hash
stringlengths
32
32
doc_id
stringlengths
7
13
section
stringlengths
3
121
content
stringlengths
0
2.2M
2c9d130f4599201b7ff29ffb2e9ae502
100 528
6.3.8.2 Signalling channel (rate)
Attribute values for connection elements: Radio interface connection element: Dm. A interface connection element: Common channel signalling system (64.0 kbit/s). Attribute values for the overall connection type: Not applicable.
2c9d130f4599201b7ff29ffb2e9ae502
100 528
6.3.9 Connection control protocol
Attribute values for connection elements: Radio interface connection element: Layer 1: GSM 04.03 and GSM 05-series. Layer 2: GSM 04.05 and 04.06. Layer 3: GSM 04.07 and 04.08, 04.11. A interface connection element: Layer 1: GSM 08.04. Layer 2: GSM 08.06. Layer 3: GSM 04.07, 04.08 and 08.08. Attribute values for the ove...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
6.3.10 Information transfer coding/protocol
Attribute values for connection elements: Radio interface connection elements: Layer 1: GSM 04.21, GSM 05-series and 06-series. Layer 2: GSM 04.06, 04.22 and GSM 07.02 or GSM 04.22 and GSM 07.03 or transparent. Layer 3: Transparent, GSM 04.11. A interface connection element: Layer 1: GSM 08.04 and GSM 08.20. Layer 2: G...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
6.3.11 Further attributes and attribute values
This subclause has outlined the relationships between those attributes values presently existing, the possibility for new values being added remains. Table 4 summarizes the attributes values for GSM PLMN connection elements. ETSI ETSI TS 100 528 V7.0.1 (1999-07) 21 (GSM 03.10 version 7.0.1 Release 1998) Table 4: Values...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
7.1 General
Given a request for a telecommunication service at the initiation of a call, the GSM PLMN must establish a connection of a connection type that supports the attributes of the service requested. This establishment of a connection is effected at the time of call set up. It should be noted that GSM PLMN connection types r...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
7.2 Relationship between Bearer services and connection types
Table 5 shows the relationship between Bearer services and GSM PLMN connection types. In table 5, the connection elements for each connection type related to a Bearer service are shown. Dominant attributes of the connection elements, such as information transfer mode, information transfer rate, information transfer cap...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
7.3 Relationship between Teleservices and connection types
Table 6 shows the relationship between teleservices and connection type elements, for those teleservices having a GSM PLMN connection type which does not correspond to the GSM PLMN connection type of a bearer service. As in table 5/GSM 03.10, dominant attributes of the connection elements and the type of radio traffic ...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
7.4 Network capability to support in-call modification
Specifications GSM 02.02 and 02.03 identify a particular need for a GSM PLMN to support the Alternate speech/data (3.1 kHz audio ex PLMN), Alternate speech and group 3 facsimile, and Speech followed by data (3.1 kHz audio). These services allow the use of in-call modification to change the mode of service. The network ...
2c9d130f4599201b7ff29ffb2e9ae502
100 528
7.5 Network capability to support channel mode modification
Specification GSM 03.45 (Technical Realization of the Group 3 Facsimile Teleservice) identifies a need for a GSM PLMN to support channel mode modification within the facsimile phase of the alternate speech and facsimile group 3 service. The network capability to support channel modification is described in GSM 04.08. C...
d487d8f8c47c92f6dee9f0152353d268
133 902
1 Scope
........................................................................................................................................................5
d487d8f8c47c92f6dee9f0152353d268
133 902
2 References
................................................................................................................................................5
d487d8f8c47c92f6dee9f0152353d268
133 902
3 Definitions and Abbreviations
.................................................................................................................5
d487d8f8c47c92f6dee9f0152353d268
133 902
4 Formal analyses
.......................................................................................................................................5
d487d8f8c47c92f6dee9f0152353d268
133 902
4.1 Formal analysis of the 3G authentication protocol with modified sequence number management
................... 5
d487d8f8c47c92f6dee9f0152353d268
133 902
4.2 Formal analysis of the 3G authentication and key agreement protocol
............................................................. 5 Annex A: Formal Analysis of the 3G Authentication Protocol with Modified Sequence Number Management ............................................................................................................6 Annex B: Formal analysis of 3G authentication ...
