hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
54aede64413370e5b8c040dc45be9216
101 771
8 Threat Analysis and possible Countermeasures
In this clause a description of common threats concerning the network and service architecture of TIPHON is given, in order to evaluate risks. Sophisticated application services based on generic TIPHON services are not taken into account. The likelihood of the threats is different and will be covered in clause 9. These...
54aede64413370e5b8c040dc45be9216
101 771
8.1 Denial of service
An entity fails to perform its function or prevents other entities from performing their functions. More comprehensive descriptions and functions can be found in clause B.1.
54aede64413370e5b8c040dc45be9216
101 771
8.1.1 Possible Attack Methods
• Flooding the target. • Modifying stored information (e.g. user profile, routing information). • Physical removing of resources (e.g. theft of equipment). • Cutting off network connections.
54aede64413370e5b8c040dc45be9216
101 771
8.1.2 Impact
• Inability to provide the service. • Service failure. • Degradation of service. • Loss of revenue. • Reduction of customer satisfaction (may lead to loss of customers).
54aede64413370e5b8c040dc45be9216
101 771
8.1.3 Possible Countermeasures
• Authentication (see clause C.1). • Access Control (see clause C.3). • Secure Configuration of Operating Systems (see clause C.5). • Physical Protection (see clause C.8).
54aede64413370e5b8c040dc45be9216
101 771
8.2 Eavesdropping
A breach of confidentiality by unauthorized monitoring of communication, see clause B.2.
54aede64413370e5b8c040dc45be9216
101 771
8.2.1 Possible Attack Methods
• Attaching a protocol analyser to any accessible link. • Illegal use of lawful interception facilities. • Illegal activation of optional features/tools (e.g. conference features). ETSI ETSI TR 101 771 V1.1.1 (2001-04) 18
54aede64413370e5b8c040dc45be9216
101 771
8.2.2 Impact
• Loss of confidentiality of customer data. • Loss of confidentiality of service information data. • Loss of confidentiality of management information. • Loss of confidentiality of charging information. • Loss of confidentiality of authentication data.
54aede64413370e5b8c040dc45be9216
101 771
8.2.3 Possible Countermeasures
• Virtual Private Network (see clause C.4). • Access Control (see clause C.3). • Secure Configuration of Operating Systems (see clause C.5). • Secure Configuration of Network Elements (see clause C.6). • Physical Protection (see clause C.8). • Encryption (see clause C.9).
54aede64413370e5b8c040dc45be9216
101 771
8.3 Masquerade
The pretence of an entity to be a different entity, see clause B.3. This may be the bases for other threats like unauthorized access or forgery.
54aede64413370e5b8c040dc45be9216
101 771
8.3.1 Possible Attack Methods
• Hijack attack on a link after authentication has been performed. • Using authentication information which has been obtained by eavesdropping, e.g. replay attack.
54aede64413370e5b8c040dc45be9216
101 771
8.3.2 Impact
• Illegal access to the service/network. • Loss of revenue. • Financial disadvantage for individual legal subscribers. • Loss of confidentiality. • Loss of confidence in the system.
54aede64413370e5b8c040dc45be9216
101 771
8.3.3 Possible Countermeasures
• Authentication by strong methods like one-time password, challenge response (see clause C.1). • Digital Signature (see clause C.2). • Virtual Private Network (see clause C.4). • Access Control (see clause C.3). • Physical Protection (see clause C.8). ETSI ETSI TR 101 771 V1.1.1 (2001-04) 19 • Encryption (see clause C...
54aede64413370e5b8c040dc45be9216
101 771
8.4 Unauthorized access
An attacker gains access to a system or application without permission, see clause B.5.
54aede64413370e5b8c040dc45be9216
101 771
8.4.1 Possible Attack Methods
• Exploiting system weaknesses. • Masquerading as an entity with higher access permission.
54aede64413370e5b8c040dc45be9216
101 771
8.4.2 Impact
• Loss of revenue. • Illegal use of service. • Loss of confidentiality. • Loss or corruption of information. • Forgery. • Denial of service.
