id
stringlengths
7
13
title
stringlengths
26
396
type
stringclasses
2 values
version
stringclasses
152 values
url
stringlengths
90
98
scope
stringlengths
0
9.03k
100 918
Digital cellular telecommunications system (Phase 2+) (GSM); General on supplementary services (GSM 02.04 version 6.1.1 Release 1997)
TS
6.1.1
http://www.etsi.org/deliver/etsi_ts/100900_100999/100918/06.01.01_60/ts_100918v060101p.pdf
The purpose of the present dcoument is to define a recommended set of supplementary services to the Teleservices and Bearer services which will be supported by a GSM PLMN in connection with other networks as a basis for the definition of the network capabilities required. The descriptions of the different supplementary services are contained in the GSM 02.80 series. Supplementary services not covered in GSM 02.04 or GSM 02.80 series cannot be introduced unilaterally in any GSM PLMN if they require modification of the GSM signalling Specifications. Technical realization of supplementary services is described in GSM 03.11 and 04.10.
100 922
Digital cellular telecommunications system (Phase 2+) (GSM); Subscriber Identity Modules (SIM); Functional characteristics (GSM 02.17 version 8.0.0 Release 1999)
TS
8.0.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100922/08.00.00_60/ts_100922v080000p.pdf
The present document defines the functional characteristics and requirements of the Subscriber Identity Module (SIM) for use in Digital Cellular Telecommunications System (GSM) applications. All references to GSM shall apply equally to any band specified for GSM unless otherwise stated. The SIM is the entity that contains the identity of the subscriber. When placed in a Mobile Equipment (ME), together they become a Mobile Station (MS) which may then register onto a GSM network. The primary function of the SIM in conjunction with a GSM network is to authenticate the validity of an MS when accessing the network. In addition it provides a means to authenticate the user and may also store other subscriber- related information or applications. Subscription entitlements are stored not in the SIM, but in the network. If the SIM functionality is incorporated into a multi-application card, the GSM application may be used in other telecommunication applications. In addition, SIMs are permitted to contain non-GSM functionality. In the case of multi-application cards, the present document defines just the GSM application.
100 931
Digital cellular telecommunications system (Phase 2+); Technical realization of facsimile group 3 transparent (GSM 03.45 version 8.0.1 Release 1999)
TS
8.0.1
http://www.etsi.org/deliver/etsi_ts/100900_100999/100931/08.00.01_60/ts_100931v080001p.pdf
The present document deals with the procedures allowing the technical realization of the Group 3 facsimile Service within the GSM PLMN using transparent Network support, according to the definition of Teleservice 61 and 62 specified in the GSM 02.03 [2].
100 939
Digital cellular telecommunications system (Phase 2+) (GSM); Mobile radio interface signalling layer 3; General aspects (GSM 04.07 version 7.3.0 Release 1998)
TS
7.3.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100939/07.03.00_60/ts_100939v070300p.pdf
This Technical Specification (TS) defines the principal architecture of layer 3 and its sublayers on the GSM Um interface, i.e. the interface between Mobile Station (MS) and network; for the CM sublayer, the description is restricted to paradigmatic examples, call control, supplementary services, and short message services for non-GPRS services. It also defines the basic message format and error handling applied by the layer 3 protocols. For CTS services, this Technical Specification (TS) defines the principal architecture of layer 3 on the GSM Um* interface, i.e. the interface between a CTS capable Mobile Station (CTS-MS) and a Fixed Part (FP). The corresponding protocols are defined in other Technical Specifications, see subclause 4.3.4. For non-GPRS services the communication between sublayers and adjacent layers and the services provided by the sublayers are distributed by use of abstract service primitives. But only externally observable behaviour resulting from the description is normatively prescribed by this Technical Specification. For GPRS services in addition the local information transfer and stimuli sent between sublayers is informatively included within Annex C of in this Technical Specification.
100 946
Digital cellular telecommunications system (Phase 2+) (GSM); Radio Link Protocol (RLP) for data and telematic services on the Mobile Station - Base Station System (MS - BSS) interface and the Base Station System - Mobile-services Switching Centre (BSS - MSC) interface (GSM 04.22 version 7.1.0 Release 1998)
TS
7.1.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100946/07.01.00_60/ts_100946v070100p.pdf
The present document specifies the Radio Link Protocol (RLP) for data transmission over the GSM PLMN. RLP covers the Layer 2 functionality of the ISO OSI Reference Model (IS 7498). It is based on ideas contained in IS 3309, IS 4335 and IS 7809 (HDLC of ISO) as well as CCITT X.25 and Q.92x (LAP-B and LAP-D of CCITT, respectively.) RLP has been tailored to the special needs of digital radio transmission. RLP provides to its users the OSI Data Link Service (IS 8886). RLP is intended for use with non-transparent data-transfer. Protocol conversion may be provided for a variety of protocol configurations. Those foreseen immediately are: - Character-mode protocols using start-stop transmission (IA5); - X.25 LAP-B. For reasons of better presentation, material about protocol conversion has been placed within those Specifications concerned with the relevant Terminal Adaptors, i.e. GSM 07.02 for the asynchronous case and GSM 07.03 for the synchronous case. Care must be taken that that material also applies to Interworking Functions; see GSM 09.04 - 09.07.
100 948
Digital cellular telecommunications system (Phase 2+) (GSM); Group Call Control (GCC) protocol (GSM 04.68 version 8.1.0 Release 1999)
TS
8.1.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100948/08.01.00_60/ts_100948v080100p.pdf
The present document specifies the Group Call Control (GCC) protocol used by the Voice Group Call Service (VGCS) on the radio interface.
100 949
Digital cellular telecommunications system (Phase 2+) (GSM); Broadcast Call Control (BCC) protocol (GSM 04.69 version 8.1.0 Release 1999)
TS
8.1.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100949/08.01.00_60/ts_100949v080100p.pdf
The present document specifies the Broadcast Call Control (BCC) protocol used by the Voice Broadcast Call Service (VBCS) on the radio interface.
100 956
Digital cellular telecommunications system (Phase 2+) (GSM); Call Barring (CB) supplementary services; Stage 3 (GSM 04.88 version 7.0.0 Release 1998)
TS
7.0.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100956/07.00.00_60/ts_100956v070000p.pdf
The present document specifies the procedures used at the radio interface (reference point Um as defined in GSM 04.02) for normal operation, registration, erasure, activation, deactivation, invocation and interrogation of call barring supplementary services. Provision and withdrawal of supplementary services is an administrative matter between the mobile subscriber and the service provider and cause no signalling on the radio interface. In GSM 04.10 the general aspects of the specification of supplementary services at the layer 3 radio interface are given. GSM 04.80 specifies the formats and coding for the supplementary services. Definitions and descriptions of supplementary services are given in GSM 02.04, GSM 02.8x and GSM 02.9x-series. Technical realization of supplementary services is described in GSM 03.11, GSM 03.8x and GSM 03.9x-series. The procedures for Call Control, Mobility Management and Radio Resource management at the layer 3 radio interface are defined in GSM 04.07 and GSM 04.08. The following supplementary services belong to the call restriction supplementary services and are described in this specification: - Barring of outgoing calls (clause 1): - Barring of all outgoing calls (BAOC) (Barring program 1); - Barring of outgoing international calls (BOIC) (Barring program 2); - Barring of outgoing international calls EXCEPT those directed to the home PLMN country (BOIC-exHC) (Barring program 3). - Barring of incoming calls (clause 2): - Barring of all incoming calls (BAIC) (Barring program 1); - Barring of incoming calls when roaming outside the home PLMN country (BIC-Roam) (Barring program 2).
100 975
Digital cellular telecommunications system (Phase 2+) (GSM); Interworking between a Public Land Mobile Network (PLMN) and a Packet Switched Public Data Network/Integrated Services Digital Network (PSPDN/ISDN) for the support of packet switched data transmission services (GSM 09.06 version 7.0.0 Release 1998)
TS
7.0.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100975/07.00.00_60/ts_100975v070000p.pdf
The present document identifies the Interworking Functions (IWF's) and requirements for the interworking between a GSM PLMN and a Packet Switched Public Data Network/Integrated Services Digital Network (PSPDN/ISDN) for the support of packet services in GSM PLMNs. In the GSM PLMN context the packet services are associated with bearer services and are described in GSM 02.02. The generally defined GSM PLMN user-network access as defined in the respective GSM specifications (see references) forms the basis for defining the particularities for the provision of packet services to the GSM PLMN subscribers. Network internal interfaces for the support of packet services in the pan-European ISDN are defined in ETSI standards, which are also taken as a basis. User-network access and network internal interfaces are defined to provide the packet services.
100 976
Digital cellular telecommunications system (Phase 2+) (GSM); General requirements on interworking between the Public Land Mobile Network (PLMN) and the Integrated Services Digital Network (ISDN) or Public Switched Telephone Network (PSTN) (GSM 09.07 version 7.2.0 Release 1998)
TS
7.2.0
http://www.etsi.org/deliver/etsi_ts/100900_100999/100976/07.02.00_60/ts_100976v070200p.pdf
The present document identifies the Mobile-services Switching Centre/Interworking Functions (MSC/IWFs) and requirements to support interworking between: a) PLMN and PSTN b) PLMN and ISDN It is not possible to treat ISDN and PSTN as one type of network, even when both ISDN and PSTN subscribers are served by the same exchange because of the limitations of the PSTN subscribers access i.e. analogue connection without D-channel signalling. Within the present document, the requirements for voice and non-voice (data) calls are considered separately.
101 009
Transmission and Multiplexing (TM); Synchronous Digital Hierarchy (SDH); Network protection schemes; Types and characteristics
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/101009/01.01.01_60/ts_101009v010101p.pdf
The present document describes the functional requirements and classification of Synchronous Digital Hierarchy (SDH) protection schemes, namely SDH multiplex section trail shared protection ring, multiplex section trail dedicated protection ring, multiplex section trail linear protection, and Lower Order/Higher Order (LO/HO) Virtual Container (VC) trail and Sub-Network Connection (SNC) protection schemes. The various SDH protection schemes are specified in terms of their network objectives, network architectures, functional modelling and network operations.
101 010
Transmission and Multiplexing (TM); Synchronous Digital Hierarchy (SDH); Network protection schemes; Interworking: rings and other schemes
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/101010/01.01.01_60/ts_101010v010101p.pdf
The present document describes the criteria, principles, objectives, requirements and architectures of protection interworking between multiplex section shared protected rings, multiplex section linear protection, and Higher Order/lower Order (HO/LO) Virtual Container (VC) trail and subnetwork connection protection schemes. The SDH protection interworking scenarios between the same and different protection schemes are described. The network objectives, architectures, functional modelling and operations of the various SDH protection schemes are described in TS 101 009 [1]. The protection switching initiation criteria and the Automatic Protection Switching (APS) protocols of the various SDH protection schemes are specified in ETS 300 746 [2].
101 012
Transmission and Multiplexing (TM); Broadband Access Digital Section and NT functional requirements
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/101012/01.02.01_60/ts_101012v010201p.pdf
The present document defines the functional requirements for an "ATM over xDSL" Broadband Access Digital Section (ADS), between the UNI interface at T/S reference point and the Access Network End System at the VB1 reference point, operated over an xDSL connection between an xDSL based Broadband Network Termination and an xDSL based Broadband Line Termination, both these elements being essential constituents of the B-ADS. The definition of B-ADS functional characteristics and protocols should enable proper interworking of the B-NT with: a) the Customer Premises Network (B-NT2 or TE) on the customer side; b) the B-LT and more generally the Access Network End System on the other side, for the provision of ATM connectivity. At the same time, the specified operational and management requirements will enable proper interworking of the B-ADS elements with the remaining Access Network elements and with the Service Node, as well as proper B-ADS management. The present document also identifies proper protocols and relevant supporting facilities for the control and management of the Customer Premises Network.
