hash stringlengths 32 32 | doc_id stringlengths 7 13 | section stringlengths 3 121 | content stringlengths 0 2.2M |
|---|---|---|---|
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.3.2 Use of trusted third parties (TTP) | A CSP or LEA may choose to ask a TTP to help meet their obligations and needs. Based on agreements, the TTP may perform some functions in support of the responsibilities of the CSP and LEA. Ultimately, the responsibility to ensure the capabilities outlined in the present document are available, lies with the CSP or LEA... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.4 LI implementation scenarios | Most existing LI solutions are either done per service or based on the type of access network, which is depicted in Figure 6-2. Figure 6-2: Types of Interception Figure 6-2 also identifies some of the subject identities used in each type of Interception. Generically, these identifiers are either equipment based or serv... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5 Implementation Challenges | |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.1 Introduction | The introduction of Cloud services may increase the complexity and challenges for Lawful interception. The variations of Cloud services (e.g. IaaS, CaaS, PaaS) may introduce new or more complex business models and relationships amongst CSPs/C(L)SPs. Some specific challenges are described in more detail. ETSI ETSI TR 10... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.2 Encryption Challenge | Media and/or metadata may be encrypted by many parties. Subscribers using Cloud services will expect C(L)SPs to protect/secure their data. This includes authenticating via secure connections and securely transferring data to/from their servers. It may also include encrypting "data at rest" when stored on the servers. I... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.3 Multiple copies of intercepted traffic | The traffic may be intercepted in more than one location or on more than one CSP network. |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.4 Integration of Partial Communication Segments | The traffic intercepted from multiple communications as part of the same target session may need to be integrated. |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.5 Nomadicity | The ability for subscribers to change access technology (e.g. cellular, WiFi, DSL) and maintain continuity of some services exists today. If LI is at the service level, that service provider can provide the service logic, but may not have access to the communications content. If LI is at the access level, the access pr... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.6 Location | The location at which users are using Cloud based services may be difficult to discern in an assured manner. While this clause uses ETSI TS 101 671 [i.2] as a basis for this discussion, it may be additionally valid for all other LI specifications. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 30 ETSI TS 101 671 [i.2] defines L... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.7 Target Identification | As mentioned in clause 5.4, the target of lawful interception may have several different network or service identities, depending on the network or service provider and type of interception being accomplished. Each service provider, either CSP or C(L)SP, will have an ability to identify a particular subscriber or clien... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.8 Correlation | Independent of interception type, LI solutions are comprised of Intercept Related Information (IRI) and Communication Content (CC). Correlation refers to the ability to associate the IRI with the CC. As stated in clause 5.4.2, different (or multiple) service providers may have access to the target's traffic. In the exa... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.5.9 Network Virtualization | LI needs on the network remain whether or not the network element is virtualized or not. As network functions are virtualized, operators and vendors need to ensure that the LI functionality is always available and that the integrity, correctness and security of LI information that crosses internal and external network ... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.6 Mobile Networks | |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.6.1 Introduction | Network functions in mobile networks can also be virtualized. Use cases that address the 3GPP mobile network architecture can be found in ETSI GS NFV 001 [i.17]. Annex A provides a non-exhaustive list of use cases, to include those for Mobile Cloud Services. These use cases fall into four categories. |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.6.2 Non-MNO transited Cloud Applications/Services | Cloud applications or services that may not transit the MNO facilities (data in motion) are not considered in this clause. Table 6-1: Use Cases where the Services do not transit an MNO Clause Use Case A.3 VMI A.4 VMI (Memory) A.5 IPC A.1 Telepresence A.2 Telepresence (Externally hosted) A.7 Mobile Portal/ Dash Board A.... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.6.3 Cloud Applications/Services integral to MNO | If the use cases provided are wholly within the MNO facilities, they fall within this category. As this requires 3GPP to address the new features and service, which might reside in an MNO network, that further work is required and left for future work items. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 32 Table 6-2: Use Cases... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.6.4 Cloud Applications/Services Transit MNO via Proxies | Service that are proxied in the network may be handled in current systems, such as Session Border Controllers (SBC), Packet Data Gateways (PDG), backend Web services and may not require input from 3GPP. However existing Intercept Access Points (IAP) and collection and delivery functions may need augmentation to support... