hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
825197b2b229c1f4310a03df8459b4de
101 567
6.3.2 Use of trusted third parties (TTP)
A CSP or LEA may choose to ask a TTP to help meet their obligations and needs. Based on agreements, the TTP may perform some functions in support of the responsibilities of the CSP and LEA. Ultimately, the responsibility to ensure the capabilities outlined in the present document are available, lies with the CSP or LEA...
825197b2b229c1f4310a03df8459b4de
101 567
6.4 LI implementation scenarios
Most existing LI solutions are either done per service or based on the type of access network, which is depicted in Figure 6-2. Figure 6-2: Types of Interception Figure 6-2 also identifies some of the subject identities used in each type of Interception. Generically, these identifiers are either equipment based or serv...
825197b2b229c1f4310a03df8459b4de
101 567
6.5 Implementation Challenges
825197b2b229c1f4310a03df8459b4de
101 567
6.5.1 Introduction
The introduction of Cloud services may increase the complexity and challenges for Lawful interception. The variations of Cloud services (e.g. IaaS, CaaS, PaaS) may introduce new or more complex business models and relationships amongst CSPs/C(L)SPs. Some specific challenges are described in more detail. ETSI ETSI TR 10...
825197b2b229c1f4310a03df8459b4de
101 567
6.5.2 Encryption Challenge
Media and/or metadata may be encrypted by many parties. Subscribers using Cloud services will expect C(L)SPs to protect/secure their data. This includes authenticating via secure connections and securely transferring data to/from their servers. It may also include encrypting "data at rest" when stored on the servers. I...
825197b2b229c1f4310a03df8459b4de
101 567
6.5.3 Multiple copies of intercepted traffic
The traffic may be intercepted in more than one location or on more than one CSP network.
825197b2b229c1f4310a03df8459b4de
101 567
6.5.4 Integration of Partial Communication Segments
The traffic intercepted from multiple communications as part of the same target session may need to be integrated.
825197b2b229c1f4310a03df8459b4de
101 567
6.5.5 Nomadicity
The ability for subscribers to change access technology (e.g. cellular, WiFi, DSL) and maintain continuity of some services exists today. If LI is at the service level, that service provider can provide the service logic, but may not have access to the communications content. If LI is at the access level, the access pr...
825197b2b229c1f4310a03df8459b4de
101 567
6.5.6 Location
The location at which users are using Cloud based services may be difficult to discern in an assured manner. While this clause uses ETSI TS 101 671 [i.2] as a basis for this discussion, it may be additionally valid for all other LI specifications. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 30 ETSI TS 101 671 [i.2] defines L...
825197b2b229c1f4310a03df8459b4de
101 567
6.5.7 Target Identification
As mentioned in clause 5.4, the target of lawful interception may have several different network or service identities, depending on the network or service provider and type of interception being accomplished. Each service provider, either CSP or C(L)SP, will have an ability to identify a particular subscriber or clien...
825197b2b229c1f4310a03df8459b4de
101 567
6.5.8 Correlation
Independent of interception type, LI solutions are comprised of Intercept Related Information (IRI) and Communication Content (CC). Correlation refers to the ability to associate the IRI with the CC. As stated in clause 5.4.2, different (or multiple) service providers may have access to the target's traffic. In the exa...
825197b2b229c1f4310a03df8459b4de
101 567
6.5.9 Network Virtualization
LI needs on the network remain whether or not the network element is virtualized or not. As network functions are virtualized, operators and vendors need to ensure that the LI functionality is always available and that the integrity, correctness and security of LI information that crosses internal and external network ...
825197b2b229c1f4310a03df8459b4de
101 567
6.6 Mobile Networks
825197b2b229c1f4310a03df8459b4de
101 567
6.6.1 Introduction
Network functions in mobile networks can also be virtualized. Use cases that address the 3GPP mobile network architecture can be found in ETSI GS NFV 001 [i.17]. Annex A provides a non-exhaustive list of use cases, to include those for Mobile Cloud Services. These use cases fall into four categories.
