WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 | 3 |

«Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 11: Supplementary services stage 2; Sub-part 18: Barring of Outgoing Calls (BOC) 2 ...»

-- [ Page 1 ] --

ETSI EN 300 392-11-18 V1.1.1 (2001-08)

European Standard (Telecommunications series)

Terrestrial Trunked Radio (TETRA);

Voice plus Data (V+D);

Part 11: Supplementary services stage 2;

Sub-part 18: Barring of Outgoing Calls (BOC)

2 ETSI EN 300 392-11-18 V1.1.1 (2001-08)

Reference

DEN/TETRA-03A-11-18

Keywords

TETRA, supplementary service

ETSI

650 Route des Lucioles

F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice

Individual copies of the present document can be downloaded from:

http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).

In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/

If you find errors in the present document, send your comment to:

editor@etsi.fr Copyright Notification No part may be reproduced except as authorized by written permission.

The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2001.

All rights reserved.

ETSI 3 ETSI EN 300 392-11-18 V1.1.1 (2001-08) Contents Intellectual Property Rights

Foreword

1 Scope

2 References

3 Definitions and abbreviations

3.1 Definitions

3.2 Abbreviations

4 SS-BOC stage 2 specification

4.1 Functional model

4.1.1 Functional model description

4.1.2 Description of FEs

4.1.2.1 Affected user's FE, FE1

4.1.2.2 SS-BOC FE in the SwMI, FE2

4.1.2.3 Authorized user's FE, FE3

4.1.2.4 SS-BOC FE2 in visited SwMI

4.1.2.5 Called party's FE, FE5

4.2 Relationship with a basic and packet data service

4.3 Definition of information flows

4.3.1 Definition

4.3.1.1 DEFINE

4.3.1.2 DEFINE and DEFINE EXTERNAL ACK

4.3.1.3 DEFINE USER

4.3.1.4 DEFINE USER ACK

4.3.2 Interrogation

4.3.2.1 INTERROGATE

4.3.2.2 INTERROGATE ACK

4.3.3 Operation

4.3.3.1 CALL BARRED

4.4 Service primitives

4.5 Information flow sequences

4.5.1 Definition

4.5.2 Definition over ISI

4.5.3 Interrogation

4.5.4 Interrogation over ISI

4.5.5 Operation

4.5.6 Operation over ISI

4.6 FE actions

4.6.1 FE actions of FE1

4.6.2 FE actions of FE2

4.6.3 FE actions of FE3

4.6.4 FE actions of visited SwMI FE2

4.6.5 FE actions of FE5

4.7 Allocation of FEs to physical equipment

4.8 Inter-working considerations

4.8.1 General requirements

4.8.2 Management and operation

4.8.3 Migration

Annex A (informative): Bibliography

History

ETSI 4 ETSI EN 300 392-11-18 V1.1.1 (2001-08) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://www.etsi.org/ipr).

Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document.

Foreword This European Standard (Telecommunications series) has been produced by ETSI Project Terrestrial Trunked Radio (TETRA).

The present document had been submitted to Public Enquiry as ETS 300 392-11-18. During the processing for Vote it was converted into an EN.

The present document is part 11, sub-part 18 of a multi-part deliverable covering Voice plus Data (V+D), as identified

below:

Part 1: "General network design";

Part 2: "Air Interface (AI)";

Part 3: "Interworking at the Inter-System Interface (ISI)";

Part 4: "Gateways basic operation";

Part 5: "Peripheral Equipment Interface (PEI)";

–  –  –

Part 9: "General requirements for supplementary services";

Part 10: "Supplementary services stage 1";

Part 11: "Supplementary services stage 2";

Part 12: "Supplementary services stage 3";

Part 13: "SDL model of the Air Interface (AI)";

Part 14: "Protocol Implementation Conformance Statement (PICS) proforma specification";





Part 15: "TETRA frequency bands, duplex spacings and channel numbering";

Part 16: "Network Performance Metrics";

Part 17: "TETRA V+D and DMO Release 1.1 specifications".

–  –  –

1 Scope The present document defines the stage 2 specification of the Supplementary Service Barring of Outgoing Calls (SS-BOC) for the Terrestrial Trunked Radio (TETRA) as provided by European operators.

SS-BOC enables barring restriction for outgoing calls to be set. SS-BOC specifies the definition, interrogation and operation of the supplementary service. The Switching and Management Infrastructure (SwMI) applies the SS-BOC definitions when the restricted user requests an outgoing service.