100 659-3
Access and Terminals (AT); Analogue access to the Public Switched Telephone Network (PSTN); Subscriber line protocol over the local loop for display (and related) services; Part 3: Data link message and parameter codings (corrections needed to EN 300 659-3 V1.3.1
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/100600_100699/10065903/01.01.01_60/ts_10065903v010101p.pdf
The present document identifies errors found in the EN 300 659-3 V1.3.1 [1]. The intention is to incorporate these modifications into a new version of EN 300 659-3.
101 031
Broadband Radio Access Networks (BRAN); HIgh PErformance Radio Local Area Network (HIPERLAN) Type 2; Requirements and architectures for wireless broadband access
TR
2.2.1
http://www.etsi.org/deliver/etsi_tr/101000_101099/101031/02.02.01_60/tr_101031v020201p.pdf
The scope of the present document is limited to the requirements and architectures for HIPERLAN Types 2. HIPERLAN Type1 is addressed by ETS 300 652 [2] and its related Conformance Test Specifications, [2a], [2b], [2c] and [2d]. HIPERLINK will be described in a TR produced by BRAN. The requirements address subjects like applications, traffic volumes and traffic patterns that underlie the projected spectrum requirements as well as the chosen architectures. The architectures address the communications layer models as well as the Reference models that identify the key interfaces subject to standardization. The architectures developed in the present document are intended to delineate the boundaries between HIPERLAN standards and standards for networks in which HIPERLANs may be used as subsystems or components. Scope of standardization The scope of the standards for HIPERLAN Types 2 is limited to the air interface specifications, the Data Link Control (DLC) layer specifications, the specifications of the management functions and the interworking functions. The DLC layer specification includes a specification of the services to be provided. The ETSI HIPERLAN/2 standards specify subsystems up to and including the DLC Layer. Interworking functions will be specified in liaison with other relevant technical standardization bodies.
101 032
Digital cellular telecommunications system (Phase 2+) (GSM); Compression algorithm for text messaging services (GSM 03.42 version 7.1.1 Release 1998)
TS
7.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/101032/07.01.01_60/ts_101032v070101p.pdf
The present document introduces the concepts and mechanisms involved in the compression and decompression of a stream of data.
101 035
Transmission and Multiplexing (TM); Synchronous Digital Hierarchy (SDH) aspects regarding Digital Radio Relay Systems (DRRS)
TR
1.1.3
http://www.etsi.org/deliver/etsi_tr/101000_101099/101035/01.01.03_60/tr_101035v010103p.pdf
Future Digital Radio Relay Systems (DRRS) have to support the Synchronous Digital Hierarchy (SDH) defined by the ITU-T. Study Group (SG) 9 of the ITU-R in its final meeting in September 1989 approved a new report (CCIR Report 1190 [3]) dealing with general aspects of DRRS in an SDH Network and containing a list of items which need further study. Moreover, SG 9 has established Task Group (TG) 9/1 to study these very urgent aspects in the period between the meetings and to conclude its work before the next Interim Meeting of SG 9. TG 9/1 ended its duty in 1992 producing ITU-R Recommendations F.750 [1] and F.751 [2]. It was deemed very important that the items listed in section 7 of CCIR Report 1190 [3] will be carefully studied by TM4 as an urgent task and some clear statements produced.
101 036-1
Fixed Radio Systems; Generic wordings for standards on DFRS (Digital Fixed Radio Systems) characteristics; Part 1: General aspects and point-to-point equipment parameters
TR
1.3.1
http://www.etsi.org/deliver/etsi_tr/101000_101099/10103601/01.03.01_60/tr_10103601v010301p.pdf
The present document defines the major issues for the standardization of the general aspects of Digital Fixed Radio Systems (DFRS) formerly known as Digital Radio Relay Systems (DRRS) and for point-to-point specific equipment parameters, in order to maintain a generic format for the editorial and technical contents. It is also essential to maintain a common understanding of the reasons behind the way certain parameters are defined among the various DFRS standards, which deal with the same general topics and may differ from each other merely from the point of view of numerical requirements. The present document therefore also explains the reasoning behind why the parameters in DFRS standards are defined in the way they are. The present document aims to cover every issue that may be required. Specific standards may differ from the guidelines contained within the present document only if the specific argument is not covered or there is good technical reason for not following them.
101 036-2
Fixed Radio Systems; Generic wordings for standards on DRRS (Digital Radio Relay Systems) characteristics; Part 2: Point-to-multipoint equipment parameters
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101000_101099/10103602/01.01.01_60/tr_10103602v010101p.pdf
The present document defines the major standardizable issues for Point-to-Multipoint digital radio-relay systems (P-MP) in the Fixed Service in order to maintain a generic format for the editorial and technical contents. It also give guidelines for the understanding of the definition of the parameters and elements. The present document aims to cover every issue that may be required. Specific standards may differ from the guidelines contained within the present document only if the specific argument is not covered or there is good technical reason for not following them. It is essential to maintain a common understanding of the reasons behind the way certain parameters are defined among the various P-MP standards, which deal with the same general topics and may differ from each other by the application of different access methods or merely from the point of view of numerical requirements. Because some of the parameters and elements are also common to Point-to-Point (P-P) digital radio-relay systems part 1 [1] of the present document should be taken into account when referenced below. The present document is applicable to the wording (generic) of Point-to-Multipoint equipment parameters. The known access methods applied to P-MP systems in the Fixed Service and the access methods to come in the future and combinations thereof implies that subparts of the present document are edited in order to maintain the commonality among the P-MP standards but to leave the way open for future P-MP technologies. Thus for every access method a subpart should be edited defining the specific parameters and when there is a new access method it should be added to the existing TR.
101 038
Digital cellular telecommunications system (Phase 2+) (GSM); High Speed Circuit Switched Data (HSCSD) - Stage 2 (GSM 03.34 version 7.0.0 Release 1998)
TS
7.0.0
http://www.etsi.org/deliver/etsi_ts/101000_101099/101038/07.00.00_60/ts_101038v070000p.pdf
The present document contains the stage 2 service description for a High Speed Circuit Switched Data (HSCSD) on GSM. In analogy with CCITT Recommendations I.130 [6] (refer to annex A) and with reference of CCITT Recommendations VI.1 Q.65 [7] (Stage 2 of the method for characterization of services supported by an ISDN), the second stage of the HSCSD is defined as follows. Stage 2 identifies the functional capabilities and information flows needed to support the service as described in High Speed Circuit Switched Data (HSCSD) - Stage 1, GSM 02.34 [9]. Furthermore, it identifies various possible physical locations for the functional capabilities. The output of Stage 2, which is signalling system independent, is used as an input to Stage 3, the design of signalling system and switching Recommendations.
101 044
Digital cellular telecommunications system (Phase 2+) (GSM); Customized Applications for Mobile network Enhanced Logic (CAMEL); Stage 2 (GSM 03.78 version 5.8.0 Release 1996)
TS
5.8.0
http://www.etsi.org/deliver/etsi_ts/101000_101099/101044/05.08.00_60/ts_101044v050800p.pdf
The present document specifies the stage 2 description for the first phase (see GSM 02.78 [2]) of the Customized Applications for Mobile network Enhanced Logic (CAMEL) feature which provides the mechanisms to support services of operators which are not covered by standardized GSM services even when roaming outside the HPLMN. The CAMEL feature is a network feature and not a supplementary service. It is a tool to help the network operator to provide the subscribers with the operator specific services even when roaming outside the HPLMN. In the present document, the GSM Service Control Function (gsmSCF) is treated as being part of the HPLMN. The regulatory environment in some countries may require the possibility that the gsmSCF and the HPLMN are controlled by different operators, and the gsmSCF and the HPLMN are therefore distinct entities. In the first phase the CAMEL feature supports: - mobile originated and forwarded calls; - mobile terminating calls; - any time interrogation; - suppression of announcements; Note that CAMEL is not applicable to Emergency Setup (TS 12), i.e., in case an Emergency call has been requested the gsmSSF shall not be invoked. The mechanism described in the present document addresses especially the need for information exchange between the VPLMN or IPLMN and the HPLMN for support of operator specific services. Any user procedures for the control of operator specific services are outside the scope of the present document. Subscribers who have subscribed to operator specific services and therefore need the functional support of the CAMEL feature shall be marked in the HPLMN and VPLMN. In case a subscriber is marked to need CAMEL support, the appropriate procedures which provide the necessary information to the VPLMN or to the HPLMN are invoked. It is possible for the HPLMN to instruct the VPLMN or IPLMN to interact with a gsmSCF which is controlled by the HPLMN. The specification of operator specific services in HPLMN is outside the scope of the present document.
101 045
Digital cellular telecommunications system (Phase 2+) (GSM); Support of Optimal Routeing (SOR); Technical realisation (GSM 03.79 version 7.3.0 Release 1998)
TS
7.3.0
http://www.etsi.org/deliver/etsi_ts/101000_101099/101045/07.03.00_60/ts_101045v070300p.pdf
The present document specifies the technical realisation of the first phase of the network feature Support of Optimal Routeing (SOR). The first phase of SOR provides: - as a network operator option, a method to route a call from one mobile subscriber directly to another mobile subscriber who is in the same country as the calling mobile subscriber or in the called mobile subscriber's home country, without needing to connect the call via the HPLMN of the called subscriber, even though the called mobile subscriber has roamed outside his HPLMN; - a method to forward calls when a called mobile subscriber who has roamed outside his home country is busy, or is not reachable, or does not reply, to a forwarded-to destination in the HPLMN country of the called subscriber or the VPLMN country of the called subscriber, without needing to connect the forwarded call via the VPLMN of the called subscriber; - a method to combine the optimal routeing described in the first bullet point above with the optimal routeing described in the second bullet point above. OR of a call is permitted only if all entities involved in handling the call support OR. Other cases of optimal routeing (e.g. calls where the calling and called subscribers are in different countries, forwarding to a mobile subscriber or multiple forwarding) will be considered for inclusion in later phases.
101 046
Digital cellular telecommunications system (Phase 2+) (GSM); Customised Applications for Mobile network Enhanced Logic (CAMEL); CAMEL Application Part (CAP) specification (GSM 09.78 version 7.1.0 Release 1998)
TS
7.1.0
http://www.etsi.org/deliver/etsi_ts/101000_101099/101046/07.01.00_60/ts_101046v070100p.pdf
The present document specifies the CAMEL Application Part (CAP) supporting the second phase of the network feature Customised Applications for Mobile network Enhanced Logic. CAP is based on a sub-set of the CS1 Core INAP as specified by ETS 300 374-1 [13]. Descriptions and definitions provided by ETS 300 374-1 [13] are directly referenced by the present document in case no additions or clarifications are needed for the use in the CAP.
101 051
Methods for Testing and Specification (MTS); Report of the CATG applications
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101000_101099/101051/01.01.01_60/tr_101051v010101p.pdf
The present document describes the experiences gained from the application of the CATG functionality of the SDL tool available at ETSI (SDT Autolink tool) on the SDL specification of Core INAP CS-2. The SDLs of Core INAP, attached as annex A to [3], gives the normative requirements of the protocol behaviour. The SDLs also makes use of the ASN.1 definitions of the INAP PDUs, therefore providing a complete specification of the protocol suitable for application of CATG.
101 052
Rules for the management of the TETRA standard authentication and key management algorithm set TAA1
TS
2.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/101052/02.01.01_60/ts_101052v020101p.pdf
The purpose of the present document is to specify the rules for the management of the TETRA standard authentication and key management algorithm set TAA1. This algorithm set is intended for air interface security in TETRA products. The specification for TAA1 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to Parts 1 and 2 of the specifications. Parts 1 and 2 are confidential for each of the algorithms. Part 3 of each of the specifications is not confidential and can be obtained directly from the TAA1 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TAA1 (ETSI, ETSI Technical Committee TCCE, TAA1 Custodian and approved recipients) together with the relationships and interactions between them. The procedures for delivering TAA1 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TAA1 and with the responsibilities of an approved recipient. This clause is supplemented by annex B which contains a Confidentiality and Restricted Usage Undertaking to be signed by each approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TAA1 Custodian.