bcc622d5a32ec685216fad82284345d7
127 903
1 Scope
........................................................................................................................................................5
bcc622d5a32ec685216fad82284345d7
127 903
2 References
................................................................................................................................................5
bcc622d5a32ec685216fad82284345d7
127 903
3 Definitions and Abbreviations
.................................................................................................................6
bcc622d5a32ec685216fad82284345d7
127 903
3.1 Definitions
..........................................................................................................................................................6
bcc622d5a32ec685216fad82284345d7
127 903
3.2 Abbreviations
.....................................................................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4 Summary of Standards Activities
.............................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4.1 IrMC
...................................................................................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4.2 Bluetooth
............................................................................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4.3 WAP
...................................................................................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4.4 Other Standards Activities
..................................................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4.4.1 MNCRS
........................................................................................................................................................7
bcc622d5a32ec685216fad82284345d7
127 903
4.4.2 Synchronisation
............................................................................................................................................8
bcc622d5a32ec685216fad82284345d7
127 903
4.4.3 MDSP
...........................................................................................................................................................8
bcc622d5a32ec685216fad82284345d7
127 903
5 Overview of Synchronisation Standards
..................................................................................................8
bcc622d5a32ec685216fad82284345d7
127 903
5.1 Introduction
........................................................................................................................................................8
bcc622d5a32ec685216fad82284345d7
127 903
5.2 IrMC Overview
..................................................................................................................................................8
bcc622d5a32ec685216fad82284345d7
127 903
5.3 IrMC 1.1 Limitations for Wide Area Synchronisation
.......................................................................................9
bcc622d5a32ec685216fad82284345d7
127 903
5.3.1 Level 4 Dependent on Connection-based Transport Protocol
......................................................................9
bcc622d5a32ec685216fad82284345d7
127 903
5.3.2 Inefficient Data Exchange
............................................................................................................................9
bcc622d5a32ec685216fad82284345d7
127 903
6 Recommendations
....................................................................................................................................9 History..............................................................................................................................................................10 (3G TR 27.903 vers...
884138cb53bcd8f30ecc584e1b0fed4c
126 912
1 Scope
........................................................................................................................................................6
884138cb53bcd8f30ecc584e1b0fed4c
126 912
2 References
................................................................................................................................................6
884138cb53bcd8f30ecc584e1b0fed4c
126 912
3 Definitions and abbreviations
..................................................................................................................6
884138cb53bcd8f30ecc584e1b0fed4c
126 912
3.1 Definitions
............................................................................................................................................................... 6
884138cb53bcd8f30ecc584e1b0fed4c
126 912
3.2 Abbreviations
.......................................................................................................................................................... 6
884138cb53bcd8f30ecc584e1b0fed4c
126 912
4 3GPP Configuration of H.324 annex C
...................................................................................................8
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5 Performance
.............................................................................................................................................9
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.1 Audio
....................................................................................................................................................................... 9
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.1.1 Introduction
........................................................................................................................................................ 9
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.1.2 Results
............................................................................................................................................................... 9
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.2 Video
..................................................................................................................................................................... 11
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.2.1 Introduction
...................................................................................................................................................... 11
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.2.2 Test environment
............................................................................................................................................. 11
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.2.3 Results
............................................................................................................................................................. 11
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.2.3.1 Subjective results
............................................................................................................................................. 12
884138cb53bcd8f30ecc584e1b0fed4c
126 912
5.2.3.2 Objective results
.............................................................................................................................................. 14 Annex A Quality degradation as a function of the FER and RBER in presence of background noise....................................................................................
d07bfdf3244e1962a4c6191f126aee07
123 930
1 Scope
........................................................................................................................................................5
d07bfdf3244e1962a4c6191f126aee07
123 930
2 References
................................................................................................................................................5
d07bfdf3244e1962a4c6191f126aee07
123 930
3 Definitions, symbols and abbreviations
...................................................................................................5
d07bfdf3244e1962a4c6191f126aee07
123 930
3.1 Definitions
......................................................................................................................................................... 5
d07bfdf3244e1962a4c6191f126aee07
123 930
3.2 Symbols
............................................................................................................................................................. 6
d07bfdf3244e1962a4c6191f126aee07
123 930
3.3 Abbreviations
..................................................................................................................................................... 6
d07bfdf3244e1962a4c6191f126aee07
123 930
4 Iu requirements
........................................................................................................................................6
d07bfdf3244e1962a4c6191f126aee07
123 930
4.1 General Requirements
........................................................................................................................................ 6
d07bfdf3244e1962a4c6191f126aee07
123 930
4.2 UMTS Terrestrial Radio Access Network (UTRAN)
........................................................................................ 7 4.2.1 SRNS-Relocation....................................................................................................................................................... 8 4.2.2 Position for header compression....................
