hash
stringlengths 32
32
| doc_id
stringlengths 7
13
| section
stringlengths 3
121
| content
stringlengths 0
3.82M
|
---|---|---|---|
2c9d130f4599201b7ff29ffb2e9ae502
|
100 528
|
7.3 Relationship between Teleservices and connection types
|
Table 6 shows the relationship between teleservices and connection type elements, for those teleservices having a GSM PLMN connection type which does not correspond to the GSM PLMN connection type of a bearer service. As in table 5/GSM 03.10, dominant attributes of the connection elements and the type of radio traffic channel are shown. In the multislot cases the minimum number of timeslots per connection (n) is 1.
|
2c9d130f4599201b7ff29ffb2e9ae502
|
100 528
|
7.4 Network capability to support in-call modification
|
Specifications GSM 02.02 and 02.03 identify a particular need for a GSM PLMN to support the Alternate speech/data (3.1 kHz audio ex PLMN), Alternate speech and group 3 facsimile, and Speech followed by data (3.1 kHz audio). These services allow the use of in-call modification to change the mode of service. The network capability to support in- call modification is described in GSM 04.08. An in-call modification of the service mode is not possible for other services.
|
2c9d130f4599201b7ff29ffb2e9ae502
|
100 528
|
7.5 Network capability to support channel mode modification
|
Specification GSM 03.45 (Technical Realization of the Group 3 Facsimile Teleservice) identifies a need for a GSM PLMN to support channel mode modification within the facsimile phase of the alternate speech and facsimile group 3 service. The network capability to support channel modification is described in GSM 04.08. Channel mode modification is not possible for other services. A channel mode modification results in a change of connection element over the radio interface with resultant change in access at the mobile station. ETSI ETSI TS 100 528 V7.0.1 (1999-07) 40 (GSM 03.10 version 7.0.1 Release 1998) Table 5: Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Circuit mode unstructured with unrestricted digital capability transparent. Data circuit duplex async n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 4). Data circuit duplex sync n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 5) or n × 1 1200 bit/s (n = 5 or 6). cct mode unstructured unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 6) on n full rate channels. 8 or 16 kbit/s per TCH/F. For data connections using 5 or 6 TCH/Fs no intermediaterate( s) . cct mode unstructured unrestricted 64 kbit/s. Fig 6 :1 d, 1 e, 2 d, 2 e Data circuit duplex async n × 14 400 bit/s ( n ≤ 3). Data circuit duplex sync n × 14 400 bit/s (n ≤ 5) cct mode unstructured unrestricted n x 14.5 kbit/s (n ≤ 5) on n full rate channels 16 kbit/s per TCH/F. Fig 7 : 1 d, 1 e, 2 d, 2 e Data circuit duplex async 14 400 bit/s Data circuit duplex sync 14 400 bit/s cct mode unstructured unrestricted 14.5 kbit/s on full rate Channel 16 kbit/s cct mode unstructured unrestricted 64 kbit/s. Fig 7 : 1 a, 1 b 2 a, 2 b Data circuit duplex async 9 600 bit/s. Data circuit duplex sync 9 600 bit/s. cct mode unstructured unrestricted 12 kbit/s on full rate channel. 16 kbit/s. cct mode unstructured unrestricted 64 kbits/s. Fig 6 :1 a, 1 b Fig 6 2 a, 2 b Data circuit duplex async 4 800 bit/s. Data circuit duplex sync 4 800 bit/s. cct mode unstructured unrestricted 6 kbit/s on full rate channel and half rate channel. 8 kbit/s. cct mode unstructured unrestricted 64 kbits/s. Fig 6 1 a, 1 b Fig 6 2 a, 2 b Data circuit duplex async 300. Data circuit duplex async 1 200. Data circuit duplex async 1 200/75. Data circuit duplex async 2 400. Data circuit duplex sync 1 200. Data circuit duplex sync 2 400. cct mode unstructured unrestricted 3.6 kbit/s on full rate channel and half rate channel. 8 kbit/s. cct mode unstructured unrestricted 64 kbits/s. Fig 6 : 1 a, 1 b Fig 6 1 a, 1 b Fig 6 1 a, 1 b Fig 6 1 a, 1 b Fig 6 2 a, 2 b Fig 6 2 a, 2 b Circuit mode unstructured with unrestricted digital capability non transparent. Data circuit duplex async n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 4). cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. 8 or 16 kbit/s per TCH/F. cct mode unstructured unrestricted 64 kbit/s. Fig 6 3 d, 3 e Data circuit duplex async n × 14 400 bit/s (n ≤ 4). cct mode SDU unrestricted n × 14.5 kbit/s (n ≤ 4) on full rate channels. 16 kbit/s Fig 7 : 3 d, 3e Data circuit duplex async 14 400 bit/s cct mode SDUunrestricted 14.5 kbit/s on full rate channel 16 kbit/s Fig 7 : 3 a, 3 b Data circuit duplex async 9 600 bit/s. cct mode SDU unrestricted 12 kbit/s on full rate channel. 16 kbit/s. cct mode unstructured unrestricted 64 kbits/s. Fig 6 : 3 a, 3 b Data circuit duplex async 4 800 bit/s. cct mode SDU unrestricted full rate channel, 12 kbit/s or half rate channel, 6 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbits/s. Fig 6 : 3 a, 3 b (continued) ETSI ETSI TS 100 528 V7.0.1 (1999-07) 41 (GSM 03.10 version 7.0.1 Release 1998) Table 5 (continued): Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Data circuit duplex async 300. Data circuit duplex async 1 200. Data circuit duplex async 1 200/75. Data circuit duplex async 2 400. cct mode SDU unrestricted full rate channel, 12 kbit/s or half rate channel, 6 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbits/s. Fig 6: 3 a, 3 b Fig 6 : 3 a, 3 b Fig 6 3 a, 3 b Fig 6 3 a, 3 b Circuit mode unstructured with 3.1 kHz audio ex PLMN transparent. Data circuit duplex async n × 4 800 bit/s (n ≤ 4) or n × 9 600 bit/s (n ≤ 3). Data circuit duplex sync n × 4 800 bit/s (n ≤ 4) or n × 9 600 bit/s (n ≤ 3). cct mode unstructured unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 3) on n full rate channels. 8 or 16 kbit/s TCH/F. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 1 d, 1 e, 2 d, 2 e Data circuit duplex async n × 14 400 bit/s (n ≤ 2). Data circuit duplex sync n × 14 400 bit/s (n ≤ 2) cct mode unstructured unrestricted x 14.5 kbit/s (n ≤ 2) on n full rate channels 16 kbit/s per TCH/F Fig 7 : 1 d, 1 e, 2 d, 2e Data circuit duplex asynch 14 400 bit/s synch 14 400 bit/s cct mode unstructured unrestricted 14.5 kbit/s on full rate channels 16 kbit/s Fig 7 : 1 a, 1 b for async Fig 7 2 a 2 b for synch Data circuit duplex async 9.6 kbit/s sync 9.6 kbit/s. cct mode unstructured unrestricted 12 kbit/s full rate channel. 16 kbit/s. Data circuit duplex async 4.8 kbit/s sync 4.8 kbit/s. cct mode unstructured unrestricted 6 kbit/s full and half rate channel. 8 kbit/s. Fig 6 : 1 a, 1 b for asynch. Fig 6 : 2 a, 2 b for synch. Data circuit duplex async ≤ 2 400 sync ≤ 2 400. cct mode unstructured unrestricted 3.6 kbit/s full and half rate channel. 16 kbit/s. Circuit mode unstructured with 3.1 kHz audio ex PLMN non transparent. Data circuit duplex async n × 4 800 (n ≤ 4) or n × 9 600 (n ≤ 4) bit/s. Data circuit duplex sync n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 4). cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. 8 or 16 kbit/s per TCH/F. cct mode unstructured unrestricted 64 kbits/s. Fig 6 : 3 d, 3 e for async. Fig 6 : 4 d, 4 e, 4 f for sync. Data circuit duplex async n × 14 400 bit/s (n ≤ 4). Data circuit duplex sync n × 14 400 bit/s (n ≤ 4) cct mode SDU unrestricted n x 14.5 kbit/s (n ≤ 4) on n full rate channels 16 kbit/s per TCH/F Fig 7 : 3 d, 3 e for asynch Fig 7 : 4 d, 4 e 4 f for synch (continued) ETSI ETSI TS 100 528 V7.0.1 (1999-07) 42 (GSM 03.10 version 7.0.1 Release 1998) Table 5 (continued): Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Data circuit duplex asynch 14 400 bit/s synch 14 400 bit/s cct mode SDU unrestricted 14.5 kbit/s full rate channel 16 kbit/s Fig 7 : 3a, 3b for asynch Fig 7 : 4 a, 4 b, 4 c for synch Data circuit duplex async 9.6 kbit/s sync 9.6 kbit/s. cct mode SDU unrestricted 12 kbit/s full rate channel. 16 kbit/s. Data circuit duplex async 4.8 kbit/s sync 4.8 kbit/s. cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 3 a, 3 b for asynch. Fig 6 : 4 a, 4 b, 4 c for synch. Data circuit duplex async ≤ 2 400 sync ≤ 2 400. cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. Pad access transparent. PAD access circuit async 300. PAD access circuit async 1 200. PAD access circuit async 1 200/75. PAD access circuit async 2 400. cct mode unstructured unrestricted 3.6 kbit/s on full rate channel and half rate channel. 8 kbit/s. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 1 a, 1 b Fig 6 : 1 a, 1 b Fig 6 : 1 a, 1 b Fig 6 : 1 a, 1 b PAD access circuit async 4 800. cct mode unstructured unrestricted 6 kbit/s on half rate channel and full rate channel. Fig 6 : 1 a, 1 b PAD access circuit async 9 600. cct mode unstructured unrestricted 12 kbit/s on full rate channel. 16 kbit/s. Fig 6 :1 a, 1 b PAD access circuit asynch 14 400 bit/s cct mode unstructured unrestricted 14.5 kbit/s on full rate channel 16 kbit/s Fig 7 : 1 a, 1 b PAD access circuit async n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 4). cct mode unstructured unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on n full rate channels. 8 or 16 kbit/s per TCH/F. Fig 6 : 1 d, 1 e PAD access circuit async n × 14 400 bit/s (n ≤ 3). cct mode unstructured unrestricted n × 14.5 kbit/s (n ≤ 3) on n full rate channels. 16 kbit/s per TCH Fig 7 : 1 d, 1 e Pad access non transparent. PAD access circuit async 300. PAD access circuit async 1 200. PAD access circuit async 1 200/75. PAD access circuit async 2 400. cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 3 a, 3 b Fig 6 : 3 a, 3 b Fig 6 : 3 a, 3 b Fig 6: 3 a, 3 b PAD access circuit async 4 800. cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. Fig 6 : 3 a, 3 b PAD access circuit async 14 400 bit/s cct mode SDU unrestricted 14.5 kbit/s on full rate channel 16 kbit/s Fig 7 : 3 a, 3 b PAD access circuit async 9 600. cct mode SDU unrestricted 12 kbit/s on full rate channel. 16 kbit/s. Fig 6 : 3 a, 3 b PAD access circuit async n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 4). cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. 8 or 16 kbit/s per TCH/F. Fig 6 : 3 d, 3 e (continued) ETSI ETSI TS 100 528 V7.0.1 (1999-07) 43 (GSM 03.10 version 7.0.1 Release 1998) Table 5 (continued): Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 PAD access circuit async n × 14 400 bit/s (n ≤ 4). cct mode SDU unrestricted n × 14.5 kbit/s (n ≤ 4) on full rate channels. 16 kbit/s per TCH/F. Fig 7 : 3 d, 3 e Packet services, dedicated access, non transparent. Data packet duplex sync 2 400. cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 4 a, 4 b, 4 c Data packet duplex sync 4 800. cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. Fig 6 : 4 a, 4 b, 4 c Data packet duplex sync 9 600. cct mode SDU unrestricted 12 kbit/s on full rate channel. 16 kbit/s. Fig 6 : 4 a, 4 b, 4 c Data packet duplex synch 14 400 bit/s cct mode SDU unrestricted 14.5 kbit/s on full rate channel 16 kbit/s. Fig 7 : 4 a, 4 b, 4 c Data packet duplex sync n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 4). cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. 8 or 16 kbit/s per TCH/F. Fig 6 : 4 d, 4 e, 4 f Data packet duplex sync n × 14 400 bit/s (n ≤ 4). cct mode SDU unrestricted n × 14.5 kbit/s (n ≤ 4) on full rate channels. 16 kbit/s per TCH/F Fig 7 : 4 d, 4 e, 4 f Packet services basic access transparent. Data circuit duplex sync n × 4 800 (n ≤ 4) or n × 9 600 bit/s (n ≤ 5) or n × 11200 bit/s (n = 5 or 6). cct mode unstructured unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 6) on n full rate channels. 8 or 16 kbit/s per TCH/F. For data connections using 5 or 6 TCH/Fs no intermediate rate(s). cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 2 d, 2 e Data circuit duplex sync n × 14 400 bit/s (n ≤ 5) cct mode unstructured unrestricted n × 14.5 kbit/s (n ≤ 5) on n full rate channels. 16 kbit/s per TCH/F Fig 7 : 2 d, 2 e Data circuit duplex synch 14 400 bit/s cct mode unstructured unrestricted 14.5 kbit/s on full rate channel. 16 kbit/s. cct mode unstructured unrestricted 64 kbit/s. Fig 7 : 2 a, 2 b Data circuit duplex sync 9 600 bit/s. cct mode unstructured unrestricted 12 kbit/s on full rate channel. 16 kbit/s. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 2 a, 2 b Data circuit duplex sync 4 800 bit/s. cct mode unstructured unrestricted 6 kbit/s on full rate channel and half rate channel. 8 kbit/s. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 2 a, 2 b Data circuit duplex sync 2 400 bit/s. cct mode unstructured unrestricted 3.6 kbit/s on full rate channel and half rate channel. 8 kbit/s. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 2 a, 2 b Packet services basic access non transparent. Data circuit duplex sync n × 4 800 (n ≤4 ) or n × 9 600 bit/s (n ≤ 4). cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. 8 or 16 kbit/s per TCH/F. cct mode unstructured unrestricted 64 kbits/s. Fig 6 : 4 d, 4 e, 4 f Data circuit duplex sync n × 14 400 bit/s (n ≤ 4). cct mode SDU unrestricted n × 14.5 kbit/s (n ≤ 4) on full rate channels 16 kbit/s per TCH/F Fig 7 : 4 d, 4 e, 4 f Data circuit duplex synch 14 400 bit/s cct mode SDU unrestricted 14.5 kbit/s on full rate channel 16 kbit/s Fig 7 : 4 a, 4 b, 4 c Data circuit duplex sync 9 600 bit/s. cct mode SDU unrestricted 12 kbit/s on full rate channel. 16 kbit/s. cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 4 a, 4 b, 4 c (continued) ETSI ETSI TS 100 528 V7.0.1 (1999-07) 44 (GSM 03.10 version 7.0.1 Release 1998) Table 5 (continued): Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Data circuit duplex sync 4 800 bit/s. cct mode SDU unrestricted full rate channel, 12 kbit/s or half rate channel, 6 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbit/s. 4 a,b,c Data circuit duplex sync 2 400 bit/s. cct mode SDU unrestricted full rate channel, 12 kbit/s or half rate channel, 6 kbit/s. 16 kbit/s FR 8 kbit/s HR. cct mode unstructured unrestricted 64 kbit/s. 4 a,b,c Circuit mode unstructured with alternate speech and 3.1 Khz audio ex PLMN transparent. Alternate speech and data duplex async n × 4 800 bit/s (n ≤ 4) or n × 9 600 bit/s (n ≤ 3). Alternate speech and data duplex sync n × 4 800 bit/s (n ≤ 4) or n × 9 600 bit/s (n ≤ 3). cct mode speech alternating with cct mode unstructured unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 3) on n full rate channels. Speech NA 8 or 16 kbit/s per TCH/F. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 :, 6 b, 1 d, 1 e, 2 d, 2 e Alternate speech and data duplex async n × 14 400 bit/s (n ≤ 2). Alternate speech and data duplex sync n × 14 400 bit/s (n ≤ 2). cct mode speech alternating with cct mode unstructured unrestricted n × 14.5 kbit/s (n ≤ 2) on n full rate channels. Speech NA 16 kbit/s per TCH/F. cct mode alternate speech and unstructured unrestricted 64 kbit/s Fig 7 : 6 b and 1d, 1e, 2d, 2e Alternate speech and data duplex async 14 400 cct mode speech alternating with cct mode unstructured unrestricted 14.5 kbit/s on full rate channel. Speech NA 16 kbit/s cct mode alternate speech and unstructured unrestricted 64 kbit/s Fig 7 : 6 b and 1 a, 1 b Alternate speech and data duplex sync 14 400 cct mode speech alternating with cct mode unstructured unrestricted 14.5 kbit/s on full rate channel. Speech NA 16 kbit/s. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 7 : 6 b and 2 a, 2 b Alternate speech and data duplex async 9 600. cct mode speech alternating with cct mode unstructured unrestricted 12 kbit/s on full rate channel. Speech NA 16 kbit/s. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 : 6b and 1 a, 1 b Alternate speech and data duplex sync 9 600. Fig 6 : 6b and 2 a, 2 b Alternate speech and data duplex async 4 800. cct mode speech alternating with cct mode unstructured unrestricted 6 kbit/s Speech NA 8 kbit/s. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 : 6 b and 1 a, 1 b Alternate speech and data duplex sync 4 800. on full rate channel or half rate channel. Fig 6 : 6 b and 2 a, 2 b Alternate speech and data duplex async ≤ 2 400. cct mode speech alternating with cct mode unstructured unrestricted 3.6 kbit/s. Speech NA 8 kbit/s. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 : 6b and 3 a, 3 b Alternate speech and data duplex sync ≤ 2 400. on full rate channel or half rate channel. Fig 6 : 6 b and 4 a, 4 b, 4 c Circuit mode unstructured with alternate speech and 3.1 Khz audio ex PLMN non transparent. Alternate speech and data duplex async n × 4 800 (n ≤ 4) or n × 9 600 (n ≤ 4) bit/s. cct mode speech alternating with cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. Speech NA 8 or 16 kbit/s per TCH/F. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 : 6b and 3d, 3e (continued) ETSI ETSI TS 100 528 V7.0.1 (1999-07) 45 (GSM 03.10 version 7.0.1 Release 1998) Table 5 (continued): Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Alternate speech and data duplex async n × 14 400 (n ≤ 4) bit/s. cct mode speech alternating with cct mode SDU unrestricted n × 14.5 kbit/s (n ≤ 4) on full rate channels Speech NA 16 kbit/s per TCH/F cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 7 : 6 b and 3 d, 3 e Alternate speech and data duplex async 14 400. cct mode speech alternating with cct mode SDU unrestricted 14.5 kbit/s on full rate channel Speech NA 16 kbit/s. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 7 : 6 b and 3a, 3b Alternate speech and data duplex async 9 600. cct mode speech alternating with cct mode SDU unrestricted 12 kbit/s on full rate channel. Speech NA 16 kbit/s. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 6 b and 3 a, 3 b Alternate speech and data duplex async 4 800. cct mode speech alternating with cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. Speech NA 16 kbit/s FR 8 kbit/s HR. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 : 6 b and 3 a, 3 b Alternate speech and data duplex async ≤ 2 400. cct mode speech alternating with cct mode SDU unrestricted full rate channel, 12 kbit/s or half rate channel, 6 kbit/s. Speech NA 16 kbit/s FR 8 kbit/s HR. cct mode alternate speech and unstructured unrestricted 64 kbit/s. Fig 6 : 6 b and 3 a, 3 b Circuit mode unstructured with speech followed by 3.1 Khz audio ex PLMN transparent. Speech followed by data duplex async n × 4 800 bit/s (n ≤ 4) or n × 9 600 bit/s (n ≤ 3). Speech followed by data duplex sync n × 4 800 bit/s (n ≤ 4) or n × 9 600 bit/s (n ≤ 3). cct mode speech followed by cct mode unstructured unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 3) on n full rate channels. Speech NA 8 or 16 kbit/s per TCH/F. cct mode speech followed by unstructured unrestricted 64 kbit/s. Fig 6 : 6 a 6 b then1 e or 2 e Speech followed by data duplex async n × 14 400 bit/s (n ≤ 2). Speech followed by data duplex sync n × 14 400 bit/s (n ≤ 2). cct mode speech followed by cct mode unstructured unrestricted n × 14.5 kbit/s (n ≤ 2) on n full rate channels. Speech NA 16 kbit/s per TCH/F. Fig 7 : 6 a or 6 b then 1 e or 2 e Speech followed by 14 400 bit/s data duplex async cct mode speech followed by cct mode unstructured unrestricted 14.5 kbit/s on full rate channel Speech NA 16 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 7 : 6 a or 6 b then 1 b Speech followed by 14 400 bit/s data duplex sync cct mode speech followed by cct mode unstructured unrestricted 14.5 kbit/s on full rate channel Speech NA 16 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 7 : 6 a or 6 b then 2 b Speech followed by 9.6 kbit/s data duplex async. cct mode speech followed by cct mode unstructured unrestricted 12 kbit/s on full rate channel. Speech NA 16 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then 1 b Speech followed by 9.6 kbit/s data duplex sync. Fig 6: 6a or 6b then 2b Speech followed by 4.8 kbit/s data duplex async. cct mode speech followed by cct mode unstructured unrestricted 6 kbit/s on full rate and half rate channel. Speech NA 8 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then 1b (continued) ETSI ETSI TS 100 528 V7.0.1 (1999-07) 46 (GSM 03.10 version 7.0.1 Release 1998) Table 5 (concluded): Relationship between Bearer services and GSM PLMN Connection elements Connection description Bearer service user data rate Radio interface connection element Intermediate rate at the BSS- MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Speech followed by 4.8 kbit/s data duplex sync. Fig 6 : 6a or 6b then 2b Speech followed by ≤ 2.4 kbit/s data duplex async. cct mode speech followed by cct mode unstructured unrestricted 3.6 kbit/s on full rate and half rate channel. Speech NA 8 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then 1b Speech followed by ≤ 2.4 kbit/s data duplex sync. Fig 6 : 6a or 6b then 2b Circuit mode unstructured with speech followed by 3.1 Khz audio ex PLMN non transparent. Speech followed by data duplex async n × 4 800 (n ≤ 4) or n × 9 600 (n ≤ 4) bit/s. cct mode speech followed by cct mode SDU unrestricted n × 6 kbit/s (n ≤ 4) or n × 12 kbit/s (n ≤ 4) on full rate channels. Speech NA 8 or 16 kbit/s per TCH/F. cct mode speech followed by unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then3e Speech followed by data duplex async n × 14 400 bit/s (n ≤ 4). cct mode speech followed by cct mode SDU unrestricted n × 14.5 kbit/s (n ≤ 4) on n full rate channels. Speech NA 16 kbit/s per TCH/F. Fig 7 : 6 a or 6 b then 3 e Speech followed by 9.6 kbit/s data duplex async. cct mode speech followed by cct mode SDU unrestricted 12 kbit/s on full rate and half rate channel. Speech NA 16 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then 3b Speech followed by 14.4 kbit/s data duplex async. cct mode speech followed by cct mode SDU unrestricted 14.5 kbit/s on full rate channel. Speech NA 16 kbit/s. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 7 : 6a or 6b then 3b Speech followed by 4.8 kbit/s data duplex async. cct mode speech followed by cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. Speech NA 8 kbit/s HR 16 kbit/s FR. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then 3b Speech followed by ≤ 2.4 kbit/s data duplex async. cct mode speech followed by cct mode SDU unrestricted half rate channel, 6 kbit/s or full rate channel, 12 kbit/s. Speech NA 8 kbit/s 16 kbit/s FR. cct mode speech followed by cct mode unstructured unrestricted 64 kbit/s. Fig 6 : 6a or 6b then 3b ETSI ETSI TS 100 528 V7.0.1 (1999-07) 47 (GSM 03.10 version 7.0.1 Release 1998) Table 6: Relationship between Teleservices and GSM PLMN connection types Teleservice in GSM PLMN Access at mobile station Radio interface connection element Intermediate rate at the BSS-MSC interface BSS-MSC connection element Protocol model in figure 6 or 7 Telephony. cct mode speech. NA. cct mode structured 64 kbit/s speech. Fig 6 : 6 a or 6 b Emergency calls. cct mode speech. NA. cct mode structured 64 kbit/s speech. Fig 6 : 6 a or 6 b Alternate Speech/ Facsimile Group 3. Data cct duplex synchronous access alternate speech/ group 3 fax. cct mode speech alternating with unstructured unrestricted 3.6 or 6 or 12 kbit/s or n × 6 kbit/s (n ≤ 3) or n × 12 kbit/s (n ≤ 2) on FR transparent. Speech NA 8 or 16 kbit/s per TCH/F. cct mode structured 64 kbit/s alternate speech/unrestricted. Fig 6 : 5, 5b and 6 a or 6 b cct mode speech alternating with unstructured unrestricted 14.5 kbit/s or n × 14.5 kbit/s (n ≤ 2) on FR transparent Speech NA 16 kbit/s per TCH/F. Fig 7 : 5 and 5 b and 6 a or 6 b Automatic Facsimile Group 3. Data cct duplex synchronous access group 3 fax. cct mode unstructured unrestricted 3.6 or 6 or 12 kbit/s or n × 6 kbit/s (n ≤ 3) or n × 12 kbit/s (n ≤ 2) on FR transparent. 