101 052-1
Rules for the management of the TETRA standard authentication and key management algorithm sets; Part 1: TAA1
TS
3.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105201/03.02.01_60/ts_10105201v030201p.pdf
The purpose of the present document is to specify the rules for the management of the TETRA standard authentication and key management algorithm set TAA1. This algorithm set is intended for air interface security in TETRA products. The specification for TAA1 consists of the following three parts: Part 1: Algorithm specification. Part 2: Design conformance test data. Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 are confidential for each of the algorithms. The algorithm primitives' section of part 1 of the specification has been published as ETSI TS 104 053-3 [i.1]. Part 3 of the specification is not confidential and can be obtained directly from the TAA1 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specification. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TAA1 (ETSI, ETSI Technical Committee TCCE, TAA1 Custodian and approved recipients (beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TAA1 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TAA1 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TAA1 Custodian. Clause 8 describes an overview of the algorithms.
101 052-2
Rules for the management of the TETRA standard authentication and key management algorithm sets; Part 2: TAA2
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105202/01.02.01_60/ts_10105202v010201p.pdf
The purpose of the present document is to specify the rules for the management of the TETRA standard authentication and key management algorithm set TAA2. This algorithm set is intended for air interface security in TETRA products. The specification for TAA2 consists of the following three parts: Part 1: Algorithm specifications. Part 2: Design conformance test data. Part 3: Algorithms input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 are confidential for each of the algorithms. The algorithm primitives' section of part 1 of the specification has been published as ETSI TS 104 053-4 [i.1]. Part 3 of of the specification is not confidential and can be obtained directly from the TAA2 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specification. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TAA2 (ETSI, ETSI Technical Committee TCCE, TAA2 Custodian and approved recipients (beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TAA2 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TAA2 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TAA2 Custodian. Clause 8 describes an overview of the algorithms.
101 053-1
Rules for the management of the TETRA standard encryption algorithms; Part 1: TEA1
TS
3.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105301/03.02.01_60/ts_10105301v030201p.pdf
The present document has been designed to specify the rules for the management of the TETRA standard encryption algorithm TEA1. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA1 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 are confidential. The algorithm primitives' section of part 1 of the specification has been published as ETSI TS 104 053-1 [i.1]. Part 3 of the specification is not confidential and can be obtained directly from the TEA1 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA1 (ETSI, ETSI Technical Committee TCCE, TEA1 Custodian and approved recipients (beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TEA1 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TEA1 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TEA1 Custodian. Clause 8 describes an overview of the algorithm and its dimensions.
101 053-2
Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2
TS
3.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105302/03.01.01_60/ts_10105302v030101p.pdf
The purpose of the present document is to specify the rules for the management of the TETRA standard encryption algorithm TEA2. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA2 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to licensing organizations to manufacture, possess, install, repair, hold, use and destroy equipment and components containing the TEA2 algorithm and to delivering parts 1, 2 and 3 of the TEA2 specifications. Parts 1 and 2 of the specification are confidential. Part 3 of the specification is not confidential and can be obtained directly from the TEA2 Custodian (see clause 7.2). There are no restrictions on the distribution of this part of the specification. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA2 (ETSI, ETSI Technical Committee TETRA and Critical Communications Evolution, TEA2 Custodian and approved recipients) together with the relationships and interactions between them. Clause 5 is concerned with the rules for the use of TEA2. This clause is supplemented by annex H, which provides an exemplary list of the states and territories in which a User may become an approved recipient. Clause 6 describes the types of licence that may be requested. The procedures for delivering TEA2 specifications to approved recipients are defined in clause 7. This clause is supplemented by annex A, which specifies the items that are to be delivered. Clause 8 is concerned with the criteria for approving an organization for receipt of TEA2 deliverables and with the responsibilities of an approved recipient. This clause is supplemented by annexes B to G which contain the Confidentiality and Restricted Usage Undertakings to be signed by the TEA2 Custodian and approved recipients of TEA2 specifications and/or equipment and components containing TEA2. Clause 9 is concerned with the appointment and responsibilities of the TEA2 Custodian.
101 053-3
Rules for the management of the TETRA standard encryption algorithms; Part 3: TEA3
TS
3.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105303/03.02.01_60/ts_10105303v030201p.pdf
The present document has been designed to specify the rules for the management of the TETRA standard encryption algorithm TEA3. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA3 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 are confidential. The algorithm primitives' section of part 1 of the specification has been published as ETSI TS 104 053-1 [i.1]. Part 3 of the specification is not confidential and can be obtained directly from the TEA3 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA3 (ETSI, ETSI Technical Committee TCCE, TEA3 Custodian and approved recipients(beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TEA3 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TEA3 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TEA3 Custodian. Clause 8 describes an overview of the algorithm and its dimensions.
101 053-4
Rules for the management of the TETRA standard encryption algorithms; Part 4: TEA4
TS
3.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105304/03.02.01_60/ts_10105304v030201p.pdf
The present document has been designed to specify the rules for the management of the TETRA standard encryption algorithm TEA4. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA4 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 of the specification are confidential. The algorithm primitives' section of part 1 of the specification has been published as ETSI TS 104 053-1 [i.1]. Part 3 of the specification is not confidential and can be obtained directly from the TEA4 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA4 (ETSI, ETSI Technical Committee TCCE, TEA4 Custodian and approved recipients (beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TEA4 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TEA4 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TEA4 Custodian. Clause 8 describes an overview of the algorithm and its dimensions.
101 053-5
Rules for the management of the TETRA standard encryption algorithms; Part 5: TEA5
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105305/01.01.01_60/ts_10105305v010101p.pdf
The purpose of the present document is to specify the rules for the management of the TETRA standard encryption algorithm TEA5. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA5 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to licensing organizations to manufacture, possess, install, repair, hold, use and destroy equipment and components containing the TEA5 algorithm and to delivering parts 1, 2 and 3 of the TEA5 specifications. Parts 1 and 2 of the specification are confidential. Part 3 of the specification is not confidential and can be obtained directly from the TEA5 Custodian (see clause 7.2). There are no restrictions on the distribution of this part of the specification. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA5 (ETSI, ETSI Technical Committee TETRA and Critical Communications Evolution, TEA5 Custodian and approved recipients) together with the relationships and interactions between them. Clause 5 is concerned with the rules for the use of TEA5. This clause is supplemented by annex H, which provides an exemplary list of the states and territories in which a User may become an approved recipient. Clause 6 describes the types of licence that may be requested. The procedures for delivering TEA5 specifications to approved recipients are defined in clause 7. This clause is supplemented by annex A, which specifies the items that are to be delivered. Clause 8 is concerned with the criteria for approving an organization for receipt of TEA5 deliverables and with the responsibilities of an approved recipient. This clause is supplemented by annexes B to G which contain the Confidentiality and Restricted Usage Undertakings to be signed by the TEA5 Custodian and approved recipients of TEA5 specifications and/or equipment and components containing TEA5. Clause 9 is concerned with the appointment and responsibilities of the TEA5 Custodian.
101 053-6
Rules for the management of the TETRA standard encryption algorithms; Part 6: TEA6
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105306/01.02.01_60/ts_10105306v010201p.pdf
The present document has been designed to specify the rules for the management of the TETRA standard encryption algorithm TEA6. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA6 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 are confidential. The algorithm primitives' section of part 1 of the specification has been published as ETSI TS 104 053-2 [i.1]. Part 3 of the specification is not confidential and can be obtained directly from the TEA6 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA6 (ETSI, ETSI Technical Committee TCCE, TEA6 Custodian and approved recipients (beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TEA6 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TEA6 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TEA6 Custodian. Clause 8 describes an overview of the algorithm and its dimensions.
101 053-7
Rules for the management of the TETRA standard encryption algorithms; Part 7: TEA7
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10105307/01.02.01_60/ts_10105307v010201p.pdf
The present document has been designed to specify the rules for the management of the TETRA standard encryption algorithm TEA7. This algorithm is intended for air interface encryption in TETRA products. The specification for TEA7 consists of the following three parts: Part 1: Algorithm specification; Part 2: Design conformance test data; Part 3: Algorithm input/output test data. The procedures described in the present document apply to parts 1 and 2 of the specification. Parts 1 and 2 are confidential. The algorithm primitives’ section of part 1 of the specification has been published as ETSI TS 104 053-2 [i.1]. Part 3 of the specification is not confidential and can be obtained directly from the TEA7 Custodian (see clause 5.2). There are no restrictions on the distribution of this part of the specifications. The management structure is defined in clause 4. This structure is defined in terms of the principals involved in the management of TEA7 (ETSI, ETSI Technical Committee TCCE, TEA7 Custodian and approved recipients (beneficiaries)) together with the relationships and interactions between them. The procedures for delivering TEA7 to approved recipients are defined in clause 5. This clause is supplemented by annex A which specifies the items which are to be delivered. Clause 6 is concerned with the criteria for approving an organization for receipt of TEA7 and with the responsibilities of an approved recipient. Clause 7 is concerned with the appointment and responsibilities of the TEA7 Custodian. Clause 8 describes an overview of the algorithm and its dimensions.
101 059
Corporate Telecommunication Networks (CN); CEPT signalling systems (L1 and L2) for analogue inter-PABX lines
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/101059/01.01.01_60/ts_101059v010101p.pdf
The present document collects together (as annexes) 10 former CEPT Recommendations on the subject of "CEPT signalling systems (L1 and L2) for analogue inter-PABX lines".
101 064-2
Telecommunications Management Network (TMN); Information models and protocols for the management and control of the Asynchronous Transfer Mode (ATM) switching network element; Part 2: Enhanced broadband switch management
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101000_101099/10106402/01.01.01_60/ts_10106402v010101p.pdf
The present document specifies the Q3 interface between an ATM switch with enhanced functionality and the Telecommunications Management Network (TMN). The interface specified is that between TMN Network Elements or Q-Adapters which interface to TMN Operations Systems (OSs) without mediation and between OSs and Mediation Devices, as defined in ITU-T Recommendation M.3010 [5]. The scope of the present document includes the management of switched VPs as defined in ITU-T Recommendations Q.2766.1 [10] and Q.2934 [12] and of soft PVCs as defined in ITU-T Recommendation Q.2767.1 [11]. The associated management for customer administration and for call routing is also within the scope of the present document. The object model in the present document is based on and extends the model in ITU-T Recommendation Q.824.6 [9]. The definition of the functionality of TMN Operations Systems is outside the scope of the present document. Security management is also outside the scope of the present document. Existing protocols are used where possible, and the focus of the work is on defining the object model.
101 075
Digital cellular telecommunications system (Phase 2) (GSM); Base Station and ancillary equipment; Physical and electrical parameters; Application of standards and guidance notes (GSM 11.22 version 4.2.0)
TR
4.2.0
http://www.etsi.org/deliver/etsi_tr/101000_101099/101075/04.02.00_60/tr_101075v040200p.pdf
The present document applies to any Base Station System type or part of a Base Station System and co-located equipment and equipment sites, unless otherwise stated. It applies regardless of ownership or responsibility for installation and maintenance of the equipment or network. The document does assume some previous knowledge of the subject matter and in some areas specialist understanding may be required. The present document addresses the following information: - product requirement overview; - equipment sites and installations; - general applicable specifications; - acoustic noise; - construction; - earthing and bonding; - environmental Conditions; - lightning protection; - power supplies; - reliability/Dependability; - specific applicable specifications for product release; - EMC; - type approval.
101 085
Digital cellular telecommunications system (Phase 2+) (GSM); Performance characterization of the GSM Enhanced Full Rate (EFR) speech codec (GSM 06.55 version 8.0.0 Release 1999)
TR
8.0.0
http://www.etsi.org/deliver/etsi_tr/101000_101099/101085/08.00.00_60/tr_101085v080000p.pdf
The present document gives background information on the performance of the GSM enhanced full rate speech codec. Experimental results from the Pre-selection and Verification tests carried out during the standardization process by the SEG (Speech Expert Group) are reported to give a more detailed picture of the behaviour of the GSM enhanced full rate speech codec under different conditions of operation.