825197b2b229c1f4310a03df8459b4de
101 567
6.6.2 Non-MNO transited Cloud Applications/Services
Cloud applications or services that may not transit the MNO facilities (data in motion) are not considered in this clause. Table 6-1: Use Cases where the Services do not transit an MNO Clause Use Case A.3 VMI A.4 VMI (Memory) A.5 IPC A.1 Telepresence A.2 Telepresence (Externally hosted) A.7 Mobile Portal/ Dash Board A....
825197b2b229c1f4310a03df8459b4de
101 567
6.6.3 Cloud Applications/Services integral to MNO
If the use cases provided are wholly within the MNO facilities, they fall within this category. As this requires 3GPP to address the new features and service, which might reside in an MNO network, that further work is required and left for future work items. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 32 Table 6-2: Use Cases...
825197b2b229c1f4310a03df8459b4de
101 567
6.6.4 Cloud Applications/Services Transit MNO via Proxies
Service that are proxied in the network may be handled in current systems, such as Session Border Controllers (SBC), Packet Data Gateways (PDG), backend Web services and may not require input from 3GPP. However existing Intercept Access Points (IAP) and collection and delivery functions may need augmentation to support...
825197b2b229c1f4310a03df8459b4de
101 567
6.6.5 Cloud Applications/Services Transit MNO via Policies
Services that have policies flow, can provide the same functionality as described in the proxies scenarios, however they requires support for: • Location information reporting. When a user's device has simultaneous access over both Wi-Fi and the cellular networks, the network may receive location information from the P...
825197b2b229c1f4310a03df8459b4de
101 567
6.7 Mobile Networks
825197b2b229c1f4310a03df8459b4de
101 567
6.7.1 General
This clause derives needs from the Use Cases for Operators to deploy Branded Mobile Cloud Solutions that meet the various regional regulatory lawful access obligations. This clause only deals with those cases that transit MNO facilities as identified in clause 5.5. In general not all regulatory domains have the same la...
825197b2b229c1f4310a03df8459b4de
101 567
6.7.2 Mobile Cloud
Lawful access obligations vary by national regulations, but generally include interception of private communications, disclosure and retention of an operator's subscriber information and their services. These needs are described in national laws and regulations and also define the instruments required to invoke access....
825197b2b229c1f4310a03df8459b4de
101 567
6.7.3 General
ETSI TS 133 106 [i.11] describes the obligations of LEA's for mobile networks. The following list is derived after some analysis in the use cases from annex A. [R001] MNO provided Cloud services (White labelled or in house) require lawful access. [R002] Lawful access may extend to MNO services that transgress the opera...
825197b2b229c1f4310a03df8459b4de
101 567
6.7.4 Proxy
[R012] Session timers (Time to Live) should be set to allow proxy systems to be able transpose address. NOTE 1: Concerns could arise whether changing the messages results in contamination of evidence and if S or CSCF do this anyway as B2B user agents, clarification may be required. Also note that the user may never get...
825197b2b229c1f4310a03df8459b4de
101 567
6.7.5 ANDSF
[R018] It should be possible to configure policies for subjects on the fly to restrict Cloud and MNO base services to be kept with the MNO network. [R019] The change in policies should be undetectable by the subject or the subject services. [R020] The IP addressed used for non-3GPP access is captured. [R021] The ANDSF ...
825197b2b229c1f4310a03df8459b4de
101 567
7.1 Introduction
As described in clause 5, network virtualization and Cloud services of existing telecommunications services for which there are LI handover specifications can generally use those specifications and associated models to meet handover obligations. This clause describes those specifications and how they can be adapted to ...
825197b2b229c1f4310a03df8459b4de
101 567
7.2 Traditional LI models
The diagrams of annex E (informative) of ETSI TS 101 331 [i.1] may provide a conceptual foundation for Cloud services LI. LI models for telecommunications services are currently found in: • ETSI TS 101 671, "Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic [i.2]; • ...