d07bfdf3244e1962a4c6191f126aee07
123 930
4.3 UMTS Satellite Radio Access Network (USRAN)
........................................................................................... 8
d07bfdf3244e1962a4c6191f126aee07
123 930
4.4 Broadband Radio Access Network (BRAN)
..................................................................................................... 9
d07bfdf3244e1962a4c6191f126aee07
123 930
5 Access stratum vs. Non-access stratum
...................................................................................................9
d07bfdf3244e1962a4c6191f126aee07
123 930
6 Working Assumptions
.............................................................................................................................9
d07bfdf3244e1962a4c6191f126aee07
123 930
6.1 General
............................................................................................................................................................... 9
d07bfdf3244e1962a4c6191f126aee07
123 930
6.2 Interface and protocols over Iu for UTRAN purposes
....................................................................................... 9 History..............................................................................................................................................................10 ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 R...
d07bfdf3244e1962a4c6191f126aee07
123 930
4.2.1 SRNS-Relocation
To carry out SRNS relocation, the source SRNC must launch the SRNS relocation procedure, since it is not the target SRNC but the source SRNC that knows the current services of an user. This is done only when this procedure has the least adverse effect on user traffic, The SRNC relocation procedures shall ensure that th...
d07bfdf3244e1962a4c6191f126aee07
123 930
4.2.2 Position for header compression
Header compression function is allocated at RNC because: • differential header compression algorithms work better if they are located in the place where packets are more likely to be discarded (after having discarded packets the compression algorithm can send a packet with full header ). This place is the RNC (where th...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
1 Scope
The present document proposes an extended validation mechanism leveraging on the existing OID4VP protocol. Its primary aim is to support the secure and interoperable validation of electronic attestations by identifying standardization needs in the context of the attestation rulebook and attribute catalogues. Key focus ...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
2 References
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
2.1 Normative references
Normative references are not applicable in the present document.
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks i...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
3 Definition of terms, symbols and abbreviations
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
3.1 Terms
For the purposes of the present document, the terms given in [i.4], [i.12], [i.14] and the following apply: attestation provider: natural or legal person who provides QEAA, PuB-EAA, or (non-qualified) EAA issuance services attribute: feature characteristic or quality of a natural or legal person or of an entity, in ele...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
3.2 Symbols
Void.
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply: ARF Architecture and Reference Framework CRQC Cryptographically Relevant Quantum Computers EAA Electronic Attestation of Attributes ECC Elliptic Curve Cryptography EUDI European Union Digital Identity HD Hierarchical Deterministic JWE JSON Web...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
4 Extended Validation Service(s)
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
4.1 Overview
The present clause presents an extension to the digital attestation validation framework. This advancement enables the development of diverse business models associated with attestations, encompassing issuance, validation, and unrestricted free usage. At present, only issuance and free usage are achievable without the ...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
4.2 Attestation Refreshing
Attestation refreshing consists of periodically refreshing attestation(s) by communicating directly with the Attestation Provider. This could be achieved through two different approaches: • Linked credentials: the Attestation Provider provides the User with a Status Assertion [i.5], which is linked to an attestation. T...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
4.3 Cyphered Attestation Presentation
The attestation, once refreshed, is encrypted by the User's Wallet. The RP should then contact the Attestation Provider to retrieve the decryption key in order to verify the attestation. This adds an additional layer of security by ensuring that the RP cannot access the attestation directly, without interaction with th...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
5 Central Rulebook for Attributes
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
5.1 Overview
The EUDI Wallet ecosystem is governed by a range of policies that address various aspects of user interaction, data security, attestation management and user privacy. These policies are designed to safeguard users' personal information and ensure that the ecosystem functions smoothly across EU boundaries. ETSI ETSI TR ...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
5.2 Attestation metadata extension
Attestation Providers could utilize the Attestation Rulebooks catalogue to publish their attributes when necessary. This catalogue mitigates the risks of uncontrolled implementation practices that could degrade system quality, increase complexity and maintenance costs. It facilitates the integration of the encrypted at...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
6 Security Considerations
1) An overarching issue when dealing with the security of cryptographic systems in use today is the advent of quantum computers, more precisely Cryptographically Relevant Quantum Computers (CRQCs). This kind of computers could break the entire stack on which security is based today, by easily solving the mathematical p...