101 105
Digital cellular telecommunications system (Phase 2+); Fraud Information Gathering System (FIGS); Service requirements - Stage 0 (GSM 01.31 version 8.0.0 Release 1999)
TR
8.0.0
http://www.etsi.org/deliver/etsi_tr/101100_101199/101105/08.00.00_60/tr_101105v080000p.pdf
The present document describes the requirements (at a stage 0 level) of the Fraud Information Gathering System (FIGS). FIGS provides the means for the HPLMN to monitor a defined set of subscriber activities. The aim is to enable service providers/network operators to use FIGS, and service limitation controls such as Operator Determined Barring (ODB) and Immediate Service Termination (IST), to limit their financial exposure to large unpaid bills produced on subscriber accounts whilst the subscriber is roaming outside their HPLMN. HPLMNs may also choose to collect information on subscriber activities whilst their subscribers are within the HPLMN.
101 106
Digital cellular telecommunications system (Phase 2+); General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements (GSM 01.61 version 8.0.0 Release 1999)
TS
8.0.0
http://www.etsi.org/deliver/etsi_ts/101100_101199/101106/08.00.00_60/ts_101106v080000p.pdf
The present document constitutes a requirements specification for a cryptographic algorithm which is used to protect General Packet Radio Services (GPRS) as specified by GSM 02.60. The present document is intended to provide the ETSI Security Algorithms Group of Experts (SAGE) with the information it requires in order to design and deliver a technical specification for such an algorithm. The specification covers the intended use of the algorithm and use of the algorithm specification, technical requirements on the algorithm, requirements on the algorithm specification and test data, and quality assurance requirements on both the algorithm and its documentation. The specification also outlines the background to the production of the present document.
101 107
Digital cellular telecommunications system (Phase 2+) (GSM); Fraud Information Gathering System (FIGS); Service description - Stage 1 (GSM 02.31 version 7.1.1 Release 1998)
TS
7.1.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101107/07.01.01_60/ts_101107v070101p.pdf
The present document specifies the stage 1 description of the Fraud Information Gathering System (FIGS) feature which provides the means for the HPLMN to monitor the activities of its subscribers in a VPLMN. The purpose of this network feature is to enable the HPLMN to monitor the activities of its subscribers while they are roaming. The VPLMN collects information about a defined set of activities on monitored subscribers and sends this information back to the HPLMN. This enables the HPLMN to clear certain types of calls and so stop fraudulent use of the GSM system. The present document enables service providers/ network operators to use FIGS, and service limitation controls such as Operator Determined Barring (ODB) and Immediate Service Termination (IST), to limit their financial exposure to subscribers producing large unpaid bills. HPLMNs may also choose to monitor the activities of its subscribers within the HPLMN.
101 108
Digital cellular telecommunications system (Phase 2+); Tandem Free Operation (TFO); Service Description; Stage 1 (GSM 02.53 version 8.0.1 Release 1999)
TS
8.0.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101108/08.00.01_60/ts_101108v080001p.pdf
The present document specifies the stage 1 description for the Tandem Free Operation (TFO) feature which provides the capability to avoid using two GSM speech codecs in mobile to mobile speech calls. The primary aim is to realise improvements in speech quality. The TFO mode of operation could also be used to reduce inter-Mobile services Switching Center (MSC) transmission bandwidth requirements. In analogy with ITU-T Recommendations I.130 [1], Stage 1 is an overall service description, from the service subscriber's and user's standpoints, that views the network as a single entity which provides services to the user.
101 110
Digital cellular telecommunications system (Phase 2+) (GSM); Characterisation, test methods and quality assessment for handsfree Mobile Stations (MSs) (GSM 03.58 version 8.0.0 Release 1999)
TR
8.0.0
http://www.etsi.org/deliver/etsi_tr/101100_101199/101110/08.00.00_60/tr_101110v080000p.pdf
The present document gives some guidelines to implement test methods and to evaluate the transmission quality of handsfree Mobile Stations (MSs). The normative characteristics and test methods for handsfree Mobile Stations (MSs are defined in GSM 03.50). The present document gives additional data. It includes summaries of texts or contributions presented and discussed during the meetings of ad hoc group SMG2/03.50 on environmental conditions, speech processing and quality assessment for handsfree Mobile Station. The items covered by this report are mainly. - Environmental conditions for handsfree Mobile Stations. - Speech processing techniques and consequences on delay. - Speech quality assessment for handsfree implementing acoustic echo cancellation and noise reduction.
101 111
Universal Mobile Telecommunications System (UMTS); Requirements for the UMTS Terrestrial Radio Access system (UTRA) (UMTS 21.01 version 3.0.1)
TR
3.0.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101111/03.00.01_60/tr_101111v030001p.pdf
This ETSI Technical Report (TR) identifies the general requirements of the radio interface of the Universal Mobile Telecommunications System (UMTS). These requirements are derived from the UMTS services and facilities framework contained within UMTS 22.01 [7] and 22.05 [8], taking into consideration different operational environments, mobility requirements, cell architectures, etc.
101 112
Universal Mobile Telecommunications System (UMTS); Selection procedures for the choice of radio transmission technologies of the UMTS (UMTS 30.03 version 3.2.0)
TR
3.2.0
http://www.etsi.org/deliver/etsi_tr/101100_101199/101112/03.02.00_60/tr_101112v030200p.pdf
This ETSI Technical Report (TR) establishes the technical procedure for the comparative evaluation of candidate technologies for the UTRA. The UTRA includes the handling of the representative bearers as defined in UMTS 21.01 [1], i.e. Open System Interconnection (OSI) layers 1-3. It establishes the criteria based upon the requirements contained in UMTS 21.01 [1]. The primary purpose of this [report] is to facilitate the comparison of different candidates between milestones M1 and M2 of the UTRA definition procedure (Refinement and synthesis phase). It will also be used after milestone M2 (Definition phase) and in the submission of the candidate to ITU. The scope of this report is not to make the actual choice but to define how the technical evaluation will be performed.
101 113
Digital cellular telecommunications system (Phase 2+) (GSM); General Packet Radio Service (GPRS); Service description; Stage 1 (GSM 02.60 version 7.5.0 Release 1998)
TS
7.5.0
http://www.etsi.org/deliver/etsi_ts/101100_101199/101113/07.05.00_60/ts_101113v070500p.pdf
The present document defines the stage one description of the General Packet Radio Service (GPRS) on Global System for Mobile communications (GSM) networks. Stage one is an overall service description, primarily from the service subscriber's and user's points of view, but does not deal with the details of the human interface itself. The present document includes information applicable to network operators, service providers and terminal, switch and data base manufacturers. The present document contains the core requirements for the GPRS on GSM, which are sufficient to provide a complete service. The present document also documents some additional requirements which may be implemented (but do not have to be implemented). In addition, additional functionalities not documented in the present document may be implemented. The requirements of which are considered outside the scope of the present document and consequently outside the scope of the corresponding stage 2 and stage 3 TSs. This additional functionality may be on a network-wide basis, or particular to one or a group of users. Such additional functionality shall not compromise conformance to the core requirements of the service. The interface between the Mobile Station (MS) and any external applications are outside the scope of the present document. Charging principles are outside the scope of the present document, unless specific service requirements are stated. These requirements deal with the allocation of certain call charges to particular users. A later phase of GPRS may include interworking with circuit switched networks (e.g. PSTN, ISDN) and may emulate certain circuit switched services. These aspects are outside the scope of this version of the present document.
101 114
Methods for Testing and Specification (MTS); Analysis of the use of ASN.1 94 with TTCN and SDL in ETSI deliverables
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101114/01.01.01_60/tr_101114v010101p.pdf
The present document identifies the key technical issues and problems of completing the integration of ASN.1 (as defined in the ITU-T Recommendations X.680 [1], X.680 Amendment 1 [2], X.681 [3], X.681 Amendment 1 [4], X.682 [5] and X.683 [6]) and SDL (as defined in ITU-T Recommendations Z.100 [7] and Z.100 Addendum 1 [8]). The present document also identifies the key technical issues and problems of integrating ASN.1 (as defined in the ITU- T Recommendations X.680 [1], X.680 Amendment 1 [2], X.681 [3], X.681 Amendment 1 [4], X.682 [5]) and X.683 [6] and the second version of TTCN (as defined in ISO/IEC 9646-3 [11]). The present document focuses on types and does not investigate representation of values. It is intended that the proposed solutions stated in the present document be used as a basis for further work by ETSI (or others). The present document complements rather than supplants ETR 60 [12] and ITU-T Recommendation Z.105 [9].
101 115
Digital cellular telecommunications system (Phase 2+) (GSM); Background for Radio Frequency (RF) requirements (GSM 05.50 version 8.2.0 Release 1999)
TR
8.2.0
http://www.etsi.org/deliver/etsi_tr/101100_101199/101115/08.02.00_60/tr_101115v080200p.pdf
The present document gives background information on how the RF requirements of GSM 400, GSM 900 and DCS 1800 systems have been derived.
101 116
Digital cellular telecommunications system (Phase 2+) (GSM); Specification of the 1.8 Volt Subscriber Identity Module - Mobile Equipment (SIM - ME) interface (GSM 11.18 version 7.0.1 Release 1998)
TS
7.0.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101116/07.00.01_60/ts_101116v070001p.pdf
The present document defines the aspects of the Subscriber Identity Module - Mobile Equipment (SIM - ME) interface which are based on 1.8V technology to be used in the Mobile Station (MS). It specifies the electrical and logical requirements necessary for the operation of the 1.8V SIM - ME interface where it differs from GSM 11.11 [1]. For all aspects of the SIM - ME interface which are not covered by the present document, GSM 11.11 [1] applies.
101 118
Network Aspects (NA); High level network architecture and solutions to support number portability
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101118/01.01.01_60/tr_101118v010101p.pdf
The present document is to investigate, address and describe possible High level Network Architectures and Solutions for Number Portability of ITU-T Recommendation E.164 [3] numbers in the fixed telecommunications Network. The following is included in the present document: a) possible Network Architectures and solutions to support number portability; b) Pros and Cons for described Number Portability solutions and influences on services; c) management issues with regard to NP and selected Data Base solution; d) the exchange of NP related information between Networks per solution; e) routeing issues with relation to NP and described solution. The following types of number portability is to be covered: 1) service provider portability of Geographic Numbers; 2) service provider portability of Non Geographic Numbers. NP solutions both for Routeing of ordinary calls and for Routeing of connection less supplementary services (e.g. CCBS) are included.
101 119
Network Aspects (NA); High level description of number portability
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101119/01.01.01_60/tr_101119v010101p.pdf
The present document is to describe Number Portability. For the purpose of this study Number portability is limited to the Service Provider Portability for Geographic Numbers (GNP) and Non Geographic Numbers (NGNP) in the National Fixed Network, e.g. number portability between Service Providers within geographic country boundaries. An exception to this is Number Portability of the European Telephony Numbering Space. In order to describe number portability, the present document provides: - an overview of number portability; - a description of the responsibility of the different entities involved; - a description of number portability in the European Telephony Numbering Space (ETNS); - background material to concepts used in related documents TR 101 118 [1], TR 101 122 [2] and EG NA-061501 [3] describing: - possible internal architectures; - numbering and addressing; - signalling; - Intelligent Network (IN) Options. The present document describes the responsibilities of the various entities involved in number portability in order to deliver calls to numbers that have been ported. The present document also identifies the information requirements of the various entities necessary to manage and implement Number Portability. Service management and inter-operator procedures have been demonstrated to be the major area of difficulty when introducing number portability. Detailed considerations of these issues are outside the scope of the present document The scope of the requirements is limited to: - the portability of individual customer numbers; - porting of individual Multiple Subscriber Number (MSN); - porting of complete Direct Dialling In (DDI) ranges. However, whilst it is not possible to port single numbers from a DDI range, dividing the range into blocks and porting the resultant sub block will have the same effect. Therefore there is no need to support the portability of individual numbers within a DDI range. The results of the study should ensure: 1) Architectural Flexibility: the set of architectures selected for support of number portability should allow network operators reasonable flexibility in the manner in which the architecture is implemented, the use of equipment from multi vendors; 2) Transparency: the mechanism by which portability is provided should be transparent to the ported and non ported customers; 3) Performance: the mechanism by which portability is provided should subject the call to minimal (if any) performance degradation relative to that offered to non ported numbers. This includes both post dial delay and transmission; 4) interconnection: All network operators offering portability within the same geographic area should interconnect, either directly, or via a transit, and complete calls. Direct or transit interconnection is a commercial decision. 6 TR 101 119 V1.1.1 (1997-11) The following Portability types are out of the scope of this study, but are described for completeness: - service Provider Portability for Mobile Numbers; - service Portability; - location Portability. The impact of a ported non geographic number resolving to a geographic number has been raised as an issue, and is for further study.