8 or 16 kbit/s per TCH/F. cct mode structured 64 kbit/s unrestricted. Fig 6 : 5, 5b cct mode unstructured unrestricted 14.5 kbit/s or n × 14.5 kbit/s (n ≤ 2) on FR transparent 16 kbit/s per TCH/F. Alternate speech/ Facsimile Group 3. Data cct duplex synchronous access alternate speech/ group 3 fax. cct mode speech alternating with SDU unrestricted 6 or 12 kbit/s or n × 6 kbit/s (n ≤ 3) or n × 12 kbit/s (n ≤ 2) on FR non transparent. Speech NA 8 or 16 kbit/s per TCH/F. cct mode structured 64 kbit/s alternate speech/unrestricted. Fig 6 : 6 a or 6 b, 7 a and 7 b cct mode speech alternating with SDU unrestricted 14.5 kbit/s or n × 14.5 kbit/s (n ≤ 2) on FR non transparent. 16 kbit/s per TCH/F. Fig 7 : 6 a or 6 b and 7 a and 7 b Automatic Facsimile Group 3. Data cct duplex synchronous access group 3 fax. cct mode SDUunrestricted 6 or 12 kbit/s or n × 6 kbit/s (n ≤ 3) or n × 12 kbit/s (n ≤ 2) on FR non transparent. 8 or 16 kbit/s per TCH/F. cct mode structured 64 kbit/s unrestricted. Fig 6 : 7 a and 7 b cct mode SDU unrestricted 14.5 kbit/s or n × 14.5 kbit/s (n ≤ 2) on FR non transparent. 16 kbit/s per TCH/F. Fig 7 : 7 a and 7 b NA: Not Applicable NOTE: The multislot data connections and the connections using TCH/F14.4 coding belong to the General Bearer Services (Classes 20, 30, 40, and 50 in GSM 02.02). ETSI ETSI TS 100 528 V7.0.1 (1999-07) 48 (GSM 03.10 version 7.0.1 Release 1998) Annex A (informative): List of definitions of GSM PLMN connection type attributes and values A.1 Attribute definition and their values Information transfer mode: This attribute describes the operational mode for transferring (transportation and switching) user information through a GSM PLMN connection in the network. Value: - Circuit Information transfer capability: This attribute describes the capability associated with the transfer of different types of information through a GSM PLMN connection. Values: - Unrestricted digital information - Speech - Group 3 facsimile - 3.1 kHz audio ex PLMN - Restricted digital information (Note: this value is signalled in the "Other ITC" element, due to a lack of further code points in the "ITC" element.) Information transfer rate: This attribute describes either the bit rate (circuit mode) or the throughput (packet mode, for further study). It refers to the transfer of digital information on a GSM PLMN connection. Values: - Appropriate bit rate - Throughput rate Establishment of connection: This attribute describes the mode of establishment used to establish and release GSM PLMN connections. Value: - Demand Symmetry: This attribute describes the relationship of information flow between two (or more) access points or reference points involved in a GSM PLMN connection. Values: - Bidirectional symmetric - Bidirectional asymmetric (Multislot configurations for data) Connection configuration: This attribute describes the spatial arrangement for transferring information on a given GSM PLMN connection. Value: - Point-to-point Structure: ETSI ETSI TS 100 528 V7.0.1 (1999-07) 49 (GSM 03.10 version 7.0.1 Release 1998) This attribute refers to the capability of a GSM PLMN connection to deliver information to the destination access point or reference point in a structure that was presented in a corresponding signal structured at the origin (access point or reference point). Values: - Service data unit integrity (see note 1) - Unstructured (see note 2) NOTE 1: Applicable for connection element "non transparent". NOTE 2: Applicable for connection element "transparent". Channel rate: This attribute describes the channels and their bit rate used to transfer the user information and/or signalling information. Value: - Name of channel (designation) and/or the corresponding bit rate NOTE 3: This attribute can be used several times for connection characterization. Connection control protocol, information transfer coding/protocol (layer 1 to 3): These attributes characterize the protocols on the connection control and/or user information transfer channel. Value: - Appropriate protocol for each layer NOTE 4: This attribute can be used several times for connection characterization. Synchronous/Asynchronous: This attribute describes the type of transmission between the reference access points. Values: - Synchronous - Asynchronous Negotiation: This attribute describes the possibility of inband parameter exchange (according to V.110) between reference access points. Value: - In band negotiation not possible User Rate: This element is relevant between the IWF and the fixed network. Values: - 0.3 kbit/s - 1.2 kbit/s - 1 200/75 bit/s - 2.4 kbit/s - 4.8 kbit/s - 9.6 kbit/s Intermediate rate: This attribute defines the intermediate rate (according to GSM 08.20 and CCITT V.110) at the A interface connection element part. Values: - 8 kbit/s - 16 kbit/s ETSI ETSI TS 100 528 V7.0.1 (1999-07) 50 (GSM 03.10 version 7.0.1 Release 1998) Fixed network user rate FNUR (Multislot configurations for data): This element is relevant between the IWF and the fixed network. Values: - 9.6 kbit/s - 14.4 kbit/s - 19.2 kbit/s - 28.8 kbit/s - 38.4 kbit/s - 48.0 kbit/s - 56.0 kbit/s - 64.0 kbit/s Acceptable channel coding(s) ACC (Multislot configurations for data): This attribute indicates the channel codings acceptable to the MS. This parameter is given at call set-up and it is non negotiable. Values: 4.8 kbit/s and/or 9.6 kbit/s and/or 14.4 kbit/s Maximum number of TCH/Fs (Multislot configurations for data): This attribute is given at call set-up and it enables the mobile user to limit the number of TCH/Fs used during the call. Values: 1 2 3 4 5 6 7 (note 5) 8 (note 5) NOTE 5: Not used by the currently specified services. Wanted air interface user rate (AIUR) (Multislot configurations for data): This attribute is applicable to non-transparent services only, and it gives the AIUR that the mobile user wants and which the network tries to achieve but which it is not allowed to exceed. Values: Not applicable 9.6 kbit/s 14.4 kbit/s 19.2 kbit/s 28.8 kbit/s ETSI ETSI TS 100 528 V7.0.1 (1999-07) 51 (GSM 03.10 version 7.0.1 Release 1998) 38.4 kbit/s 43.2 kbit/s 57.6 kbit/s User initiated modification indication (Multislot configurations for data): This element is relevant between the MT and the IWF. Values: - User initiated modification not requested - User initiated modification up to 1 TCH/F requested - User initiated modification up to 2 TCH/F requested - User initiated modification up to 3 TCH/F requested - User initiated modification up to 4 TCH/F requested The parameters where it is indicated that they are related to Multislot configurations for data are optional. For multislot configuration, the following applies to the parameters contained in the BC-IE: - Half rate channels are not supported. The MS shall code the radio channel requirement as "Full rate support only MS" or "Dual rate support MS, full rate preferred". In the second case, the network shall assign full rate channel(s) only. - The "fixed network user rate" and "other modem type" take precedence over the "user rate" and "modem type". - The "intermediate rate" parameter is overridden. The intermediate rate used per each TCH/F is derived from the chosen channel type: channel type IR per TCH/F TCH/F4.8 8 kbit/s TCH/F9.6 16 kbit/s TCH/F14.4 16 kbit/s (on the A interface but 32 kbit/s inside the MS) - The user rate per TCH is derived from the chosen channel type: channel type user rate per TCH TCH/F4.8 4.8 kbit/s TCH/F9.6 9.6 kbit/s TCH/F14.4 14.4 kbit/s For CE: T, the padding procedure described in GSM 03.34 can be applied. Network independent clocking on Tx: This attribute defines the usage of NIC at the reference access point in the transmit direction. Values: - Not required - Required Network independent clocking on Rx: This attribute defines the usage of NIC at the reference access point in the receive direction. Values: - Not accepted ETSI ETSI TS 100 528 V7.0.1 (1999-07) 52 (GSM 03.10 version 7.0.1 Release 1998) - Accepted Number of stop bits: This attribute describes the number of stop bits for the asynchronous type of transmission between reference access points. Values: - 1 bit - 2 bit Number of data bits excluding parity if present: This attribute describes the number of data bits for a character oriented mode of transmission between reference access points. Values: - 7 bit - 8 bit Parity information: This attribute describes the type of parity information for a character oriented mode of transmission between the reference access points. Values: - Odd - Even - None - Forced to 0 - Forced to 1 Duplex mode: This attribute describes the kind of transmission of the GSM PLMN between reference access points. Value: - Full duplex Modem type: This attribute describes the modem allocated by the IWF/MSC in the case of a 3.1 kHz audio used outside the GSM PLMN information transfer capability. Values: - V.21 - V.22 - V.22bis - V.23 - V.26ter - V.32 - Autobauding type 1 - None Other Modem Type (OMT): This element is relevant between the MS and IWF. Values: - No other modem type ETSI ETSI TS 100 528 V7.0.1 (1999-07) 53 (GSM 03.10 version 7.0.1 Release 1998) - V.32bis - V.34 Compression This attribute describes the possible usage of data compression between the reference access points. In the network to MS direction, it indicates the possibility of using data compression. In the MS to network direction, it indicates the allowance of data compression. Values: - Data compression not possible/not allowed - Data compression possible/allowed (see note 6) NOTE 6: Only applicable for the asynchronous transmission between the reference access points, if connection element is "non transparent". Radio channel requirement: This attribute describes the available channels for the transfer of the user information between the reference access points. Values: - Full rate channel (Bm) - Half rate channel (Lm) - dual rate/full rate preferred - Dual rate/half rate preferred Negotiation of Intermediate Rate Requested (NIRR) This attribute indicates if 6 kbit/s radio interface rate is requested. Values: - NIRR not requested/not accepted - NIRR requested/accepted Connection element: This attribute describes the possible usage of GSM layer 2 protocol between the reference access points. Values: - Transparent - Non-transparent (RLP) - Both, transparent preferred - Both, non transparent preferred User information layer 2 protocol: This attribute describes the layer 2 relay protocol used between the reference access points in non-transparent transmissions. Values: - ISO 6429, code set 0 - X.25 - Character oriented protocol with no flow control ETSI ETSI TS 100 528 V7.0.1 (1999-07) 54 (GSM 03.10 version 7.0.1 Release 1998) Signalling access protocol: This attribute characterizes the protocol on the signalling or user information transfer channel at the mobile reference access point. Values: - I.440/450 - X.21 - X.28, dedicated PAD, individual NUI - X.28, dedicated PAD, universal NUI - X.28, non dedicated PAD - X.32 Rate adaptation: This attribute describes the rate adaptation used at the fixed reference access point. Values: - V.110/X.30 - X.31 flag stuffing - No rate adaptation - V.120 (Note: This value is signalled in the "Other Rate Adaption" element, due to a lack of further code points in the "Rate Adaptation" element.) Coding standard: This attribute refers to the structure of the BC-IE defined in the GSM 04.08. Value: - GSM User information layer 1 protocol: This attribute characterizes the layer 1 protocol to be used at the Um interface according to the GSM 05.01. Value: - Default Rate adaption header/no header: This attribute is relevant between IWF and the fixed network. It is only applicable for V.120 rate adaptation. Values: - Rate adaption header not included - Rate adaption header included Multiple frame establishment support in data link: This attribute is relevant between IWF and the fixed network. It is only applicable for V.120 rate adaptation. Values: - Multiple frame establishment not supported. Only UI frames allowed - Multiple frame establishment supported Mode of operation: This attribute is relevant between IWF and the fixed network. It is only applicable for V.120 rate adaptation. Values: - Bit transparent mode of operation - Protocol sensitive mode of operation Logical link identifier negotiation: ETSI ETSI TS 100 528 V7.0.1 (1999-07) 55 (GSM 03.10 version 7.0.1 Release 1998) This attribute is relevant between IWF and the fixed network. It is only applicable for V.120 rate adaptation. Values: - Default, LLI=256 only - Full protocol negotiation (note 7) NOTE 7: A connection over which protocol negotiation will be executed is indicated in the "In-band/out-band negotiation" parameter. Assignor/assignee: This attribute is relevant between IWF and the fixed network. It is only applicable for V.120 rate adaptation. Values: - Message originator is "default assignee" - Message originator is "assignor only" In-band/out-band negotiation: This attribute is relevant between IWF and the fixed network. It is only applicable for V.120 rate adaptation. Values: - Negotiation is done with USER INFORMATION messages on a temporary signalling connection - Negotiation is done in-band using logical link zero. A.2 Definition of values Unrestricted digital data information: Transfer of information sequence of bits at its specified bit rate without alteration. This implies: - bit sequence independence; - digit sequence integrity; - bit integrity. Speech: Digital representation of speech coded according to a specified encoding rule (e.g. A Law, GSM 06-series). Demand connection: A GSM PLMN connection is set up at any time on demand via a digital channel in response to signalling information received from subscriber, other MSCs or other networks, i.e. on a per call basis. Bidirectional symmetric: This value applies when the information flow characteristics provided by the GSM PLMN connection are the same between two (or more) access points or reference points in the forward and backward directions. Bidirectional asymmetric (Multislot configurations for data): This value applies when the information flow characteristics provided by the GSM PLMN connection differ between two (or more) access points or reference points in the forward and backward directions on one or more TCH/Fs. In Multislot configurations for data the asymmetry is downlink biased, i.e. the MS may receive at a greater rate than it transmits. Point-to-point connection: This value applies when only two end points are provided by the connection. Service data unit integrity: This value applies when: ETSI ETSI TS 100 528 V7.0.1 (1999-07) 56 (GSM 03.10 version 7.0.1 Release 1998) i) at each user-network interface, protocols provide a mechanism for identifying the boundaries of service data units (e.g. X.25 complete packet sequence); and ii) all bits submitted within a single service data unit are delivered in a corresponding service data unit. Unstructured: This value is applicable when the GSM PLMN connection neither provides structural boundaries nor preserves structural integrity. ETSI ETSI TS 100 528 V7.0.1 (1999-07) 57 (GSM 03.10 version 7.0.1 Release 1998) Annex B (informative): Location of the transcoding, multiplexing and RA2 functions The location of the transcoding and data rate adaptation functions used to convert from the data rate used on the radio interface to the 64 kbits/s required by the MSC, is considered in this annex B. There are four alternatives which are equally valid from a connection type point of view. The selection of which alternative to use is not considered in GSM 03.10. The alternatives are shown in figure 8. Alternative 1 assumes that all the transcoding and data rate adaptation is located at the BSS end of the A interface. Alternative 2 assumes that all the transcoding and data rate adaptation is located at the MSC end of the A interface and gives no indication how the information is carried on the link. Alternative 3 assumes that the information is transferred on the A interface in 8 or 16 kbit/s channels using one of the sub-multiplexing schemes described in CCITT Recommendation I.460. The same sub-multiplexing scheme is used for both speech and data. Alternative 4 illustrates a multislot connection in which the information is transferred on the A-interface in 64 kbit/s channel into which up to four channels of intermediate rate 16 kbit/s have been multiplexed (refer to GSM 08.20). Alternative 4 also shows a situation in which a multislot connection of 5 or 6 TCH/Fs is used; the rate between the RA1’/RA1- and RA1’’-functions is 64 kbit/s. Alternatives 1b, 2b, 3b, and 4b show similar approaches for channel coding TCH/F14.4 (The alternatives explained above correspond to all other channel codings). It should be noted that in all of the alternatives the transcoding and data rate adaptation are performed on the BSS side of the A-interface and is therefore considered to be a function of the BSS. In the first three alternatives, the interface at the MSC is always based on 64 kbit/s without sub-multiplexing. ETSI ETSI TS 100 528 V7.0.1 (1999-07) 58 (GSM 03.10 version 7.0.1 Release 1998) MS BSS MSC RADIO I/F BSS-MSC I/F FEC RA1' RA1 FEC RA2 FEC FEC RA1' RA1 RA2 FEC MPX GSM 06-series Speech GSC A LAW BSS-MSC LINK Speech RA1' RA1 FEC MPX MPX GSM 06-series MPX RA2 Speech Data Data Data GSC A LAW ALTERNATIVE 1 ALTERNATIVE 2 ALTERNATIVE 3 GSC A LAW n x 8/16 kbit/s n x 8/16 kbit/s Figure 8: Location of transcoding and rate adaptation ETSI ETSI TS 100 528 V7.0.1 (1999-07) 59 (GSM 03.10 version 7.0.1 Release 1998) MS BSS MSC RADIO I/F BSS-MSC I/F BSS-MSC LINK ALTERNATIVE 4 FEC RA1' RA1 8 or 16kbit/s intermediate rates multiplexed/ demultiplexed Data RA1’’ 8 or 16kbit/s intermediate rates multiplexed/ demultiplexed FEC RA1' RA1 Data S/C Figure 8 (continued): Location of transcoding and rate adaptation RA2 RA2 RAA’ MS BSS MSC RADIO I/F BSS-MSC I/F FEC FEC RA1' RAA’ BSS-MSC LINK FEC RA1' RAA’ RA1' MPX MPX RAA’ Data Data Data ALTERNATIVE 1b ALTERNATIVE 2b ALTERNATIVE 3b n x 8/16 kbit/s RAA’ RAA’ RA2 Figure 8 (concluded): Location of transcoding and rate adaptation ETSI ETSI TS 100 528 V7.0.1 (1999-07) 60 (GSM 03.10 version 7.0.1 Release 1998) Legend to Figure 8 GSC = GSM Speech Codec FEC = Forward Error Correction MPX = Multiplex/Demultiplex MS BSS MSC RADIO I/F BSS-MSC I/F BSS-MSC LINK ALTERNATIVE 4b FEC RA1' RAA’ 16kbit/s intermediate rates multiplexed/ demultiplexed Data 16kbit/s intermediate rates multiplexed/ demultiplexed FEC RA1' RA1 Data S/C RAA’ Figure 8 (concluded): Location of transcoding and rate adaptation ETSI ETSI TS 100 528 V7.0.1 (1999-07) 61 (GSM 03.10 version 7.0.1 Release 1998) History Document history V6.0.0 April 1999 Publication V7.0.1 July 1999 Publication ISBN 2-7437-3208-3 Dépôt légal : Juillet 1999
|
d487d8f8c47c92f6dee9f0152353d268
|
133 902
|
1 Scope
|
........................................................................................................................................................5
|
d487d8f8c47c92f6dee9f0152353d268
|
133 902
|
2 References
|
................................................................................................................................................5
|
d487d8f8c47c92f6dee9f0152353d268
|
133 902
|
3 Definitions and Abbreviations
|
.................................................................................................................5
|
d487d8f8c47c92f6dee9f0152353d268
|
133 902
|
4 Formal analyses
|
.......................................................................................................................................5
|
d487d8f8c47c92f6dee9f0152353d268
|
133 902
|
4.1 Formal analysis of the 3G authentication protocol with modified sequence number management
|
................... 5
|
d487d8f8c47c92f6dee9f0152353d268
|
133 902
|
4.2 Formal analysis of the 3G authentication and key agreement protocol
|
............................................................. 5 Annex A: Formal Analysis of the 3G Authentication Protocol with Modified Sequence Number Management ............................................................................................................6 Annex B: Formal analysis of 3G authentication and key agreement protocol ................................37 Annex C: Change history......................................................................................................................45 ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) ETSI 3GPP 3G TR 33.902 V3.1.0 (2000-01) 4 3G TR 33.902 version 3.1.0 Release 1999 Foreword This Technical Report has been produced by the 3GPP. The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of this TS, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version 3.y.z where: 3 the first digit: 3 Indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the specification. ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) ETSI 3GPP 3G TR 33.902 V3.1.0 (2000-01) 5 3G TR 33.902 version 3.1.0 Release 1999 1 Scope This report contains formal analyses of the authentication and key agreement (AKA) protocol specified in 3G TS 33.102. These analyses are carried out using various means of formal logic suitable for demonstrating security and correctness properties of the AKA protocol. The structure of this technical specification is as follows: clause 2 lists the references used in this specification; clause 3 lists the definitions and abbreviations used in this specification; clause 4 refers to the main body of this report. The main body is only referred to because it is not available in Word-, but only in pdf-format. The corresponding .pdf-documents are attached to this document. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. All references are specific (identified by date of publication, edition number, version number, etc.) and are contained in the subsections of section 4 of this document. 3 Definitions and Abbreviations All definitions and abbreviations are contained in the subsections of section 4 of this document. 4 Formal analyses 4.1 Formal analysis of the 3G authentication protocol with modified sequence number management Annex A (TR_33902_Annex_A.pdf) contains a formal analysis of the 3GPP mechanism using a technique called Temporal Logic of Actions (TLA). The analysis seeks to prove that the 3GPP mechanism, if correctly implemented, will not "crash" or fall into failure scenarios. 4.2 Formal analysis of the 3G authentication and key agreement protocol The formal analysis contained in Annex B (TR_33902_Annex_B.pdf) complements the TLA-based formal analysis contained in Annex A. An enhanced BAN logic is used to prove that the 3GPP authentication and key agreement protocol meets the required security goals. ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) ETSI 3GPP 3G TR 33.902 V3.1.0 (2000-01) 3G TR 33.902 version 3.1.0 Release 1999 Annex A: Formal Analysis of the 3G Authentication Protocol with Modified Sequence Number Management 6 ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) ETSI 3GPP 3G TR 33.902 V3.1.0 (2000-01) 3G TR 33.902 version 3.1.0 Release 1999 Annex B: Formal analysis of 3G authentication and key agreement protocol 7 ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) ETSI 3GPP 3G TR 33.902 V3.1.0 (2000-01) 3G TR 33.902 version 3.1.0 Release 1999 Annex C: Change history Change history TSG SA # Version CR Tdoc SA New Version Subject/Comment SA#05 0.1.0 3.0.0 Approved at SA#5 and placed under TSG SA Change Control SA#06 3.0.0 001 SP-99589 3.1.0 Formal analysis of the 3G authentication protocol 8 ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) ETSI 9 ETSI ETSI TR 133 902 V3.1.0 (2000-01) (3G TR 33.902 version 3.1.0 Release 1999) History Document history V3.1.0 January 2000 Publication
