definitions and abbreviations
c5937175d0844f0d1c6367fc4efb0735
102 010
3.1 Definitions
For the purposes of the present document, the following definitions apply: authentication: process whereby a DECT subscriber is positively verified to be a legitimate user of a particular Fixed Part (FP) and vice-versa ETSI ETSI TR 102 010 V1.1.1 (2001-11) 7 Fixed Part (FP): physical grouping that contains all of the e...
c5937175d0844f0d1c6367fc4efb0735
102 010
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: AAA Authentication Authorization and Accounting ACAP Application Configuration Access Protocol ADPCM Adaptive Differential Pulse Code Modulation ARI Access Rights Identity BOOTP Bootstrap Protocol DHCP Dynamic Host Configuration Protocol DCL D...
c5937175d0844f0d1c6367fc4efb0735
102 010
4 Scenarios and services
c5937175d0844f0d1c6367fc4efb0735
102 010
4.1 IP-data transfer
In figure 1, a basic scenario is given for IP-data transfer: Access Server / Foreign Agent Application Server DECT Fixed Part Terminal Home Agent Figure 1: Basic data scenario
c5937175d0844f0d1c6367fc4efb0735
102 010
4.2 Voice service
In figure 2, a basic scenario is given for voice services: ETSI ETSI TR 102 010 V1.1.1 (2001-11) 9 DECT Portable Part Access Server / Foreign Agent IP Phone DECT Fixed Part Home Agent Figure 2: Basic speech scenario
c5937175d0844f0d1c6367fc4efb0735
102 010
4.3 Video and Multicast
Further scenarios are e.g. video transmission over IP and multicast (streaming, one way) over IP.
c5937175d0844f0d1c6367fc4efb0735
102 010
5 Related features
c5937175d0844f0d1c6367fc4efb0735
102 010
5.1 User identification
Any user should be assigned with a user identifier that will be used by roaming and mobility functions to assess his identity when visiting different access networks. The identifier serves to uniquely identify a user as well as to identify the NSP the user is associated with. Anonymous user identifiers should be possib...
c5937175d0844f0d1c6367fc4efb0735
102 010
5.2 Network Provider Discovery
Terminals should be informed about the identity and characteristics of the providers available at any time and place, and they should be able to establish or release associations with them.
c5937175d0844f0d1c6367fc4efb0735
102 010
5.3 Auto-configuration
Auto-configuration means, that the terminal will automatically discover and register the parameters that it needs to use to connect to the Internet. Typical users do not configure "low-level" parameters in their terminals; they interact with "high-level" or application customization parameters, like user profiles. Appl...
c5937175d0844f0d1c6367fc4efb0735
102 010
5.4 Mobility
A Roaming service, that allows terminals to get network services when visiting "foreign networks" is required. Roaming may be loosely defined as the ability to use any one of multiple Internet service providers, while maintaining a formal customer-vendor relation with only one. In general, all the changes due to termin...
c5937175d0844f0d1c6367fc4efb0735
102 010
5.5 Location information
Location information about the positioning of terminals could be provided for location based services.
c5937175d0844f0d1c6367fc4efb0735
102 010
5.6 Security
End-to-end authentication and encryption may be required for some applications.
c5937175d0844f0d1c6367fc4efb0735
102 010
5.7 Emergency services
Support of emergency services is required for some applications.
c5937175d0844f0d1c6367fc4efb0735
102 010
6 Reference configuration
In figure 3 is shown the reference configuration for the scope of present document: PHY DLC MAC NWK IP TCP/UDP Application PHY DLC MAC NWK IWK Layer 1 Layer IP Layer 1 Layer IP TCP/UDP Application Figure 3: Reference configuration ETSI ETSI TR 102 010 V1.1.1 (2001-11) 11
c5937175d0844f0d1c6367fc4efb0735
102 010
7 Network Architecture
In figure 4 is shown the network reference architecture for the scope of the present document: Foreign Agent Application Mobility Manager, Server, Authorisation, IP Address Service Discovery Communication Manage IP Gateway DECT Fixed DECT Portable End System Terminal Media Gateway Media Controller Internet or Intranet ...
c5937175d0844f0d1c6367fc4efb0735
102 010
8 Network Functional Entities
This clause describes the Network Functional Entities comprising the Network Reference Architecture.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.1 Access gateway
The Access gateway interfaces the access network and the IP network. The Access gateway: • Conveys bearer streams between the access network and the IP network. • Transports control streams between access network and IP network. • Serves as the QoS Policy Enforcement point for control and bearer streams between the acc...