54aede64413370e5b8c040dc45be9216
101 771
8.4.3 Possible Countermeasures
• Authentication (see clause C.1). • Access Control (see clause C.3). • Secure Configuration of Operating Systems (see clause C.5). • Secure Configuration of Network Elements (see clause C.6). • Virtual Private Network (see clause C.4). • Digital Signature (see clause C.2).
54aede64413370e5b8c040dc45be9216
101 771
8.5 Loss of information
The destruction of information, which may be stored or in transit along a path of communication. There is a difference in the impact of this threat to the users and the service providers. More information can be found in clause B.4.
54aede64413370e5b8c040dc45be9216
101 771
8.5.1 Possible Attack Methods
• Deletion of data. • Modification of access rights of other parties (as a consequence of an unauthorized access attack).
54aede64413370e5b8c040dc45be9216
101 771
8.5.2 Impact
• Incorrect routing and addressing of messages. • Loss of availability (e.g. denial of service). • Loss of charging information. ETSI ETSI TR 101 771 V1.1.1 (2001-04) 20 • Loss of call content. • Loss of revenue.
54aede64413370e5b8c040dc45be9216
101 771
8.5.3 Possible Countermeasures
• Access Control (see clause C.3). • Secure Configuration of Network Elements (see clause C.6). • Secure Configuration of Operating Systems (see clause C.5). • Physical Protection (see clause C.8).
54aede64413370e5b8c040dc45be9216
101 771
8.6 Corruption of information
The compromise of data integrity by unauthorized insertion, modification or reordering. More information can be found in clause B.4.
54aede64413370e5b8c040dc45be9216
101 771
8.6.1 Possible Attack Methods
• Modifying transmitted information. • Modifying stored information (e.g. by masquerading or bypassing access control).
54aede64413370e5b8c040dc45be9216
101 771
8.6.2 Impact
• Incorrect routing and addressing of messages. • Various forms of interruption preventing access or communication. • Unauthorized modification of information. • Denial of service. • Incorrect billing. • Loss of trust. • Loss of customers.
54aede64413370e5b8c040dc45be9216
101 771
8.6.3 Possible Countermeasures
• Authentication (see clause C.1). • Access Control (see clause C.3). • Secure Configuration of Operating Systems (see clause C.5). • Secure Configuration of Network Elements (see clause C.6).
54aede64413370e5b8c040dc45be9216
101 771
8.7 Repudiation
One or more users involved in a communication deny participation. More information can be found in annex B.
54aede64413370e5b8c040dc45be9216
101 771
8.7.1 Possible Attack Methods
• Denial of transmission. ETSI ETSI TR 101 771 V1.1.1 (2001-04) 21 • Denial of data receipt. • Denial of data access. • Denial of modification of data.
54aede64413370e5b8c040dc45be9216
101 771
8.7.2 Impact
• Loss of revenue. • Loss of trust. • Loss of customers.
54aede64413370e5b8c040dc45be9216
101 771
8.7.3 Possible Countermeasures
• Access Control (see clause C.3). • Secure Configuration of Network Elements (see clause C.5). • Non-repudiation measures (see clause C.12).
54aede64413370e5b8c040dc45be9216
101 771
9 Risk Assessment
A potential threat is doing no harm unless there is a corresponding weakness in the system and until the point in time when the intruder exploits a weakness. Thus, the threats must be evaluated, i.e. it should be attempted to characterize them according to cost/effort involved (occurrence likelihood) and according to p...
54aede64413370e5b8c040dc45be9216
101 771
9.1 Methodology
In a first step all threats are evaluated according to the following scheme: • evaluate impact (= "I") on each threatened subject, e.g. using three different levels (1 through 3); • identify likelihood of occurrence (= "0") for each threat, using three different levels (1 through 3); • calculate a risk factor (= "Ix0")...
54aede64413370e5b8c040dc45be9216
101 771
9.2 Evaluation of Risks
This clause gives figures for likelihood and impact of identified attack scenarios and calculates the risk factors for TIPHON compliant systems. It shall be noted that this threat analysis identifies and analyses threats on network elements and reference points from a generic point of view. Thus it does not reflect pos...
54aede64413370e5b8c040dc45be9216
101 771
9.3 Effectiveness of Countermeasures
This clause applies the countermeasures as listed in clause 10.1 and generally described in annex C to all threats classified as critical risks (i.e. risk factors 6 and 9), associates new values for likelihood and impact (named L* and I*) and calculates the residual risk factor (as RF*). It is assumed that the impact m...