825197b2b229c1f4310a03df8459b4de
101 567
7.3 Adaptation to the Cloud environment
Irrespective of how the services are provided, obligations for LEA necessitate the interception of designated traffic in a secure and trusted manner sufficient to meet any applicable judicial evidence obligations, as expeditiously as possible. Examples are depicted in Figure 7-2. ETSI ETSI TR 101 567 V1.1.1 (2016-01) 3...
825197b2b229c1f4310a03df8459b4de
101 567
7.4 Handover Interfaces for new Cloud services
The basic request-response interface demarcation between the LEA and CSP will continue to exist. However, what gets transferred across that interface is likely to be fundamentally different. Applications, services and the available information expected to be returned by the C (L) SP are generally very different in the ...
825197b2b229c1f4310a03df8459b4de
101 567
7.5 Handover interfaces for virtualized network elements
Handover interfaces between the LEA and CSP will continue to exist.
825197b2b229c1f4310a03df8459b4de
101 567
7.6 Hybrid Services
825197b2b229c1f4310a03df8459b4de
101 567
7.6.1 Introduction
Hybrid Cloud services are a composition of two or more clouds (private, community or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g. Cloud bursting for load-balancing between clouds).
825197b2b229c1f4310a03df8459b4de
101 567
7.6.2 Volte
Given the options in how certain network elements can be deployed and how they may be geographically shared it is possible that a combination of traditional telecommunications and Cloud LI techniques may be required e.g. centralized HSS or TAS.
825197b2b229c1f4310a03df8459b4de
101 567
7.6.3 Peer to Peer Services
Some peer to peer services only contact a centralized point to ensure they know what IP address to use to contact another user - the media is not routed via any easily predictable infrastructure. However this setup information may, if structured correctly and unencrypted allow the various CSPs intercept the traffic. Se...
825197b2b229c1f4310a03df8459b4de
101 567
7.7 Cloud Lawful Interception Function (CLIF)
In order to maintain LI production capabilities, a C (L) SP can implement a Cloud Lawful Interception Function (CLIF). Table 7-1 describes CLIF use cases to accommodate implementation challenges. Table 7-1: Cloud Lawful Interception Function Use Cases Locations Cloud Lawful Interception Function Cloud based provider ou...
825197b2b229c1f4310a03df8459b4de
101 567
8.1 Lawful Interception security
Existing LI specifications include extensive security capabilities. See Handover specification for IP delivery, ETSI TS 102 232-1 [i.3]. Some comparable secure delivery capability is necessary for the Cloud service environment - not only for delivery, but for requests such as warrants described in ETSI TR 103 690 [i.8]...
825197b2b229c1f4310a03df8459b4de
101 567
8.2 Cloud services security
C (L) SPs ensure that their infrastructure is secure and that client data and applications are protected. This is done through security controls to prevent attacks and mitigate vulnerabilities, detect attacks and reduce data/resource loss and damage in the event of an attack or security compromise. C (L) SPs will need ...
825197b2b229c1f4310a03df8459b4de
101 567
9 LI - Cloud gaps and challenges
825197b2b229c1f4310a03df8459b4de
101 567
9.1 Generic Cloud LI interface specification gap
The present document is intended to provide an initial overview of Cloud LI, to include mobile operators that provide white labelled or Branded Mobile Cloud Services. Challenges to support lawful access of services are identified and discussed. The present document focuses on Interception of data in motion and any miss...
825197b2b229c1f4310a03df8459b4de
101 567
9.2 Specific Cloud LI specification gaps
825197b2b229c1f4310a03df8459b4de
101 567
9.2.1 General
Scenarios 2 and 3 may require additional specification(s) or CSP/C (L) SPs may benefit from a best practices or implementation guide. 9.2.2 Scenario 2: Cloud Services that transit the network facilities via Proxy It is left to implementation how a mobile operator will meet their lawful access obligations. The present d...