101 122
Network Aspects (NA); Numbering and addressing for Number Portability
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101122/01.01.01_60/tr_101122v010101p.pdf
The present document is to analyse the impact of Service Provider Portability on Geographic and non-geographic numbers and number formats used at the Network Termination Point (NTP) and also at the Point Of Interconnection (POI) between networks in a multi-vendor environment. Routeing requirements are analysed and numbers and number formats are derived as a consequence.
101 123
Broadband Integrated Services Digital Network (B-ISDN); Resource management procedures and cases of their possible usage
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101123/01.01.01_60/tr_101123v010101p.pdf
The present document is to define a specific resource management protocol to support the transfer ABT-DT capability and to consider some specific cases of its possible application. The material contained in the present document is strictly informative to give guidance for implementation in networks. No additional ATM transfer capabilities as compared to ITU-T Recommendation I.371 [1] are introduced. The present document specifies the functions supported by the ABT-DT protocol, the protocol messages and the protocol procedures. In order to achieve an effective resource management capability, these functions shall be complemented by additional functions (e.g. connection policing, resource allocation) that are network operator specific and are not covered by the present document.
101 127
Transmission and Multiplexing (TM); Digital Radio Relay Systems (DRRS); Synchronous Digital Hierarchy (SDH); High capacity DRRS carrying SDH signals (1 x STM-1) in frequency bands with about 30 MHz channel spacing and using Co-Channel Dual Polarized (CCDP) operation
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101127/01.01.01_60/tr_101127v010101p.pdf
101 130
ElectroMagnetic Compatibility and Radio Spectrum Matters (ERM); Study of the feasibility for standardizing Self-organizing Time Division Multiple Access (STDMA) system requirements
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101130/01.01.01_60/tr_101130v010101p.pdf
101 135
Transmission and Multiplexing (TM); High bit-rate Digital Subscriber Line (HDSL) transmission systems on metallic local lines; HDSL core specification and applications for combined ISDN-BA and 2 048 kbit/s transmission
TS
1.5.3
http://www.etsi.org/deliver/etsi_ts/101100_101199/101135/01.05.03_60/ts_101135v010503p.pdf
The present document describes a transmission technique called High bit-rate Digital Subscriber Line (HDSL), as a means for the transportation of several types of applications. The present document defines the requirements for the individual HDSL transmission system, the transmission performance, the HDSL maintenance requirements and procedures and the mapping of information from the dedicated applications. An individual HDSL transceiver system is a two wire bi-directional transceiver for metallic wires using the echo cancellation method. Three systems may be utilized, one transporting a bit rate of 784 kbit/s over each of three pairs used in parallel, a second with an increased bit rate of 1 168 kbit/s and two pairs in parallel only and a third with a more increased bit rate of 2 320 kbit/s on one pair only. The line codes of systems specified in the present document are 2B1Q (2 Binary 1 Quaternary) and CAP (Carrierless Amplitude Phase modulation). Systems using a CAP line code are covered in annex B. Annex C summarizes the Committee T1 recommendation for the frame structure of 1 544 kbit/s applications. Only one of the line codes has to be realized in a transmission system. The present document defines the common circuitry for combining and controlling one, two or three HDSL transceiver systems, depending on the bit rate of the transceiver system used, for the support of applications with a 2 048 kbit/s hierarchy. The common circuitry and the necessary number of HDSL transceiver systems form the HDSL core, which is independent from the different applications defined in the present document. The applications of HDSL are determined by the functionality of the mapping and interface part, some of which are defined as follows: - ISDN primary rate access digital section in accordance with ETS 300 233 [1]; - ONP leased line access D2048U based on ETS 300 246 [2] and ETS 300 247 [3]; - ONP leased line access D2048S based on ETS 300 418 [4] and ETS 300 419 [5]; - 2 Mbit/s access to the Synchronous Digital Hierarchy (SDH) via a TU-12. The HDSL core may be used for applications that are not restrictive to the access portion of the network but this is outside the scope of the present document. NOTE: If further applications are identified in future the present document may be enhanced to define the relevant interface and mapping requirements as far as these do not violate the specification of the HDSL core. Special applications of the HDSL core or part of the HDSL core can be: - fractional installation, which provides reduced access capability only by a reduced number of HDSL transceivers, to cater for an inexpensive system if the total capacity of 30 × 64 kbit/s is not needed; - partial operation, which is the persistent operation of the operable HDSL transceiver systems when others become inoperable; - fractional payload, e.g. H0-channel. The bit-rate at the application interface will also be 2 048 kbit/s in these applications, but not all the time slots in the ITU-T Recommendation G.704 [32] frame may be used, or there may be network specific interfaces used for these applications, the definition of which is outside the scope of the present document. The present document does not specify all the requirements for the implementation of NTU, LTU or REG. It serves only to describe the functionality needed. ETSI ETSI TS 101 135 V1.5.3 (2000-09) 13
101 136
Satellite Earth Stations and Systems (SES); Guidance for general purpose earth stations transmitting in the 5,7 GHz to 30,0 GHz frequency bands towards geostationary satellites and not covered by other ETSI specifications or standards
TS
1.3.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101136/01.03.01_60/ts_101136v010301p.pdf
The present document is applicable to General Purpose Earth Stations (GPESs) not covered by other ETSI specifications or standards. The present document is intended to provide guidance for compliance of GPESs with the Radio and Telecommunications Terminal Equipment directive [1] requirements for the protection of other services from harmful interference. However, for some GPES, it is recognized that relaxation of the specified limits may be necessary and may be accepted, taking into account the particular environment of the GPES installation on a case-by-case basis. NOTE 1: More stringent specifications may be needed and required by satellite operators. NOTE 2: A GPES will be subject to a site clearance and a standard frequency co-ordination process. The present document is applicable to GPESs which have the following characteristics: • GPESs designed to transmit in all or part of any of the applicable frequency bands allocated to the Fixed Satellite Service (FSS),including feeder links for the Broadcast Satellite Service (BSS), as defined in table 1; and • GPESs designed to operate through geostationary satellites with a typical orbital separation as defined in table 1 away from any other geostationary satellite operating in the same frequency band and covering common areas; and • GPESs designed for operation at a fixed location; and • GPESs designed for attended operation. Table 1: Transmit frequency bands Transmit frequency bands Typical orbital separation 5,725 GHz - 7,075 GHz 3° 10,7 GHz - 11,7 GHz 3° 12,75 GHz - 14,50 GHz 3° 17,30 GHz - 18,40 GHz 3° 27,50 GHz - 30,00 GHz 2° A GPES typically comprises six main parts as defined in clause 3.1. The present document does not contain any recommendation or information about the method of modulation. The present document applies to the GPES with its various equipment, its ancillary equipment and its various terrestrial ports when operated within the boundary limits of the operational environmental profile (including the ranges of humidity, temperature and supply voltage) declared by the applicant. NOTE 3: Limits for spurious radiation from a GPES when transmitting multiple carriers simultaneously (multicarrier operation) have not been taken into consideration in the present document. ETSI ETSI TS 101 136 V1.3.1 (2001-06) 6
101 139
Integrated Services Digital Network (ISDN); Signalling System No.7; Transaction Capabilities (TC) version 2; Implementors guide
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101139/01.01.01_60/ts_101139v010101p.pdf
The present document is a compilation of reported defects, their resolutions and minor upgrades to the 2nd Edition of ETS 300 287-1 [1]. It includes all approved technical corrigenda and is intended to be an additional authoritative source of information for implementors to be read in conjunction with the ETS 300 287-1 [1] itself.
101 146
Universal Mobile Telecommunications System (UMTS); UMTS Terrestrial Radio Access (UTRA); Concept evaluation (UMTS 30.06 version 3.0.0)
TR
3.0.0
http://www.etsi.org/deliver/etsi_tr/101100_101199/101146/03.00.00_60/tr_101146v030000p.pdf
This document describes the detailed evaluation work towards the definition of the Universal Mobile Telecommunications System UMTS Terrestrial Radio Access (UTRA) within SMG2.
101 147
Environmental Engineering (EE); Interworking between Direct Current/Isolated (DC/I) and Direct Current/Common (DC/C) electrical power systems
TR
1.2.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101147/01.02.01_60/tr_101147v010201p.pdf
The present document describes and establishes simplified models of the different sections of the ground distribution network constituting the DC/I and the DC/C electrical power systems. These models are interworked to identify the common impedance where DC power supply currents can circulate (interconnection between DC/C and DC/I, DC/C and DC/C, DC/I and DC/I). These results allow the establishment of some basic engineering advice that should be applied to guarantee the good behaviour when interconnecting two systems. These precautions are given for functionality reasons: • the noise immunity of the pre-existing system and of the links between the system and the MDF should be conserved; and safety aspects: • the screens of signal cables between the pre-existing system and the Main Distribution Frame (MDF), the conductors and the connections of the pre-existing system have to withstand additional currents.
101 149
2-wire analogue voice band interfaces; Terminal Equipment transmitting voice signals; Test simulation for level limitation requirements
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101149/01.01.01_60/tr_101149v010101p.pdf
The present document studies the possibility of using a single pseudo-speech signal as test simulation for level limitation requirements. This applies to Terminal equipment (TE) transmitting voice signals and having a 2-Wire analogue voice band interface.
101 150
Report on the application of TBR 21
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101150/01.01.01_60/tr_101150v010101p.pdf
The present document studies the application of prTBR 21 and the published TBR 21[1] at a national level and considers opportunities to build upon the experience gained. Topics taken into account include: a) the scope of actual implementations; b) problems encountered or foreseen in practical application; c) interpretation of the Scope of TBR 21; d) the relationship with TBR 37 [9] and TBR 38 [3] (including the opportunities for convergence towards a single access CTR for the analogue PSTN); e) possible extensions to the applicability of TBR 21 (including the opportunity for an early application of TBR 38); f) relationships with other related areas, e.g. analogue leased line TBRs.
101 153-1
Users' views on addressing and directories; Part 1: Requirements for design and interworking
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/10115301/01.01.01_60/tr_10115301v010101p.pdf
The present document summarizes the users' views on the main issues related to directory systems (including public, private and corporate ones) from a functional point view. It deals with the design of these systems, the interworking between private directory systems as well as interworking between private directory systems and public ones. The present document is applicable to private directory system design and provision. Public directory service designers may also find here some useful information about interoperability needs and content, since business users are also seeking information from such services. There are several directory technologies available. Issues concerning the establishment of private directories are to some degree dependent on the selected technology. Most concepts given in the present document refer to the X.500 directory technology, since, as indicated in subclause 6.2. "Directory schema", the interworking between the different directory systems implies the conformance to at least some X.500 key concepts. In the remainder of the present document, concepts like Directory Information Tree (DIT), directory entry, Distinguished Name (DN), Relative Distinguished Name (RDN), Directory System Agent (DSA), Directory User Agent (DUA), Directory Management Domain (DMD), etc., are assumed to be known by the reader.