80fdf3a3ce1a5e984582bc005dba2f5f
119 479-2
7 Privacy Considerations
The mechanism set up so far brings about some considerations regarding privacy, described below: 1) With regard to clause 4.3 about Cyphered Attestation Presentation, it should be highlighted that the Attestation Provider and the RP could collude in order to decrypt the JWE: this is due to the possibility to share the ...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
1 Scope
A considerable amount of work has been conducted, mainly in the UK, to investigate the effect of wanted radio frequency transmissions from GSM MS and BTS on other equipment. The present document aims to summarize this work and to look at the implications for GSM. Since GSM EMC considerations extend outside the GSM aren...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
1.1 Void
f7d157762f0f1ce82de62a5fe14e2af8
101 640
1.2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication and/or edition number or version number) or non-specific. • For a specific reference, subsequent revisions do not apply. • ...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
2 Information available
A number of European organizations have conducted extensive investigations into GSM EMC. These investigations looked at the potential of a GSM transmission to interfere with a wide range of electrical apparatus. Having conducted both objective and subjective investigations, it was discovered that personal audio equipme...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
3 Cause of potential EMC interference
The source of GSM interference is the 100 % amplitude modulated RF envelope introduced by burst transmission necessary for Time Division multiple Access (TDMA). Audio apparatus having some non-linear component able to demodulate this Amplitude Modulation (AM) envelope will be subject to interference in the audio pass-b...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
4 Laboratory results
f7d157762f0f1ce82de62a5fe14e2af8
101 640
4.1 Hearing aids
Objective laboratory results from the United Kingdom, Department of Trade and Industry, Radiocommunications Agency (DTI/RA) [5] showed that a typical "behind the ear" hearing aid in normal (amplifying) mode was susceptible to peak GSM field intensities of: - between 10 V/m and 17 V/m in order to produce the same audio ...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
4.2 Cardiac pace-makers
Work was carried out by CSELT Italy to investigate the effects of GSM type burst structure on cardiac pace-makers (annex D). Unipolar and bipolar types from one manufacturer were tested. The results show that, although it was possible to interfere with pace-maker operation in free space, it was not possible, with the e...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
4.3 Domestic equipment
Tests carried out by various laboratories and collected together by the Radio Technology Laboratory (RTL) of the Radiocommunications Agency (annex E) show that for a limited number of devices under test the cassette decks, television receivers and portable radios/cassette players etc. are the most susceptible domestic ...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
5 Modelling results
A wide range of scenarios were modelled (annexes A and B) to include the possible interference to hearing aid users from base stations, mobiles and handportables. Not surprisingly, by far the highest incidence of interference was caused in crowded urban environments where hearing aids and handportable transceivers are ...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
6 Solutions
The generic immunity standard, EN 50082-1, produced by CENELEC, calls for immunity to RF electromagnetic fields of 3 V/m. This work has shown that current hearing aids have immunities close to this proposed level and that a handportable GSM transmitter is likely to present a field strength greater than this at regular ...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
7 Non-ionizing radiation
Guideline levels for exposure to non-ionizing RF radiation have been published by many organizations including Non- Ionizing Radio Committee (INIRC), the UK National Radiological Protection Board (NRPB), the Institute of Electrical and Electronics Engineers (IEEE), German Electrotechnical Commission of DIN and VDE (DKE...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
8 Conclusion
Extensive research has highlighted a potential compatibility problem between GSM transmitters and body worn audio apparatus; in particular hearing aids. However, this research has been based on a limited sample of hearing aid types of fairly old design. An increased immunity for future body worn apparatus, enforced thr...
f7d157762f0f1ce82de62a5fe14e2af8
101 640
9 Other EMC reports
CEPT-SE report "Summary document on the interference to radio and non-radio devices from TDMA-type transmissions". The report from CEPT covers much of the work included in the GSM report and considers EMC susceptibility of a far greater range of products. The findings of the two reports are similar. CEPT-SE report "Dra...
f48e0f9fa2d7ccfd80e612b2641fd571
101 362
1 Scope
The present document is a descriptive recommendation to be helpful in cell planning.