825197b2b229c1f4310a03df8459b4de
101 567
9.2.4 Target Identity expressions for Cloud LI
Unlike the traditional telecommunications and Internet environments, target identities, in a Cloud environment are unlikely to be well structured and are frequently temporary. With more than two million applications and other Cloud services and expansion rates of 10 % per month, the identities of targets may vary signi...
825197b2b229c1f4310a03df8459b4de
101 567
9.2.5 Application Identity expressions for Cloud LI
Similar to the virtual target identity challenge/gap described above, in a Cloud environment, the applications number in the hundreds of thousands and are constantly changing. Some applications may also be malware. A number of organizations and vendors are attempting to develop means for instantiating virtual service a...
825197b2b229c1f4310a03df8459b4de
101 567
9.2.6 Virtual Observable (VO) expressions for Cloud LI
In a Cloud environment, available information, whether LI content or IRI associated with the virtual target identity, is usually very diverse, associated with applications that are not well understood or acquired from many kinds of distributed network resources. The information of interest may also include complex reso...
825197b2b229c1f4310a03df8459b4de
101 567
9.2.7 CLIF Specifications
In relatively static, traditional network environments, a common set of handover interface (HI) specifications for receiving and responding to structured expressions for LEA Lawful Interception production requests have been widely used over many years. Additionally, an Intercept Access Point is necessary to provide cov...
825197b2b229c1f4310a03df8459b4de
101 567
10 LI - Network Virtualization gaps and challenges
In NFV, exact physical deployment of a VNF instance on the infrastructure is not visible from the end-to-end service perspective, with the exception of guaranteeing specific policy constraints. VNF instances and their supporting infrastructure need to be visible for configuration, diagnostic and troubleshooting purpose...
825197b2b229c1f4310a03df8459b4de
101 567
11 Conclusions and Recommendations
Major gaps and challenges exist that are increasingly larger with respect to enabling law enforcement to request and receive Cloud/virtualization information. The gaps go substantially beyond Cloud/virtualization networks and services. Traditional LI approaches in dedicated service architectures like telephony are larg...
f952884caaacc9187c28caa32d2ae50b
101 540
1 Scope
The present document describes the DVB-H Small Gap Fillers intended for consumer use. These devices are low-power on-channel repeaters of a DVB-H multiplex, with the aim of improving indoor reception in areas where outdoor reception is available. It includes in particular: • Market information. • Technical information....
f952884caaacc9187c28caa32d2ae50b
101 540
2 References
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar...
f952884caaacc9187c28caa32d2ae50b
101 540
2.1 Normative references
The following referenced documents are necessary for the application of the present document. Not applicable.
f952884caaacc9187c28caa32d2ae50b
101 540
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI EN 301 558: "Electromagnetic compatibility and Radio spectrum Matters (ERM); Digital Video Broadcasting (DVB); Technical Specifications for DVB-H...
f952884caaacc9187c28caa32d2ae50b
101 540
3 Definitions and abbreviations
f952884caaacc9187c28caa32d2ae50b
101 540
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply: erroneous second: a particular one-second interval when any of the following two quality criteria fails on the demodulated output signal: 1) No detected erroneous TS packets during this 1 s interval; 2) Post-Viterbi BER ≤ 2·10-4 measur...
f952884caaacc9187c28caa32d2ae50b
101 540
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: 2G Second Generation 3G Third Generation BER Bit Error Rate CATV CAble TV COFDM Coded Orthogonal Frequency Division Multiplexing DVB Digital Video Broadcasting DVB-H DVB Handheld DVB-T DVB Terrestrial e.m. Electromagnetic EN European Norm ERP ...
f952884caaacc9187c28caa32d2ae50b
101 540
4 Comments on the System Reference Document
There were no comments received.
f952884caaacc9187c28caa32d2ae50b
101 540
4.1 Statements by ETSI Members
There were no statements received.