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
1 Scope
|
........................................................................................................................................................5
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
2 References
|
................................................................................................................................................5
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
3 Definitions and Abbreviations
|
.................................................................................................................6
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
3.1 Definitions
|
..........................................................................................................................................................6
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
3.2 Abbreviations
|
.....................................................................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4 Summary of Standards Activities
|
.............................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.1 IrMC
|
...................................................................................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.2 Bluetooth
|
............................................................................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.3 WAP
|
...................................................................................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.4 Other Standards Activities
|
..................................................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.4.1 MNCRS
|
........................................................................................................................................................7
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.4.2 Synchronisation
|
............................................................................................................................................8
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
4.4.3 MDSP
|
...........................................................................................................................................................8
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
5 Overview of Synchronisation Standards
|
..................................................................................................8
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
5.1 Introduction
|
........................................................................................................................................................8
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
5.2 IrMC Overview
|
..................................................................................................................................................8
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
5.3 IrMC 1.1 Limitations for Wide Area Synchronisation
|
.......................................................................................9
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
5.3.1 Level 4 Dependent on Connection-based Transport Protocol
|
......................................................................9
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
5.3.2 Inefficient Data Exchange
|
............................................................................................................................9
|
bcc622d5a32ec685216fad82284345d7
|
127 903
|
6 Recommendations
|
....................................................................................................................................9 History..............................................................................................................................................................10 (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 3GPP 3G TR 27.903 V 3.0.0 (1999-10) 4 3G TR 27.903 version 3.0.0 Foreword This Technical Report has been produced by the 3GPP. The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of this TR, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version 3.y.z where: x the first digit: 1 presented to TSG for information; 2 presented to TSG for approval; 3 Indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the specification; (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 3GPP 3G TR 27.903 V 3.0.0 (1999-10) 5 3G TR 27.903 version 3.0.0 1 Scope The present document provides information on existing synchronisation protocols. It summarises proprietary and standard protocols relevant to current and future mobile communication devices. The present document covers only synchronisation between end-user devices, desktop applications, and server-based information services. It does not refer to replication or synchronisation between enterprise databases. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. • A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same number. [1] Bluetooth: Bluetooth SIG, Bluetooth Specifications, version 1.0, July 1999. (http://www.bluetooth.com/) [2] Generic Binary Object: Infrared Data Association, "IrWW IrDA for Wrist Watches", "Generic Binary Object" Chapter 4, version 0.5, 12 July 1999. (members section of ftp://ftp.irda.org/) [3] ICNIRP: "Guidelines for limiting exposure to time-varying electric, magnetic, and electromagnetic fields (up to 300 GHz)", International Commission on Non-Ionizing Radiation Protection (ICNIRP), Health Physics, vol. 74, pp 494-522, April 1998. [4] IrLAP: Infrared Data Association, "Serial Infrared Link Access Protocol (IrLAP)", version 1.1, 16 June 1996, plus all applicable errata. (http://www.irda.org/) [5] IrLMP, Infrared Data Association, "Link Management Protocol", version 1.1, 23 January 1996, plus all applicable errata. (http://www.irda.org/) [6] IrMC, Infrared Data Association, "Specifications for Ir Mobile Communications (IrMC)", version 1.1, 01 March 1999, plus all applicable errata. (http://www.irda.org/) [7] IrOBEX, Infrared Data Association, "Ir Object Exchange Protocol IrOBEX", version 1.2, April 1999, plus all applicable errata. (http://www.irda.org/) [8] MNCRS, Mobile Network Computing Reference Specification Consortium, Mobile Network Computing Reference Specification, Data Synchronisation Work Group, Application Programmer's Guide to Mobile Network Computer Data Synchronisation, version 1.1, March 1999. (http://www.oadg.or.jp/activity/mncrs/mncrs03-99.html) [9] MDSP - Mobile Data Synchronisation Protocol. [10] Tiny TP, Infrared Data Association, "'Tiny TP': A Flow-Control Mechanism for use with LrLMP", version 1.1, 20 October 1996, plus all applicable errata. (http://www.irda.org/) [11] Various documents produced for "Synchronisation". [12] vCalendar, the Internet Mail Consortium, "vCalendar - The Electronic Calendaring and Scheduling Exchange Format - Version 1.0", 18 September 1996. (http://www.imc.org/pdi/vcal- 10.doc) (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 3GPP 3G TR 27.903 V 3.0.0 (1999-10) 6 3G TR 27.903 version 3.0.0 [13] vCard, the Internet Mail Consortium, "vCard - The Electronic Business Card - Version 2.1", 18 September 1996.(http://www.imc.org/pdi/vcard-21.doc) [14] WAP, WAP Forum, "WAP Technical Specifications Suite", version 1.1, June 1999. (http://www.wapforum.com/) 3 Definitions and Abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: Bluetooth: a technology specification [1] for short range radio links between mobile PCs, mobile phones and other portable devices. (http://www.bluetooth.com/) bvCalendar: a compressed version of vCalendar as defined in the IrDA Generic Binary Object proposal [2]. bvCard: a compressed version of vCard as defined in the IrDA Generic Binary Object proposal [2]. GET: the operation of requesting that the server returns an object from to the client as defined in the IrDA IrOBEX specification [7]. IrDA: an industry consortium set up to define a set of short range Ir communications standards. (http://www.irda.org/) Latency: time delay associated with the process of information exchange in a network. Level 1: minimum level support defined in the IrDA IrMC set of specifications [6]. Level 2: Access Level support defined in the IrDA IrMC set of specifications [6]. Level 3: Index Level support defined in the IrDA IrMC set of specifications [6]. Level 4: Sync Level support defined in the IrDA IrMC set of specifications [6]. Personal Area Network: a short range wireless connection between two or more devices for the purpose of transferring information. Short range is typically defined as fifty meters or less in distance. PUT: the operation of sending one object from the client to the server as defined in the IrDA IrOBEX specification [7]. Radio Frequency (RF): the frequency range between 300 Hz and 300 GHz (ICNIRP definition [3]). Synchronisation: the process of exchanging information between multiple physical or virtual locations for the purpose of ensuring that each location's copy of that information reflects the same information content. Ultra: a connectionless information transfer mechanism defined as part of the IrDA IrMC set of specifications [6]. vCalendar: a format defined by the IMC for electronic calendaring and scheduling exchange [12] with extensions as defined in the IrDA IrMC set of specifications [6]. vCard: a format defined by the IMC for electronic business card exchange [13] with extensions as defined in the IrDA IrMC set of specifications [6]. WAP: an industry consortium set up to define a set of standards [14] to empower mobile users with wireless devices to easily access and interact with information and services. (http://www.wapforum.com/) Wide Area Devices: devices intended for use in 3G systems. Wide Area Network: a geographically-large range wireless connection between two or more devices for the purpose of transferring information. Large geographical range is typically defined as one kilometer or more in distance. Wireless Information Devices: wide area and short range devices intended for information transfer. (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 3GPP 3G TR 27.903 V 3.0.0 (1999-10) 7 3G TR 27.903 version 3.0.0 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: DID Database IDentifier IAS Information Access Service IBM International Business Machines ICNIRP International Commission on Non-Ionizing Radiation Protection IETF Internet Engineering Task Force IMC Internet Mail Consortium Ir Infrared IrDA Infrared Data Association IrLAP Infrared Link Access Protocol IrLMP Infrared Link Management Protocol IrMC Ir Mobile Communications IrOBEX Ir Object EXchange LUID Unique object IDentifier MDSP Mobile Data Synchronisation Protocol MNCRS Mobile Network Computer Reference Specification OBEX Object Exchange PDA Personal Digital Assistant PIM Personal Information Manager TTP Tiny TP WAP Wireless Application Protocol 4 Summary of Standards Activities 4.1 IrMC The IrMC standard [6] was developed as an extension to the IrDA standard for the purpose of providing an open standard for data exchange between mobile devices or between mobile devices and desktops or PDAs. Among other things, IrMC defines four levels of support for information exchange. By definition, each higher level must support all of the preceding levels. The four levels are: Level 1 (Minimum Level), Level 2 (Access Level), Level 3 (Index Level), and Level 4 (Sync Level). (Level 4 does not require Level 3) Level 2 and Level 4 are the most relevant for synchronisation. IrMC has been adopted by the IrDA and Bluetooth initiatives and has wide industry support. 4.2 Bluetooth Bluetooth has adopted the IrMC standard [6] as the basis for their synchronisation specification. 4.3 WAP WAP [14] has not specified a synchronisation standard. Attempts to form a work group last year were abandoned. 4.4 Other Standards Activities 4.4.1 MNCRS The MNCRS [8] (Mobile Network Computer Reference Specification) specifies an application programming interface (API) providing data-synchronisation services focused on Java-enabled devices. MNCRS is promoted by a number of companies but has not been adopted by any formal standards body. (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 3GPP 3G TR 27.903 V 3.0.0 (1999-10) 8 3G TR 27.903 version 3.0.0 4.4.2 Synchronisation A group met informally in early 1999 for the purpose of defining a synchronisation specification [11] to be presented to the 3GPP or WAP bodies. The parties involved - Symbian, Puma, Ericsson, Nokia, Motorola, Starfish, and Lotus - disbanded before any agreement was reached. 4.4.3 MDSP MDSP [9] (Mobile Data Synchronisation Protocol) is a data synchronisation and data exchange protocol for networked devices promoted by IBM. It is designed primarily for use between mobile devices that are sporadically connected to the network and servers that are continuously connected to the network. In particular, MDSP is designed to handle the case where the server and device store the data they are synchronizing in different formats, using different software systems. MDSP can be used to exchange data elements, without attempting to synchronize the containers as used in a one-way synchronisation to a device with no editing capabilities. MDSP has not been adopted by any formal standards body. 5 Overview of Synchronisation Standards 5.1 Introduction 3G Wireless Information Devices will enable unprecedented access to information regardless of location. Information will continue to be stored on personal computers or servers, however users will also expect to be able to have access to that same information on handheld or palm-size devices and wireless devices. To date, there is only one adopted standard that addresses synchronisation: IrMC. The IrMC standard [6] is also referenced in the Bluetooth specification. 3GPP has not yet adopted a standard for synchronisation. The IrMC standard [6] is defined for personal area networks running either low or high bandwidth wireless links and may be used in connection-oriented or connectionless links such as IrDA or Bluetooth. It does not currently support a specifically optimized mode for wide area network synchronisation. Wide area network synchronisation presents a unique set of problems for efficient and accurate synchronisation. 5.2 IrMC Overview The IrMC version 1.1 specification [6] was driven by leading handset manufacturers to provide a standard means for exchanging data between mobile devices and between mobile devices and desktop, handheld PCs, and Printers of various kinds. The focus of the original specification was to extend the IrDA standard to include extensions for transferring Personal Information Manager (PIM) data, files, and isochronous voice between co-operating IrMC devices. The current IrMC specification [6] supports data exchange with Phone Book, Calendar, Messaging and Note applications on mobile devices. The specification was recently updated (version 1.1 [6]) to better support synchronisation features requested by the Bluetooth initiative, which is also committed to using IrMC version 1.1 [6] and its supporting IrOBEX [7] object exchange layer for satisfying its data exchange needs over short-distance radio links. The scope of the IrMC specification [6] encompasses more than synchronisation. Components of IrMC deal with Call Control (for mobile handsets), real time audio transmission, and permissions for getting and setting the real time clock on the mobile device. IrMC also defines four (4) distinct levels of support for information exchange, where each higher level is expected to support the preceding levels (with some exceptions, see above). For purposes of synchronisation, Level 2 (Access Level) and Level 4 (Sync Level) are the only information exchange levels required to address our stated requirements. The IrMC specification [6] and its supporting IrOBEX [7] object exchange layer is layered on top of the pre-existing IrDA stack. Since the IrMC synchronisation component requires either the Connection Oriented Service or the Connectionless Oriented Service, this means that IrMC and IrOBEX, when used in an IrDA application, sit atop of the IrDA layers IrLAP [4], IrLMP [5], and possibly TTP [10] and IAS [5]. Thus, the IrMC specification [6] is a natural (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 3GPP 3G TR 27.903 V 3.0.0 (1999-10) 9 3G TR 27.903 version 3.0.0 extension of the IrDA stack. When used in Bluetooth, IrMC and IrOBEX sit atop the Bluetooth equivalent of these layers. The object is to swap transport and below layers while keeping a common set of applications. The information exchange levels of IrMC prescribe the text-based data formats that must be exchanged between two mobile devices. Wherever possible, industry-standard data formats are used. Where no pre-existing data format exists, IrMC defines new formats that must be supported by implementers. Required data formats include IMC's vCard [13] and vCalendar [12] plus the similarly defined constructs vMessage [6] and vNote [6]. In addition, custom data formats are prescribed for exchanging data objects (such as change logs, information logs, error logs and device information). IrMC is currently evaluating allowing the use of the IETF versions of these constructs, the binary versions called bvCard [2] and bvCalendar [2], plus a completely generic Generic Binary Object [2]. IrMC effectively addresses the synchronisation needs of PIM applications residing on mobile devices, and operating in a connected or connectionless environment. At the highest level (Level 4), IrMC specifies core functionality such as database identifiers (DID), unique object identifiers (LUID), change logs and change counters or time stamps which are essential to ensure fast and reliable synchronisation. The specification also includes a rich set of features for exchanging PIM data. Included in this is an Information Log that describes the characteristics of each database, a Device Information block that identifies each device with capabilities, an optional Error Log that returns record-level error codes, a mechanism for detecting new items entered while synchronisation is in progress, and a means for detecting device resets. 5.3 IrMC 1.1 Limitations for Wide Area Synchronisation IrMC was written to address the exchange of PIM data in a personal area network or peer-to-peer environment. However, the current IrMC specification [6] has not yet addressed synchronisation in a wide area wireless network environment such as that which would exist in a 3GPP scenario. The limitations of IrMC in a 3G environment are as follows: 5.3.1 Level 4 Dependent on Connection-based Transport Protocol IrMC Level 4 (Sync Level) requires either a Connection Oriented Service, when using IrDA involves components such as IrLAP [4] and IrLMP [5]. By its nature, IrOBEX [7] involves establishing an explicit connection between devices, performing the necessary data exchange, and then disconnecting. A persistent connection between devices is difficult to maintain in some Wide Area Network environments. Latency can slow the transactions to an unacceptable level, or worse, cause synchronisation to be stopped due to timeouts. 5.3.2 Inefficient Data Exchange Data exchanges between an IrMC client and server tend to be chatty and quite inefficient. In particular, each object sent between devices requires a separate request/response pair using IrOBEX [7] commands. For example, GET operations entail a request and response for each object. PUT Operations can be more efficient in an Ultra [6] environment since no response is expected. To address the limitations of IrMC Level 4 synchronisation in a Wide Area Network, one of two actions must occur. a) Modifications to the IrMC Level 4 to address the above limitations within the Wide Area Network must be made. b) An extension to IrMC Level 4 for Wide Area Network Synchronisation must be created. Ideally, this extension would operate on top of existing stacks and would use as much existing code base as possible. (3G TR 27.903 version 3.0.0 Release 1999) ETSI TR 127 903 V3.0.0 (2000-01) ETSI 10 ETSI ETSI TR 127 903 V3.0.0 (2000-01) (3G TR 27.903 version 3.0.0 Release 1999) History Document history V3.0.0 January 2000 Publication
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
1 Scope
|
........................................................................................................................................................6
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
2 References
|
................................................................................................................................................6
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
3 Definitions and abbreviations
|