The SS-BOC actions are defined for the SwMI, for the Mobile Station (MS) and for the Line Station (LS). The SS-BOC information flows may be delivered over the Inter-System Interface (ISI). SS-BOC may also be invoked for services, e.g. calls, within one TETRA system or for services that extend over the ISI to several TETRA systems.

Man-Machine Interface (MMI) and charging principles are outside the scope of the present document.

Stage 2 describes the functional capabilities of the Supplementary Service introduced in stage 1 description. Stage 2 identifies the functional capabilities for the management and operation of the service in the SwMI, in the MS and in the LS. Stage 2 describes also the information flows exchanged between these entities and the flows sent over the ISI.

NOTE: The stage 2 description is followed by the stage 3 description, which specifies the encoding rules for the information flows and process behaviour for the different entities in the SwMI, in the MS and in the LS.

Aspects relating to all supplementary services are detailed in EN 300 392-9 [6].

2 References

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.

• References are either specific (identified by date of publication and/or edition number or version number) or non-specific.

• For a specific reference, subsequent revisions do not apply.

• For a non-specific reference, the latest version applies.

–  –  –

3.1 Definitions

For the purposes of the present document, the following terms and definitions apply:

affected user: user who has outgoing calls barred authorized user: user who is permitted to bar outgoing calls on affected user's behalf packet data service: packet mode data service, see EN 300 392-2, clause 28 3.2 Abbreviations

For the purposes of the present document, the following abbreviations apply:

–  –  –

4.1 Functional model 4.1.1 Functional model description

The functional model shall comprise the following Functional Entities (FEs):

FE1 affected user's (calling party's) FE for SS-BOC in MS/LS;

–  –  –

FE3 authorized party's FE for SS-BOC in MS/LS;

FE5 called party's FE for SS-BOC in MS/LS;

CC call control functional entity in SwMI;

CCA call control functional entity agent in MS/LS.

NOTE: CC/CCA refers to any basic service sub-entity or packet mode data service entity, which shall be used in conjunction with SS-BIC.

–  –  –

The following relationships shall exist between these FEs:

ra between FE1 and FE2;

rb between FE2s in different TETRA systems;

rc between FE2 and FE3;

rd between FE2s in different TETRA systems;

re between FE1 and visited SwMI FE2;

rf between FE3 and visited SwMI FE2;

rg between FE2 and FE5.

Figures 1 and 2 show these FEs and their relationships. Figure 1 gives the functional model for the management part and figure 2 gives the functional model for the operational part.

–  –  –

4.1.2.1 Affected user's FE, FE1

The functional tasks of FE1 shall be the following:

- upon reception of an SS-BOC definition indication from the SwMI, if FE1 supports the information procedure, FE1 shall inform the user application;

- upon reception of an SS-BOC interrogation request from the user application, FE1 shall send the interrogation request to the SwMI;

- upon reception of an SS-BOC interrogation response from the SwMI, FE1 shall inform the user application;

- upon reception of a barring indication from the SwMI, FE1 shall inform the user application of the barring of the basic or packet data service.

–  –  –

4.1.2.2 SS-BOC FE in the SwMI, FE2

The functional tasks of FE2 shall be the following in the home system of the affected user:

- upon reception of an SS-BOC definition request from FE3, FE2 shall save the definition in the SwMI and acknowledge the request to FE3. FE2 shall send the SS-BOC definition indication(s) to FE1(s), if requested by FE3 in the definition request;

- upon reception of an SS-BOC interrogation request from FE1 or FE3, FE2 shall send the interrogation response to FE1 or FE3 respectively;

- upon reception of an outgoing basic or packet data service request from FE1, for which the SS-BOC restrictions apply, FE2 shall bar the request and inform FE1 about the barring.

The functional tasks of FE2 shall be the following in the visited system of the affected user:

- upon reception of an SS-BOC interrogation request from FE1 or FE3, FE2 shall send the interrogation response to FE1 or FE3 respectively, if the visited system knows the SS-BOC definition;

- upon reception of an outgoing basic or packet data service request from FE1, for which the SS-BOC restrictions apply, FE2 shall bar the request and inform FE1 about the barring, if the visited system knows the SS-BOC definition;

- upon reception of an outgoing basic or packet data service request from FE1, FE2 may send the service request to the home system and bar the call, if indicated by the home system. FE2 shall inform FE1 about the barring of the service.