f952884caaacc9187c28caa32d2ae50b
101 540
5 Presentation of the system or technology
DVB-H Small Gap Fillers are low power on-channel repeaters of a DVB-H multiplex, with the aim of improving domestic indoor reception in areas where outdoor reception is available. Consumers of mobile TV services, now familiar with the user experience of 2G/3G, are likely to expect good indoor coverage also for DVB-H. H...
f952884caaacc9187c28caa32d2ae50b
101 540
6 Market information
Sales figures for DVB-H Small Gap Fillers in Europe strongly depend on market penetration of DVB-H network and services. The maximum demand is expected in correspondence with the introduction of DVB-H services in urban areas, when networks are planned mainly for outdoor coverage. The devices could be sold in bundle wit...
f952884caaacc9187c28caa32d2ae50b
101 540
7 Technical information
f952884caaacc9187c28caa32d2ae50b
101 540
7.1 Detailed technical description
DVB-H Small Gap Fillers are low power on-channel repeaters of a DVB-H multiplex, with the aim of improving domestic indoor reception in areas where outdoor reception is available. These devices are intended to be connected to a roof-top antenna, e.g. via a direct cable in a single private house, or using the existing i...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2 Technical parameters and implications on spectrum
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.1 Status of technical parameters
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.1.1 Current ITU and European Common Allocations
No special allocation is needed since the DVB-H Small Gap Filler is using existing allocation according to the ITU GE06 plan. ETSI ETSI TR 101 540 V1.1.1 (2011-03) 11
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.1.2 Sharing and compatibility studies (if any) already available
DVB-H Small Gap Fillers are intended for use in the UHF frequency band, and therefore co-exist with other services also distributed in the UHF band, e.g. traditional TV services (i.e. analogue TV, DVB-T, CATV). The limiting condition is when a neighbour is watching an analogue terrestrial TV signal using an indoor ante...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.1.3 Sharing and compatibility issues still to be considered
Void.
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2 Transmitter parameters
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2.1 Transmitter Output Power/Radiated Power
The Maximum Effective Radiated Power (ERPmax) (see note 1) is limited to 0 dBm. This value allows to achieve the target coverage and, at the same time, prevents potential interference to other services. NOTE 1: With reference to a half wave dipole. NOTE 2: The maximum power input to the aerial should be limited to take...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2.1a Antenna Characteristics
Given the limits on the ERP fixed in clause 7.2.2.1, there are no specific requirements on the form and type of the transmission antenna of the device. However, to ensure that the overall ERP remains in those limits, the antenna is an integral part of the device, preventing its replacement by the user with another mode...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2.2 Operating Frequency
The DVB-H Small Gap Filler receives and transmits on UHF band IV/V (channels 21÷60 MHz, 470÷790 MHz). The difference between receive and transmit frequencies is as small as possible, and ideally zero. The maximum frequency error does not exceed 0,1 % of the carrier spacing of the DVB-H mode in question. As an example: ...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2.3 Bandwidth
It is an on-channel device, where a DVB-H multiplex with a 5 MHz, 6 MHz, 7 MHz or 8 MHz bandwidth is retransmitted on the same frequency and in the same bandwidth as the received signal. The DVB-H Small Gap Filler has to selectively amplify a single input DVB-H channel so as not to re-radiate unwanted signals present a...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2.4 Unwanted emissions
Out-of-band emissions are unwanted emissions immediately outside the nominal channel resulting from non-linearity in the amplifier but excluding spurious emissions. For the purposes of the present document, out-of-band emissions are emissions at frequencies outside the channel bandwidth and within the frequency ranges ...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.2.5 Maximum delay
The maximum delay of the DVB-H Small Gap Filler is limited to 2,8 µs. The maximum delay is defined as the time difference between a single received path and the first path in the impulse response of the retransmitted signal. The delay introduced by the DVB-H Small Gap Filler has also implications at RF level, since the...
f952884caaacc9187c28caa32d2ae50b
101 540
7.2.3 Receiver parameters
Void.