..................................................................................................................6
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
3.1 Definitions
|
............................................................................................................................................................... 6
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
3.2 Abbreviations
|
.......................................................................................................................................................... 6
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
4 3GPP Configuration of H.324 annex C
|
...................................................................................................8
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5 Performance
|
.............................................................................................................................................9
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.1 Audio
|
....................................................................................................................................................................... 9
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.1.1 Introduction
|
........................................................................................................................................................ 9
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.1.2 Results
|
............................................................................................................................................................... 9
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.2 Video
|
..................................................................................................................................................................... 11
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.2.1 Introduction
|
...................................................................................................................................................... 11
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.2.2 Test environment
|
............................................................................................................................................. 11
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.2.3 Results
|
............................................................................................................................................................. 11
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.2.3.1 Subjective results
|
............................................................................................................................................. 12
|
884138cb53bcd8f30ecc584e1b0fed4c
|
126 912
|
5.2.3.2 Objective results
|
.............................................................................................................................................. 14 Annex A Quality degradation as a function of the FER and RBER in presence of background noise..................................................................................................................17 A.1 Results in Car Noise: .............................................................................................................................17 A.2 Results in Street Noise:..........................................................................................................................17 A.3 Results in Office Noise..........................................................................................................................18 Annex B: Simulation test of a video multimedia codec .....................................................................19 B.1 Introduction............................................................................................................................................19 B.2 Test Procedure .......................................................................................................................................19 B.2.1 Simulation Model ............................................................................................................................................ 19 B.2.2 Source materials............................................................................................................................................... 21 B.2.3 Source encoding............................................................................................................................................... 21 B.2.3.1 Speech.............................................................................................................................................................. 21 B.2.3.2 Video ............................................................................................................................................................... 21 B.2.4 Multiplexing .................................................................................................................................................... 22 B.2.5 Bit error injection............................................................................................................................................. 22 B.2.5.1 Error pattern files............................................................................................................................................. 22 B.2.5.2 Error pattern segments to be used at the simulation ........................................................................................ 23 B.2.5.3 Injection of bit errors ....................................................................................................................................... 23 B.2.6 De-multiplexing............................................................................................................................................... 23 B.2.7 Video decoding................................................................................................................................................ 24 B.2.8 Constraints and regulations.............................................................................................................................. 24 B.2.8.1 Delay................................................................................................................................................................ 24 B.2.8.1.1 Video.......................................................................................................................................................... 24 B.2.9 Statistical data to be reported........................................................................................................................... 24 B.2.9.1 Video coding bitrate [%6.2f kbps] and MUX overhead [%6.2f kbps]............................................................. 25 B.2.9.2 Speech coding bitrate [%6.2f kbps] and frame length [%d ms]....................................................................... 25 B.2.9.3 Video initial delay [%6.1f ms]......................................................................................................................... 25 B.2.9.4 PSNR related data............................................................................................................................................ 25 B.2.9.4.1 Total average PSNR, i.e., PSNRtotal [%6.2f dB]......................................................................................... 25 B.2.9.4.2 Average PSNR for representative run, i.e., PSNRk* [%6.2f dB] ................................................................ 25 B.2.9.4.3 Average PSNR in error-free case, i.e., PSNRfree [%6.2f dB] ..................................................................... 25 B.2.9.4.4 Standard deviation of PSNR, i.e., Sigma [%6.2f dB]................................................................................. 25 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 4 3G TR 26.912 version 3.0.0 Release 1999 B.2.9.5 Coding frame rate [%5.2f frames/sec]............................................................................................................. 26 B.2.9.6 Average dropframe rate [%6.2f %].................................................................................................................. 26 B.2.9.7 Out of delay constraints rate [%6.2f %]........................................................................................................... 26 B.2.9.8 Definition of video stationary delay................................................................................................................. 26 B.2.9.9 Decoded video of representative run ............................................................................................................... 27 B.3 Subjective quality evaluation.................................................................................................................27 B.3.1 Structure of test................................................................................................................................................ 27 B.3.1.1 Program ........................................................................................................................................................... 27 B.3.1.2 Training session............................................................................................................................................... 27 B.3.1.3 Scoring session ................................................................................................................................................ 27 B.3.1.4 Video sequence................................................................................................................................................ 27 B.3.1.5 Structure of program........................................................................................................................................ 27 B.3.2 Editing process................................................................................................................................................. 28 B.3.2.1 Producing training session............................................................................................................................... 28 B.3.2.2 Randomization................................................................................................................................................. 28 B.3.3 Assessment ...................................................................................................................................................... 28 B.3.3.1 Test subjects .................................................................................................................................................... 28 B.3.3.2 Facilities and equipment for test...................................................................................................................... 29 B.3.3.3 Score sheet....................................................................................................................................................... 29 B.3.4 Data processing................................................................................................................................................ 29 B.3.4.1 MOS [%4.2f] ................................................................................................................................................... 30 B.3.4.2 Standard deviation of OS, i.e., 1os [%4.2f] ...................................................................................................... 30 B.4 Test results and observations .................................................................................................................30 B.4.1 Test results....................................................................................................................................................... 30 B.4.2 Observations .................................................................................................................................................... 30 B.5 List of video/speech codecs and multiplexers employed in the simulation...........................................31 B.6 Test results.............................................................................................................................................32 Annex C: Change history......................................................................................................................37 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 5 3G TR 26.912 version 3.0.0 Release 1999 Foreword This Technical Report (TR) has been produced by the 3rd Generation Partnership Project (3GPP). The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of the present document, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version x.y.z where: x the first digit: 1 presented to TSG for information; 2 presented to TSG for approval; 3 or greater indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the document. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 6 3G TR 26.912 version 3.0.0 Release 1999 1 Scope The present document is meant to function as guidance in the work of other 3GPP work groups or work items. Such work may include conclusion on how to achieve detailed Stage 1 service requirements or suggestion of a set of recommended RAB parameters giving satisfactory user-to-user quality for a circuit switched multimedia service using 3G-324M. 2 References The following documents contain provisions, which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. [1] "Volume 3; Specifications of air-interface for 3G mobile system (Version 1.0-0.3)", IMT-2000 Study Committee, Air-Interface WG/SWG2, Nov. 18th, 1998. [2] "Volume 8; Codec specification for use in a 3G mobile system (Version 0.5.2)", IMT-2000 Study Committee, Codec WG (ARIB), July 21st, 1998. [3] International Standard ISO/IEC 14494-2: "Information technology — Generic coding of audio- visual object — Part 2: Visual, 1999". [4] ITU-T Recommendation H.263: "Video coding for low bit rate communication". [5] ITU-T Recommendation H.245: "Control protocol for multimedia communication". [6] ITU-T Recommendation H.223: "Multiplexing protocol for low bitrate multimedia communication". [7] ITU-T Recommendation H.324: "Terminal for low bit rate multimedia communication". 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply. Codec: a single media coder/decoder, or a multimedia system specific coder & decoder system. For example, 3GPP AMR (speech codec), ITU-T H.263 (video codec) or ITU-T H.32x (multimedia system with included media codecs) are understood to fulfil the definition of a codec. TS 21.905 "Vocabulary for 3G Specifications" provides the definitions not listed in this section. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: 3G Third Generation Mobile Network 5DQS 5 step Discrete Quality Scale AC/DC Alternate Current/Direct Current AL1-AL3 Adaptation Layer 1-3 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 7 3G TR 26.912 version 3.0.0 Release 1999 AL-SDU Adaptation Layer – Service Data Unit ARIB Association of Radio Industries and Businesses BER residual Bit Error Ratio BT 500-8 ITU-R Recommendation, "Methodology for the subjective assessment of the quality of television pictures" CCSRL Control Channel Segmentation and Reassembly Layer CIF Common Image Format (352x288 pixel) CRC Cyclic Redundancy Code FEC Forward Error Correction FER Frame Error Ratio GSM Global System for Mobile-communications AMR Adaptive Multi-Rate Speech Codec H.223 ITU-T Recommendation, "Multiplexing protocol for low bit rate multimedia communication" H.245 ITU-T Recommendation, "Control protocol for multimedia communication" H.324 ITU-T Recommendation, "Terminal l for low bit rate multimedia communication" IEC International Electrotechnical Commission IMT-2000 International Mobile Telecommunications - 2000 ISO International Organization for Standardization ITU-R International Telecommunication Union – Radiocommunications Standardisation Sector ITU-T International Telecommunication Union – Telecommunications Standardisation Sector I-VOP Intra Video Object Plane kbps Kilo bits per second (used in Annex B) LAPM Link Access Procedure for Modem LCD Liquid Crystal Panel MOS Mean Opinion Score MPEG Moving Picture Expert Group MUX-PDU MUltipleX – Protocol Data Unit PLMN Public Land Mobile Network PSNR Peak Signal to Noise Ratio P-VOP Predicted Video Object Plane QCIF Quarter Common Image Format (176x144 pixel) QoS Quality of Service SS Single Stimulus TM-5 Test Model 5 WCDMA Wideband Code Division Multiple Access VLC Variable Length Code ETSI ETSI TR 126 912 V3.0.0 (2000-03) 8 3G TR 26.912 version 3.0.0 Release 1999 4 3GPP Configuration of H.324 annex C Figure 1 Figure 1 shows the main building block of a 3G-324M terminal. The standards inside […] are not mandatory. The configuration actually used for each of the four performances evaluations (Audio, Video, Control and Data) will be described under each heading. Video I/O Equipment Video Codec H.263, [MPEG-4, Audio I/O Equipment Speech Codec AMR, [G.723.1 …] Optional Receive Path Delay Multiplex/ Demultiplex H.223, H.223 Annex A, H.223 Annex B, [H.223 Annex C, H.223 Annex D] User Data Application s Data Protocols [V.14, LAPM, …] Syste m Contro l H.245 3GPP Network CCSRL NSRP [LAPM/V.4 Scope of TS 26.111 Call Set-up Scope of TS 26.112 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 9 3G TR 26.912 version 3.0.0 Release 1999 5 Performance 5.1 Audio 5.1.1 Introduction This section provides a subset of the AMR Characterisation test results expressed as speech quality degradation (in ∆MOS or ∆DMOS) compared to the EFR speech codec in error free conditions, as a function of the FER (Frame Error Rate) and RBER( Residual Bit Error Rate as defined for GSM). It is believed that these results would also apply to H.324M channel with equivalent error conditions. Additional results are provided in Annex A for test conditions under background noise (Car noise, Street noise and Office noise). The original test results are included in the AMR characterisation report (TR 26.975). They relate to a channel condition GSM TU3 IFH (Typical Urban 3 km/h Ideal Frequency Hopping). These results could be updated once the AMR 3G Characterisation tests are completed. Quality performances of audio codecs in H.324M channels should be included in future versions of this document, as these results become available. 5.1.2 Results The following diagrams present the speech quality degradation in clean speech (expressed in ∆MOS) for the different AMR codec modes, as a function of the FER and RBER, when compared to the EFR speech codec in error free condition. In all cases, the results represent the average scores obtained over all tests performed for each experiment as compiled in the GSM AMR Characterization report (TR 26.975). The EFR reference is taken from the score obtained by the EFR speech codec in error free in the same experiment. The actual results were slightly altered to smoothen the curves’ shape. Finally, it should also be noted that the diagrams function of the FER are actually affected by the Residual Bit Error Rate for each test condition, while the diagrams function of the RBER are also function of the FER present for each test condition. The two sets of diagrams cannot be considered totally independent. They are a reflection of the channel coding scheme selected for the GSM radio channels. Finally, it should be pointed out that the FER and RBER estimates used to derive these diagrams are based on the limited number of error patterns used for the AMR characterization phase. These could be affected by some inaccuracies that could explain the difference in shapes between the different speech codec modes. WARNING: These results are representative of the test conditions used for the GSM AMR characterization phase and may not be representative of the codec performances in other test conditions. When analyzing the original experiments, it was usually found that a difference in MOS lower than 0.2 was not statistically significant. For the following results, the confidence interval should also be increased by the uncertainty introduced in the estimation of the FER or RBER. Perceived quality (MOS) degradation as a function of the FER (FR Tests in Clean Speech) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% 100.000% FER ∆ M OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Perceived quality (MOS) degradation as a function of the RBER (FR Tests in Clean Speech) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% RBER ∆ M OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR ETSI ETSI TR 126 912 V3.0.0 (2000-03) 10 3G TR 26.912 version 3.0.0 Release 1999 Figure 2a: Quality Degradation function of FER Figure 2b: Quality Degradation function of RBER ETSI ETSI TR 126 912 V3.0.0 (2000-03) 11 3G TR 26.912 version 3.0.0 Release 1999 Comments on the previous results: In clean speech, it appears that all AMR codec modes do not show any significant quality degradation when the Frame Erasure Rate is lower than 0.5%. In some instances, the range can even be extended to 1% FER without any quality degradation. It is also interesting to note that at 1% FER degradation, the highest codec modes (12.2 and 10.2) are still equivalent to the second tier of codec modes (7.95 to 5.9) in error free. Similarly, the middle range codec modes (7.95 to 5.9) present the same quality at 1% FER than the lower rate codec modes (5.15 and 4.75) in error free conditions. The results as a function of the RBER are quite similar with a different range of acceptable RBER. The AMR codec modes do not present any significant quality degradation when the RBER is below 0.1%. Similar results under background noise conditions are provided in Annex A. 5.2 Video 5.2.1 Introduction Qualitative evaluation of H.324 Annex C over a simulated WCDMA Channel was carried out by ARIB (Association of Radio Industries and Businesses) IMT-2000 Study committee March 1999. The purpose of the test was to clarify the relationship between source/channel codec parameters and the channel bit-error conditions. A short description of the evaluation and a presentation of the results are included. The full test report is included in Annex B. 5.2.2 Test environment The ARIB simulation was carried out as follows: 1) source video sequences come into a video encoder; 2) speech dummy data and video bitstreams are generated; 3) the bitstreams are multiplexed into a single multiplexed bitstream in the form of MUX-PDU; 4) bit errors are injected into the multiplexed bitstream ('1' in error pattern file represents error); 5) contaminated bitstream is de-multiplexed into speech and video bitstreams; 6) de-multiplexed video bitstream is decoded by a video decoder; 7) decoded video sequences are evaluated subjectively. A layered overview of the test set up is shown in table 1. Table 1 Layer Entity Instance Video Codec ISO MPEG-4 Simple Profile or ITU-T H.263 Ver.2 Application Layer Speech Codec Dummy data Mux Layer Multiplexer De-multiplexer H.223/M (mobile extension of ITU-T H.223 multiplexing protocol) Physical Layer Simulated Wideband CDMA-channel Error pattern files bitrate: 32 Kbit/s, 64 Kbit/s and 128 Kbit/s channel error condition BER: 1e-3, 1e-4 and 1e-6 velocity (model): 3km/h (Vehicular-A) and 120km/h (Vehicular-A) 5.2.3 Results The results presented below should be used carefully. The subjective evaluation performed by ARIB provides good insight into the quality aspects of 3G-324M. However, attention should be paid to the following shortcomings: the test lacks a well known reference which makes it hard to asses the absolute picture quality furthermore the test methodology for low quality video is not very well developed which might be the reason for the high deviation in the results. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 12 3G TR 26.912 version 3.0.0 Release 1999 The objective results presented should also be used carefully. It is very hard to map objective measurements to subjective quality. However high objective quality generally does mean that the subjective quality is good and vice versa. 5.2.3.1 Subjective results The following graphs are built from a subset of the data found in table in Clause B.6 of Annex B. Each codecs shown in the graphs had been tested for every error cases for each channel bit-rate. Since the evaluation lacked a known reference the MOS-values should be used very carefully. It is not the absolute value that is interesting but more the tendency. For all three of the following graphs are the error channel described in the following way: M64-10-3 where: M means Mobile-to-Mobile Channel, it could also be an F for a Fix-to-Mobile channel 64 stands for the total bitrate on the channel i.e. 64 Kbit/s, 128 means 128 Kbit/s 10 is the interleaving depth in ms, other possibilities is 20 and 80 ms 3 bit-error-rate i.e. 10e-3, other tested bit-error-rates are 10e-4 and 10e-6 Results from two different sequences are shown: Overtime and Australia. Overtime is a typical "head and shoulder" scene while Australia is a multi-person conference scene with camera motion. The later is known, from the MPEG4 verification tests, to be difficult to code. The Overtime sequence has QCIF and the Australia CIF resolution. The coded video frame rate was not fixed in the test, however most of the experimenter used a frame rate around 10 Hz. Full information about the test to be found in Annex B. MOS versus bit-error-rate, 64kps, Overtime 1 1,5 2 2,5 3 3,5 4 4,5 5 F64-10-6 M64-10-6 F64-20-4 M64-20-4 F64-10-3 M64-10-3 MPEG4 simple profile, H.223 Level 1, 8kbps Audio MPEG4 Simple profile, H.223 Level 2, 8kbps Audio H.263 Annex D, F, I, J, N, T, H.223 Level 2, 7.6 kbps Audio MPEG4 simple profile, H.223 Level 2, 7.6 kbps Audio H.263 Annex D, F, N, R, H.223 Level 2, 6.4 kbps Audio MPEG4 simple profile, H223 Level 3, 8.12 kbps Audio Figure 3 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 13 3G TR 26.912 version 3.0.0 Release 1999 Mos versus bit-error-rate, 64kps, Australia 1 1,5 2 2,5 3 3,5 4 4,5 5 F64-10-6 M64-10-6 F64-20-4 M64-20-4 F64-10-3 M64-10-3 H.263 Annex D, F, I, J, N, T, H.223 Level 2, 7.6 kbps Audio MPEG4 simple profile, H.223 Level 2, 7.6 kbps MPEG4 simple profile, H.223 Level 3wRS, 8 kbps Figure 4 MOS versus bit-error-rate, 128 kps, Australia 1 1,5 2 2,5 3 3,5 4 4,5 5 F128-10.-6 M128-10-6 F128-20-4 M128-20-4 F120-10-3 M128-10-3 MPEG4 simple profile,H.223 Level 2, 8 kbps Audio MPEG4 simple profile,H.223 Level 3wRS, 8 kbps Audio Figure 5 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 14 3G TR 26.912 version 3.0.0 Release 1999 As a comparison to the subjective results above, some objective data are presented for the same test cases. The tested sequence is Australia, two different bitrates are used (64 and 128 Kbit/s). Graphs for both Fix-to-Mobile and Mobile-to- Mobile are shown. In these results, three different multiplex levels of H.223 were used for each condition. The description of the error channel is the same as 5.3.2.1. Additional description for multiplex levels is as following: Lv2o: Level 2 with optional header, Lv3r4: Level 3 with FEC (convolutional code with a rate of 8/12), Lv3rs8: Level 3 with FEC (Reed Solomon code with 8 symbol correction). 28 29 30 31 32 33 34 35 36 37 38 1.E-06 1.E-05 1.E-04 1.E-03 1.E-02 BER PS N R [d B] F64-lv2o F64-lv3r4 F64-lv3rs8 Figure 6: BER vs. PSNR performance (64 Kbit/s, Fix-to-Mobile) ETSI ETSI TR 126 912 V3.0.0 (2000-03) 15 3G TR 26.912 version 3.0.0 Release 1999 28 29 30 31 32 33 34 35 36 37 38 1.E-06 1.E-05 1.E-04 1.E-03 1.E-02 BER PSNR [dB F128-lv2o F128-lv3r4 F128-lv3rs8 Figure 7: BER vs. PSNR performance (128 Kbit/s, Fix-to-Mobile) 28 29 30 31 32 33 34 35 36 37 38 1.E-06 1.E-05 1.E-04 1.E-03 1.E-02 BER PSNR [dB M64-lv2o M64-lv3r4 M64-lv3rs8 Figure 8: BER vs. PSNR performance (64 Kbit/s, Mobile-to-Mobile) ETSI ETSI TR 126 912 V3.0.0 (2000-03) 16 3G TR 26.912 version 3.0.0 Release 1999 28 29 30 31 32 33 34 35 36 37 38 1.E-06 1.E-05 1.E-04 1.E-03 1.E-02 BER PSNR [dB M128-lv2o M128-lv3r4 M128-lv3rs8 Figure 9: BER vs. PSNR performance (128 Kbit/s, Mobile-to-Mobile) ETSI ETSI TR 126 912 V3.0.0 (2000-03) 17 3G TR 26.912 version 3.0.0 Release 1999 Annex A: Quality degradation as a function of the FER and RBER in presence of background noise The following diagrams are provided in complement to the AMR speech codec quality performance included in subclause 5.1. They show the quality degradation induced by the different speech codec modes as a function of the FER and RBER in presence of background noise (car noise in Figures A1a & A1b, street noise in Figures A2a & A2b and Office noise in Figures A3a & A3b). The same comments on the origin of the test results as provided in subclause 5.1 also apply to the following diagrams. A.1 Results in Car Noise: Perceived quality (DMOS) degradation as a function of the FER (FR Tests in Car Noise) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% 100.000% FER ∆ DM OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Perceived quality (DMOS) degradation as a function of the RBER (FR Tests in Car Noise) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% RBER ∆ DM OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Figure A.1a: Quality Degradation function of FER Figure A.1b: Quality Degradation function of RBER In car noise, no significant degradation is observed when the FER stays below 1% and the difference in quality between the different codecs is slightly amplified compared to the results clean speech. A.2 Results in Street Noise: Perceived quality (DMOS) degradation as a function of the FER (FR Tests in Street Noise) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% 100.000% FER ∆ DM OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Perceived quality (DMOS) degradation as a function of the RBER (FR Tests in Street Noise) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% RBER ∆ DM OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Figure A.2a: Quality Degradation function of FER Figure A.2b: Quality Degradation function of RBER The results in street noise are in line with the previous results. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 18 3G TR 26.912 version 3.0.0 Release 1999 A.3 Results in Office Noise Perceived quality (DMOS) degradation as a function of the FER (FR Tests in Office Noise) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% 100.000% FER ∆ DM OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Perceived quality (DMOS) degradation as a function of the RBER (FR Tests in Office Noise) -3.00 -2.50 -2.00 -1.50 -1.00 -0.50 0.00 0.50 0.001% 0.010% 0.100% 1.000% 10.000% RBER ∆ DM OS 12.2 10.2 7.95 FR 7.4 FR 6.7 FR 5.9 FR 5.15 FR 4.75 FR Figure A.3a: Quality Degradation function of FER Figure A.3b: Quality Degradation function of RBER Same comment for the results in Office Noise ETSI ETSI TR 126 912 V3.0.0 (2000-03) 19 3G TR 26.912 version 3.0.0 Release 1999 Annex B: Simulation test of a video multimedia codec B.1 Introduction This Annex describes the simulation test of a real time, bi-directional video multimedia codec. It is a shorter version of the "Report of ARIB IMT-2000 Video Multimedia Codec Simulation Test" found in reference [2]. The purpose of the test is to clarify the relationship between source/channel codec parameters and the channel QoS (Quality of Service) parameters of available bearer channel set. While the source and channel codecs are specified with algorithms, tools, options and parameters, the channel QoS parameters include bitrate, BER (bit error rate) and delay. Resulting video associated with a certain combination of source/channel codec parameters and the channel QoS parameters is subjectively evaluated in terms of quality. Twelve experimenters, that is, companies conducted the simulations. The experimenters individually and independently carry out the simulation using video codec and multiplexer prepared by each organization. B.2 Test Procedure B.2.1 Simulation Model The system configuration of the simulation model for these experiments is depicted in Figure B.1. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 20 3G TR 26.912 version 3.0.0 Release 1999 Multiplexer (MUX) Simulated Channel Error Injector (1e-3/1e-4/1e-6, 1 Radio Link/2 Radio Links) De-Multiplexer (DEMUX) Adaptation Layer (AL2) Dummy Speech Data Generator Adaptation Layer (AL2) De-Multiplexed Speech Data Speech Application Layer Application Layer MUX Layer MUX Layer Physical Layer Video Encoder MPEG-4 SP/ H.263 Ver. 2 Adaptation Layer (AL3) Video Source Sample Adaptation Layer (AL3) Video Decoder MPEG-4 SP/ H.263 Ver. 2 Decoded Video Sample Video back Figure B.1: System configuration of simulation model This model is a typical example of mobile multimedia communication systems, and consists of the following three layers as shown in Table B.1. Table B.1: Layer structure of simulation model Layer Entity Instance Video Codec ISO MPEG-4 Simple Profile or ITU-T H.263 Ver.2 Application Layer Speech Codec dummy data Mux Layer Multiplexer De-multiplexer H.223/M (mobile extension of ITU-T H.223 multiplexing protocol) Physical Layer IMT-2000 Air- Interface spec. (Vol. 3 Ver. 0.5) error pattern files - bitrate: 32kbps, 64kbps and 128kbps - channel error condition BER: 1e-3, 1e-4 and 1e-6 - velocity (model): 3km/h (Vehicular-A) and 120km/h (Vehicular-A) The simulation is generally carried out as follows: 1) source video sequences come into a video encoder, 2) speech dummy data and video bitstreams are generated, ETSI ETSI TR 126 912 V3.0.0 (2000-03) 21 3G TR 26.912 version 3.0.0 Release 1999 3) the bitstreams are multiplexed into a single multiplexed bitstream in the form of MUX-PDU, 4) bit errors are injected into the multiplexed bitstream ('1' in error pattern file represents error), 5) contaminated bitstream is de-multiplexed into speech and video bitstreams, 6) de-multiplexed video bitstream is decoded by a video decoder, 7) decoded video sequences are evaluated subjectively. B.2.2 Source materials In the simulation two video sequences as shown in Table B.2 are used. Table B.2: Video source material Feature Name Provider Spatial Resolution Temporal Resolution Length [sec] Service assumed Motion Scene Change Overtime NTT DoCoMo QCIF*1 30 fps 60 video telephony low no Australia France Telecom QCIF*1 or CIF*2 25 fps 60 (72*3) video conference middle twice NOTE *1 QCIF: 176 (width) x 144 (height), 4:2:0 chroma format. *2 CIF : 352 (width) x 288 (height), 4:2:0 chroma format. *3 Australia is handled as 60 sec sequence of 30 fps, though it's originally 72 sec of 25 fps. B.2.3 Source encoding Clause B.5 shows the list of video/speech codecs and multiplexers employed by experimenters for the simulation. B.2.3.1 Speech Dummy random data, which are generated by each experimenter, are used to simulate encoded speech bitstream. The assumed coding bitrate and frame lengths of dummy speech data are left at the experimenter's discretion. B.2.3.2 Video Either ISO MPEG-4 Video Simple Profile or ITU-T H.263 Ver. 2 is employed as a video codec. There are some optional tools and parameters that can be set at the encoder for both specifications. Each experimenter taking speech coding bitrate and MUX overhead into account shall decide the bitrate allocated to video coding. A typical example is 8 kbps speech, 48 kbps video and 8 kbps MUX overhead, which results in 64 kbps in total. Some coding parameters are fixed to facilitate the simulation and demonstration by reducing the number of simulation conditions: 1) coding bitrate; 32 kbps and 64 kbps for Overtime, 64 kbps and 128 kbps for Australia, 2) spatial resolution of test sequence; QCIF for Overtime, CIF for Australia 128 kbps coding, and QCIF or CIF for Australia 64 kbps coding, 3) initial frame alignment; the 1st frame of test sequence shall be encoded as 1st intra-coded frame. It is noted that coding frame rate is left at the experimenter’s discretion. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 22 3G TR 26.912 version 3.0.0 Release 1999 B.2.4 Multiplexing ITU-T H.223/M (mobile extension) with its annexes namely Annex A, Annex B, Annex C and Annex D is used as a multiplexing protocol. As for the adaptation layer, AL3 is used for video and AL2 for speech. The use of the optional tools like control field, re-transmission and the optional header field in the Annex B is up to the experimenters. B.2.5 Bit error injection B.2.5.1 Error pattern files The bit error patterns are generated based on Vol. 3 Ver. 0.5 (ARIB IMT-2000 A/IF specification) [1] issued on Nov. 18 th, 1998 [Ed. Note, This is a WCDMA channel]. The frame structure of the bit error file is shown in Figure B.2, which is identical to the air channel frame assumed. The frame is in 10-msec unit, and each frame is composed of CRC (16 bits) and INFO bits (10-msec worth of user bitrate). The multiplexed or encoded bitstream is assumed to be transmitted as INFO bits on a frame basis. The 16-bit CRC is originally designed to detect errors in the corresponding INFO bits at the physical layer. It can, however, be exploited at the application layer (e.g., source codec and MUX). In this simulation, the CRC is not used, hence, the 16-bit CRC should be merely discarded. It shall be noted that the CRC may be able to improve the performance of use applications. This is left for further study. CRC 16 INFO Nch_info CRC 16 INFO Nch_info CRC 16 INFO Nch_info Frame unit (10ms) given Bit Error Pattern Ncodec_info Ncodec_info INFO Ncodec_info INFO Ncodec_info Bit Errors added to Encoded bit- stream. Figure B.2: Frame structure of bit error pattern file The bit error patterns in binary format are then provided as summarized in Table B.3. Among them, the error pattern files of Vehicular-A, 120km/h propagation model are used for the test of mobile-to-land mode. The mobile-to-mobile (M2M) error pattern files weren't provided. M2M files was thus generated by XORing (exclusive OR) forward link and reverse link appropriately. Unfortunately reverse link files are available only for 32kbps, 1e-3 case. Therefore, error pattern of M2M mode are synthesized by XORing two forward link files that are the same in bitrate, BER and interleave length but only differ in propagation model. The two propagation models used are 3km/h and 120km/h of vehicular-A. Table B.3: Bit error pattern files Radio Channel Type Ref. File Name FL/ RL Bitrate [kbps] Interleave Size [msec] BER File Length [sec] Speed [km/h] Propagation model Eb/Io [dB] SG4/VMG File# F32-10-3-V3a FL 32 10 1e-3 300 3 Veh-A 2.57 SG4-7 F32-10-3-V120a 120 Veh-A 3.93 SG4-10 F32-20-4-V3 20 1e-4 300 3 Veh-A 2.59 VMG-1 F32-20-4-V120 120 Veh-A 3.90 VMG-2 F32-10-6-V3 10 1e-6 5000 3 Veh-A 3.96 SG4-41 F32-10-6-V120a 120 Veh-A 5.63 SG4-43 F32-80-6-V3 80 3 Veh-A 2.42 SG4-45 F32-80-6-V120a 120 Veh-A 3.66 SG4-47 F64-10-3-V3a 64 10 1e-3 300 3 Veh-A 2.18 SG4-13 F64-10-3-V120a 120 Veh-A 3.39 SG4-16 F64-20-4-V3 20 1e-4 300 3 Veh-A 2.16 VMG-3 F64-20-4-V120 120 Veh-A 3.47 VMG-4 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 23 3G TR 26.912 version 3.0.0 Release 1999 Radio Channel Type Ref. File Name FL/ RL Bitrate [kbps] Interleave Size [msec] BER File Length [sec] Speed [km/h] Propagation model Eb/Io [dB] SG4/VMG File# F64-10-6-V3 10 1e-6 5000 3 Veh-A 3.63 SG4-25 F64-10-6-V120a 120 Veh-A 5.06 SG4-27 F64-80-6-V3 80 3200 3 Veh-A 2.00 SG4-29 F64-80-6-V120a 120 Veh-A 3.28 SG4-31 F128-10-3-V3 128 10 1e-3 300 3 Veh-A 0.93 VMG-5 F128-10-3-V120 120 Veh-A 2.21 VMG-6 F128-20-4-V3 20 1e-4 300 3 Veh-A VMG-7 F128-20-4-V120 120 Veh-A VMG-8 F128-10-6-V3 10 1e-6 3000 3 Veh-A 2.24 SG4-49 F128-10-6-V120a 120 Veh-A 3.91 SG4-51 F128-80-6-V3 80 1600 3 Veh-A 0.99 SG4-53 F128-80-6-V120a 120 Veh-A 1.98 SG4-55 R32-10-3-V3 RL 32 10 1e-3 300 3 Veh-A 2.48 VMG-9 R32-10-3-V120 120 Veh-A 3.86 VMG-10 B.2.5.2 Error pattern segments to be used at the simulation Multiple-run simulation leads to more reliable results. Therefore it was decided to use 20 runs per error pattern file, i.e., parent file. It should be noted that the successive processes namely de-multiplexing and source decoding are repeated 20 times accordingly. An extracted file is denoted "error pattern segment", so 20 error pattern segments (denoted as seg#0 - seg#19) are extracted from each error pattern file. Note that duration of error pattern segments must be identical to that of test sequence, hence, 60 seconds for both Overtime and Australia. These error pattern segments, which shall represent respective test condition, are extracted as follows. • In case of 1e-3 and 1e-4 BERs, 20 error pattern segments, initial frame of which are equally distributed over 5-min error pattern file, are extracted. Each segment is composed of successive frames in an error pattern file. The initial frame number of seg#0 is zero, and those of the following segments fall with fixed interval; 1200 frames (12 seconds). • In case of 1e-6 BER, an intermediate file of 20 segments worth length, whose actual BER is as close to 1e-6 as possible, is sought over an error pattern file. Then 20 segments are extracted from the intermediate file. The initial frame of seg#0 collocates that of the intermediate file. As to the rest, they are extracted in the way that seg#N (where N=1,...,19) immediately follows seg#N-1. • Firstly, 20 error pattern segments are extracted for each propagation model. The M2M error pattern segments are generated by XORing these extracted segments. In this process segment number must be matched, that is, XORing seg#N (where N=0,...,19) of 3km/h model and seg#N of 120km/h model yields seg#N of M2M model. B.2.5.3 Injection of bit errors To simulate the noisy channel, those bit errors are injected into multiplexed bitstream. This process is done by XOR in bit-wise fashion. But the initial error free period is tailored to protect the important part of the bitstream, since errors on such portion probably cause fatal damages in the source decoding process. Therefore the initial 100 bytes from the beginning of the multiplexed bitstream, which is denoted error-free period, are enforced to be error-free. So bit errors are injected immediately after the error-free period in multiplexed bitstream (Precisely the 1st bit of error patterns shall collocate 801st bit (both counting from one) of the multiplexed bitstream). If multiplexed bitstream is longer than error pattern segment plus 100 bytes, no error is applied to the tail part of the bitstream exceeding the length of error pattern segment plus 100 bytes. ITU-T H.245 Version 5 [5] is designed to perform a capability exchange prior to the transmission of data streams. With this technique, the initial error-free period can be realized by means of re- transmission. B.2.6 De-multiplexing The multiplexed bitstream is de-multiplexed at the receiver side. This process comes out with de-multiplexed speech bitstream and de-multiplexed video bitstream in the form of AL-SDU. Errors may be detected in some units of those bitstream with error detection capability of the multiplexing protocol. In that case it is up to the experimenter to decide ETSI ETSI TR 126 912 V3.0.0 (2000-03) 24 3G TR 26.912 version 3.0.0 Release 1999 whether erroneous AL-SDUs are delivered to the AL user, i.e., video decoder, or simply discarded. When erroneous AL-SDUs are delivered to respective AL user, it is possible that the AL user is notified of the presence of errors in delivered AL-SDU by the de-multiplexer B.2.7 Video decoding The de-multiplexed video bitstream is decoded. The video decoder has less freedom in selecting optional tools compared to the encoder, but has more freedom of operation outside of the standard, e.g., error detection, error recovery, error concealment and post processing. The use of these non-normative tools and proprietary schemes is up to the experimenters. To align the spatial resolution at subjective evaluation test, "Australia" sequence encoded at QCIF size shall be up-sampled to CIF size. Then "Overtime" and "Australia" sequences are displayed at the size of QCIF and CIF, respectively. For QCIF-to-CIF conversion, the up-sampling filter [FILTER] employed at MPEG-4 experiments is used. B.2.8 Constraints and regulations B.2.8.1 Delay In considering adequate combination of bearer radio channel and codec parameters, both channel and codec affect the delay. Therefore the delay constraints shall be investigated in both aspects simultaneously. Table B.4 summarizes the delay constraints to meet. It shall be noted that delay due to multiplexing/de-multiplexing heavily depends on the system configuration. Given that processing power of MUX related components are high enough, the delay at MUX layer can be absorbed into the video delay. So in the simulation, it is assumed that the delay at MUX layer is negligible, i.e., zero. Table B.4: Delay constraints Total allowable delay Allowable delay for air interface, network Allowable delay for codec and MUX Associated BER 10x2*,50 330 1e-3, 1e-6 20x2*,50 310 1e-4 400 ms 80x2*,50 190 1e-6 NOTE: * Multiplying by 2 means two links for mobile-to-mobile. B.2.8.1.1 Video The video delay is classified into two; initial delay and stationary delay. The former is defined with coding bits consumed at the 1st intra-coded frame, and is quantified by the coding bits divided by video coding bitrate. In the subjective test, when the initial delay exceeds 600 ms, mid-gray background is displayed with duration identical to the initial delay before presenting decoded video sequence. The latter is the one calculated based on the delay model described in B.2.9.8. It is, however, found difficult and impractical to always keep the stationary delay below the prescribed values shown in Table B.4 considering a variety of natures of input video sequences. While the experimenters are yet strongly encouraged to obey the above constraints, they are exceptionally allowed not to do. It is noted that such violation is admitted only when it is essential and rather practical than obeying the constraints. B.2.9 Statistical data to be reported The following items shall be reported on a test condition basis, i.e., one per error pattern file. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 25 3G TR 26.912 version 3.0.0 Release 1999 B.2.9.1 Video coding bitrate [%6.2f kbps] and MUX overhead [%6.2f kbps] B.2.9.2 Speech coding bitrate [%6.2f kbps] and frame length [%d ms] B.2.9.3 Video initial delay [%6.1f ms] The video initial delay is calculated as coding bits for initial intra-coded frame divided by video coding bitrate B.2.9.4 PSNR related data The PSNRk,l (peak signal-to-noise ratio) of l-th frame at k-th run is defined as; ( ) ( ) ( ) = ∑ − = ∑ − = ∑ − = ∑ − = − + ∑ − = ∑ − = − + − 1 0 1 0 1 2 0 1 2 0 2 1 2 0 1 2 0 2 2 2 255 5 1 10 M i N j / M i / N j ) j ,i( b Cˆ ) j ,i( Cb / M i / N j ) j ,i(r Cˆ ) j ,i( Cr ) j ,i( Yˆ ) j ,i( Y ) ( * N * M * . log PSNR l k, where , , and , , indicate the three channels of the original and decoded frames, respectively, and M and N indicate the Y channel support for 4:2:0. Practically, M = 176 and N = 144 for QCIF format and M = 352 and N = 288 for CIF format B.2.9.4.1 Total average PSNR, i.e., PSNRtotal [%6.2f dB] Now at the decoder, let is_decoded(k, l) be a function which returns '1' if l-th frame at k-th run is decoded, and otherwise returns '0' representing "dropframe" (e.g., it occurs when a frame can't be reconstructed due to errors). Total average PSNR denoted by PSNRtotal is defined as; B.2.9.4.2 Average PSNR for representative run, i.e., PSNRk* [%6.2f dB] Firstly average PSNR at k-th run denoted by PSNRk is obtained; The representative run k* is chosen from among 20 candidates PSNRk, where k=0,...,19. The selection criterion is that PSNRk* is the one closest to PSNRtotal. B.2.9.4.3 Average PSNR in error-free case, i.e., PSNRfree [%6.2f dB] The average PSNR in error-free case represented by PSNRfree is obtained in the similar way above. To precisely define the term, it is the average PSNR calculated when decoding error-free video bitstream. B.2.9.4.4 Standard deviation of PSNR, i.e., Sigma [%6.2f dB] The Sigma is represented as; ∑ ∑ = = × × = 1799 0 19 0 20 l l, k k total ) l, k ( decoded _ is PSNR ) l, k ( decoded _ is PSNR ∑ = − = 19 0 2 19 k k total ) PSNR PSNR ( Sigma ∑ = × = 1799 0 l l, k k ) l, k ( decoded _ is PSNR ) l, k ( decoded _ is PSNR ETSI ETSI TR 126 912 V3.0.0 (2000-03) 26 3G TR 26.912 version 3.0.0 Release 1999 B.2.9.5 Coding frame rate [%5.2f frames/sec] Like is_decoded(k, l), let is_encoded( l) denote a function which returns '1' if l-th frame is encoded at the encoder, and otherwise returns '0'. The coding frame rate is expressed as; B.2.9.6 Average dropframe rate [%6.2f %] The average dropframe rate is defined as; B.2.9.7 Out of delay constraints rate [%6.2f %] Let is_outofdelay(l) represent a function which returns '1' if the delay constraints can not be observed at l-th frame, and otherwise returns '0'. Note is_outofdelay(l) is meaningful only when the l-th frame is encoded, i.e., is_encoded(l)=1. Now the out of delay constraints rate is defined as; B.2.9.8 Definition of video stationary delay The video stationary delay, Dn, for the n-th (n = 1, 2, ...) coded frame in the transmitted sequence is defined as follows (the delay model defined has no relation between the buffering model described in the MPEG-4 [3] or H.263 [4] specification): Dn = Tn - On, where On denotes the time when the n-th coded frame occurs, and Tn denotes the time when the last bit of the coded information related to the n-th coded frame is transmitted from the transmitting side. For example, when the video information is coded at the fixed bitrate of R bits/s, Dn is defined as follows: , where Bn is the number of transmitted bits for the n-th coded frame. The encoder shall encode a frame which occurred before the transmission of the information related to the previous coded frame is finished. This condition is described as: On ≤ Tn-1 . In the fixed bitrate case, this equation is rewritten as: R B O O n i i n ∑ − = + ≤ 1 1 1 . ∑ = = 1799 0 60 l ) l( encoded _ is rate _ frame _ coding ∑ ∑ = = − × = 1799 0 19 0 100 l k ) l( encoded _ is ) l, k ( decoded _ is ) l( encoded _ is rate _ dropframe _ average ∑ = × = 1799 0 100 l ) l( encoded _ is ) l( outofdelay _ is & ) l( encoded _ is rate _ s int constra _ delay _ of _ out ETSI ETSI TR 126 912 V3.0.0 (2000-03) 27 3G TR 26.912 version 3.0.0 Release 1999 B.2.9.9 Decoded video of representative run The decoded video sequence shall ideally be displayed as it is demonstrated using actual real time codec. It is, however, found difficult for all experimenters to tailor such real time codec. Therefore, experimenters shall submit the decoded video of representative run. For simplicity sake, the decoded video is displayed according to the time stamp of encoded frames, assuming the time stamp is not so much deviated from presentation time at decoder. B.3 Subjective quality evaluation The video subjective quality evaluation test is performed based on so-called SS-5DQS, that is, single stimulus (SS) method with a 5-point discrete quality scale (5DQS) referred to as ITU-R BT 500-8. However, the test is not designed to be fully compliant to SS-5DQS, but is rather simplified. There are five grades; excellent, good, fair, poor and bad. It shall be noted that the grading is made under the assumption that those video sequences, hence, associated video codecs are employed for prospective IMT-2000 mobile terminals. In this context, LCD monitors are employed as display since the mobile terminal for video related services will most likely be equipped with LCD monitors. B.3.1 Structure of test B.3.1.1 Program The subjective test is composed of several programs. A program is designed to be 20-40 minute long taking account of concentration duration of test subjects. A program is comprised of a training session followed by a scoring session. "Overtime" and "Australia" are handled separately in this level. B.3.1.2 Training session In order for test subjects to establish their own criteria on video subjective quality, a training session is tailored prior to actual evaluation. A training session consists of five video sequences, and there are two training sessions; one for "Overtime" and another for "Australia". These two are commonly used to every program in respective category. No score is put to sequences in a training session. A training session begins with 5-second indication notifying the beginning of the session. 5-second break is inserted between video sequences. B.3.1.3 Scoring session A scoring session is composed of multiple sequences, all of which are to be subjectively assessed. 10-second break is inserted between successive sequences. Test subject should mark a grade to a sequence during break which immediately follow the said sequence. B.3.1.4 Video sequence A video sequence, or sequence, represents a series of decoded images which is of 1-minute long. B.3.1.5 Structure of program A structure of a program is given in Table B.5. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 28 3G TR 26.912 version 3.0.0 Release 1999 Table B.5: Structure of program Session Components Contents Duration [s] Time elapsed Indication training session 5 training #1 video sequence 60 Break gray image 5 training #2 video sequence 60 Break gray image 5 Training training #5 video sequence 60 5’25" indication scoring session 10 evaluation #1 video sequence 60 score and break gray image 10 evaluation #2 video sequence 60 score and break gray image 10 evaluation #23* video sequence 60 Scoring score gray image 10 32’25" NOTE The total number of sequences in a scoring session ranges from 21 to 23 depending on program. B.3.2 Editing process The decoded video sequences submitted by experimenters are to be edited, i.e., re-organized complying with a simplified SS-5DQS method. B.3.2.1 Producing training session Five sequences, each for "Overtime" and "Australia", are to be picked up. Two extremes, one in the best quality class and one in the worst quality class shall be included in a training session. The other three are to be picked up covering various classes in video quality. B.3.2.2 Randomization "Overtime" and "Australia" sequences are dealt with separately, and those related programs are denoted like "O1" which represents the first program of "Overtime". Firstly the number of programs are determined taking account of the total number of sequences. Since there are 91 and 64 sequences for "Overtime" and "Australia", respectively, 4 programs for "Overtime" and 3 programs for "Australia" are generated. Secondly sequential number is put to sequences properly. Then video sequences are classified into those programs using random numbers. B.3.3 Assessment B.3.3.1 Test subjects According to an ITU-R recommendation, reliable MOS data can be obtained with 10 expert test subjects or with 20 non-expert test subjects or more. In this test, 15 (12 experts, 1 semi-expert and 2 non-experts)and 14 (11 experts, 2 semi-experts and 1 non-expert) test subjects are employed for evaluation of Overtime and Australia sequences, respectively. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 29 3G TR 26.912 version 3.0.0 Release 1999 Table B.6: Time schedule of test Time Test Subject Group A Test Subject Group B Test Administrators 09:20 – 10:10 Equipment Set-up 10:10 – 10:30 Explanation of the Test Preparation for O1 10:33 – 11:06 Evaluation (Program O1) Break 11:06 – 11:12 Break Preparation for A1 11:12 – 11:44 Evaluation (Program A1) 11:44 – 11:52 Lunch Break Preparation for O2 11:52 – 12:25 Evaluation (Program O2) 12:25 – 13:00 Lunch Break Preparation for A2 /XQFK 13:00 – 13:33 Evaluation (Program A2) 13:33 – 13:40 Break Preparation for O3 13:40 – 14:13 Evaluation (Program O3) 14:13 – 14:20 Break Preparation for A3 14:20 – 14:53 Evaluation (Program A3) 14:53 – 15:00 Dismissal (after above) Preparation for O4 15:00 – 15:33 Evaluation (Program O4) Dismissal (after above) 15:33 – 16:00 Equipment Take-down B.3.3.2 Facilities and equipment for test As many as 15 test subjects shall conduct the evaluation at the same time in the subjective test. From among several possible solutions the following equipment is deployed for the test. One set capable of handing four LCD monitors (including one parent PC) is composed of; 1) one high-performance PC, 2) one Dsub15-to-BNC video interface (Umezawa, ITF-400), 3) one 1BNC-to-3BNC video splitter (Umezawa, UM-4700A), 4) three BNC-to-Dsub15 conversion boxes (Umezawa, ADA-400) and 5) three LCD monitors. Given that two test subjects share an LCD, two sets of above are necessary and can synchronously display video on up to 8 LCDs (including two parent PCs). B.3.3.3 Score sheet Score sheet is made on a program basis, and given to test subjects prior to each program. The format of score sheet is depicted in Figure B.3, which exemplifies the case of "A1-01" marked "Good" and "A1-02" marked "Fair". No. Excellent Good Fair Poor Bad A1-01 A1-02 Figure B.3: Format of score sheet (example of "A1-01" marked "Good" and "A1-02" marked "Fair" The following instruction is described on a score sheet; "Test subject shall subjectively judge how well quality of video sequence meets the quality test subject expects for IMT-2000 real time video communication services assumed. The best and worst quality sequences don't necessarily correspond to the grades excellent and bad, respectively." B.3.4 Data processing MOS (mean opinion score) and its standard deviation denoted by 1os are calculated and to be reported as subjective test results. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 30 3G TR 26.912 version 3.0.0 Release 1999 B.3.4.1 MOS [%4.2f] Let M and OS[i] denote the number of test subjects and the opinion score of i-th test subject. Note that OS[i] is associated with integers as below and so converted. Excellent: 5 / Good: 4 / Fair: 3 / Poor: 2 / Bad: 1 Now the MOS is calculated as; B.3.4.2 Standard deviation of OS, i.e., os [%4.2f] The standard deviation of OS (opinion score) is expressed as; B.4 Test results and observations B.4.1 Test results The test results including both opinion scores and statistical data are shown in the table of in clause B.6. Both the subjective test results and statistical data obtained through the simulation test are tabulated there in terms of channel type. B.4.2 Observations The characteristics of the residual errors on the simulated channels are considerably different from that of the ARIB IMT-2000 first video multimedia codec simulation test conducted in May-June 1998. The error density in the residual error burst is significantly lower this time probably due to the use of Turbo Codes [OBSERVE]. The effects of the used error correcting code, the residual error characteristic and its influence on the multimedia codec system have to be further investigated. ∑ = = M i M ] i[ OS MOS 1 ∑ = − − = M i M ) MOS ] i[ OS ( 1 2 os 1 σ ETSI ETSI TR 126 912 V3.0.0 (2000-03) 31 3G TR 26.912 version 3.0.0 Release 1999 B.5 List of video/speech codecs and multiplexers employed in the simulation Item Sub-item A B C D E F Algorithm/profile MPEG-4 Simple Profile MPEG-4 Simple Profile MPEG-4 Simple Profile MPEG-4 Simple Profile MPEG-4 Simple Profile MPEG-4 Simple Profile tools/options I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Header Extension Code I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Header Extension Code I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Header Extension Code I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Video coding rate control MPEG-2 TM-5 step2 used (variable frame rate) used Used used ITU-T H.263 tmn8 based Algorithm/level ITU-T H.223 Level 2/3 ITU-T H.223 Level 2 ITU-T H.223 Level 1/2*1 ITU-T H.223 Level 3 ITU-T H.223 Level 2 ITU-T H.223 Level 2 tools/options optional header optional header optional header optional header interleave (for Annex C) no optional header no optional header Multiplexing Back channel model N/A N/A N/A N/A N/A N/A Speech coding (dummy data) bit rate/frame length 6.4kbps/30ms 8.0kbps/20ms 4.0kbps/20ms 8.0kbps/10ms 7.67, 7.94, 8.09, 8.12kbps, /10ms 8.0kbps/30ms 6.4kbps/30ms Item Sub-item G H I J K L Algorithm/profile H.263 Ver.2 MPEG-4 Simple Profile MPEG-4 Simple Profile H.263 Ver.2 MPEG-4 Simple Profile MPEG-4 Simple Profile tools/options Annexes: D, F, I, J, N, T I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Header Extension Code Annexes: D, F, N, R I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Header Extension Code I-VOP P-VOP AC/DC Prediction Reversible VLC Slice Resynch Data Partitioning Header Extension Code Video coding rate control ITU-T H.263 TMN 5 ITU-T H.263 TMN 5 TMN5 H.263 TMN-6 used used Algorithm/level ITU-T H.223 Level 2 ITU-T H.223 Level 2 ITU-T H.223 Level 3wRS ITU-T H.223 Level 2 ITU-T H.223 Level 1/2*1 ITU-T H.223 Level 2/3/3wRS tools/options no optional header no optional header optional header no optional header optional header optional header Multiplexing Back channel model H.245 videoFastUpdateGOB and videoFastUpdatePicture H.245 videoFastUpdatePicture N/A H.263 Annex N separate logical channel mode*2 N/A N/A Speech coding (dummy data) bit rate/frame length 7.6kbps/20ms 7.6kbps/20ms 8.0kbps/20ms 6.4kbps/30ms 8.0kbps/10ms 6.4kbps/30ms Note: *1: EI (error indication) is generated at AL3 and sent to video decoder together with video bitstream assuming AL-SDU is of fixed length and the length is known to both video encoder and decoder. *2: Error pattern of forward-channel is hypothetically applied to back-channel. The separate logical channel mode specified in H.223 Annex N option delivers the back-channel message through the dedicated logical channel. As to the delay due to the back-channel, it is almost zero at the codec, and is assumed to be the duration to transmit the maximum MUX-PDU considering the worst case at multiplexer. ETSI ETSI TR 126 912 V3.0.0 (2000-03) 32 3G TR 26.912 version 3.0.0 Release 1999 B.6 Test results subjective test results experimenter's choice statistical data at encoder/multiplexer statistical data at decoder/de-multiplexer Channel type MUX audio bitrate audio frame length MUX overhead picture spatial resolution video bitrate coding frame rate video initial delay out of delay constraints PSNRfree PSNRtotal PSNRk* Sigma average drop frame rate Video Sequence LinkRate- IL-BER MOS •os H.223 Level [kbps] [ms] [kbps] QCIF or CIF [kbps] [frames/s] [ms] [%] [dB] [dB] [dB] [dB] [%] Overtime F32-10-3 1.33 0.49 2 4.00 20 4.01 QCIF 24.01 8.02 489.0 0.00 33.72 32.02 31.98 0.47 2.37 1.60 0.63 2 6. 40 30 6. 58 QCIF 19. 02 8.40 591.6 0.02 31.86 31.34 31.35 0.09 0.00 R32-10-3 1.87 0.52 2 4.00 20 4.01 QCIF 24.01 8.02 489.0 0.00 33.72 30.55 30.51 0.50 4.68 M32-10-3 1.13 0.52 2 4.00 20 4.01 QCIF 24.01 8.02 489.0 0.00 33.72 31.92 31.93 0.45 2.12 1.00 0.00 2 6.40 30 6.58 QCIF 19.02 8.34 591.6 0.02 31.86 30.92 30.91 0.15 0.00 F32-20-4 1.47 0.52 2 6.40 30 2.60 QCIF 20.67 7.50 454.0 0.00 31.56 28.68 28.42 2.72 0.10 2.33 0.72 2 4.00 20 4.01 QCIF 24.01 8.02 489.0 0.00 33.72 33.50 33.49 0.17 0.26 1.87 0.35 2 6.40 30 6.59 QCIF 19.01 8.47 591.6 0.03 31.86 31.78 31.78 0.05 0.00 M32-20-4 1.33 0.49 2 6.40 30 2.60 QCIF 20.67 7.50 454.0 0.00 31.56 28.17 28.52 3.17 1.05 2.13 0.64 2 4.00 20 4.01 QCIF 24.01 8.02 489.0 0.00 33.72 33.32 33.32 0.25 0.64 1.80 0.56 2 6.40 30 6.59 QCIF 19.01 8.46 591.6 0.03 31.86 31.71 31.71 0.08 0.00 F32-10-6 2.53 0.52 1 4.00 20 3.17 QCIF 25.05 8.33 469.4 0.00 33.83 33.83 33.83 0.00 0.00 2.20 0.41 2 6.40 30 2.60 QCIF 20.69 7.50 454.0 0.00 31.57 31.56 31.57 0.04 0.00 2.33 0.62 2 6.40 30 6.59 QCIF 19.01 8.45 591.6 0.02 31.86 31.86 31.86 0.01 0.00 F32-80-6 2.47 0.64 1 4.00 20 3.16 QCIF 25.03 10.58 469.4 0.00 33.15 33.15 33.15 0.01 0.01 1.93 0.70 2 6.40 30 2.60 QCIF 20.61 7.50 454.0 0.01 31.52 31.22 31.44 1.29 0.35 1.93 0.46 2 6.40 30 6.59 QCIF 19.01 8.45 591.6 0.06 31.86 31.85 31.86 0.02 0.00 M32-10-6 2.33 0.49 1 4.00 20 3.17 QCIF 25.05 8.33 469.4 0.00 33.83 33.83 33.83 0.01 0.01 2.60 0.63 2 6.40 30 2.60 QCIF 20.69 7.50 454.0 0.00 31.57 31.56 31.57 0.04 0.00 1.93 0.59 2 6.40 30 6.59 QCIF 19.01 8.46 591.6 0.02 31.86 31.86 31.86 0.01 0.00 M32-80-6 2.53 0.74 1 4.00 20 3.16 QCIF 25.03 10.58 469.4 0.00 33.15 33.15 33.15 0.01 0.02 1.93 0.46 2 6.40 30 2.60 QCIF 20.61 7.50 454.0 0.01 31.52 30.91 31.38 1.82 0.70 1.87 0.64 2 6.40 30 6.59 QCIF 19.01 8.45 591.6 0.06 31.86 31.85 31.86 0.03 0.00 F64-10-3 2.80 0.77 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 0.86 35.02 32.55 32.52 1.06 0.04 2.53 0.99 2 8.00 10 8.03 QCIF 48.06 11.63 475.0 0.00 35.40 33.90 33.89 0.29 2.66 1.67 0.62 2 7.60 20 7.06 QCIF 49.34 9.31 463.8 0.21 36.77 32.88 32.94 0.77 1.65 1.93 0.46 2 7.60 20 8.63 QCIF 47.77 9.11 482.8 0.43 34.90 32.86 32.85 0.46 1.96 1.87 0.64 2 6.40 30 6.56 QCIF 51.04 9.06 300.4 0.00 36.04 34.87 34.86 0.19 0.00 1.60 0.51 2 6.40 30 5.08 QCIF 46.88 7.48 582.08 0.01 31.58 28.54 28.28 1.34 0.70 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 33 3G TR 26.912 version 3.0.0 Release 1999 subjective test results experimenter's choice statistical data at encoder/multiplexer statistical data at decoder/de-multiplexer Channel type MUX audio bitrate audio frame length MUX overhead picture spatial resolution video bitrate coding frame rate video initial delay out of delay constraints PSNRfree PSNRtotal PSNRk* Sigma average drop frame rate Video Sequence LinkRate- IL-BER MOS •os H.223 Level [kbps] [ms] [kbps] QCIF or CIF [kbps] [frames/s] [ms] [%] [dB] [dB] [dB] [dB] [%] 1.87 0.64 3 8.12 10 32.65 QCIF 24.27 6.25 599.0 11.47 33.39 31.86 31.85 0.60 6.99 1.40 0.51 3 6.40 30 20.10 QCIF 34.07 7.42 561.371 0.07 30.69 28.11 28.46 1.31 0.29 1.60 0.63 3wRS 6.40 30 20.33 QCIF 34.07 7.42 561.371 0.07 30.69 28.41 28.39 1.33 0.30 M64-10-3 1.87 0.64 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 1.21 35.02 30.99 30.89 1.00 0.00 1.53 0.52 2 8.00 10 8.03 QCIF 48.06 11.63 475.0 0.00 35.40 32.91 32.90 0.28 4.99 1.33 0.49 2 7.60 20 7.04 QCIF 49.36 9.30 463.5 0.22 36.77 31.57 31.55 0.83 2.80 1.13 0.35 2 7.60 20 8.53 QCIF 47.87 9.14 465.4 0.41 34.90 31.08 30.97 1.13 3.03 1.60 0.51 2 6.40 30 6.56 QCIF 51.04 9.06 300.4 0.00 36.04 34.20 34.20 0.15 0.00 1.47 0.64 2 6.40 30 5.08 QCIF 46.88 7.48 582.0 0.01 31.58 25.90 25.42 1.49 1.25 1.60 0.63 3 8.12 10 32.65 QCIF 24.27 6.25 599.0 11.47 33.39 31.85 31.89 0.55 6.89 1.27 0.59 3 6.40 30 20.10 QCIF 34.07 7.42 561.371 0.07 30.69 26.31 26.68 1.36 0.46 1.40 0.51 3wRS 6.40 30 20.33 QCIF 34.07 7.42 561.371 0.07 30.69 27.77 28.17 1.29 0.48 F64-20-4 3.33 0.62 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 1.21 35.02 34.60 34.54 0.66 0.00 2.87 0.92 2 8.00 10 8.03 QCIF 48.06 11.63 475.0 0.00 35.40 35.20 35.20 0.13 0.31 3.67 0.72 2 8.00 30 7.35 QCIF 48.07 10.40 545.3 1.44 38.74 37.58 37.41 0.81 0.06 2.93 0.88 2 7.60 20 6.84 QCIF 49.56 9.38 461.6 0.18 36.77 35.25 35.24 0.36 0.19 2.87 0.83 2 7.60 20 8.17 QCIF 48.23 9.23 473.6 0.33 34.90 34.40 34.38 0.78 0.47 3.47 0.64 2 6.40 30 6.57 QCIF 51.03 9.05 300.4 0.00 36.04 35.89 35.89 0.09 0.00 3.40 0.74 2 6.40 30 5.08 QCIF 46.88 7.48 582.0 0.04 31.58 31.38 31.37 0.40 0.14 2.73 0.70 3 6.40 30 24.60 QCIF 32.39 7.50 325.0 0.00 33.87 31.32 32.81 3.18 2.80 2.80 0.68 3 8.12 10 32.50 QCIF 24.25 6.30 598.3 11.38 33.45 33.38 33.39 0.14 1.44 2.53 0.52 3 6.40 30 19.30 QCIF 33.00 7.40 561.371 0.11 30.83 30.70 30.67 0.39 0.06 2.60 0.63 3wRS 6.40 30 19.70 QCIF 33.00 7.40 561.371 0.11 30.83 30.81 30.81 0.14 0.00 M64-20-4 2.73 0.88 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 2.76 35.02 34.21 34.25 0.82 0.00 3.07 0.88 2 8.00 10 8.03 QCIF 48.06 11.63 475.0 0.00 35.40 35.05 35.07 0.15 0.69 3.33 0.72 2 8.00 30 7.35 QCIF 48.07 10.40 545.3 1.44 38.74 36.08 36.24 1.75 0.17 2.73 0.70 2 7.60 20 6.95 QCIF 49.45 9.35 462.7 0.18 36.77 34.75 34.74 0.81 0.35 3.20 1.01 2 7.60 20 8.90 QCIF 47.50 9.08 485.6 0.35 34.90 34.32 34.35 0.22 0.72 3.40 0.74 2 6.40 30 6.56 QCIF 51.04 9.05 300.4 0.00 36.04 35.73 35.74 0.09 0.00 3.20 0.94 2 6.40 30 5.08 QCIF 46.88 7.48 582.0 0.04 31.58 30.64 30.81 1.05 0.19 2.60 0.51 3 6.40 30 24.60 QCIF 32.39 7.50 325.0 0.00 33.87 29.69 29.27 3.17 4.95 2.80 0.77 3 8.12 10 32.50 QCIF 24.25 6.30 598.3 11.38 33.45 33.22 33.19 1.88 2.20 2.07 0.96 3 6.40 30 19.30 QCIF 33.00 7.40 561.371 0.11 30.83 30.57 30.60 0.43 0.10 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 34 3G TR 26.912 version 3.0.0 Release 1999 subjective test results experimenter's choice statistical data at encoder/multiplexer statistical data at decoder/de-multiplexer Channel type MUX audio bitrate audio frame length MUX overhead picture spatial resolution video bitrate coding frame rate video initial delay out of delay constraints PSNRfree PSNRtotal PSNRk* Sigma average drop frame rate Video Sequence LinkRate- IL-BER MOS •os H.223 Level [kbps] [ms] [kbps] QCIF or CIF [kbps] [frames/s] [ms] [%] [dB] [dB] [dB] [dB] [%] 2.87 0.74 3wRS 6.40 30 19.70 QCIF 33.00 7.40 561.371 0.11 30.83 30.72 30.71 0.28 0.01 F64-10-6 3.67 0.82 1 8.00 10 6.31 QCIF 50.04 15.63 490.2 0.00 34.42 34.35 34.35 0.00 0.01 3.60 0.99 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 0.86 35.02 35.02 35.02 0.01 0.03 4.40 0.83 2 7.60 20 7.04 QCIF 49.37 9.53 500.8 0.17 36.77 36.73 36.74 0.09 0.00 3.87 1.06 2 7.60 20 8.17 QCIF 48.23 9.23 461.9 0.32 34.90 34.84 34.85 0.09 0.29 3.47 0.99 2 6.40 30 6.56 QCIF 51.04 9.05 300.4 0.00 36.04 36.04 36.04 0.01 0.00 3.20 0.77 3 6.40 30 24.60 QCIF 32.41 7.50 325.0 0.00 33.88 33.52 33.88 1.64 0.35 3.67 0.72 3 8.12 10 17.28 QCIF 39.50 6.53 530.5 8.42 36.49 36.49 36.49 0.03 0.00 F64-80-6 3.60 0.91 1 8.00 10 6.31 QCIF 50.04 15.63 490.2 0.00 34.42 34.35 34.35 0.01 0.01 3.67 0.90 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 9.67 35.02 35.01 35.02 0.05 0.01 4.33 0.82 2 7.60 20 6.81 QCIF 49.59 9.58 498.5 1.67 36.77 36.65 36.65 0.17 0.12 3.93 0.80 2 7.60 20 8.45 QCIF 47.95 9.17 470.0 5.08 34.90 34.83 34.82 0.09 0.35 3.73 0.70 2 6.40 30 6.57 QCIF 51.03 9.05 300.4 0.00 36.04 36.03 36.04 0.03 0.00 2.60 0.63 3 6.40 30 24.60 QCIF 32.33 7.50 325.0 0.03 33.84 33.84 33.84 0.01 0.00 4.07 0.59 3 7.94 10 16.28 QCIF 39.30 6.65 518.6 16.79 36.31 36.31 36.31 0.00 0.00 M64-10-6 3.53 0.99 1 8.00 10 6.31 QCIF 50.04 15.63 490.2 0.00 34.42 34.35 34.35 0.01 0.01 4.40 0.83 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 1.21 35.02 35.02 35.02 0.02 0.00 4.33 0.72 2 7.60 20 6.95 QCIF 49.45 9.55 499.9 0.17 36.77 36.74 36.73 0.07 0.01 3.87 0.74 2 7.60 20 8.67 QCIF 47.73 9.13 472.5 0.28 34.90 34.83 34.82 0.07 0.28 3.87 0.74 2 6.40 30 6.57 QCIF 51.03 9.05 300.4 0.00 36.04 36.04 36.03 0.01 0.00 3.13 0.74 3 6.40 30 24.60 QCIF 32.41 7.50 325.0 0.00 33.88 33.52 33.88 1.64 0.35 3.67 0.90 3 8.12 10 17.28 QCIF 39.50 6.53 530.5 8.42 36.49 36.46 36.48 0.08 0.00 M64-80-6 3.33 0.90 1 8.00 10 6.31 QCIF 50.04 15.63 490.2 0.00 34.42 34.35 34.35 0.02 0.02 3.60 0.99 2 8.00 20 3.20 QCIF 52.80 9.65 384.0 56.13 35.02 35.01 35.01 0.05 0.00 3.67 0.72 2 7.60 20 6.85 QCIF 49.55 9.58 498.9 1.47 36.77 36.37 36.29 0.65 0.02 3.80 0.94 2 7.60 20 8.39 QCIF 48.01 9.17 481.2 5.14 34.90 34.78 34.78 0.18 0.35 3.87 0.99 2 6.40 30 6.57 QCIF 51.03 9.05 300.4 0.00 36.04 36.01 36.03 0.05 0.00 2.53 0.64 3 6.40 30 24.60 QCIF 32.33 7.50 325.0 0.03 33.84 33.84 33.84 0.01 0.00 4.00 0.93 3 7.94 10 16.28 QCIF 39.30 6.65 518.6 16.79 36.31 36.30 36.31 0.02 0.00 Australia F64-10-3 1.21 0.43 2 6.40 30 4.65 CIF 52.38 6.45 389.0•. 