4.1.2.3 Authorized user's FE, FE3

The functional tasks of FE3 shall be the following:

- upon reception of an SS-BOC definition request from the user application, FE3 shall send the request to the SwMI;

- upon reception of an SS-BOC definition acknowledgement from the SwMI, FE3 shall inform the user application of the acknowledgement;

- upon reception of an SS-BOC interrogation request from the user application, FE3 shall send the request to the SwMI;

- upon reception of an SS-BOC interrogation response from the SwMI, FE3 shall inform the user application of the response.

4.1.2.4 SS-BOC FE2 in visited SwMI

The visited SwMI FE2 shall have as it functional tasks the following tasks, refer EN 300 392-9 [6]:

- upon reception of an SS-BOC information flow over the ISI from home SwMI FE2 to FE1 or to FE3, the visited SwMI FE2 shall transport the flow to FE1 or to FE3 respectively;

- upon reception of an SS-BOC information flow from FE1 or FE3 to home SwMI FE2, the visited SwMI FE2 shall transport the flow over the ISI to home SwMI FE2.

4.1.2.5 Called party's FE, FE5 FE5 does not have any actions related to SS-BOC. The FE is only presented to clarify the service behaviour.

–  –  –

4.2 Relationship with a basic and packet data service FE2 shall be collocated to CC in the SwMI.

FE1 shall be collocated to CCA.

The relationship with basic and packet data service is shown in figure 3.

–  –  –

4.3 Definition of information flows In the tables listing the service elements in information flows, the column header "Type" indicates which of the service elements are Mandatory (M), Conditional (C) or Optional (O). If type is conditional, the conditions are stated.

The listed service elements shall specify whether the information of each element is included in the flow.

NOTE: It is possible that there is not a one-to-one mapping between a service element and Protocol Data Unit (PDU) or primitive elements described in EN 300 392-12-18 [2].

4.3.1 Definition The authorized user shall be able to define barring restrictions on affected user's behalf. The SS-BOC definitions shall restrict outgoing services.

One restricted identity shall refer to an individual subscriber identity.

NOTE 1: Supplementary Service Barring of Incoming Calls (SS-BIC) is used to set restrictions for group identities, see EN 300 392-11-19 [3].

The authorized user shall only be allowed to define SS-BOC for subscriber identities which home system is the same as the authorized user's home system.

One definition request shall be made to restrict:

- one subscriber identity;



Pages:   || 2 | 3 |


Similar works:

«Beyond the Middle Ear Endoscopic Surgical Anatomy and Approaches to Inner Ear and Lateral Skull Base Livio Presutti, MDa,*, João Flávio Nogueira, MDb, Matteo Alicandri-Ciufelli, MDa, Daniele Marchioni, a MD KEYWORDS  Transcanal endoscopic approach  Petrous bone pathologic condition  Lateral skull base  Surgical anatomy  Inner ear KEY POINTS  The endoscopic approach to lateral skull base can be classified as a transcanal exclusively endoscopic approach or as combined approaches...»

«1 Using Voxelization and Ray-Tracing to Identify Wall Thinness of Polygonal Models Eric Fickenscher Computing & Software Systems Institute of Technology University of Washington, Tacoma Tacoma, WA 98402 efickens@u.washington.edu MS CSS Capstone Design Project in Computing and Software Systems Committee Chair: Isabelle Bichindaritz Committee Member: Wayne Warren Date of Submission: December 2008 Abstract New technologies make it possible to print models in three-dimensions. Printers capable of...»

«TESTIMONY OF SHEILA C. BAIR, PRESIDENT WASHINGTON COLLEGE BEFORE THE HOUSE WAYS AND MEANS COMMITTEE SUBCOMMITTEE ON OVERSIGHT September 13, 2016 Chairman Roskam, Ranking Member Lewis, and members of the Committee, it is a pleasure to be here. About a year ago, I became the President of Washington College, a private, nonprofit liberal arts college in Chestertown, on Maryland’s Eastern Shore. Of our 1481 undergraduates, 90 percent of them receive some form of need-based financial aid or...»

«The Road Safety Wales Low Down What’s happening in the world of road safety? March 2013 — Issue 25 In This Issue:  CRASH Cards  Driving When Tired  Thirty Years of Seatbelt Safety  New Rules for Motorcyclists  Euro NCAP's Best in Class  National Speed Awareness Course  New Scheme Offered by BUSK  Government Reveals Drink-Drive Cost  Global Status Report on Road Safety  Operation Spectacles CRASH Cards Motorcyclists in Wales are being encouraged to carry free...»