f952884caaacc9187c28caa32d2ae50b
101 540
7.3 Information on relevant standard(s)
Void.
f952884caaacc9187c28caa32d2ae50b
101 540
8 Radio spectrum request and justification
No additional radio spectrum allocation is required, since only a legitimate DVB-H signal, already broadcast in the same area by a licensed network operator, is re-radiated by the device on the same frequency in a non-interfering way (SFN).
f952884caaacc9187c28caa32d2ae50b
101 540
9 Regulations
In this clause the term "regulation" should be taken in its broadest sense.
f952884caaacc9187c28caa32d2ae50b
101 540
9.1 Current regulations
Current regulations include, in particular, ITU, EU and ECC applicable regulations. ETSI ETSI TR 101 540 V1.1.1 (2011-03) 16
f952884caaacc9187c28caa32d2ae50b
101 540
9.2 Proposed regulation and justification
A Technical Specification for DVB-H Small Gap Fillers, according to [i.1], is proposed as a new harmonised EN. This new harmonised EN will allow to provide a satisfactory DVB-H coverage in indoor reception, also in urban areas, in the lower floors and if using receivers with integrated antenna. This new harmonised EN a...
d41f8dab39a9a600e474dc59c8588181
101 562-3
1 Scope
MIMO PLT Channel and noise is reviewed and statistical analysis performed, which takes into account earthing variations, country variation, operator differences, phasing and distribution topologies, domestic, industrial and residential types, as well as local network loading.
d41f8dab39a9a600e474dc59c8588181
101 562-3
2 References
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which ar...
d41f8dab39a9a600e474dc59c8588181
101 562-3
2.1 Normative references
The following referenced documents are necessary for the application of the present document. Not applicable.
d41f8dab39a9a600e474dc59c8588181
101 562-3
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] Sartenaer, T. & Delogne, P., "Powerline Cables Modelling for Broadband Communications", ISPLC 2001, pp. 331-337. [i.2] R. Hashmat, P. Pagani, A; Zedda...
d41f8dab39a9a600e474dc59c8588181
101 562-3
3 Symbols and abbreviations
d41f8dab39a9a600e474dc59c8588181
101 562-3
3.1 Symbols
For the purposes of the present document, the following symbols apply: B Bandwidth C Channel Capacity D Diagonal Matrix f Frequency k kilo, most used at kilo Ohms H Channel Matrix Hz Hertz I Current L Inductance λ Singular Value or Eigen Value nF nanoFarads R Resistor U,V unitary matrices uH micro Henry Z Impedance
d41f8dab39a9a600e474dc59c8588181
101 562-3
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: AC Alternating Current ADC Analog to Digital Converter AGC Automatic Gain Control AMN Artificial Mains Network AMP Amplifier AWG Arbitrary Waveform Generator BG Band Gap BNC Bayonet Nut Connector C-CDF Complementary Cumulative Distribution Fun...
d41f8dab39a9a600e474dc59c8588181
101 562-3
3.2.1 Abbreviations Used for Feeding Styles
APN Signal feed mode: Dual wire feed (version C of clause 7.1.4.5 in [i.5]) to input P||N E in figure 28 of [i.5] CM Signal feed mode: Common mode, P, N, E terminated to ground EP Signal feed mode: DELTA (differential) between E and P, PN and NE terminated EP-NET Signal feed mode: Differential between E and P, only NE ...
d41f8dab39a9a600e474dc59c8588181
101 562-3
4 Major Project Phases
Table 1 No. Period Topic Event 01 Sept. 2010 Project organization Definition of targets, what and how to measure STF 410 Preparatory Meeting Stuttgart, Germany 02 Nov 2010 Setup of MIMO PLT measurements (EMI, Channel and Noise) Several STF 410 phone conferences. Drafting of measurement specification 03 Dec. 2010 1st ve...