54aede64413370e5b8c040dc45be9216
101 771
10 Recommendations
54aede64413370e5b8c040dc45be9216
101 771
10.1 Security Policy
Operators and service providers of TIPHON compliant systems shall establish and apply a security policy. It is a set of rules and practices that specify or regulate how a system or organization provides security to protect sensitive and critical system resources. The threat analysis as performed in the clauses prior to...
54aede64413370e5b8c040dc45be9216
101 771
10.2 Recommendation to the TIPHON Security Profiles
As to be seen in clause 9.3. some countermeasures are identified as means to secure a wide range of threats. Especially Authentication and Encryption are mentioned in numerous circumstances. These countermeasures, however, can be implemented in various ways and thus offer high or only medium security. For all implement...
54aede64413370e5b8c040dc45be9216
101 771
10.3 Recommendation to the TIPHON network architecture
Based on the security objectives and identified threats it is highly recommended to consider security measures while developing the network architecture. An example may be redundant systems to meet the availability requirements. The security objectives should also be adapted at the real implementation by network operat...
54aede64413370e5b8c040dc45be9216
101 771
10.4 Recommendation to TIPHON Services
For each TIPHON Service it may be necessary to additionally establish a service specific security policy. It should contain e.g. administrative rights, access rights for users and operators, ... For further study ETSI ETSI TR 101 771 V1.1.1 (2001-04) 28 Annex A: Legislation Issues The following areas of legislation may...
74be785671b29f80349cf9d99ee2e0c0
101 768
1 Scope
The present document gives guidance on the different aspects of analogue ringing signals. The present document aims at listing the different parameters that must be taken into account when drafting specifications or other documentation on which analogue ringing signals have an impact or influence. The present document ...
74be785671b29f80349cf9d99ee2e0c0
101 768
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ETSI EN 300 001: "Attachments to the Public Switched Telephone Network (PSTN); General technical requirements for equipment connected to an analogue subscriber interface in the PSTN". [2] ETSI TR 101 183: "Public Switched Telephone Netwo...
74be785671b29f80349cf9d99ee2e0c0
101 768
3 Definitions, symbols and abbreviations
74be785671b29f80349cf9d99ee2e0c0
101 768
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: answer signal: indication that a terminal is answering an incoming call balanced ringing: the ringing voltage is applied to both A and B wires. Each line carries half the ringing voltage (with respect to earth potential), 180 degrees o...
74be785671b29f80349cf9d99ee2e0c0
101 768
3.2 Symbols
For the purposes of the present document, the following symbols apply: µ micro µF micro farad % percent V volt Ω ohm ETSI ETSI TR 101 768 V1.1.1 (2000-12) 6
74be785671b29f80349cf9d99ee2e0c0
101 768
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: ac alternating current dc direct current DSL Digital Subscriber Loop Hz Hertz rms root mean square SLIC Subscriber Line Interface Circuit
74be785671b29f80349cf9d99ee2e0c0
101 768
4 Technical requirements
74be785671b29f80349cf9d99ee2e0c0
101 768
4.1 Application to line
Two methods of ringing generation are commonly used, balanced ringing and unbalanced ringing. The use of balanced ringing minimizes the risk of crosstalk in adjacent cable pairs. Modern SLIC design follows this principle and integrates ringing on the SLIC chip, saving a ring relay, additional ring generator and therefo...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.2 DC voltage
The traditional way to detect ring trip is to monitor the dc current drawn from line by terminal equipment during ring generation. The ac ringing signal was therefore superimposed on a dc voltage. Terminal manufacturers could rely on this dc voltage during ringing to draw limited current for powering certain low power ...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.3 Frequency
Ringing generators use various ringing frequencies. The most common frequencies used are 25 Hz and 50 Hz, with a tendency towards 25 Hz. To ensure reliable detection by all terminals, a ringing signal frequency of 25 Hz ± 8 % is recommended for ringing generators, and for terminal equipment it is recommended to detect ...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.4 Waveform
The waveform of the voltage output of the ring generator should be sinusoidal, when measured directly at the output of the line card under specified loads (depending on the drive capability of the line card, or as required by the operator). A peak to rms ratio (Crest Factor) of 1,2 to 1,6 is recommended to limit harmon...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.5 Distortion
Ring signal distortion may be originated either from the ringing generator itself (distortion of the voltage source) and/or from the non-linear characteristics of the load (distortion of the ringing current). It is therefore necessary to specify the distortion of the output voltage of the generator, loaded with a linea...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.6 Switching noise
The ringing signal should be applied to line and removed from line at the dc-offset level during the ringing cadence in order to minimize switching transients. These transients generate switching noise that can cause crosstalk in adjacent subscriber connections and interfere with DSL applications. For single line (subs...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.7 Maximum voltage level
The maximum ringing voltage under no load conditions should be 100 Vrms, in order to prevent potential damage to terminals. In any event, safety limits should not be exceeded.