101 153-2
Users' views on addressing and directories; Part 2: Guidelines to the users designing a private directory system
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/10115302/01.01.01_60/tr_10115302v010101p.pdf
The present document summarizes the users' views on the main issues related to private directory systems from a functional point of view. It deals with the design of these systems, their interworking as well as interworking between private directory systems and public ones. The present document is applicable to private directory system design and provision. It should be seen as a source of guidelines to users. A corporate directory is an implementation of a private directory for large companies. It is here defined as a repository for information shared by all departments in a corporation, an organization, or an institution. A corporate directory is in contrast to the situation where different departments and functions maintain their own directories for their own purposes, and where such directories are not integrated to constitute an integrated appearance to all users. This does not necessarily imply that a corporate directory needs to be centralized or centrally managed. There are several directory technologies available. Issues concerning establishing a corporate directory are to some degree dependent on the selected technology. Most concepts given in the present document refer to the X.500 directory technology. It does not assume that the reader has a deep understanding of that technology. It is the intention here to keep the technical details down to a minimum. However, it is not possible to discuss deployment of a directory without referring to some X.500 directory concepts, like naming and information structures. Annex A gives a short introduction to the basic X.500 concepts for the benefit of those readers not familiar with such concepts. Although EWOS closed in 1997 and a new organization ISSS (Information Society Standardization System) has been set up to continue producing specifications in same area, EWOS publications remain available for downloading. Therefore, some additional tutorial information can be found on the EWOS Web-pages: http://www.ewos.be/dir/gtop.htm [12] Nevertheless, as indicated in subclause 6.4 "Directory schema", interworking between the different directory systems implies conformance to some X.500 key concepts. In the remainder of the present document, concepts like Directory Information Tree (DIT), directory entry, Distinguished Name (DN), Relative Distinguished Name (RDN), Directory System Agent (DSA), Directory User Agent (DUA), Directory Management Domain (DMD), etc. are assumed to be known by the reader.
101 154
Digital Video Broadcasting (DVB); Specification for the use of Video and Audio Coding in Broadcast and Broadband Applications
TS
2.9.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101154/02.09.01_60/ts_101154v020901p.pdf
The present document provides implementation guidelines and conformance points for the use of audio-visual coding utilizing MPEG-2 Systems in satellite, cable and terrestrial broadcasting systems and in IP-based networks, and for the use of video coding for adaptive bitrate delivery over IP-based networks. The present document covers Standard Definition Television (SDTV), High Definition Television (HDTV), Plano Stereoscopic 3DTV and Ultra High Definition Television (UHDTV). More specifically, the present document covers the first and second phases of the DVB UHDTV specification, as well as the DVB Next Generation Audio specification.
101 158
Telecommunications security; Lawful Interception (LI); Requirements for network functions
TS
1.3.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101158/01.03.01_60/ts_101158v010301p.pdf
The present document describes the general requirements of Network Operators (NWOs), Service Providers (SvPs) and Access Providers (APs) relating to the provision of lawful interception, with particular reference to the Handover Interface (HI). The provision of lawful interception is a requirement of national law, which is usually mandatory. From time to time, a NWO and/or SvP and/or AP will be required, according to a lawful authorization, to make available results of interception, relating to specific identities, to a specific Law Enforcement Agency (LEA). The general approach of the HI described in the present document is to be applied for every network technique, present or future, as long as the intercept requirements can be satisfied.
101 159
Digital Enhanced Cordless Telecommunications (DECT); Implementing DECT in an arbitrary spectrum allocation
TR
1.2.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101159/01.02.01_60/tr_101159v010201p.pdf
The present document is a guide how to implement and test Digital Enhanced Cordless Telecommunications (DECT) systems operating at frequencies outside the frequency-bands described in TBR 6 [11]. The need to have this arises if DECT equipment is to be adapted to national requirements of countries which do not allow to use the basic 1 880 to 1 900 MHz DECT frequency band. The present document is thereby also a guide for approval of such DECT systems in the above mentioned countries.
101 162
Digital Video Broadcasting (DVB); Allocation of identifiers and codes for Digital Video Broadcasting (DVB) systems
TS
1.9.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101162/01.09.01_60/ts_101162v010901p.pdf
The present document defines codes, and identifiers (also referred to as code points) used in DVB systems. These codes are allocated by the DVB Project Office at the request of potential service providers and once allocated, become part of ETSI EN 300 468 [i.1] by reference. Further details can be obtained by contacting DVB Services Sàrl. DVB Services Sàrl c/o EBU L'Ancienne Route 17a CH-1218 Grand-Saconnex Switzerland Tel: +41 22 717 27 19 Email: info@dvbservices.com Web: http://www.dvbservices.com
101 170
Generic Programmable Communication Interface (PCI) for Multimedia Applications: Identification of PCIs needed
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101170/01.01.01_60/tr_101170v010101p.pdf
The term PCI stands for Programmable Communication Interface, sometimes also referred to as Programming Communication Interface. A PCI presents a specialized Application Program Interface (API) that is related to the communications aspects of software. The present document deals with the requirements of PCIs for multimedia applications, i.e. digital applications that combine independent isochronous and asynchronous media types together. Multimedia applications can be interactive or not. They may use and/or present different types of media either in context, or simultaneously or in loose conjunction with each other. Different types of applications and different types of media like audio, video, voice or images, impose different requirements onto the terminal equipment and the underlying communications networks. The impact of those applications and media, and the abilities of the communications networks are studied thoroughly. The demands of the (human) users are considered carefully. The present document analyses the different requirements by applying different viewpoints, which illuminate the viewpoint-specific impacts and demands. The summary of the results form a general list of requirements for PCIs for multimedia applications. Those requirements are then compared against existing PCIs. As result a detailed list of requirements for each type of PCI is obtained. Moreover, the present document structures the existing and future PCIs in accordance with existing PCI models and discusses briefly the need for future extension or creation of specific PCIs. The general title of the present document reads "Generic PCI for multimedia applications". Since this title might mislead the reader in the sense that possibly one - and only one - PCI might exist that covers all the applications needs, the reader should note that the complexity of multimedia applications disallows this approach. Several - in nature completely different - PCIs will be needed to cover the world of multimedia applications. This becomes even more apparent, if it is considered that future multimedia applications will probably extend to run in new kinds of terminal equipment that is not even yet available. The present document identifies the Programmable Communication Interfaces (PCIs) needed for today and future multimedia aware applications. It points out: - what kind of PCIs are needed; - what kind of features those PCIs shall provide; - what kind of suitable PCIs are already defined (or standardized) by standardization bodies; - how existing definitions of those PCIs should be extended to cover the needs of multimedia aware applications. TR 101 170 V1.1.1 (1998-05) 7
101 173
Broadband Radio Access Networks (BRAN); Inventory of broadband radio technologies and techniques
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101173/01.01.01_60/tr_101173v010101p.pdf
The scope of the present document is identification of technologies and techniques and their characteristics that may prove suitable for the implementation of the physical, Data Link Control (DLC) and subnetwork convergence functions of BRAN as identified in TR 101 031 [4] and TR 101 177 [5]. The BRAN Project is intended to provide specifications for these networks. The technologies and techniques identified should support the main characteristics of these networks: high data rate, high capacity and uncoordinated deployment. Bringing together these technologies and techniques in a single document facilitates evaluation of their relative merits as well as facilitating the composition and evaluation of combinations. The present document is not intended to be inclusive or complete: it reflects a state of the art at the beginning of the standardization process. Much of the material is derived from private and public research projects in the field of broadband radio systems. Examples are the EU ACTS projects AWACS, MEDIAN, SAMBA and Magic WAND and the German ATMmobil project.
101 176
Digital Enhanced Cordless Telecommunications (DECT); Global System for Mobile communications (GSM); DECT/GSM advanced integration of DECT/GSM dual-mode terminal equipment
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101176/01.01.01_60/tr_101176v010101p.pdf
To investigate radio and network aspects and clarifying the possibilities, problems and needs for new standardization related to advanced dual-mode terminals for DECT and GSM. The present document will identify the needed contents of the necessary standards that will form the basis for the second edition of Harmonized Standard EN 301 439 [18], i.e. dual-mode terminals that cannot be type approved according to existing TBRs and Harmonized Standards and that may operate in both modes at the same time or using only a single subscription. Basic dual-mode terminals, i.e. terminals consisting of one DECT part and one GSM part and that can be type approved according to existing TBRs and Harmonized Standards, were considered in another ETR (TR 101 072 [16]). The same consideration should be made for dual-mode terminals and infrastructure for DECT/DCS1800 as well as dual-mode/dual-band terminals DECT/GSM/DCS1800. The term GSM is considered to cover all the frequency bands, and combinations of frequency bands, allowed for GSM type equipments, i.e. P-GSM, E-GSM, R-GSM, DCS1800 or dual-band GSM/DCS. NOTE: A terminal comprising multiple GSM parts operating on different frequency bands is considered as a dual- band terminal. A terminal comprising both DECT and GSM parts is referred to as a dual-mode terminal.
101 177
Broadband Radio Access Networks (BRAN); Requirements and architectures for broadband fixed radio access networks (HIPERACCESS)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101177/01.01.01_60/tr_101177v010101p.pdf
The scope of the present document is limited to the requirements and architectures for broadband fixed radio access networks, under the name HIPERACCESS. The requirements in the present document address subjects such as applications, traffic volumes and traffic patterns that underlie the projected spectrum requirements; transport requirements, operational requirements and chosen architectures. The architectures address the communications layer models as well as the reference models that identify the key interfaces subject to standardization.
101 178
Digital Enhanced Cordless Telecommunications (DECT); A High Level Guide to the DECT Standardization
TR
1.5.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101178/01.05.01_60/tr_101178v010501p.pdf
The present document provides a high level description of the various components of the Digital Enhanced Cordless Telecommunications (DECT) standardization. It is directed to a wide audience, regulators, operators, manufacturers and others, and attempts to provide a basic overview of the DECT standards, without requiring detailed technical knowledge of DECT as a prerequisite. The present document describes the services and applications for which DECT may be used, and which ETSI publications relate to the different applications. The documents relating to conformance testing and regulation of DECT products are also described.
101 180
Digital cellular telecommunications system (Phase 2+) (GSM); Security mechanisms for the SIM application toolkit; Stage 1 (GSM 02.48 version 8.0.0 Release 1999)
TS
8.0.0
http://www.etsi.org/deliver/etsi_ts/101100_101199/101180/08.00.00_60/ts_101180v080000p.pdf
The present document provides standardised security mechanisms in conjunction with the SIM Application Toolkit for the interface between a GSM PLMN Entity and a SIM. The security mechanisms which are specified are independent of applications. The present document describes the functional requirements of the security mechanisms with the implementation detail of these mechanisms being described in the stage 2 specification (GSM 03.48). The present document is the result of a feasibility study carried out on this topic, contained in GSM 11.15.
101 182
Analogue Terminals and Access (ATA); Definitions, abbreviations and symbols
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101182/01.01.01_60/tr_101182v010101p.pdf
The present document presents a list of the definitions, abbreviations and symbols used in the documents prepared by the ETSI Project Analogue Terminals and Access (ATA). The purpose of the present document is primarily to give guidance to ATA rapporteurs in the preparation of their documents, and to assist the usability of these documents through the use of consistent terminology. Furthermore it is intended to align, as far as possible, the definitions abbreviations and symbols with the corresponding ones from ITU and make them available within ETSI for other Technical Bodies, membership and clients. The definitions, abbreviations and symbols given are not intended to be exclusive. Other definitions, abbreviations and symbols different from those given here may be found in some ATA documents. However, the definitions given in the present document are generally to be preferred. The intended users of the present document include: Table 1: Intended users and potential benefits User TR used for Potential Benefit 1 ETSI Project ATA Provide guidance for ATA rapporteurs Improved quality of ATA documents through consistency and coherence of definitions, abbreviations and symbols 2 Other ETSI Technical Bodies Provide guidance on ATA terminology, and on how ATA interpret common terms Promote harmonized terminology within ETSI 3 User groups Provide guidance on ETSI Project ATA terminology Increased awareness in other interested parties of ATA terminology and its applications in documents
101 183
Public Switched Telephone Network (PSTN); Analogue ringing signals
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101183/01.01.01_60/tr_101183v010101p.pdf
The present document identifies ringing signals used by various network operators on analogue interfaces of Public Switched Telephone Networks both for delivery of normal calls and also distinctive ringing signals used to support supplementary services. The present document deals with the time, cadence and waveform characteristics of the ringing signals uses in different countries. The present document is useful to terminal equipment intended for analogue connection to the public switched telephone networks and could be used as a complement of information to TBR 21 [1], subclause 4.5. This is a study that aims to compliment the information included in ETS 300 001 [2], subclause 1.7.9 considering the present development of European Telecommunications. The present document is applicable to the analogue interface of the Public Switched Telephone Network.