c5937175d0844f0d1c6367fc4efb0735
102 010
8.2 Access network
An access network is a network that allows terminals to attach or detach. The Access Network consists of the DECT Fixed Termination and the DECT Portable Termination.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.3 Accounting
The accounting keeps track of the services, QoS, and multimedia resources requested and used by individual subscribers.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.4 Application server
The application server stores and executes service logic to provide specific voice call and multimedia session services for subscribers. Application Servers may provide services to users that are not related to specific voice calls or sessions.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.5 Authentication
The authentication verifies the identity of a requesting entity.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.6 Authorization
The authorization verifies that the one or more services, the QoS, or the multimedia resources requested by a subscriber are allowed based on the services subscribed and policies of the service provider.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.7 IP address manager
IP address manager controls network level address assignment and recovery of addresses within the address space of the network domain. The IP Address Manager: • Manages IP address allocation status. • Allocates and de-allocates IP addresses. • Accepts and handles allocation or de-allocation requests from the Terminal.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.8 IP gateway
The IP gateway provides controlled access between the local IP network and other IP networks, such as the Internet, intranets or enterprise networks. ETSI ETSI TR 102 010 V1.1.1 (2001-11) 13
c5937175d0844f0d1c6367fc4efb0735
102 010
8.9 Location server
The location server stores all dynamic information associated with subscriber/terminal and service mobility. Location information will include both network location and geographic position.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.10 Media gateway
A media gateway interconnects the local IP network to the PSTN or to circuit terminations.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.11 Media gateway controller
A media gateway controller controls the bearer paths through a media gateway.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.12 Mobility Manager
The Mobility Manager supports the movement of a mobile terminal across Administrative Domain boundaries as well as across Access Gateway boundaries. The Mobility Manager: • Supports IP level (i.e., network layer) mobility management. • Updates the administrative domain location of the mobile subscriber and Terminal in ...
c5937175d0844f0d1c6367fc4efb0735
102 010
8.13 Home agent
Stores subscriber objects containing subscriber identity, subscriber name, service preferences, terminal-to-service associations and transport authorization. Stores terminal objects containing bearer capabilities (e.g. voice packets, data rates), terminal capabilities (e.g. authentication type, call processing, specifi...
c5937175d0844f0d1c6367fc4efb0735
102 010
8.14 Public Switched Telephone Network (PSTN)
The PSTN is a circuit switched network controlled by ISUP. This includes the fixed networks and the circuit-switched portion of wireless service provider networks (e.g. Public Land Mobile Networks). ETSI ETSI TR 102 010 V1.1.1 (2001-11) 14
c5937175d0844f0d1c6367fc4efb0735
102 010
8.15 Service discovery and communication session manager
The service discovery server enables discovery of network services. It provides accessing terminals or other servers with addressing information, server attributes, supported interfaces, etc. The communication session manager provides the controls for all sessions for a given subscriber.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.16 Signalling gateway
A signalling gateway interconnects the local IP network to a legacy signalling (e.g. SS7) networks.
c5937175d0844f0d1c6367fc4efb0735
102 010
8.17 Terminal
A Terminal is a device with allows a subscriber or user to access the network to gain assess to communication services. The Terminal consists of the DECT Portable Termination and the End System. A Terminal: • Terminates bearer streams. • Provides conversion of bearer streams to make them useful to the user (e.g. displa...
c5937175d0844f0d1c6367fc4efb0735
102 010
9 Investigation of specific issues
c5937175d0844f0d1c6367fc4efb0735
102 010
9.1 User identification
For the identification of users the Network Access Identifier (NAI) could be used, which has a syntax similar to an e-mail address, two strings separated by an "@". The first part is made of a username and the second identifies the home NSP of the user.
c5937175d0844f0d1c6367fc4efb0735
102 010
9.2 Addressing and Mobility
When connecting to a network provider, the home IP address will probably be the one agreed when the contract with that provider was signed and will be the same independently of the point the terminal connects to the network. As the terminal moves, different care-of address will be assigned to the terminal to manage mob...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.2.1 Configuration and address allocation
Configuration can be divided up into three main areas. Firstly, there is configuration of the lower layers and assignment of radio resources. Secondly, there is the allocation of an IP address to the terminal. This could be carried out using a variety of options: • Link layer procedures (e.g. analogous to PPP's IPCP). ...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.2.2 Registration procedures and mobile IP
Registration procedures refer to the ability of the user to register the local address of their terminal at some well known global identity. The only class of local address to be considered is the IP address, allocated as described above in clause 9.2.1. Address registration procedures should be carried out preferably ...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.3 Auto-configuration
After having received some network announcements from the available network providers in the area, and, after having taken the decision to associate with a particular one, the auto-configuration phase begins. Auto-configuration is typically based on client-server applications. Clients discover the parameters they need ...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.3.1 Basic IP auto-configuration
Before a mobile station is able to use any IP-based service, several configuration parameters and options need to be properly set inside the TCP/IP protocol stack. Some of them can be set to default or some pre-configured values. But the values for some other parameters cannot be guessed or assumed to have correct defa...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.3.2 Multicast address allocation
Some applications will make use of IP multicast services. Video distribution applications, news services that push information to a high number of users, videoconferences with a high number of participants are examples of applications that benefit from using IP multicast services. Before sending data to a multicast gro...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.3.3 Service discovery
Apart from the basic IP configuration parameters, the auto-configuration process should allow terminals to automatically discover the resources available on an access network, as well as the parameters needed to use them. ETSI ETSI TR 102 010 V1.1.1 (2001-11) 17 Proxy servers that offer specific application services ad...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.4 Mobility Management
As a general principle, applications should be "as unaware as possible" about changes due to mobility of terminals. Whenever possible, all issues related to roaming and mobility should be treated in lower layer levels. For example, movement between cells inside an access network can be treated by the underlying sub-net...
c5937175d0844f0d1c6367fc4efb0735
102 010
9.5 Header compression
For further study, see also RFC1144 [13].
c5937175d0844f0d1c6367fc4efb0735
102 010
9.6 Security
It is preferred to use end-to-end security, which can only be provided by the higher layers.