74be785671b29f80349cf9d99ee2e0c0
101 768
4.7.1 Peak voltage
The peak voltage (ac plus dc), across the A- and B- wires should not exceed 184 V. This ensures the prevention of false ring tripping due to over voltage protectors firing. The clipping caused by the over voltage protectors will cause additional distortion that can influence DSL applications negatively. ETSI ETSI TR 10...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.8 Minimum voltage under load
A ringing generator should be able to produce a ring signal adequate for detection by terminals connected to the end of the subscriber line. Influential factors that need to be considered are the maximum number of terminals that will possibly be connected to one line, the minimum allowable ring impedance of each termin...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.9 Ringing cadences
The ringing cadences used may differ between networks. To ensure interoperability it is necessary for terminal manufacturers to ensure detection of the various ringing cadences. Distinctive ringing is a reality, a universal ringing cadence is therefore not probable. Due to the high voltages usually associated with ring...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.10 Ring trip
The ringing signal should be removed as quickly as possible (typically 100 ms) upon reception of an answer signal to minimize the possibility of acoustic shock, to increase user comfort (especially on terminals with headsets) and to minimize the negative influence on DSL applications. This influence is due to distortio...
74be785671b29f80349cf9d99ee2e0c0
101 768
4.11 False ring trip
False ring tripping should not be caused by normal ring load conditions. This could result in: a) The network returning false busy signals to the calling party. b) False call completion or connect signals to the network which in turn results in the calling party being charged for a connection that was not made. c) No i...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
1 Scope
The present document: • performs a study of the global usage and acceptance of non-radio TBRs and related documents, • identifies the implications of any change to the existing TBRs or related documents; • gives guidance on future handling of the content of these documents. NOTE: Annex A lists documents within the scop...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
2 References
For the purposes of this Technical Report (TR) the following references apply: [1] ETSI TR 103 000-1: "Access and Terminals (AT); Analogue Access to Public Telephone Network; Advisory Notes to Standards Harmonizing Terminal Interface; Part 1: List of all Advisory Notes". [2] ETSI TR 103 050: "Access and Terminals (AT);...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
3 Definitions and abbreviations
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: TBR: Technical Basis for Regulation under the EU Directives 91/263/EEC [4] and 98/13/EC [5]; in the present document equivalent to deliverables of the series EN 301 4xx when mandated by CEC.