0.0 33.49 29.40 29.99 2.00 1.52 1.64 0.63 2 7.60 20 7.01 QCIF 49.39 9.23 251.8 0.09 36.39 32.91 32.88 0.69 1.71 1.50 0.52 2 7.60 20 8.32 QCIF 48.08 9.13 228.8 0.23 35.05 32.31 32.31 1.14 1.89 1.50 0.52 3 7.67 10 30.39 QCIF 24.29 6.18 503.0 11.32 34.15 31.95 31.98 0.65 5.35 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 35 3G TR 26.912 version 3.0.0 Release 1999 subjective test results experimenter's choice statistical data at encoder/multiplexer statistical data at decoder/de-multiplexer Channel type MUX audio bitrate audio frame length MUX overhead picture spatial resolution video bitrate coding frame rate video initial delay out of delay constraints PSNRfree PSNRtotal PSNRk* Sigma average drop frame rate Video Sequence LinkRate- IL-BER MOS •os H.223 Level [kbps] [ms] [kbps] QCIF or CIF [kbps] [frames/s] [ms] [%] [dB] [dB] [dB] [dB] [%] 1.93 0.62 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 33.12 33.02 1.06 0.01 M64-10-3 1.21 0.43 2 6.40 30 4.72 CIF 52.40 6.43 388.9 0.0 33.48 27.75 27.95 1.49 3.76 1.57 0.85 2 7.60 20 6.78 QCIF 49.62 9.29 250.5 0.13 36.39 31.30 31.25 0.68 2.90 1.57 0.65 2 7.60 20 8.37 QCIF 48.04 9.13 225.5 0.24 35.05 30.52 30.58 1.34 4.51 1.21 0.43 3 7.67 10 30.39 QCIF 24.29 6.18 503.0 11.32 34.15 31.72 31.71 0.63 5.60 1.57 0.65 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 32.25 32.29 1.03 0.15 F64-20-4 2.07 0.62 2 6.40 30 4.68 CIF 52.39 6.53 389.0 0.00 33.59 33.11 33.12 0.40 0.15 2.43 0.65 2 7.60 20 6.89 QCIF 49.51 9.26 251.1 0.07 36.39 35.37 35.39 0.33 0.30 2.43 0.65 2 7.60 20 8.17 QCIF 48.23 9.15 228.0 0.33 35.05 34.35 34.56 1.01 0.60 2.50 0.52 2 8.00 10 8.00 QCIF 48.29 9.80 441.8 1.36 36.88 34.09 34.14 1.92 0.40 2.07 0.62 3 8.09 10 32.42 QCIF 24.24 6.37 501.7 10.21 34.10 34.03 34.03 1.08 4.87 2.64 0.63 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 34.63 34.64 0.10 0.01 M64-20-4 1.79 0.58 2 6.40 30 4.71 CIF 52.36 6.45 389.2 0.00 33.58 32.53 32.54 0.76 0.34 2.79 0.58 2 7.60 20 6.72 QCIF 49.68 9.30 250.3 0.10 36.39 35.16 35.14 0.32 0.57 2.43 0.51 2 7.60 20 8.42 QCIF 47.98 9.13 229.2 0.18 35.05 34.38 34.38 0.41 0.79 2.07 0.73 2 8.00 10 8.00 QCIF 48.29 9.80 441.8 1.36 36.88 32.06 32.09 1.89 0.77 1.93 0.73 3 8.09 10 32.42 QCIF 24.24 6.37 501.7 10.21 34.10 33.91 33.91 1.35 6.24 2.14 0.86 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 34.52 34.51 0.14 0.05 F64-10-6 3.43 0.51 1 8.00 10 6.00 QCIF 50.37 9.98 524.4 0.17 37.93 37.75 37.84 0.78 0.01 3.29 0.61 2 7.60 20 6.86 QCIF 49.54 9.27 250.9 0.11 36.39 36.22 36.23 0.23 0.18 3.21 0.58 2 7.60 20 8.44 QCIF 47.96 9.12 234.5 0.18 35.05 35.05 35.06 0.09 0.26 2.43 0.51 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 34.73 34.73 0.00 0.00 F64-80-6 3.36 0.63 1 8.00 10 6.00 QCIF 48.52 9.82 544.5 5.94 37.79 37.74 37.79 0.16 0.00 3.00 0.68 2 7.60 20 6.87 QCIF 49.54 9.26 251.0 1.72 36.39 36.17 36.19 0.24 0.05 2.93 0.62 2 7.60 20 8.10 QCIF 48.30 9.17 235.7 4.46 35.05 35.05 35.05 0.08 0.46 2.43 0.51 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 34.73 34.73 0.00 0.00 M64-10-6 3.21 0.70 1 8.00 10 6.00 QCIF 50.37 9.98 524.4 0.17 37.93 37.73 37.76 0.78 0.01 3.21 0.70 2 7.60 20 6.75 QCIF 49.65 9.29 250.4 0.10 36.39 36.29 36.29 0.13 0.01 2.79 0.58 2 7.60 20 8.29 QCIF 48.11 9.12 232.2 0.36 35.05 35.03 35.05 0.09 0.60 2.57 0.65 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 34.73 34.73 0.00 0.00 M64-80-6 3.29 0.99 1 8.00 10 6.00 QCIF 48.52 9.82 544.5 5.94 37.79 37.54 37.51 0.56 0.03 3.50 0.52 2 7.60 20 6.66 QCIF 49.75 9.31 249.9 2.99 36.39 36.17 36-23 0.37 0.10 3.07 0.83 2 7.60 20 8.46 QCIF 47.94 9.12 232.9 4.86 35.05 35.02 35.01 0.09 0.32 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 36 3G TR 26.912 version 3.0.0 Release 1999 subjective test results experimenter's choice statistical data at encoder/multiplexer statistical data at decoder/de-multiplexer Channel type MUX audio bitrate audio frame length MUX overhead picture spatial resolution video bitrate coding frame rate video initial delay out of delay constraints PSNRfree PSNRtotal PSNRk* Sigma average drop frame rate Video Sequence LinkRate- IL-BER MOS •os H.223 Level [kbps] [ms] [kbps] QCIF or CIF [kbps] [frames/s] [ms] [%] [dB] [dB] [dB] [dB] [%] 2.43 0.65 3wRS 8.00 20 13.80 QCIF 42.01 9.92 237.3 0.00 34.73 34.73 34.73 0.00 0.00 F128-10- 2.36 0.50 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 1.57 34.65 31.72 31.42 2.25 0.00 1.50 0.52 2 6.40 30 11.17 CIF 110.51 9.62 184.4 0.00 35.30 30.19 30.23 1.55 0.98 2.14 0.53 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 0.00 34.39 32.95 33.08 0.49 0.13 M128-10- 1.57 0.51 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 2.02 34.65 30.06 29.82 1.62 0.00 1.21 0.43 2 6.40 30 7.85 CIF 111.97 9.63 182.0 0.00 35.39 28.71 29.11 1.67 1.44 1.64 0.50 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 0.00 34.39 31.38 31.31 1.10 0.21 F128-20- 3.07 0.83 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 2.02 34.65 33.89 33.47 0.73 0.00 2.57 0.51 2 6.40 30 7.86 CIF 112.03 9.73 181.9 0.00 35.48 34.52 34.54 0.39 0.11 2.36 0.84 2 8.00 10 8.00 CIF 112.70 9.72 495.3 2.06 36.27 30.27 30.25 1.77 0.79 3.36 0.84 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 0.00 34.39 34.22 34.22 0.18 0.08 M128-20- 2.79 0.70 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 6.74 34.65 33.43 33.16 0.68 0.00 2.50 0.76 2 6.40 30 7.92 CIF 112.00 9.68 181.9 0.00 35.43 33.66 33.91 0.49 0.21 1.36 0.50 2 8.00 10 8.00 CIF 112.70 9.72 495.3 2.06 36.27 28.23 28.23 2.02 1.68 3.36 0.74 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 0.00 34.39 34.01 34.01 0.23 0.12 F128-10- 4.07 0.62 1 8.00 10 6.00 CIF 114.67 9.62 486.7 2.08 36.77 36.55 36.71 0.68 0.01 3.86 0.77 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 1.57 34.65 34.64 34.63 0.05 0.00 3.50 0.65 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 0.00 34.39 34.38 34.39 0.03 0.00 F128-80- 4.00 0.78 1 8.00 10 6.00 CIF 108.33 9.63 515.3 7.61 36.56 36.03 35.93 1.37 0.04 3.86 0.95 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 29.44 34.65 34.62 34.59 0.10 0.00 3.29 0.73 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 2.68 34.39 34.39 34.39 0.00 0.00 M128-10- 3.93 1.00 1 8.00 10 6.00 CIF 114.67 9.62 486.7 2.08 36.77 36.52 36.71 0.70 0.01 3.86 0.53 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 2.02 34.65 34.64 34.63 0.05 0.00 3.29 0 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 0.00 34.39 34.38 34.39 0.03 0.00 M128-80- 4.57 0.65 1 8.00 10 6.00 CIF 108.33 9.63 515.3 7.61 36.56 35.04 34.98 2.48 0.09 3.64 0.50 2 8.00 20 5.60 CIF 114.4000 7.42 394.0 91.69 34.65 34.61 34.61 0.10 0.00 3.57 0.65 3wRS 8.00 20 26.36 CIF 93.01 9.33 287.7 2.68 34.39 34.39 34.39 0.00 0.00 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 37 3G TR 26.912 version 3.0.0 Release 1999 Annex C: Change history Change history TSG SA# Version CR Tdoc SA New Version Subject/Comment SA07 3.0.0 - SP-000019 3.0.0 Approved at TSG SA #7 and placed under Change Control 38 ETSI ETSI TR 126 912 V3.0.0 (2000-03) 3G TR 26.912 version 3.0.0 Release 1999 History Document history V3.0.0 March 2000 Publication
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
1 Scope
|
........................................................................................................................................................5
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
2 References
|
................................................................................................................................................5
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
3 Definitions, symbols and abbreviations
|
...................................................................................................5
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
3.1 Definitions
|
......................................................................................................................................................... 5
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
3.2 Symbols
|
............................................................................................................................................................. 6
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
3.3 Abbreviations
|
..................................................................................................................................................... 6
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4 Iu requirements
|
........................................................................................................................................6
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4.1 General Requirements
|
........................................................................................................................................ 6
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4.2 UMTS Terrestrial Radio Access Network (UTRAN)
|
........................................................................................ 7 4.2.1 SRNS-Relocation....................................................................................................................................................... 8 4.2.2 Position for header compression................................................................................................................................ 8
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4.3 UMTS Satellite Radio Access Network (USRAN)
|
........................................................................................... 8
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4.4 Broadband Radio Access Network (BRAN)
|
..................................................................................................... 9
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
5 Access stratum vs. Non-access stratum
|
...................................................................................................9
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
6 Working Assumptions
|
.............................................................................................................................9
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
6.1 General
|
............................................................................................................................................................... 9
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
6.2 Interface and protocols over Iu for UTRAN purposes
|
....................................................................................... 9 History..............................................................................................................................................................10 ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 4 3G TR 23.930 version 3.0.0 Foreword This Technical Report has been produced by the 3GPP. The contents of the present document are subject to continuing work within the TSG and may change following formal TSG approval. Should the TSG modify the contents of this TR, it will be re-released by the TSG with an identifying change of release date and an increase in version number as follows: Version 3.y.z where: x the first digit: 1) presented to TSG for information; 1) presented to TSG for approval; 1) Indicates TSG approved document under change control. y the second digit is incremented for all changes of substance, i.e. technical enhancements, corrections, updates, etc. z the third digit is incremented when editorial only changes have been incorporated in the specification; Introduction The Iu reference point of UMTS is defined to be at the boundary of the URAN and the IWU [1]. In case the IWU is null, the Iu is between URAN and CN. The purpose of this document is to analyze the basic issues related to the Iu before starting the actual standardisation of the related interface(s). ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 5 3G TR 23.930 version 3.0.0 1 Scope This report identifies the requirements on the Iu and studies relevant principles to guide further standardisation of the related interface(s). The different instances of the UMTS radio access currently identified are the following: UMTS radio access network (URAN) UMTS Terrestrial Radio Access Network (UTRAN) Broadband Radio Access Network (BRAN) UMTS satellite radio access network 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. 1) References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same number. [1] UMTS 23.101: “Universal Mobile Telecommunications System (UMTS): General Architecture”. [2] UMTS 23.110: “UMTS Access Stratum, Services and Functions” 3 Definitions, symbols and abbreviations 3.1 Definitions Iu Interconnection point between the RNS and Core Network. It is also considered as a reference point. The Iu will be implemented as one or more physical interfaces. Iu-CS The physical instance of Iu towards the CS-Service Domain of the core network. Iu-PS The physical instance of Iu towards the PS-Service Domain of the core network. ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 6 3G TR 23.930 version 3.0.0 RAN CS-Service Domain PS-Service Domain Iu-CS" hysical instance of Iu owards the CS- ervice domain "Iu-PS" Physical instance of Iu towards the PS-Service domain u Reference Point Core Network Figure 1 – Iu Reference point, and the Iu-CS and Iu-PS physical instances 3.2 Symbols For the purposes of the present document, the following symbols apply: TBD 3.3 Abbreviations For the purposes of this document, the following abbreviations apply: TBD 4 Iu requirements 4.1 General Requirements 1) The Iu shall support all service capabilities offered to UMTS users Iu shall particularly cater for a variety of services e.g. classical telephony, internet-based services (www, e-mail etc.), and multimedia services. This implies that Iu supports efficiently: • dedicated circuits, especially for voice • best-effort packet services (e.g. Internet/IP) • real-time multimedia services requiring a higher degree of QoS. These real time services may be based on real-time packet data or circuit-switched data. • UMTS signalling and backward compatibility towards GSM signalling scheme. 2) The Iu shall support separate evolution of O&M facilities 3) The Iu shall support separation of each User Equipment (UE) on the protocol level for mobile specific signalling management. 4) The Iu shall support transfer of transparent non-access signalling between UE and CN. 5) The Iu shall support procedures to establish, maintain and release various types of Iu bearers. 6) The Iu shall support procedures for Intersystem handover, and the CN shall support corresponding switching ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 7 3G TR 23.930 version 3.0.0 capability. 7) The Iu shall support mechanisms for resource reservation for packet data streams (e.g. IP) 8) The specifications, for the Control and User planes, of the IU shall be such that the Radio Network Layer and the Transport Layer are independent, allowing either layer to change without impacting the other layer. 9) The Transport Layer Protocols and the Radio Network Layer Protocols, for the Control and User planes, of the IU shall be specified in separate documents, allowing for either document to change without impacting the other document. 4.2 UMTS Terrestrial Radio Access Network (UTRAN) 1) (Not used) 2) The design of Iu shall support connection of UTRAN via IWF to A and Gb interfaces of GSM. 3) The Iu shall support connection of various manufacturers’ URANs to various manufacturers’ IWF/CN 4) The Iu shall support separate evolution of URAN and IWF/CN 5) “The specification of the Iu shall cater for both the circuit switched (GSM) and packet (GPRS) domains. In order to enable each domain to develop according to their specific characteristics, Iu shall allow different protocol stacks towards the PSTN/ISDN domain and the IP domain. 6) The Iu shall support the combined process of relocating the SRNS role to another RNS and changing the Iu connection point for a specific UE (streamlining) and the CN shall support switching capability. 7) As long as the Iu connection point is not modified, the UTRAN can be requested by the CN to prevent all loss of data (i.e. independently of the handovers on the radio interface). 8) In case the Iu connection point is changed (e.g. SRNS relocation, streamlining), the CN is not supposed to buffer packets in view of ensuring a high data reliability. Hence, at SRNC relocation, for high reliability Radio Access Bearers, the old SRNC has to send downstream packets not yet acknowledged by UE to the new SRNC. Furthermore, no flow control between CN and UTRAN needs to be defined in order to control the IP domain user plane downstream flow. 9) A single set of radio access bearer services shall be offered by the UTRAN to the Core Network. 10) There shall be a single functional split between the UTRAN and the Core Network. 11) A single Access Stratum signalling protocol between the UTRAN and the Core Network over Iu shall be defined to access the services provided by UTRAN. Note: The statements 9, 10 and 11 apply regardless of the scenario applied for the Core Network. 12) If the GSM/UMTS Core Network consists of different core network node types, UTRAN shall support simultaneous access to these node types for one UE. 13) The Iu shall support general procedures that are not related to a specific UE. Such procedures may be used e.g. in failure situations, for flow control in procedure level, or in the initialisation phase (this does not refer to O&M procedures). 14) (Not used) 15) The Iu shall support a set of general UTRAN procedures from the Core Network such as paging –notification 16) (Not used) 17) The Iu shall support procedures to establish, maintain and release various types of UTRAN Radio Access Bearers. 18) The Iu shall enable the CN node to request UTRAN to obtain and send the location information for a specific UE located in the coverage of the present UTRAN. The location information consists of both a geographic area identity and a set of global co-ordinates with uncertainty parameters 19) AAL2 is used as the data transport bearer for the user plane towards the PSTN/ISDN domain. ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 8 3G TR 23.930 version 3.0.0 20) The AAL Type signalling protocol 2 (q.aal2) Capability Set 1 (CS1) developed by ITU SG11 is used to establish the AAL2 connections towards the PSTN/ISDN domain 21) To ensure the necessary load sharing on the Iu_PS interface, • When the CN requests the establishment of a Radio Access Bearer (associated with a PDP context) or at SRNS relocation for all Radio Access Bearers (associated with PDP contexts) of an UE, the CN specifies the IP address of the packet processing function allocated to this / each of these PDP context(s) in the CN. • In the response to the CN request, the RNC specifies the IP address of the packet processing function allocated to this / each of these Radio Access Bearer(s) in the RNC. When it sends downstream traffic in a RAB, the packet processing function in the CN sends the packet to the RNC IP address received from the SRNC at RAB establishment or at SRNS relocation. When it sends upstream traffic in this RAB, the packet processing function in the RNC sends the packet to the CN IP address received from the CN at RAB establishment or at SRNS relocation.