d41f8dab39a9a600e474dc59c8588181
101 562-3
5 Motivation
PLT systems available today use only one transmission path between two outlets. It is the differential mode channel between the phase (or live) and neutral contact of the mains. These systems are called SISO (Single Input Single Output) modems. In contrast, MIMO PLT systems make use of the third wire, PE (Protective Ea...
d41f8dab39a9a600e474dc59c8588181
101 562-3
6 Measurement Description
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.1 Introduction
At the beginning of the measurement campaign, different strategies were discussed on how to best measure a set of desired properties. The main question was if LVDN properties should be recorded in Time- (TD) or Frequency Domain (FD). Each method has pros and cons. Please read the comparison chart below for an overview....
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.2 Couplers to Connect Measurement Equipment to the LVDN
The MIMO PLC couplers for feeding and receiving signals are specified in [i.5].
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.3 General Set-up Before Starting Measurements
The power supply for measurement equipment has to be prepared prior to starting measurements. The supply must be clean and maximally separated from the grid of the residential unit being tested. It is recommended that the power supply be taken from a neighboring flat, a backup power supply or a least a plug far away fr...
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4 Channel Transfer Function Measurements (S21)
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.1 Set-Up
The measurement set-up basically consists of a NWA connected to coupler A and coupler B to the mains. The power supply of the NWA is isolated from the LVDN being tested by a filter with > 1 kΩ differential mode- and > 1 kΩ common mode impedance. Coupler A Coupler B Tx Rx LVDN Network Analyzer Isolation Filter for DM + ...
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.2 Calibration of NWA
To eliminate effects cause by long cables used in the building, the NWA needs to be calibrated. A response (thru) calibration should be done by shortcutting the endings of both coaxial cables. A conventional adapter (BNC female to BNC female) should be used as a calibration kit. In the measurements recorded here the MI...
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.3.1.1 Slide Switch Positions
Table 3: Switch Positions of Functional Test at Δ Interface PN Feed & Receive NE Feed & Receive EP Feed & Receive P (S4) E (S5) N (S6) CM (S7) off off off on E-P (S1) P-N (S2) N-E (S3) off on off P (S4) E (S5) N (S6) CM (S7) off off off on E-P (S1) P-N (S2) N-E (S3) off off on P (S4) E (S5) N (S6) CM (S7) off off off o...
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.3.1.2 Typical Insertion Loss for All Three Channels
Table 4: Insertion Loss of Functional Test at Δ Interface 10 30 80 MHz - S21 22 22 23 dB
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.3.2 Functional Test of the Star Interfaces
slide switch lever position 19.2 dB Test pad Delta to Star EP NE PN IN P E N CM S1 S3 S4 S6 S7 PN EP NE CM S1 S3 S4 S6 S7 50 50 OUT P E N P-N in N out coupler A coupler B EP slide switch lever position 19.2 dB Test pad Delta to Star EP NE PN IN P E N CM S1 S3 S4 S6 S7 PN EP NE CM S1 S3 S4 S6 S7 50 50 OUT P E N P-N in E...
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.3.3 Functional Test of the Common Mode Interface
Star to CM PN EP NE CM S1 S3 S4 S6 S7 P E N OUT IN Schuko plug "P" respectively "N" connected to box Slide Switch Positions Coupler A for all configurations P (S4) E (S5) N (S6) CM (S7) on off off on E-P (S1) P-N (S2) N-E (S3) off off off Figure 5: Coupler Configuration: Feed into Single Conductor and Receive CM
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.3.3.1 Typical Insertion Loss
Table 7: Insertion Loss of Functional Test of the CM Interface 3 10 30 MHz - S21 "P" respectively "N" to out 2,5 to 2,8 2,5 to 2,8 3,0 to 4,0 dB NOTE: Only connect "P" respectively "N" to the box, isolate the other one. ETSI ETSI TR 101 562-3 V1.1.1 (2012-02) 16
d41f8dab39a9a600e474dc59c8588181
101 562-3
6.4.4 Coupler Configuration for Transfer Function Measurements