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: AN Advisory Note ATAAB Analogue Type Approval Advisory Board CEC Commission of the European Community CTR Common Technical Requirement DR Direct Reference within legislation DTAAB DECT Type Approval Advisory Board EEA European Economic Area EU...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4 Research on current applications of TBRs
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.1 Strategy adopted
Two surveys were conducted to provide an indication of the extent of use of TBRs and related documents. The first survey was initially sent to AT members, members of related ETSI committees; members of TRAC; and members of the associated TAABs (ATAAB and ITAAB). The returned information was then be analysed and a secon...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.2 Phase 1 questionnaire
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.2.1 Summary of phase 1 questionnaire
The recipient of the survey was requested to complete the following information for each non-Radio TBR for which they hold related information: • Admin/Organization: Names of all organizations known to make use of the TBR. • Type: Type of Organization. • Date of Info: When this information was last checked. • No of use...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.2.2 Summary of answers obtained to phase 1 questionnaire
Responses were received from 10 sources including manufacturers, a certifier, PTOs and administrations. Table 1 lists the responses received in TBR order. Table 1: Phase 1 questionnaire response summary TBR No of Countries No of Admin No of PTO No of Others Comments TBR 001 [26] 8 7 1 TBR 002 [27] 8 7 1 TBR 003 [28] 41...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.2.3 Preliminary analysis
Some specific TBRs are formally cited in regulation in non-EEA countries. There is also evidence of TBRs being used for procurement, voluntary certification, and network compatibility, including declarations required under article 4.2 of the R&TTE Directive 1999/5/EC [6]. These preliminary findings support the initiati...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.3 Phase 2 questionnaire
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.3.1 Summary of phase 2 questionnaire
The purpose of the second questionnaire was to establish the degree of acceptance and usage of non-Radio TBRs. Recipients of the second questionnaire included contacts from the following types of organizations: 1) Administrations (Regulators and Certification/Type Approval Authorities) 2) National Standards Organizatio...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.3.2 Summary of answers obtained to phase 2 questionnaire
The summary of the responses to the questionnaire have been divided in to three tables. Table 5 relates to the Regulators and Administrations; table 6 to the National Standards Organizations and table 7 to the Network Operators. The following notes should be read in conjunction with the aforementioned tables. NOTES: CZ...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
4.4 Conclusions of research
Despite the relatively low response to the questionnaire, in general those countries that are moving towards implementing R&TTE Directive 1999/5/EC [6] did not see any value in maintaining the TBRs as TBRs. However, there was support for maintaining and further developing the technical content of the non-radio TBRs in ...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
5.1 Status of non-radio TBRs
TBRs were produced by ETSI under a EU commission mandate to support the TTE directive (initially under EU Directive 91/263/EEC [4] which was repealed by EU Directive 98/13/EEC [5]). Most were cited as harmonized standards under one of these directives. The technical content of the TBRs was dictated by a combination of ...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
5.2 Status of CTRs
CTRs are European Commission or council decisions under the TTE Directive that bring TBRs or ENs into legal force. CTRs have now ceased to have effect and any status since 7th April 2001. CTRs 1, 2, 8, 13, 15, 17, 21, 24, 25, 33, 34, and 38 invoke the TBRs directly and do not differ in scope of application to the TBRs....
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
5.3 Status of ATAAB and ITAAB Notes
TRAC was formed under the TTE to advise the EU commission on regulatory matters relating to terminal equipment subject to that directive. TRAC recognized that standards documents on occasion need amendment and correction but were eager that the introduction of terminals, especially those of innovative design should not...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
5.4 Status of EN 301 401 and EN 301 437
Both these documents were produced under the same mandate as for the TBRs, and only contain requirements consistent with the TTE essential requirements. Neither of these is however cited in an appropriate CTR. EN 301 401 [7] was intended as a replacement for TBR 001 [26] and TBR 002 [27]. EN 301 437 [8] in effect appli...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
5.5 Status of other related documents
A number of documents currently under the editorial control of other bodies make significant reference to the non-Radio TBRs. In TBR 010 [48] Edition 3, reference is made to requirements in TBR 038 [47] where TBR 008 [33] is also referenced with respect to some test methods. Consequently the future and currency of the ...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6 Discussion of options for the future
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.1 Overview of available deliverables
The following ETSI deliverable types are relevant to the present document: • EN European Standard voted by NSOs (may also have public enquiry); • ES ETSI Standard voted by all ETSI members; • EG ETSI Guide voted by all ETSI members; • TS Technical Specification approved by Technical body; • TR Technical Report approved...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2 TBRs, EN 301 401, and EN 301 437
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.1 General