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.6.5 Cloud Applications/Services Transit MNO via Policies | Services that have policies flow, can provide the same functionality as described in the proxies scenarios, however they requires support for: • Location information reporting. When a user's device has simultaneous access over both Wi-Fi and the cellular networks, the network may receive location information from the P... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.7 Mobile Networks | |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.7.1 General | This clause derives needs from the Use Cases for Operators to deploy Branded Mobile Cloud Solutions that meet the various regional regulatory lawful access obligations. This clause only deals with those cases that transit MNO facilities as identified in clause 5.5. In general not all regulatory domains have the same la... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.7.2 Mobile Cloud | Lawful access obligations vary by national regulations, but generally include interception of private communications, disclosure and retention of an operator's subscriber information and their services. These needs are described in national laws and regulations and also define the instruments required to invoke access.... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.7.3 General | ETSI TS 133 106 [i.11] describes the obligations of LEA's for mobile networks. The following list is derived after some analysis in the use cases from annex A. [R001] MNO provided Cloud services (White labelled or in house) require lawful access. [R002] Lawful access may extend to MNO services that transgress the opera... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.7.4 Proxy | [R012] Session timers (Time to Live) should be set to allow proxy systems to be able transpose address. NOTE 1: Concerns could arise whether changing the messages results in contamination of evidence and if S or CSCF do this anyway as B2B user agents, clarification may be required. Also note that the user may never get... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 6.7.5 ANDSF | [R018] It should be possible to configure policies for subjects on the fly to restrict Cloud and MNO base services to be kept with the MNO network. [R019] The change in policies should be undetectable by the subject or the subject services. [R020] The IP addressed used for non-3GPP access is captured. [R021] The ANDSF ... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.1 Introduction | As described in clause 5, network virtualization and Cloud services of existing telecommunications services for which there are LI handover specifications can generally use those specifications and associated models to meet handover obligations. This clause describes those specifications and how they can be adapted to ... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.2 Traditional LI models | The diagrams of annex E (informative) of ETSI TS 101 331 [i.1] may provide a conceptual foundation for Cloud services LI. LI models for telecommunications services are currently found in: • ETSI TS 101 671, "Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic [i.2]; • ... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.3 Adaptation to the Cloud environment | Irrespective of how the services are provided, obligations for LEA necessitate the interception of designated traffic in a secure and trusted manner sufficient to meet any applicable judicial evidence obligations, as expeditiously as possible. Examples are depicted in Figure 7-2. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 3... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.4 Handover Interfaces for new Cloud services | The basic request-response interface demarcation between the LEA and CSP will continue to exist. However, what gets transferred across that interface is likely to be fundamentally different. Applications, services and the available information expected to be returned by the C (L) SP are generally very different in the ... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.5 Handover interfaces for virtualized network elements | Handover interfaces between the LEA and CSP will continue to exist. |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.6 Hybrid Services | |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.6.1 Introduction | Hybrid Cloud services are a composition of two or more clouds (private, community or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g. Cloud bursting for load-balancing between clouds). |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.6.2 Volte | Given the options in how certain network elements can be deployed and how they may be geographically shared it is possible that a combination of traditional telecommunications and Cloud LI techniques may be required e.g. centralized HSS or TAS. |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.6.3 Peer to Peer Services | Some peer to peer services only contact a centralized point to ensure they know what IP address to use to contact another user - the media is not routed via any easily predictable infrastructure. However this setup information may, if structured correctly and unencrypted allow the various CSPs intercept the traffic. Se... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 7.7 Cloud Lawful Interception Function (CLIF) | In order to maintain LI production capabilities, a C (L) SP can implement a Cloud Lawful Interception Function (CLIF). Table 7-1 describes CLIF use cases to accommodate implementation challenges. Table 7-1: Cloud Lawful Interception Function Use Cases Locations Cloud Lawful Interception Function Cloud based provider ou... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 8.1 Lawful Interception security | Existing LI specifications include extensive security capabilities. See Handover specification for IP delivery, ETSI TS 102 232-1 [i.3]. Some comparable secure delivery capability is necessary for the Cloud service environment - not only for delivery, but for requests such as warrants described in ETSI TR 103 690 [i.8]... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 8.2 Cloud services security | C (L) SPs ensure that their infrastructure is secure and that client data and applications are protected. This is done through security controls to prevent attacks and mitigate vulnerabilities, detect attacks and reduce data/resource loss and damage in the event of an attack or security compromise. C (L) SPs will need ... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9 LI - Cloud gaps and challenges | |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.1 Generic Cloud LI interface specification gap | The present document is intended to provide an initial overview of Cloud LI, to include mobile operators that provide white labelled or Branded Mobile Cloud Services. Challenges to support lawful access of services are identified and discussed. The present document focuses on Interception of data in motion and any miss... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.2 Specific Cloud LI specification gaps | |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.2.1 General | Scenarios 2 and 3 may require additional specification(s) or CSP/C (L) SPs may benefit from a best practices or implementation guide. 9.2.2 Scenario 2: Cloud Services that transit the network facilities via Proxy It is left to implementation how a mobile operator will meet their lawful access obligations. The present d... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.2.4 Target Identity expressions for Cloud LI | Unlike the traditional telecommunications and Internet environments, target identities, in a Cloud environment are unlikely to be well structured and are frequently temporary. With more than two million applications and other Cloud services and expansion rates of 10 % per month, the identities of targets may vary signi... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.2.5 Application Identity expressions for Cloud LI | Similar to the virtual target identity challenge/gap described above, in a Cloud environment, the applications number in the hundreds of thousands and are constantly changing. Some applications may also be malware. A number of organizations and vendors are attempting to develop means for instantiating virtual service a... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.2.6 Virtual Observable (VO) expressions for Cloud LI | In a Cloud environment, available information, whether LI content or IRI associated with the virtual target identity, is usually very diverse, associated with applications that are not well understood or acquired from many kinds of distributed network resources. The information of interest may also include complex reso... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 9.2.7 CLIF Specifications | In relatively static, traditional network environments, a common set of handover interface (HI) specifications for receiving and responding to structured expressions for LEA Lawful Interception production requests have been widely used over many years. Additionally, an Intercept Access Point is necessary to provide cov... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 10 LI - Network Virtualization gaps and challenges | In NFV, exact physical deployment of a VNF instance on the infrastructure is not visible from the end-to-end service perspective, with the exception of guaranteeing specific policy constraints. VNF instances and their supporting infrastructure need to be visible for configuration, diagnostic and troubleshooting purpose... |
825197b2b229c1f4310a03df8459b4de | 101 567 | 11 Conclusions and Recommendations | Major gaps and challenges exist that are increasingly larger with respect to enabling law enforcement to request and receive Cloud/virtualization information. The gaps go substantially beyond Cloud/virtualization networks and services. Traditional LI approaches in dedicated service architectures like telephony are larg... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 1 Scope | The present document describes the DVB-H Small Gap Fillers intended for consumer use. These devices are low-power on-channel repeaters of a DVB-H multiplex, with the aim of improving indoor reception in areas where outdoor reception is available. It includes in particular: • Market information. • Technical information.... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 2 References | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 2.1 Normative references | The following referenced documents are necessary for the application of the present document. Not applicable. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 2.2 Informative references | The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI EN 301 558: "Electromagnetic compatibility and Radio spectrum Matters (ERM); Digital Video Broadcasting (DVB); Technical Specifications for DVB-H... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 3 Definitions and abbreviations | |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply: erroneous second: a particular one-second interval when any of the following two quality criteria fails on the demodulated output signal: 1) No detected erroneous TS packets during this 1 s interval; 2) Post-Viterbi BER ≤ 2·10-4 measur... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: 2G Second Generation 3G Third Generation BER Bit Error Rate CATV CAble TV COFDM Coded Orthogonal Frequency Division Multiplexing DVB Digital Video Broadcasting DVB-H DVB Handheld DVB-T DVB Terrestrial e.m. Electromagnetic EN European Norm ERP ... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 4 Comments on the System Reference Document | There were no comments received. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 4.1 Statements by ETSI Members | There were no statements received. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 5 Presentation of the system or technology | DVB-H Small Gap Fillers are low power on-channel repeaters of a DVB-H multiplex, with the aim of improving domestic indoor reception in areas where outdoor reception is available. Consumers of mobile TV services, now familiar with the user experience of 2G/3G, are likely to expect good indoor coverage also for DVB-H. H... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 6 Market information | Sales figures for DVB-H Small Gap Fillers in Europe strongly depend on market penetration of DVB-H network and services. The maximum demand is expected in correspondence with the introduction of DVB-H services in urban areas, when networks are planned mainly for outdoor coverage. The devices could be sold in bundle wit... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7 Technical information | |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.1 Detailed technical description | DVB-H Small Gap Fillers are low power on-channel repeaters of a DVB-H multiplex, with the aim of improving domestic indoor reception in areas where outdoor reception is available. These devices are intended to be connected to a roof-top antenna, e.g. via a direct cable in a single private house, or using the existing i... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2 Technical parameters and implications on spectrum | |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.1 Status of technical parameters | |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.1.1 Current ITU and European Common Allocations | No special allocation is needed since the DVB-H Small Gap Filler is using existing allocation according to the ITU GE06 plan. ETSI ETSI TR 101 540 V1.1.1 (2011-03) 11 |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.1.2 Sharing and compatibility studies (if any) already available | DVB-H Small Gap Fillers are intended for use in the UHF frequency band, and therefore co-exist with other services also distributed in the UHF band, e.g. traditional TV services (i.e. analogue TV, DVB-T, CATV). The limiting condition is when a neighbour is watching an analogue terrestrial TV signal using an indoor ante... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.1.3 Sharing and compatibility issues still to be considered | Void. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2 Transmitter parameters | |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2.1 Transmitter Output Power/Radiated Power | The Maximum Effective Radiated Power (ERPmax) (see note 1) is limited to 0 dBm. This value allows to achieve the target coverage and, at the same time, prevents potential interference to other services. NOTE 1: With reference to a half wave dipole. NOTE 2: The maximum power input to the aerial should be limited to take... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2.1a Antenna Characteristics | Given the limits on the ERP fixed in clause 7.2.2.1, there are no specific requirements on the form and type of the transmission antenna of the device. However, to ensure that the overall ERP remains in those limits, the antenna is an integral part of the device, preventing its replacement by the user with another mode... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2.2 Operating Frequency | The DVB-H Small Gap Filler receives and transmits on UHF band IV/V (channels 21÷60 MHz, 470÷790 MHz). The difference between receive and transmit frequencies is as small as possible, and ideally zero. The maximum frequency error does not exceed 0,1 % of the carrier spacing of the DVB-H mode in question. As an example: ... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2.3 Bandwidth | It is an on-channel device, where a DVB-H multiplex with a 5 MHz, 6 MHz, 7 MHz or 8 MHz bandwidth is retransmitted on the same frequency and in the same bandwidth as the received signal. The DVB-H Small Gap Filler has to selectively amplify a single input DVB-H channel so as not to re-radiate unwanted signals present a... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2.4 Unwanted emissions | Out-of-band emissions are unwanted emissions immediately outside the nominal channel resulting from non-linearity in the amplifier but excluding spurious emissions. For the purposes of the present document, out-of-band emissions are emissions at frequencies outside the channel bandwidth and within the frequency ranges ... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.2.5 Maximum delay | The maximum delay of the DVB-H Small Gap Filler is limited to 2,8 µs. The maximum delay is defined as the time difference between a single received path and the first path in the impulse response of the retransmitted signal. The delay introduced by the DVB-H Small Gap Filler has also implications at RF level, since the... |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.2.3 Receiver parameters | Void. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 7.3 Information on relevant standard(s) | Void. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 8 Radio spectrum request and justification | No additional radio spectrum allocation is required, since only a legitimate DVB-H signal, already broadcast in the same area by a licensed network operator, is re-radiated by the device on the same frequency in a non-interfering way (SFN). |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 9 Regulations | In this clause the term "regulation" should be taken in its broadest sense. |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 9.1 Current regulations | Current regulations include, in particular, ITU, EU and ECC applicable regulations. ETSI ETSI TR 101 540 V1.1.1 (2011-03) 16 |
f952884caaacc9187c28caa32d2ae50b | 101 540 | 9.2 Proposed regulation and justification | A Technical Specification for DVB-H Small Gap Fillers, according to [i.1], is proposed as a new harmonised EN. This new harmonised EN will allow to provide a satisfactory DVB-H coverage in indoor reception, also in urban areas, in the lower floors and if using receivers with integrated antenna. This new harmonised EN a... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 1 Scope | MIMO PLT Channel and noise is reviewed and statistical analysis performed, which takes into account earthing variations, country variation, operator differences, phasing and distribution topologies, domestic, industrial and residential types, as well as local network loading. |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 2 References | References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 2.1 Normative references | The following referenced documents are necessary for the application of the present document. Not applicable. |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 2.2 Informative references | The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] Sartenaer, T. & Delogne, P., "Powerline Cables Modelling for Broadband Communications", ISPLC 2001, pp. 331-337. [i.2] R. Hashmat, P. Pagani, A; Zedda... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 3 Symbols and abbreviations | |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 3.1 Symbols | For the purposes of the present document, the following symbols apply: B Bandwidth C Channel Capacity D Diagonal Matrix f Frequency k kilo, most used at kilo Ohms H Channel Matrix Hz Hertz I Current L Inductance λ Singular Value or Eigen Value nF nanoFarads R Resistor U,V unitary matrices uH micro Henry Z Impedance |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply: AC Alternating Current ADC Analog to Digital Converter AGC Automatic Gain Control AMN Artificial Mains Network AMP Amplifier AWG Arbitrary Waveform Generator BG Band Gap BNC Bayonet Nut Connector C-CDF Complementary Cumulative Distribution Fun... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 3.2.1 Abbreviations Used for Feeding Styles | APN Signal feed mode: Dual wire feed (version C of clause 7.1.4.5 in [i.5]) to input P||N E in figure 28 of [i.5] CM Signal feed mode: Common mode, P, N, E terminated to ground EP Signal feed mode: DELTA (differential) between E and P, PN and NE terminated EP-NET Signal feed mode: Differential between E and P, only NE ... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 4 Major Project Phases | Table 1 No. Period Topic Event 01 Sept. 2010 Project organization Definition of targets, what and how to measure STF 410 Preparatory Meeting Stuttgart, Germany 02 Nov 2010 Setup of MIMO PLT measurements (EMI, Channel and Noise) Several STF 410 phone conferences. Drafting of measurement specification 03 Dec. 2010 1st ve... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 5 Motivation | PLT systems available today use only one transmission path between two outlets. It is the differential mode channel between the phase (or live) and neutral contact of the mains. These systems are called SISO (Single Input Single Output) modems. In contrast, MIMO PLT systems make use of the third wire, PE (Protective Ea... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6 Measurement Description | |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.1 Introduction | At the beginning of the measurement campaign, different strategies were discussed on how to best measure a set of desired properties. The main question was if LVDN properties should be recorded in Time- (TD) or Frequency Domain (FD). Each method has pros and cons. Please read the comparison chart below for an overview.... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.2 Couplers to Connect Measurement Equipment to the LVDN | The MIMO PLC couplers for feeding and receiving signals are specified in [i.5]. |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.3 General Set-up Before Starting Measurements | The power supply for measurement equipment has to be prepared prior to starting measurements. The supply must be clean and maximally separated from the grid of the residential unit being tested. It is recommended that the power supply be taken from a neighboring flat, a backup power supply or a least a plug far away fr... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4 Channel Transfer Function Measurements (S21) | |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.1 Set-Up | The measurement set-up basically consists of a NWA connected to coupler A and coupler B to the mains. The power supply of the NWA is isolated from the LVDN being tested by a filter with > 1 kΩ differential mode- and > 1 kΩ common mode impedance. Coupler A Coupler B Tx Rx LVDN Network Analyzer Isolation Filter for DM + ... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.2 Calibration of NWA | To eliminate effects cause by long cables used in the building, the NWA needs to be calibrated. A response (thru) calibration should be done by shortcutting the endings of both coaxial cables. A conventional adapter (BNC female to BNC female) should be used as a calibration kit. In the measurements recorded here the MI... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.3.1.1 Slide Switch Positions | Table 3: Switch Positions of Functional Test at Δ Interface PN Feed & Receive NE Feed & Receive EP Feed & Receive P (S4) E (S5) N (S6) CM (S7) off off off on E-P (S1) P-N (S2) N-E (S3) off on off P (S4) E (S5) N (S6) CM (S7) off off off on E-P (S1) P-N (S2) N-E (S3) off off on P (S4) E (S5) N (S6) CM (S7) off off off o... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.3.1.2 Typical Insertion Loss for All Three Channels | Table 4: Insertion Loss of Functional Test at Δ Interface 10 30 80 MHz - S21 22 22 23 dB |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.3.2 Functional Test of the Star Interfaces | slide switch lever position 19.2 dB Test pad Delta to Star EP NE PN IN P E N CM S1 S3 S4 S6 S7 PN EP NE CM S1 S3 S4 S6 S7 50 50 OUT P E N P-N in N out coupler A coupler B EP slide switch lever position 19.2 dB Test pad Delta to Star EP NE PN IN P E N CM S1 S3 S4 S6 S7 PN EP NE CM S1 S3 S4 S6 S7 50 50 OUT P E N P-N in E... |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.3.3 Functional Test of the Common Mode Interface | Star to CM PN EP NE CM S1 S3 S4 S6 S7 P E N OUT IN Schuko plug "P" respectively "N" connected to box Slide Switch Positions Coupler A for all configurations P (S4) E (S5) N (S6) CM (S7) on off off on E-P (S1) P-N (S2) N-E (S3) off off off Figure 5: Coupler Configuration: Feed into Single Conductor and Receive CM |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.3.3.1 Typical Insertion Loss | Table 7: Insertion Loss of Functional Test of the CM Interface 3 10 30 MHz - S21 "P" respectively "N" to out 2,5 to 2,8 2,5 to 2,8 3,0 to 4,0 dB NOTE: Only connect "P" respectively "N" to the box, isolate the other one. ETSI ETSI TR 101 562-3 V1.1.1 (2012-02) 16 |
d41f8dab39a9a600e474dc59c8588181 | 101 562-3 | 6.4.4 Coupler Configuration for Transfer Function Measurements |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.