«OFFICE OF THE TRAFFIC COMMISSIONER (WALES) (CYMRU) APPLICATIONS AND DECISIONS PUBLICATION NUMBER: 8402 PUBLICATION DATE: 06 August 2014 OBJECTION DEADLINE DATE: 27 August 2014 Correspondence should be addressed to: Office of the Traffic Commissioner (Wales) (Cymru) Hillcrest House 386 Harehills Lane Leeds LS9 6NF Telephone: 0300 123 9000 Fax: 0113 248 8521 Website: www.gov.uk The public counter at the above office is open from 9.30am to 4pm Monday to Friday The next edition of Applications and...»

«No. 11-84 ================================================================ In The Supreme Court of the United States -♦MICHELLE ALVIS, JOHN KESSOR, and PAUL MORGADO, Petitioners, v. KATHLEEN ESPINOSA, individually and as personal representative of the Estate of Asa Sullivan, ASA SULLIVAN, A.S., a minor, by and through his Guardian Ad Litem Nicole Guerra, Respondents. -♦On Petition For A Writ Of Certiorari To The United States Court Of Appeals For The Ninth Circuit -♦BRIEF OF AMICI CURIAE...»

«Session : Inkrementelle Umformtechnik Simulation in der umFormteCHniK Numerical modelling of sheet metal guillotining process G.A. Berti and M. Monti University of Padua, DTG, Stradella San Nicola 3, I-36100 Vicenza (Italy) guido.berti@unipd.it, manuel.monti@unipd.it. Abstract This work is focused on the numerical analysis of sheet metal guillotining process aimed to evaluate relevant shearing force as well as the final configuration of the sheet. In the first part of the paper a new approach,...»

«MIDI Devices and Features Original Manual: Synkron Revision and Quality Control: C. Bachmann, H. Bischoff, S. Pfeifer, C. Schomburg The information in this document is subject to change without notice and does not represent a commitment on the part of Steinberg Media Technologies GmbH. The software described by this document is subject to a License Agreement and may not be copied to other media except as specifically allowed in the License Agreement. No part of this publication may be copied,...»

«L2/15-116 Document # Title: Encoding Pitman Shorthand scripts into Unicode Character Set Source: Pitman scripts and its adaptation over years Author: Ramachandran Status: Individual contribution for consideration by UTC Replaces: [L2/14-254] Date: 2015-03-28 Historical overview of Pitman Shorthand and its adaptations Pitman Shorthand scripts are widely used in English speaking countries. It is called ‘Phonography’ as it is a system of writing scripts based on pronunciation of English words...»

«PLAGUE YEAR by Jeff Carlson Release Date: July 31, 2007 Ace Books/Penguin Group $7.99 U.S./$10.99 CAN ISBN 978-0-441-01514-6 © Jeff Carlson All Rights Reserved Chapter One They ate Jorgensen first. He'd twisted his leg bad—his long white leg. The man hadn't been much more than a stranger, but Cam remembered five hundred things about him. It was a weakness. Cam remembered someone who never cursed, who kept his credit cards and driver's license for some reason. He remembered a hard worker who...»

«Evaluation of Hairdressing Training project A research and development project funded by the DfES and the JISC October 2004 June 2006 Diane Saxon, ex City College Manchester Kate Bird, Manchester Metropolitan University Jonathan Putt, City College Manchester Maria Clarkin, Blackpool and the Fylde College Final report June 2006 Evaluation of Hairdressing Training project Final report June 2006 Contents ACKNOWLEDGEMENTS SUMMARY KEY ISSUES RECOMMENDATIONS INTRODUCTION CONTEXT OF THE EVALUATION...»

«WHO/CDS/EPR/GIP/2006.2 WHO strategic action plan for pandemic influenza 2006–2007 WHO strategic action plan for pandemic influenza 2006–2007 Contents 2 Executive summary 4 Background 6 Goals 7 Strategic actions and expected results 7 Reduce human exposure to the H5N1 virus 10 Strengthen the early warning system 14 Intensify rapid containment operations 16 Build capacity to cope with a pandemic 18 Coordinate global scientific research and development 23 2006-2007 Funding Requirements 1 WHO...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.