AT has responsibility for a number of TBRs (refer Annex A). Additionally AT holds responsibility for EN 301 401 [7] and EN 301 437 [8]. While these document remain in use AT has the responsibility for appropriate maintenance of the contents. The ETSI technical working procedures allow for TBRs to be maintained by amend...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.2 Cease maintenance of the TBRs
At the first meeting of TC AT the general future of TBRs were discussed. The option to withdraw TBRs completely after 7th April 2001 was rejected as it was considered TBRs would have ongoing use after that date. The present document is intended in part to verify this view. The option of declaring TBRs obsolescent was r...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.3 Retaining TBR identity
The TBR document identity is widely recognized in a global context, both within and outside the EEA. In consideration of the regulatory history of TBRs and their current status within EEA countries, the working practices of some NSOs may not permit them to consider, or approve revisions of TBRs. The original purpose of...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.4 Conversion from TBR yy to EN 301 4yy
The status of ENs is not self evident with some having regulatory significance and others not. The EN 301 4xx series were reserved by the ETSI secretariat for conversion of TBRs. The original purpose of the TBRs was to fulfil a regulatory mandate from the European commission. On conversion to an EN 301 4xx document the...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.5 Conversion to other EN numbered deliverables
The issues are the same as for the EN 301 4xx numbering range except that there will be no implicit linkage with previous EU regulatory regimes. ETSI ETSI TR 101 844 V1.1.1 (2002-04) 24
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.6 Conversion to ES deliverable
There is no implicit linkage with the previous EU regulatory regime. The ES 203 0xx series is reserved by the ETSI secretariat for conversion of TBRs. The ES option will enable non-EU members with interests in the revision of the contents to formally express their opinions within the approval process. The timeframe for...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.2.7 Conversion to TS deliverable
There is no implicit linkage with the previous EU regulatory regime. The TS 103 0xx series is reserved by the ETSI secretariat for conversion of TBRs. The TS option only requires formal agreement from within the responsible Technical body. This is the quickest option, but may not have wide enough acceptance/approval to...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.3 Current advisory notes
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.3.1 General
The advisory notes were published by TRAC. AT have the responsibility for maintaining the technical content and proposing solutions. The role of TRAC ceased after 7th April 2001 at the end of the transition arrangements for the R&TTE. The continued availability of ATAAB and ITAAB notes is important to the correct appli...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.3.2 ATAAB notes
EG 201 121 [3] contains ATAAB Notes and unendorsed advisory notes. Until 7th April 2001 any TRAC endorsed note may be additionally included within a revision of EG 201 121 [3]. After 7th April 2001 revisions of existing ATAAB notes will need to follow the relevant ETSI procedure. The decision reached during the TC AT#3...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.3.3 ITAAB notes
ITAAB Notes were published individually by TRAC, with an index document IT.01 detailing their application. Some ITAAB notes have been published on the ETSI CD Rom but the currency of them has yet to be established. After 7th April 2001 there is a need for the ongoing availability of accepted ITAAB notes within the ETSI...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.4 Future advisory notes
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.4.1 General
From 7th April 2001 there is an ongoing requirement for a fast track solution to problems encountered in the application of TBRs. The agreement reached on handling future advisory notes is given in clause 5.3.
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.4.2 Analogue advisory notes
There are 3 options to progress new and revised advisory notes. One option would be to agree notes in AT-A and add them as revisions to EG 201 121 [3]. However since the EG deliverable requires ETSI member vote this would add significant delay between AT agreement and publication. Another option would be to continue wi...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.4.3 Digital advisory notes
For ease of reference the ITAAB index document IT.01 will need to be republished as an ETSI deliverable. Given the fast track requirement and the nature of the information the most suitable is a TR deliverable. To retain the fast track objective new and revised ITAAB notes would have to be either TR or TS deliverables....
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
6.5 Other related documents
The recommendations of the present document might be considered for future maintenance of TBR 010 [48], TBR 040 [49] and EN 301 440 [11] that are under the responsibility of ETSI Project DECT. ETSI ETSI TR 101 844 V1.1.1 (2002-04) 26
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
7 Recommendations
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
7.1 General
Where it is necessary to substantially update the technical content of non-Radio TBRs, it is recommended that the technical content of the TBR be transposed into an ETSI Standard (ES). The consideration of recommending the deliverable as an ES and not an EN is based upon ETSI directives and to receive the widest approv...
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
7.2 Handling existing TBRs
The Technical Body experts will need to identify whether urgent and specific technical updates would be best provided in a TR or TS supplementing the TBR, or handled as part of the transposition of the technical content into an ES.
9a59bf1c9aa411ca8e1b30580a48a39d
101 844
7.3 Handling of advisory notes