101 186
Digital cellular telecommunications system (Phase 2+) (GSM); General Packet Radio Service (GPRS); Requirements specification of GPRS (GSM 01.60 version 6.0.0)
TR
6.0.0
http://www.etsi.org/deliver/etsi_tr/101100_101199/101186/06.00.00_60/tr_101186v060000p.pdf
The purpose of this document is to specify the requirements of GPRS, which shall form the basis for further development work on this subject. This requirements specification is to be used a reference document for the standardisation process and also for the "compliance to requirements check" to ensure compliance of the developed standards with the specified requirements or to enable the documentation of the approved deviations and also the reasons for deviation. It is neither intended nor necessary to update this document to reflect the actual status of the standardisation work, since the standardisation process - especially the stage 2 work - may be influenced by implementation and/or technical aspects, which may not be true requirements but rather be, for example, a "temporary aspect or constraint". Additional requirements or refinements to this specification are of course allowed.
101 190
Digital Video Broadcasting (DVB); Implementation guidelines for DVB terrestrial services; Transmission aspects
TR
1.3.2
http://www.etsi.org/deliver/etsi_tr/101100_101199/101190/01.03.02_60/tr_101190v010302p.pdf
The present document describes the Digital Video Broadcasting Terrestrial (DVB-T) specification for digital terrestrial TV broadcasting. It tries to draw attention to the technical questions that need to be answered in setting up a DVB-T network and offers some guidance in finding answers to them. It does not cover issues linked to the content of the broadcasts such as Service Information (SI), Electronic Programme Guides (EPG) and Access Control (CA). Guidelines for implementation of MPEG-2 and Service Information (SI) can be found in ETR 154 [i.1] and ETR 211 [i.2].
101 191
Digital Video Broadcasting (DVB); DVB mega-frame for Single Frequency Network (SFN) synchronization
TS
1.4.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101191/01.04.01_60/ts_101191v010401p.pdf
The present document specifies a mega-frame, including a Mega-frame Initialization Packet (MIP), which may be used for synchronization of Single Frequency Networks (SFN) as well as for the optional control of other important parameters in an SFN.
101 196
Digital Video Broadcasting (DVB); Interaction channel for Cable TV distribution systems (CATV); Guidelines for the use of ETS 300 800
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101100_101199/101196/01.01.01_60/tr_101196v010101p.pdf
The present document gives guidelines for use of the DVB interaction channel for Cable TV distribution systems (CATV) specification ETS 300 800 [1]. Hybrid Fibre Coax (HFC) networks are a sub-class of CATV networks in which the subscribers are divided into groups by using optical transmission technology in the trunk network. The CATV infrastructures can support the implementation of the RC for interactive services suitable for DVB broadcasting systems. CATV can be used to implement interactive services in the DVB environment, providing a bi-directional communication path between the user terminal and the service provider.
101 197
Digital Video Broadcasting (DVB); DVB SimulCrypt; Head-end architecture and synchronization
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101100_101199/101197/01.02.01_60/ts_101197v010201p.pdf
The present document specifies the system architecture, timing relationships and messaging structures of DVB SimulCrypt. The components within the system architecture represent functional units. The boundaries between physical units are not required to match the boundaries between functional units. It is possible that the SimulCrypt Synchronizer (SCS) could be in the Multiplexer (MUX) or the SCS and MUX could be built independently. Neither architecture is mandated.
101 202
Digital Video Broadcasting (DVB); Implementation guidelines for Data Broadcasting
TR
1.2.1
http://www.etsi.org/deliver/etsi_tr/101200_101299/101202/01.02.01_60/tr_101202v010201p.pdf
The present document provides implementation guidelines for the use and implementation of the Digital Video Broadcasting (DVB) data broadcast service in a DVB digital broadcast environment including satellite-, cable-, MMDS- and terrestrial networks. The guidelines are intended to be highly recommended rules for the usage of the DVB data broadcast specification as put down in EN 301 192 [1]. As such, they facilitate the efficient and reliable implementation of data broadcast services. The rules apply to broadcasters, network operators as well as manufacturers. The rules are specified in the form of constraints on the data broadcast implementation. The specification of these functions in no way prohibits end consumer device manufacturers from including additional features, and should not be interpreted as stipulating any form of upper limit to the performance. NOTE: It is highly recommended that the end consumer device should be designed to allow for future compatible extensions to the DVB data broadcast specification. All the fields "reserved" (for ISO), "reserved_future_use" (for ETSI), and "user defined" in the EN 301 192 [1] should be ignored by end consumer devices not to make use of them. The "reserved" and "reserved_future_use" field may be specified in the future by the respective bodies, whereas the "user defined" field will not be standardized. This guidelines document uses the terminology defined in EN 301 192 [1] and should be read in conjunction with that document.
101 203-1
Identification card systems; Telecommunications IC cards and terminals; Test methods and conformance testing for EN 726-3; Part 1: Implementation Conformance Statement (ICS) proforma specification
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120301/01.02.01_60/ts_10120301v010201p.pdf
To evaluate conformance of a particular implementation, it is necessary to have a statement of which capabilities and options have been implemented for a telecommunication specification. Such a statement is called an Implementation Conformance Statement (ICS). The present document provides the ICS proforma for Application independent card requirements defined in TS 101 206-3 [1] in compliance with the relevant requirements, and in accordance with the relevant guidance given in ISO/IEC 9646-7 [4] and ETS 300 406 [2]. The supplier of an implementation which is claimed to conform to the present document is required to complete a copy of the ICS proforma provided in annex A and is required to provide the information necessary to identify both the supplier and the implementation.
101 203-2
Identification card systems; Telecommunications IC cards and terminals; Test methods and conformance testing for EN 726-3; Part 2: Test Suite Structure and Test Purposes (TSS&TP) specification
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120302/01.02.01_60/ts_10120302v010201p.pdf
The present document provides the Test Suite Structure and Test Purposes (TSS&TP). It applies to the User Card (UC) defined in TS 101 206-3 [10] in compliance with the relevant requirements, and according to the relevant guidance given in ISO/IEC 9646-7 [14] and ETS 300 406 [11]. DISCLAIMER: The present document provides conformance tests for the TS 101 206-3 [10]. To guarantee usefulness of an IC card it might be necessary to perform additional implementation dependent tests regarding: - performance aspects; - quality of security concepts; - implementation dependent details not described in base standard. Tests for behaviour of the IUT in case of memory problems are mandatory but it is out of the scope of the present document how to create situations of failing memory. It might be possible to create a failing memory situation by either stressing memory long enough or by using an emulator.
101 204-2
Identification card systems; Telecommunications IC cards and terminals; Test methods and conformance testing for EN 726-4; Part 2: Test Suite Structure and Test Purposes (TSS & TP) specification
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120402/01.02.01_60/ts_10120402v010201p.pdf
The present document provides Test Suite Structure and Test Purposes (TSS&TP). It applies to the application independent card related terminal requirements defined in TS 101 200-4 [7]. The TSS&TP is in compliance with the relevant requirements and according to the relevant guidance given in ISO/IEC 9646-7 [11] and ETS 300 406 [9]. The set of tests described herein is intended to proof the compliance of a terminal with the standard TS 101 200-4 [7]. However the number of tests and the depth of testing is not sufficient for a product qualification test, especially as the standard TS 101 200-4 [7] does not define any application. For a product qualification at least the following tests should be added: - application tests: - each application implemented in the terminal shall be tested against the specifications for these applications. - User Card (UC) and Security Module (SM) interface test: - the interface between the user card and the security module shall be tested to verify the correct coding of all the used commands. The reaction of the terminal to every error code possible shall also be tested and be as specified for the application. - performance test: - to test whether the terminal complies with all the environmental conditions required and reacts within the specified time.
101 205
Digital Video Broadcasting (DVB); LMDS Base Station and User Terminal Implementation Guidelines for ETSI EN 301 199
TR
1.1.2
http://www.etsi.org/deliver/etsi_tr/101200_101299/101205/01.01.02_60/tr_101205v010102p.pdf
The goal of the present document is to give operators and manufacturers suitable advice for enabling practical operation of LMDS hardware equipment, planning antenna systems and geographical propagation.
101 206-3
Identification card systems; Telecommunications IC cards and terminals; Part 3: Application independent card requirements
TS
1.3.2
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120603/01.03.02_60/ts_10120603v010302p.pdf
The present document specifies the application-independent characteristics of multi-application Integrated Circuit (IC) cards and plug-in modules for telecommunication applications in order to ensure interoperability for telecommunication cards with the various systems and terminals. Mono-application cards are considered to be a subset of multi-application cards. All common characteristics, necessary for the interactions between the card and the external world are defined. The present document does not preclude cards from other sectors from containing telecommunication application(s) based on the present document. The application-specific characteristics are not defined in the present document. They are defined and described in the relevant application requirements. The present document does not specify any internal technical implementation. It describes: a) the requirements for the physical characteristics of the card, the electronic signals and the transmission protocols; b) the application-independent logical model which should be used as a basis for the design of the logical structure of, optionally, several applications in the card; c) the security facilities concerning the access to the different parts within the card and the possible interactions between these parts. Also the description of security functions which should be needed generally by the various applications. They should be available as a common set; d) the description of the application-independent functions between card and external world, should be used as a standardized common set for all basic functions used in international applications; e) the mapping of these application messages (commands and responses) under standardized protocols; f) the contents of the Master File (MF); g) the interoperability of IC cards; h) the overall security aspects for card-manufacturers, application providers and card-issuers.
101 206-4
Identification card systems; Telecommunications IC cards and terminals; Part 4: Application independent card related terminal requirements
TS
1.3.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120604/01.03.01_60/ts_10120604v010301p.pdf
The present document specifies the application independent card related characteristics of card terminals able to process cards complying with TS 101 206-3 [1]. All common characteristics which are necessary for a standardized card use in the terminals are defined. The present document does not preclude letting terminals accept and process cards complying with other standards. The application-specific characteristics are not defined in the present document. They are defined and described in the relevant application requirements. The present document does not specify any internal realization of a card-terminal. It describes: a) the requirements for the physical and environmental specifications on the card terminal, the electronic signals and transmission protocols; b) the application independent logical model, which should be used as a basic design of the logical structure of card specific requirements supported by the terminal; c) the description of the application independent functions and general scenarios to be used by most of the applications; d) the error handling.
101 206-7
Identification card systems; Telecommunications IC cards and terminals; Part 7: Security module
TS
1.3.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120607/01.03.01_60/ts_10120607v010301p.pdf
The present document specifies: a) the minimum security requirements for a Security Module (SM); b) the general card related functions embedded in the SM - terminal protocols including minimum data exchange. The data elements and cryptographic processing described in annex A for the case where the SM is an IC card shall be supported if the SM is not an IC card or the configuration of the system, e.g. where the SM handles more than one terminal/user card. Configurations where the SM handles more than one terminal/user card are not fully described in the present document. Further mechanisms may be required to enable these configurations; c) the necessary security services and mechanisms to provide application and cryptographic security information for the processing of telecommunication transactions, considering several types of SM at different locations in the system and different system configurations. The present document allows interaction between the IC card and the SM via the terminal in a way that may be functionally transparent to the terminal and possibly also the network(s). This provides the flexibility to use different techniques, commands and message formats at the terminal - SM interface. The present document supports IC cards with payment applications following EN 726-5 [3] and all card applications following clauses 4 to 7 of the present document. The present document supports IC cards following TS 101 206-3 [2]. Other telecommunication IC cards which do not follow EN 726, e.g. simple memory cards, may also be supported by the SM described in the present document.
