hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 10.3.2 Dynamic multicast groups | Dynamic multicast groups are groups that allow the ST to elect to join or leave the group at any time, subject to network capability and the ST subscription. Dynamic multicast groups should include support for IP multicast. |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 10.3.3 Multicast addressing | Multicast services use specific IP address in Class D to communicate. The address range defined for multicast is 224.0.0.0 - 239.255.255.255. Some multicast addresses are reserved to multicast signalling protocols on a local network such as group membership protocol (IGMP) and routing protocols, Session Announcement Pr... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 10.3.4 Multicast routing | In the case of dynamic multicast groups, a signalling multicast protocol is required on the BSM network to route IP multicast packets. Two kinds of protocols could be suggested depending on BSM scenarios. These two types of protocols required a bi-directional link between Satellite Terminals. The return link could be e... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.1 Introduction | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.1.1 IP threats | Different attacks can be applied to perturb an IP session; however, we can consider three big families of IP threats: a) IP sniffing: the intruder listens to the traffic transiting over the network. He can have knowledge of the data included in the messages on the network, as well as users' passwords. IP sniffing is ra... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.1.2 BSM security processes | The objective of the BSM network is to provide a wide range of multimedia services for business and consumers. Because of the rich content of data transiting on the network, security becomes a mandatory requirement. Security is intended to protect the user identity, the signalling traffic and the data traffic. The foll... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.2 Security requirements | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.2.1 General performance requirements | Due to the intrinsic broadcast capability of the BSM satellite system, the radio segment constitutes a large network causing some critical security concerns. The BSM security design shall focus on internal interfaces, in particular the air interface between the hub and a satellite terminal in the case of a star network... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.2.2 Compatibility requirements | Analyzing the role and the interest of the different actors (Access Network Operator, Internet Service Provider), it can be possible to have simultaneously different security scheme: • On the BSM network between the hub and the terminals for the star network case. • On the BSM network between 2 or more satellite termin... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.2.3 Services requirements | The BSM system should implement some native mechanisms to provide secure multicast transmission of IP packets on the satellite bi-directional links. The key issues are to implement a secure access control, a scalable key management and an efficient ciphered data-plane which are optimized for multicast environment. Usua... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.3 Security in the satellite independent layers | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.3.1 General | Several different possibilities exist to secure the traffic: • At the application level providing: - Data confidentiality using SSL (Secure Socket Level), PGP ( Pretty Good Privacy), TLS (Transport Layer Security) or others. - Entity authentication using PAP, CHAP or others. • At the network level providing: - Authenti... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.3.2 IPSec | The goal of IPSec is to provide security at the IP layer. IPSec defines three separate components: • Authentication Header (AH): defined in IETF RFC 2402 [29], provides connectionless integrity services, authentication, anti-replay. • Encapsulated Security Payload (ESP): defined in IETF RFC 2406 [30], provides data con... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.3.3 Constraints on the use of IPSec | IPSec has constraints that do not allow it to be used with all kinds of configurations or protocols. Those limitations are: • IPSec is originally configured for unicast sessions. Multicast is however integrated for IPSec over IPv6. • IPSec ESP tolerates no modification of the Layer 4 headers: - This implies that Header... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.4 Security in the satellite dependent layers | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.4.1 General | Security techniques implemented in the satellite dependent layers enables: • to focus on the BSM internal interfaces (as defined in clause 11.2.1); • to offer a total compatibility with higher layer security systems. |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 11.4.2 DVB techniques | At the data link level, DVB defines several different techniques but these do not provide a full suitability for BSM: • DVB-CA is available for DVB-S compatible systems to provide scrambling at the level of the Transport Stream packet (MPEG2 184 bytes packets). This technique is already deployed for digital television ... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12 Performance Enhancing Proxies (PEPs) | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.1 Overview of PEPs | This clause discusses Performance Enhancing Proxy (PEP) performance mitigation techniques as applied to a BSM system. The discussion of PEPs in this clause is based on the discussion in IETF RFC 3135 [22]. A PEP can be used to improve the performance of the Internet protocols on network paths where native performance s... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.2 Definitions | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.2.1 Layering | A PEP implementation may function at any protocol layer but typically it functions at one or two layers only. Consideration of PEP implementations for BSM will focus on implementations that function at the transport layer or at the application layer as such PEPs are most commonly used to enhance performance over links ... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.2.2 Implementation distribution | A PEP implementation may be integrated, i.e. it comprises a single PEP component implemented within a single node, or distributed, i.e. it comprises two or more PEP components, typically implemented in multiple nodes. For example, a distributed PEP implementation is most appropriate for a satellite link for which perfo... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.2.3 Implementation symmetry | A PEP implementation may be symmetric or asymmetric. Symmetric PEPs use identical behaviour in both directions, i.e. the actions taken by the PEP occur independent from which interface a packet is received. Asymmetric PEPs operate differently in each direction. The direction can be defined in terms of the link (e.g. fr... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.2.4 Split TCP connections | A split connection TCP implementation terminates the TCP connection received from an end system and establishes a corresponding TCP connection to the other end system. In a distributed PEP implementation, this is typically done to allow the use of a third connection between two PEPs optimized for the satellite link. Th... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.2.5 Transparency | A transparent PEPs is one that operates totally transparently to the end systems, transport endpoints, and/or applications involved (in a connection), requiring no modifications to the end systems, transport endpoints, or applications. A non-transparent PEP implementation is one that may require modifications to one or... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.3 Negative implications of using PEPs | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.3.1 General | Most of the potential negative implications associated with using PEPs are related to the possibility of breaking the end-to-end semantics of connections. This is one of the main reasons why PEPs are not recommended for general use. NOTE: The end-to-end argument is one of the architectural principles of the Internet. T... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.3.2 Security implications | In most cases, security applied above the transport layer can be used with PEPs, especially transport layer PEPs. The most detrimental negative implication of breaking the end-to-end semantics of a connection is that it disables the use of IPSEC. In general, a user or network administrator must choose between using PEP... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.3.3 Fate sharing | If the end-to-end connection depends upon some state being stored in the network (e.g. in a PEP), then a failure in the network (e.g. the node containing a PEP crashes) causes this state to be lost, forcing the connection to terminate even if an alternate path through the network exists. In the case of BSM networks PEP... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.3.4 End-to-end reliability | If a PEP implementation acknowledges application data prematurely (before the PEP receives an application ACK from the other endpoint), end-to-end reliability cannot be guaranteed. Typically, application layer PEPs do not acknowledge data prematurely, i.e. the PEP does not send an application ACK to the sender until it... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.4 Alternatives to using PEPs | |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.4.1 Alternative transport layer protocols | An alternative to the use of PEPs, is to use an alternative end-to-end transport protocol in place of TCP. This approach should preserve the end-to-end behaviour of the transport layer (see below for the implications) while still permitting part of the protocol to be matched to the characteristics of a link or subnetwo... |
342be278db575e370ea87dcd0bbb4b47 | 101 985 | 12.4.2 Space Communications Protocol Standards (SCPS) | The goal of the Space Communications Protocol Standards (SCPS) project [47] is to provide a suite of standard data handling protocols that (from a user viewpoint) make a remote space vehicle appear to be just another "node on the Internet". A protocol of interest for PEPs is the SCPS Transport Protocol (SCPS-TP) [48], ... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 1 Scope | The present document studies the requirements normally applying to analogue presented PSTN terminal equipment to ensure correct interworking with PSTN network interfaces that would also apply to ADSL modems when connected to the PSTN using microfilters or ADSL splitters without a DC blocking function. The present docum... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 2 References | For the purposes of this Technical Report (TR) the following references apply: [1] ETSI TBR 21: "Terminal Equipment (TE); Attachment requirements for pan-European approval for connection to the analogue Public Switched Telephone Networks (PSTNs) of TE (excluding TE supporting the voice telephony service) in which netwo... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 3 Definitions and abbreviations | |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 3.1 Definitions | For the purposes of the present document, the following definition applies: TBR: Technical Basis for Regulation under the EU Directives 91/263/EEC and 98/13/EEC in TR 101 954 equivalent to deliverables of the series EN 301 4xx when mandated by CEC. |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: AC Alternating Current ADSL Asymmetric Digital Subscriber Line DC Direct Current EG ETSI Guide NTP Network Termination Point (user interface) POTS Plain Old Telephone System PSTN Public Switched Telephone Networks TBR Technical Basis for Regul... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4 General aspects - Rationale for requirements | Analogue presented PSTN requirements have been specified in TBR 21 [1] for the case of a single terminal connected to the line. EG 201 120 [2] is an ETSI guide that tells the manufacturer how to design terminals capable of sharing the resources available at the NTP with other terminals in the installation. The present ... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.1 Polarity | The PSTN line typically has 40 V to 70 V DC powering the POTS service, in each requirement the DC excitation is specified. When the POTS terminal is off hook the voltage appearing across the ADSL modem input will normally be lower depending on the characteristics of the terminal and the line length. Reversals in polari... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.2 DC resistance | The DC current drawn by the ADSL modem when connected to a source of • 100 V DC • 50 V DC • 25 V DC should not exceed that which would be drawn by a 5 MΩ resistor replacing the modem. This requirement applies 30 s after the voltage is applied. The test method is described in TBR 21 [1], clause A.4.4.1. |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.3 Ringing impedance | The impedance of the ADSL modem at frequencies of 25 Hz and 50 Hz should not be less than 20 kΩ. when tested at 30 V rms. The test method is described in TBR 21 [1], clause A.4.4.2.1. |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.4 Transient response | When ringing signals are applied to the ADSL modem, the resulting current should not cause the public exchange to detect a loop state. This can be verified by a DC excitation of 60 V with a source resistance of 200 Ω applied to the modem. The current shall be equal to or less than 25 mA 1 ms after commencement of the e... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.5 DC current during ringing | The resulting DC current drawn by the ADSL modem during the ringing signal, tested with a 25 Hz and 50 Hz AC signal at a voltage of 90 V rms superimposed on a DC voltage of 60 V, shall be less than 0,6 mA. The test method is described in TBR 21 [1], clause A.4.4.2.3. ETSI ETSI TR 101 954 V1.1.1 (2002-02) 8 |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.6 Impedance unbalance about earth | The longitudinal conversion loss when the AC termination of the ADSL modem is 600 Ω should be at least the values given in table 2. Table 2: Longitudinal conversion loss, minimum values Frequency range Minimum value 50 Hz to 600 Hz 54 dB 600 Hz to 3 400 Hz 60 dB The test method is described in TBR 21 [1], clause A.4.4.... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.7 DC resistance to earth | Where the supplier's instructions state that a connection to earth is intended, the DC resistance between each line terminal of the ADSL modem and earth when tested at 100 V DC shall be not less than 50 MΩ. The test method is described in TBR 21 [1], clause A.4.4.4. |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.8 Impedance for PSTN voice band and metering signals | The impedance of the ADSL modem for PSTN voice band and metering frequencies should meet the following requirements. This parameter could be tested by the following test method: ADSL Modem Feed Bridge M + - Impedance Meter NOTE 1: Figure 3 represents an ideal feeding bridge, actual implementation of the test setup is a... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.8.1 Voice band (200 Hz - 4 000 Hz) | The input impedance of the ADSL modem should be greater than or equal to the impedance defined in table 3 and figure 4. Table 3: Minimum impedance requirements in the voice band Frequency (Hz) Impedance (ΩΩΩΩ) 100 10 000 455 10 000 4 000 1 137 ETSI ETSI TR 101 954 V1.1.1 (2002-02) 9 1 10000 1 10 100 1000 10000 Frequenc... |
7e75451d1c95de197b003b3e9b86eaf9 | 101 954 | 4.8.2 Frequencies used for metering pulses (12 kHz and 16 kHz) | At 12 kHz the input impedance of the ADSL modem should be greater than or equal to 379 Ω. At 16 kHz the input impedance of the ADSL modem should be greater than or equal to 284 Ω. ETSI ETSI TR 101 954 V1.1.1 (2002-02) 10 History Document history V1.1.1 February 2002 Publication |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 1 Scope | The present document describes test methods for the high pass section of VDSL/POTS splitters. These splitters are intended to be installed at the Local Exchange side of the local loop and at the user side near the NTP. In the case of splitters at the user side, the present document describes test methods for the master... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 2 References | For the purposes of this Technical Report (TR) the following references apply: [1] ETSI TS 101 270 (all parts): "Transmission and Multiplexing (TM); Access transmission systems on metallic access cables; Very high speed Digital Subscriber Line (VDSL)". [2] ETSI TS 101 952-2-2: "Access network xDSL transmission filters;... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 3 Definitions and abbreviations | |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: A-wire and B-wire: wires in the 2-wire local loop connection provided from the exchange to the NTP on-hook: state of the POTS equipment at either end of a POTS loop connection when the NTP terminal equipment is in the quiescent state N... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: ADSL Asymmetric Digital Subscriber Line CPE Customer Premises Equipment DC Direct Current DSL Digital Subscriber Line dBm Absolute power level expressed in decibels relative to 1 mW DUT Device Under Test ISDN Integrated Services Digital Networ... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 4 Introduction | The present document is part 2, sub-part 2 of a multi-part deliverable supporting different aspects of European Specific DSL splitters. It has been produced based on the activities of ETSI STF 248. The present document describes test methods for the high pass part of VDSL/POTS splitters. The test methods of the present... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 5 Test conditions and general notes | For some tests feeding bridges and holding circuits are foreseen. For all of these tests, feeding bridge and holding circuit must comply with the requirements as specified in TBR 038 [7] with respect to the low frequency range. Similar performance is required for the high frequency range (up to 12 MHz). An equivalent a... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 6.1 Insertion Loss Requirements for Options A, B and C | Table 1 Test case name: Insertion Loss in the Pass Band (VDSL) Reference: TS 101 952-2-2 [2], clause 7.1 Test purpose: To evaluate the Insertion Loss in the Pass Band (VDSL) in when tested with the test parameters as given in the related standards Test configuration: See Test Set-up; DUT not configured ETSI ETSI TR 101... |
0d99d4ddf90232a8f647b617cad89525 | 101 953-2-2 | 6.2 Unbalance about earth requirements for options B and C | 6.2.1 Unbalance about earth requirements for options B and C without DC feeding Table 4 Test case name: Unbalance about Earth Reference: TS 101 952-2-2 [2], clause 7.2 Test purpose: To evaluate the symmetry (unbalance) of the splitter about earth when tested with the test parameters as given in the related standards Te... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 1 Scope | The present document defines the TIPHON framework that enables services to be developed which are able to inter-work across multiple communication network domains and diverse network technologies. The framework identifies services, service capabilities and service applications and defines the relationships between them... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 2 References | For the purposes of this Technical Report (TR), the following references apply: [1] ETSI TR 101 835: "Telecommunications and Internet Protocol Harmonization over Networks (TIPHON); Project method definition". [2] ITU-T Recommendation I.130: "Method for the characterization of telecommunication services supported by an ... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 3 Definitions and abbreviations | |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: administrative domain: bounded entity within which all encompassed constituent elements are under common ownership, operation and management domain: result of the application of specific policies to a specific network technology Intern... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: GSM Global System for Mobile communication IEPS International Emergency Preparedness Scheme ISDN Integrated Services Digital Network RDS Requirements Definition Study SCD Service Capability Definition SP Service Provider ETSI ETSI TR 101 877 V... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 4 Services and service capabilities framework | Traditional approaches to developing services offered by communications networks have largely been specific to a single network technology, such as ISDN. This has tended to create problems in enabling services to operate across multiple network technologies. An alternative approach is to derive a core set of capabiliti... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 4.1 The ITU ISDN approach to describing services | ITU-T Recommendations I.130 [2], I.140 [3] and I.210 [4] describe a method of describing service applications in the Integrated Services Digital Network (ISDN) by bearer and teleservice attributes. In general bearer services offer bearer attributes to teleservices and the teleservices provide service by manipulation of... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 4.2 The TIPHON environment | The TIPHON environment considers the case where multiple networks, possibly employing differing network technologies, inter-work to provide end-to-end communications services as shown in figure 1. This model supports the different business roles found within the heterogeneous communications environment envisaged by TIP... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 4.3 Service capability framework | TIPHON identifies a number of concepts when considering the TIPHON Application Plane. These are derived from a decomposition of a service into constituent elements. TIPHON places the following meanings on the terminology used to describe services as follows: Service: commercial offering to a customer. It comprises func... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 5 Building service applications | There are essentially two approaches to the development of Service Applications. One approach is to analyse the requirements of an envisaged Service Application and then decompose this to the point of identifying the constituent Service Capabilities that will be required for implementation - a "Top Down" approach. The ... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 5.1 Structuring service applications | In determining which Service Capabilities will be required to construct a Service Application, or identifying whether new Service Capabilities will be required, the service designer will create a model for the service application. This will consider the: • scope of the Service Application and the application of the des... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 5.2 Service application models | To enable Service Applications to be developed that will inter-work across the various domains within the TIPHON environment, they need to reflect an end-to-end model of this kind. To aid this process, TIPHON has identified the application environment model, shown in figure 4. In the example shown, there are three Serv... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 6 Deriving service capabilities | |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 6.1 Structuring service capabilities | TIPHON identifies core Service Capabilities through the analysis of elemental Service Applications as part of a TIPHON Requirements Definition Study [1]. Service Applications, such as Simple Call that constitute the simplest form of an application that implements the functionality of a particular type of service, are e... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 6.2 Service capability model | The TIPHON Service Capability Model identifies the following elements for a Service Capability Definition: • scope; • behaviour, including state transitions; • Service Capability Identifier; • failure modes. A Service Capability Definition has to describe the above items at the points at which users and/or network doma... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7 Simple call service application | As an example, the following clause demonstrates the use of the approach described in the present document to the provision of a call service application. The objective in this clause is to demonstrate the principles of the approach, rather than provide a normative specification - which shall be provided in the relevan... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.1 Simple call as a basic service application | The primary function of a communications network is to enable, establish and appropriately control the flow of information between the users of the network. From this core functionality, additional features may be developed to meet a range of other needs - such as behaviour when a called user is not available. For a ne... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.1.1 Scope of the simple call service application | It is possible to consider a number of Service Applications that could be considered to be a "Simple Call". Each of these "Simple Calls" is differentiated from another by its scope of use and functionality. The differences between the various types of call arise from specific requirements, which may include behaviours ... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.1.2 Behaviour of the simple call service application | The following definitions provide some insight into the behaviour of a call in a communications network: • a call is defined by ISO as "any temporary relationship capable of transferring a continuous stream of information between two or more users of a telecommunications system. In this context a user may be a person o... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.1.3 Use of service capabilities | Service Capabilities required to support the Simple Call Service Application do not exist at the time of writing and therefore need to be created. If appropriate Service Capabilities were available, this clause would discuss how they would be used and identify any additional Service Capabilities that need to be defined... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.2 Service capabilities for simple call | An initial analysis of the Simple Call Service Application shows that a number of Service Capabilities are required to provide the aggregate functionality required. These Service Capabilities are declared in the following clauses and will be developed further in their respective Service Capability Definitions [1]. |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.2.1 Simple connectivity control | Scope: - to establish a temporary logical association between a calling entity and another entity for the purpose of conveying information. This applies to TIPHON scenarios 0, 1 ,2 and 3. Attributes: - a user shall supply a name corresponding to another user to whom a connection is desired; - a failure reason shall be ... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 7.2.2 Simple registration | Scope: - to establish a temporary logical association between an entity requesting registration and an entity offering registration. This applies to TIPHON scenarios 0, 1, 2 and 3. Attributes: - a user shall supply credentials for registration; - the things which the registering user may do are maintained as a profile.... |
136f0a62f8a62f5a8a7099f8730bbe18 | 101 877 | 8 Prioritized requirements | The present document has described the method of using Service Capabilities in the TIPHON environment and identified the Simple Call Service Application. TIPHON Release 3 shall develop the set of Service Capabilities required to support this Service Application and the associated register of TIPHON Service Capabilities... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 1 Scope | The present document gives guidance on a common methodology for studying the impact of noise on xDSL performance (maximum reach, noise margin, maximum bitrate) when changing parameters within various Spectral Management scenarios. These methods enable reproducible results and a consistent presentation of the assumed co... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 2 References | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. • For a specific reference, subsequent revisions do not apply. • Non-specific reference may be made only to a complete document or a part thereof and only in the following cases: - if it is accept... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 2.1 Normative references | The following referenced documents are indispensable for the application of the present document. For dated references, only the edition cited applies. For non-specific references, the latest edition of the referenced document (including any amendments) applies. Not applicable. |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 2.2 Informative references | The following referenced documents are not essential to the use of the present document but they assist the user with regard to a particular subject area. For non-specific references, the latest version of the referenced document (including any amendments) applies. SpM [i.1] ETSI TR 101 830-1: "Transmission and Multipl... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 3 Definitions and abbreviations | |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: access port: physical location, appointed by the loop provider, where signals (for transmission purposes) are injected into the local loop wiring access rule: mandatory rule for achieving access to the local loop wiring, equal for all ... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: 2B1Q 2-Binary, 1-Quaternary (Use of 4-level PAM to carry two buts per pulse) ADSL Asymmetric Digital Subscriber Line BER Bit Error Ratio CAP Carrier less Amplitude/Phase modulation CMP Cable Management Plan DFE Decision Feedback Equalizer DMT ... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4 Transmitter signal models for xDSL | A transmitter model in this clause is mainly a PSD description of the transmitted signal under matched conditions, plus an output impedance description to cover mismatched conditions as well. PSD masks of transmitted xDSL signals are specified in several documents for various purposes, for instance in TR 101 830-1 [i.1... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.1 Generic transmitter signal model | A generic model of an xDSL transmitter is essentially a linear signal source. The Thevenin equivalent of such a source equals an ideal voltage source Us having a real resistor Rs in series. The output voltage of this source is random in nature (as a function of the time), and occupies a relatively broad spectrum. Corre... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.2 Transmitter signal model for "ISDN.2B1Q" | The PSD template for modelling the "ISDN.2B1Q" transmit spectrum is defined by the theoretical sinc-shape of PAM encoded signals, with additional filtering and with a noise floor. The PSD is the maximum of both power density curves, as summarized in expression 1 and the associated table 1. The coefficient qN scales the... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.3 Transmitter signal model for "ISDN.2B1Q/filtered" | When ISDN signals have to pass a low-pass filter (such as in an ADSL splitter) before they reach the line, the disturbance caused by these ISDN systems to other wire pairs will change, as well as their performance. SpM studies should therefore make a distinction between crosstalk generated from ISDN systems connected d... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.4 Line-shared signal model for "ISDN.2B1Q" | The PSD template for modelling the line-shared signal from an ISDN.2B1Q transmitter that has passed the low-pass and the high-pass part of a splitter/filter for sharing the line with ADSL signals, is defined in table 3 in terms of break frequencies. It has been constructed from the transmitter PSD template, filtered by... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.5 Transmitter signal model for "ISDN.MMS43" | The PSD template for modelling the "ISDN.MMS43" transmit spectrum (also known as ISDN.4B3T) is defined by a combination of a theoretical curve and a noise floor. The PSD is the maximum of both power density curves, as summarized in expression 2. The source impedance equals 150 Ω. ] / [ ) ( ) ( ] / [ 1 1 1 1 sinc sinc s... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.6 Transmitter signal model for "ISDN.MMS43/filtered" | When ISDN signals have to pass a low-pass filter (such as in an ADSL splitter) before they reach the line, the disturbance caused by these ISDN systems to other wire pairs will change, as well as their performance. SpM studies should therefore make a distinction between crosstalk generated from ISDN systems connected d... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.7 Line-shared signal model for "ISDN.MMS43" | The PSD template for modelling the line-shared signal from an ISDN.MMS43 transmitter (also known as vv ISDN.4B3T), that has passed the low-pass and the high-pass part of a splitter/filter for sharing the line with ADSL signals, is defined in table 5 in terms of break frequencies. It has been constructed from the transm... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.8 Transmitter signal model for "HDSL.2B1Q" | The PSD templates for modelling the spectra of various "HDSL.2B1Q" transmitters are defined by the theoretical sinc-shape of PAM encoded signals, with additional filtering and a noise floor. The PSD template is the maximum of both power density curves, as summarized in expression 3 and associated table 6. The coefficie... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.9 Transmitter signal model for "HDSL.CAP" | The PSD templates for modelling signals generated by HDSL.CAP transmitters are different for single-pair and two-pair HDSL systems. The PSD templates for modelling the "HDSL.CAP/1" transmit spectra for one-pair systems and "HDSL.CAP/2" transmit spectra for two-pair systems are defined in terms of break frequencies, as ... |
08e1ba5192b27e9b78740fab31d0eae8 | 101 830-2 | 4.10 Transmitter signal model for "SDSL" | The PSD templates for modelling the spectra of "SDSL" transmitters are defined by the theoretical sinc-shape of PAM encoded signals, plus additional filtering and a noise floor. The transmit spectrum is defined as summarized in expression 4 and the associated table 8. NOTE: These models are applicable to SDSL 16-UC-PAM... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.