101 207-2
Identification card systems; Telecommunications IC cards and terminals; Test methods and conformance testing for EN 726-7; Part 2: Test Suite Structure and Test Purposes (TSS & TP) specification
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120702/01.02.01_60/ts_10120702v010201p.pdf
The present document provides Test Suite Structure and Test Purposes (TSS&TP). It applies to the Security Module (SM) defined in TS 101 206-7 [7] in compliance with the relevant requirements, and according to the relevant guidance given in ISO/IEC 9646-7 [12] and ETS 300 406 [10]. The set of test purposes described herein is intended to proof the compliance of a security module with the standard TS 101 206-7 [7] (about 140 tests) and it is seen as an extension of the test purposes made for TS 101 206-3 [6] (about 645 tests), however the number of tests and the depth of testing is not sufficient for a product qualification test. For a product qualification at least the following tests should be added: - User profile test: - to test whether the SM suits the need for a specific application. Here all possible scenarios should be run. - Life cycle test: - to test the behaviour of a SM after it has been used for X transactions, where X is a multiple of the guaranteed life cycle of the programmable memory. - Stress test: - to test the behaviour of the SM at physical stress, such as under voltage, over voltage, too high or low frequencies and spikes on the VCC/VPP line. - Performance test: - to test whether the implementation is able to handle the defined scenarios within the defined time limits. - Key test: - each key in a SM should be used for its specified purpose at least once and the result should be checked. - Additional file tests: - each file present in the SM should be selected and read out, if possible. The answer to SELECT and the contents of the file should be checked against the specification. Tests for additional functions. For a compliance with the specification the SM should at least be tested with: - each allowed parameter, or at least their extreme values; - at least one invalid parameter; - each return code should at least be provoked once; - the successful operation of the function should be tested. In addition to that, tests can be added for: - all invalid parameter combinations; - undefined situations; etc. ETSI TS 101 207-2 V1.2.1 (1999-05) 8
101 207-3
Identification card systems; Telecommunications IC cards and terminals; Test methods and conformance testing for EN 726-7; Part 3: Abstract Test Suite (ATS) and Implementation eXtra Information for Testing (IXIT) proforma specification.
TS
1.2.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120703/01.02.01_60/ts_10120703v010201p.pdf
The present document specifies the Abstract Test Suite (ATS) and Implementation eXtra Information for Testing (IXIT) proforma for Application independent card requirements defined in TS 101 200-7 [1]. ISO/IEC 9646-1 [2], ISO/IEC 9646-2 [3], ISO/IEC 9646-3 [4], ISO/IEC 9646-4 [5] and ISO/IEC 9646-5 [6] are used as the basis for the test methodology.
101 209-2
Identification card systems; Telecommunications IC cards and terminals; Interoperability with synchronous prepaid cards; Part 2: Security requirements
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/10120902/01.01.01_60/ts_10120902v010101p.pdf
The present document defines security requirements of the interoperability of synchronous prepaid cards in order to provide a common security level for compliant systems. It focuses mainly on the three elements of the complete system that are directly related to interoperability security. These three elements are: - the Security Module (SM); - the Secure Device (SD); - the Trusted Third Party (TTP). In the standard ES 201 209-1 [1], the following mechanisms are defined: - acceptance of User Memory Cards (UMC) for payment purposes; - claim of money for proven UMC usage from card issuers; - key management between system operators and card issuer. A security framework is necessary to support an interoperability scheme on the basis of ES 201 209-1 [1]. For card issuers who want to participate in such an interoperability scheme, trust in the security of the system is necessary, whereby two basic targets are most important: - sufficient protection of the master keys of the card applications; - correct billing. These security targets are mostly reflected in the following two aspects of the architecture of the system described in [1], which are also described in annex A of [1]. - initial key download supported by the Trusted Third Party (TTP); and - security requirements fulfilled by the Security Module (SM). In the present document, the basic security requirements to reach the above mentioned security targets are specified. Systems can be evaluated against these requirements. This gives a common security level for systems in compliance with the present document. In order to achieve this, the present document describes: - the security architecture of the system; - security targets to be achieved in the system; - security requirements for the security relevant components; - security requirements for the roles; and - basic security requirements for the development and production of security products. The present document does not imply the mandatory use of specific security mechanisms, if not already specified in ES 201 209-1 [1]. ETSI TS 101 209-2 V1.1.1 (1998-05) 9
101 211
Digital Video Broadcasting (DVB); Implementation and usage of Service Information (SI)
TS
1.13.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/101211/01.13.01_60/ts_101211v011301p.pdf
The present document provides implementation guidelines for the use and implementation of the DVB Service Information (SI) coding in a DVB digital TV environment including satellite- cable- and terrestrial networks. The guidelines are intended to be highly recommended rules for the usage of the DVB SI syntax specified in ETSI EN 300 468 [1]. As such, they facilitate the efficient and reliable implementation of basic user-interaction functions in Integrated Receiver-Decoders (IRD). The rules apply to broadcasters, network operators as well as manufacturers. The rules are specified in the form of constraints on the DVB SI streams or in terms of intended interpretation by IRDs. The specification of these functions in no way prohibits IRD manufacturers from including additional features, and should not be interpreted as stipulating any form of upper limit to the performance. The guidelines do not cover features related to user-interface details or advanced Electronic Program Guides (EPG). Such issues are left to the marketplace. NOTE: It is highly recommended that the IRD should be designed to allow for future compatible extensions to the DVB SI syntax. All the fields "reserved" (for ISO), "reserved_future_use" (for ETSI), and "user defined" in the ETSI EN 300 468 [1] should be ignored by IRDs designed not to make use of them. The "reserved" and "reserved_future_use" fields may be specified in the future by the respective bodies, whereas the "user defined" fields will not be standardized. The present document uses the terminology defined in ETSI EN 300 468 [1] and should be read in conjunction with that EN.
101 220
Smart Cards; ETSI numbering system for telecommunication application providers (Release 19)
TS
19.0.0
http://www.etsi.org/deliver/etsi_ts/101200_101299/101220/19.00.00_60/ts_101220v190000p.pdf
The present document provides for the administration of shared name spaces in use by applications on the UICC, as defined in ETSI TS 102 221 [43], including the managed allocation of identifiers from these name spaces.
101 221
Digital Video Broadcasting (DVB); User guideline for Digital Satellite News Gathering (DSNG) and other contribution applications by satellite
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101200_101299/101221/01.01.01_60/tr_101221v010101p.pdf
The purpose of the present document is to facilitate the interpretation of the technical concepts included in the DVB specifications related to DSNG transmission: - Framing structure, channel coding and modulation for Digital Satellite News Gathering (DSNG) and other contribution applications by satellite (EN 301 210 [1]); and - Co-ordination channels associated with Digital Satellite News Gathering (DSNG) (EN 301 222 [2]). The present document gives an overview of the technical and operational issues relevant to the system, including service quality and link availability evaluation for typical DSNG and fixed contribution links.
101 224
Digital Video Broadcasting (DVB); Home Access Network (HAN) with an active Network Termination (NT)
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/101224/01.01.01_60/ts_101224v010101p.pdf
101 225
Digital Video Broadcasting (DVB); Home Local Network Specification based on IEEE 1394
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/101225/01.01.01_60/ts_101225v010101p.pdf
The present document standardizes the topology, physical interfaces and a complete stack of protocols for the Home Local Network (HLN). This includes the specification of the APIs that an application on an HLN device can use to access the services provided by this HLN device or any other HLN device, as well as a Java language binding for these APIs. This allows e.g. Java applications to be downloaded to a DVB Receiver and use the services from other HLN devices such as storage devices. The HLN services and APIs allow any HLN device, to access (interactive) DVB services, Internet services, or other services even if that device itself is not directly connected to a Home Access Network (HAN) or to the corresponding Access Network that delivers these services to the home. The HLN specification covers the possibility of connecting multiple DVB receivers or devices providing access to other services, to the HLN. This HLN specification also allows for multiple applications to execute simultaneously on multiple HLN Devices and share, in a cooperative way, the HLN resources such as bandwidth or a DVB receiver. The present document is based on the commercial requirements in TM1690 (rev 2) (see Bibliography), the role of the HLN in the total architecture of the In-Home Digital Network (IHDN) given in DVB-IHDN 012 (rev 6) (see Bibliography), as well as the technical requirements given in DVB-IHDN 012 (rev 6) (see Bibliography).
101 231
Television systems; Register of Country and Network Identification (CNI), Video Programming System (VPS) codes and Application codes for Teletext based systems
TS
1.3.1
http://www.etsi.org/deliver/etsi_ts/101200_101299/101231/01.03.01_60/ts_101231v010301p.pdf
The present document contains the so-far allocated values of the Network Identification (NI) field of the Teletext Broadcast Service Data Packet (extension data packet of type 8/30 format 1), and the Country and Network Identification (CNI) fields of the Programme Delivery Control (PDC) data packets (extension data packets X/26 and 8/30 format 2). The present document also contains identification codes related to Video Programme System (VPS) CNI, which apply to German, Austrian and Swiss TV programme providers. Services like Teletext, PDC or VPS that contain Network Identification data in their formats may be used (besides their primary purpose) also as a reference for a source display or for Automatic Tuning Systems (ATS). The CNI codes are also used in Electronic Programme Guide transmissions.
101 233
Television systems; Code of practice for allocation of services in the Vertical Blanking Interval (VBI)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/101200_101299/101233/01.01.01_60/tr_101233v010101p.pdf
The present document is intended as a companion document to ETS 300 706 [1] and ETS 300 708 [2], covering the data format and transmission via Teletext. It is primarily aimed broadcasters and telecommunications network operators with the intention that there is a consistent approach to the positioning of services within the Vertical Blanking Interval (VBI) of 625/50 Phase Alternation Line (PAL) derived services in Europe. The main area of interest is in the VBI as received at home, and thus the effects of all the telecommunication systems that are used to convey the signal are taken into account. Thus as there are many options available to all the parties involved in creating the total system, some common understanding of the concepts involved is required as well as formal agreements between parties for the use of the VBI.
101 251
Digital cellular telecommunications system (Phase 2+) (GSM); Fault management of the Base Station System (BSS) (GSM 12.11 version 6.3.0 Release 1997)
TS
6.3.0
http://www.etsi.org/deliver/etsi_ts/101200_101299/101251/06.03.00_60/ts_101251v060300p.pdf
The present document describes the fault management of any NE of a GSM PLMN through the Q3 interface, with focus on the Base Station System (BSS). The OAM of the GSM Public Land Mobile Network (PLMN) is organised and described in terms of TMN Management Services. GSM 12.00 describes the architecture and gives a general overview of the OAM services, while the rest of the GSM 12 series gives the detailed specification for each service and other aspects of the OAM. Among all the TMN Management Services listed in GSM 12.00, the following are addressed by the present document: - Management of the BSS (also covered by GSM 12.20). - Restoration and Recovery (also covered by GSM 12.06). The present document deals with "Fault Management" aspects of the above services. For the TMN Management Services covered, the following "TMN Management Service Components" have been defined in clause 5: - Alarm surveillance. - Fault localisation. - Fault correction. - Testing. The above TMN Management Service Components are based on several "Management Functions", some of which are defined in other ITU-T documents (e.g. State Management Functions, Alarm Reporting Functions, etc.), and others which are specifically defined here, in clauses 6 and 7. For some management functions, the management information model is already provided by referenced ITU-T recommendations as well as GSM 12.00 and GSM 12.20. The GDMO and ASN.1 definition of the information model for the present document is fully defined through explicit references to ITU-T M.3100, ITU-T Q.821, ITU-T G.774.03, ITU-T X.7xx-series and GSM 12.00 information models, together with extensions defined in the Annex of the present document. Although sometimes considered as part of fault management, various administrative policies and procedures such as trouble ticketing and tracking, parts inventory, etc. are not included in the present document. Such aspects may be considered to be the responsibility of the operator and thus outside the scope of the present document.