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4.2.1 SRNS-Relocation
|
To carry out SRNS relocation, the source SRNC must launch the SRNS relocation procedure, since it is not the target SRNC but the source SRNC that knows the current services of an user. This is done only when this procedure has the least adverse effect on user traffic, The SRNC relocation procedures shall ensure that there is only one Serving RNC for an user even if this user has services through more than one (IP or ISDN) domain. The SRNS relocation procedure is split in 2 phases. In the first one resources are reserved on the new Iu interfaces and (if needed) inside the CN. Only when this first phase has been successfully carried out for all domains on which the user has currently some services, the source SRNC can launch the second phase i.e. hand-over the role of SRNC to the target SRNC.
|
d07bfdf3244e1962a4c6191f126aee07
|
123 930
|
4.2.2 Position for header compression
|
Header compression function is allocated at RNC because: • differential header compression algorithms work better if they are located in the place where packets are more likely to be discarded (after having discarded packets the compression algorithm can send a packet with full header ). This place is the RNC (where the queues for downstream packets waiting for radio resources are located). • The compression entity is as close as possible to the reliable link (as in 2G) which in this case is the RLC. Therefore it can be stated that a faster recovery of packets is possible after loss of packets in the radio interface and this solution will therefore minimize the amount of buffering in the UE and network. • the compression can be optimized for the used RAN. • It increases the possible data rates that can be achieved: Locating the compression function in the RAN defers the SGSN from the task of opening and processing packets • efficient inter-system hand-over can be supported 4.3 UMTS Satellite Radio Access Network (USRAN) 1) The Iu shall support connection to UMTS Satellite Radio Access Network (USRAN) 2) The Iu shall support low rate source encoded speech; 3) [The Iu shall support radio access and link control protocols that are tolerant to changes in delay at handovers.] 4) (Editorial, Requirement 3 is currently put into brackets since Iu related requirements related to handover scenarios including Satellite based access are for further study) ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 9 3G TR 23.930 version 3.0.0 5) The Iu shall ensure that location information wherever and whenever present, shall support global co- ordinate formats. 6) The Iu shall support connection establishment protocols working over radio resources of different power and penetration levels such as to request the user to move to a more favourable location to complete the establishment of the connection. 7) The Iu shall support low rate data services. 4.4 Broadband Radio Access Network (BRAN) 1) The Iu shall support connection of an EP BRAN HIPERLAN 2 radio access network. 2) The Iu shall support high data rates according to the capability of HIPERLAN2. 3) The Iu shall support UMTS QoS mechanisms also for high data rate services according to the capability of HIPERLAN2. 4) The Iu shall support handover within/between HIPERLAN2 radio access networks. 5) The Iu shall support handover between HIPERLAN 2 and UTRAN. Other systems are ffs. 5 Access stratum vs. Non-access stratum The Access Stratum (AS) offers its services to the Nonaccess Stratum through SAPs in the UE and CN. These services are described in [2]. The Access Stratum contains a set of UE – RAN protocols and a set of RAN – CN protocols ref. [1]. RAN UE CN Access Stratum Non-Access Stratum Radio (Uu) Iu 6 Working Assumptions 6.1 General 1) Source dependent coding (e.g. voice) shall be located in the core network domain, and logically belong outside the Access Stratum. For release 99 the location is expected to be the visited MSC. However the release 99 standard shall facilitate the evolution of the codec into the gateway/interworking MSC; i.e., at the PLMN border. To do this, it is (at least) required that the interface between RNC and the transcoder is fully standardised in release 99. 2) Transport protocol across the Iu interface for UTRAN shall be based on ATM. 6.2 Interface and protocols over Iu for UTRAN purposes 1) The UMTS standard shall allow for both separated and combined MSC/VLR and SGSN configurations ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 10 3G TR 23.930 version 3.0.0 2) The UTRAN shall support two logically separate signalling flows via Iu to combined or separate network nodes of different types (MSC and SGSN) 3) The UE shall be able to handle separated or combined MSCs and SGSNs. 4) There can be several user planes to these CN nodes. 5) Addressing in RANAP should follow the following principles (subject to evaluation of performance impact): 5a) Addressing for signalling messages on the Iu interface (in RANAP) should be independent of underlying layers allowing for independent evolution of the underlying layers. 5b) Addressing for signalling messages on the Iu interface (in RANAP) should use the same addressing scheme for both the PS-domain and the CS-domain History Document History August 1997 Scope agreed November 1997 0.1.0 Version 0.1.0 mailed to SMG3 SA delegates prior to SMG3 SA meeting in Stockholm. November 1997 0.1.1 Version 0.1.1 presented at SMG3 SA in Stockholm August 1998 0.2.0 Version 0.2.0 with the changes agreed in the Sophia Antipolis meeting. September 1998 0.3.0 Version 0.3.0 with the changes agreed in the Rome meeting October 1998 0.4.0 Added req. due to Td 98S853. Added section “Access Stratum vs. Non-Access Stratum due to Td 98S864 December 1998 0.5.0 Restructured to handle different types of the UMTS radio access network December 1998 0.6.0 New USRAN and BRAN sections. New working assumptions. February 1999 1.0.0 Based on decisions in Walnut Creek and Kista meetings March 1999 1.1.0 Section 6.1, Working assumption on Transcoder Location included March 1999 1.2.0 Changes from Nynäshamn (S2-99148) April 1999 1.2.1 Change to 3GPP format June 1999 1.3.0 Changes from Sophia Antipolis (S2-99345, S2-99404) June 1999 1.3.1 Editorial changes in section 4.2 (Editor : Bo Axerud, e- mail:[email protected]) June 1999 2.0.0 Version 1.3.1 has been approved by e-mail and agreed to be updated to version 2.0.0, for submission to TSG SA ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 3GPP 3G TR 23.930 V3.0.0 (1999-07) 11 3G TR 23.930 version 3.0.0 for approval July 1999 3.0.0 Template changed, clauses and sub-clauses numbering corrected, administrative clauses added. ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) ETSI 12 ETSI ETSI TR 123 930 V3.0.0 (2000-01) (3G TR 23.930 version 3.0.0 Release 1999) History Document history V3.0.0 January 2000 Publication
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
1 Scope
|
The present document proposes an extended validation mechanism leveraging on the existing OID4VP protocol. Its primary aim is to support the secure and interoperable validation of electronic attestations by identifying standardization needs in the context of the attestation rulebook and attribute catalogues. Key focus areas include: • introduction of attestation refreshing and attestation encryption mechanisms; • description of embedded disclosure policies and support for pricing policies; • further considerations on the extension of attestation metadata structures to include policy-related parameters.
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
2 References
| |
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
2.1 Normative references
|
Normative references are not applicable in the present document.
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long-term validity. The following referenced documents may be useful in implementing an ETSI deliverable or add to the reader's understanding, but are not required for conformance to the present document. [i.1] BIP-0032. [i.2] ETSI TS 119 312: "Electronic Signatures and Trust Infrastructures (ESI); Cryptographic Suites". [i.3] ETSI TR 119 476 (V1.2.1): "Electronic Signatures and Trust Infrastructures (ESI); Analysis of selective disclosure and zero-knowledge proofs applied to Electronic Attestation of Attributes". [i.4] European Digital Identity Wallet Architecture and Reference Framework v1.8 (ARF). [i.5] IETF draft-demarco-oauth-status-assertions-03: "OAuth Status Assertions". [i.6] IETF draft-ietf-oauth-sd-jwt-vc-09: "SD-JWT-based Verifiable Credentials (SD-JWT VC)". [i.7] IETF RFC 7516: "JSON Web Encryption (JWE)". [i.8] ISO/IEC 18013-5: "Personal identification - ISO-compliant driving licence - Part 5: Mobile driving licence (mDL) application". [i.9] NIST SP 800-56A Rev. 3: "Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography". [i.10] OpenID Foundation: "OpenID for Verifiable Credential Issuance - draft 15", 2024. [i.11] OpenID Foundation: "OpenID for Verifiable Presentations - draft 24", 2025. [i.12] Regulation (EU) 2024/1183 of the European Parliament and of the Council of 11 April 2024 amending Regulation (EU) No 910/2014 as regards establishing the European Digital Identity Framework. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 7 [i.13] SOG-IS Crypto Working Group: "SOG-IS Crypto Evaluation Scheme Agreed Cryptographic Mechanisms". [i.14] W3C® Recommendation 3 March 2022: "Verifiable Credentials Data Model v1.1".
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
3 Definition of terms, symbols and abbreviations
| |
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
3.1 Terms
|
For the purposes of the present document, the terms given in [i.4], [i.12], [i.14] and the following apply: attestation provider: natural or legal person who provides QEAA, PuB-EAA, or (non-qualified) EAA issuance services attribute: feature characteristic or quality of a natural or legal person or of an entity, in electronic form Electronic Attestation of Attributes (EAA): attestation in electronic form that allows attributes to be authenticated Electronic Attestation of Attributes issued by or on behalf of a Public sector body (PuB-EAA): electronic attestation of attributes issued by a public sector body that is responsible for an authentic source or by a public sector body that is designated by the Member State to issue such attestations of attributes on behalf of the public sector bodies responsible for authentic sources EU Digital Identity (EUDI) Wallet: initiative by the European Union aimed at providing citizens and businesses with a secure and convenient way to manage and use their digital identities NOTE: The EU Digital Identity Wallet allows users to store and control their personal data in a digital format, enabling them to prove their identity and other attributes in various online and offline situations. Person Identification Data (PID): set of data that is issued in accordance with Union or national law and that enables the establishment of the identity of a natural or legal person, or of a natural person representing another natural person or a legal person PID provider: natural or legal person responsible for issuing and revoking the person identification data and ensuring that the person identification data of a user is cryptographically bound to a Wallet Unit presentation: data derived from one or more attestations, issued by one or more Attestation Providers, that is shared with a specific verifier Qualified Electronic Attestation of Attributes (QEAA): electronic attestation of attributes which is issued by a qualified trust service provider and meets the requirements laid down in Annex V of European Digital Identity Wallet Architecture and Reference Framework [i.4] Relying Party (RP): natural or legal person that relies upon electronic identification, European Digital Identity Wallets or other electronic identification means, or upon a trust service (Wallet-) Relying Party: Relying Party that intends to rely upon Wallet Units for the provision of public or private services by means of digital interaction selective disclosure: capability enabling the user to present a subset of the attributes included in a PID or attestation unlinkability: lack of information required to connect the user's selectively disclosed attributes beyond what is disclosed NOTE: The unlinkability definition has different shapes, refer to clause 3 of ETSI TR 119 476 [i.3] for further information. user: natural or legal person, or natural person representing another natural person or legal person, that uses trust services or electronic identification means provided in accordance with Regulation (EU) 2024/1183 [i.12] (Wallet) User: user who is in control of the Wallet Unit ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 8 Wallet Solution: combination of software, hardware, services, settings, and configurations, including Wallet Instances, one or more Wallet Secure Cryptographic Applications, and one or more Wallet Secure Cryptographic Devices Wallet Unit: unique configuration of a Wallet Solution that includes Wallet instances, Wallet Secure Cryptographic Applications, and Wallet Secure Cryptographic Devices provided by a Wallet Provider to an individual Wallet User
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
3.2 Symbols
|
Void.
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
3.3 Abbreviations
|
For the purposes of the present document, the following abbreviations apply: ARF Architecture and Reference Framework CRQC Cryptographically Relevant Quantum Computers EAA Electronic Attestation of Attributes ECC Elliptic Curve Cryptography EUDI European Union Digital Identity HD Hierarchical Deterministic JWE JSON Web Encryption KID Key IDentifier OID4VCI OpenID for Verifiable Credential Issuance OID4VP OpenID for Verifiable Presentation PID Personal Identification Data QEAA Qualified Electronic Attestation of Attribute RP(s) Relying Party(-ies) URL Uniform Resource Locator VP Verifiable Presentation
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
4 Extended Validation Service(s)
| |
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
4.1 Overview
|
The present clause presents an extension to the digital attestation validation framework. This advancement enables the development of diverse business models associated with attestations, encompassing issuance, validation, and unrestricted free usage. At present, only issuance and free usage are achievable without the proposed approach. The proposal discussed in the present document does not require changes to the existing attestation issuance process. It is format-agnostic, maintaining compatibility with all the available. The concept involves two steps: 1) Attestation Refreshing: the attestations are refreshed before being presented, to guarantee their validity without the need for the RP to undertake additional controls, except for integrity of the attestations. 2) Cyphered Attestation Presentation: the attestations are encrypted by the User's Wallet using a mechanism described later in the present document, before being shared with a RP. The RP can only access the attestation(s) through direct communication with the User and with the Attestation Provider. This communication occurs without revealing any information about the User and allows the Attestation Provider to count the number of verifications performed by each RP. These two steps are described more thoroughly in the following clauses. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 9
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
4.2 Attestation Refreshing
|
Attestation refreshing consists of periodically refreshing attestation(s) by communicating directly with the Attestation Provider. This could be achieved through two different approaches: • Linked credentials: the Attestation Provider provides the User with a Status Assertion [i.5], which is linked to an attestation. This enables the User to present both the attestation and its Status Assertion to RP as a proof of the attestation's validity status. • Credential reissuance: it is based on multiple access to the RP endpoint, as described in clause 13.5 in OID4VCI [i.10]. It is possible to refresh an issued attestation, the Wallet can retrieve an updated attestation using a valid Access Token or refresh it with a valid Refresh Token, without interaction with the User. If the Wallet lacks both a valid Access and Refresh Token, the Attestation Provider should reissue the attestation by initiating the issuance process from the beginning, which requires interaction with the User. Re-issuance means the replacement of a PID or attestation that already exists in a Wallet Unit by a PID or attestation having the same document type. For formal definitions of re-issuance, refer to ARF Topic B [i.4]. • Batch Issuance: it means that instead of issuing a single PID or attestation to a Wallet User, a PID Provider or Attestation Provider issues a batch of them. If the original PID or attestation was issued in a batch, then the PID Provider or Attestation Provider re-issues that PID or attestation in a batch as well. For formal definitions of batch issuance, refer to ARF Topic B [i.4]. This Attestation Refreshing could be done when the Wallet starts up, or on demand, or just before presenting the attestation. These approaches should apply only to attestations that require refreshing. For example, it would not be useful for static attestations. RP can implement their own policies based on the type of service provided. For instance, they could accept an attestation refreshed within the last N hours or, for more critical services, only accept an attestation refreshed within the last minute. This ensures for a non-complex validation mechanism, since the attestation is refreshed directly by the Attestation Provider, third parties are not required to validate it.
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
4.3 Cyphered Attestation Presentation
|
The attestation, once refreshed, is encrypted by the User's Wallet. The RP should then contact the Attestation Provider to retrieve the decryption key in order to verify the attestation. This adds an additional layer of security by ensuring that the RP cannot access the attestation directly, without interaction with the Wallet User and the Attestation Provider. As previously mentioned, the protocol doesn't imply any change to the current attestation issuance process (described in OID4VCI [i.10]). The Attestation Provider creates and signs the attestation, embedding relevant identity or attribute information for the User (e.g. identity, access rights, etc.). Then the attestation is transmitted to the User's Wallet over a secure channel using TLS, as described in OID4VCI [i.10]. The proposed method involves encrypting the attestation at the time of presentation, leveraging the properties of Elliptic Curve Cryptography (ECC) and, more specifically, the Hierarchical Deterministic (HD) Key Derivation. In particular, the method takes advantage of the properties of Hierarchical Deterministic structures, where each derived private key is generated in such a way that the corresponding public key can be computed without knowing the private key itself. When a Wallet initiates the presentation of an attestation (which could be in various formats, such as SD-JWT VC [i.6] or mdoc [i.8]), the attestation is encrypted according to the JSON Web Encryption (JWE) standard [i.7]. The encryption key for the attestation is generated at the time of the new presentation; it is derived from the Attestation Provider's public key. In order for the RP to decrypt the JWE, the Wallet should also send them additional information along with the JWE. This will be forwarded to the Attestation Provider. Upon receiving the necessary information, the Attestation Provider retrieves the cryptographic material which the RP can use to obtain the attestation. More in detail, the expected flow of messages is listed below, subdivided into two phases: Refreshing and Presentation. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 10 Refreshing: 1) The Wallet sends the Attestation Provider a request to refresh the attestation, as described in the previous clause. 2) The Attestation Provider sends an updated attestation back to the Wallet, notifying the Wallet in case the attestation is not valid anymore. Cyphered Attestation Presentation: 1) The Wallet generates a transaction-specific symmetric encryption key K which it uses to encrypt the attestation A. The result of the encryption process is denoted here as K(A). 2) The Wallet generates the JWE of the attestation as follows: - The JWE contains all the necessary information for decrypting the body of the JWE itself; this includes: X: a concatenation between a timestamp and a random nonce generated by the Wallet; KID: a Key Identifier, needed to identify the correct Attestation Provider and then ask this Attestation Provider to decrypt CP(K) (see below); CP(K), i.e. the key K encrypted using an asymmetric public key CP belonging to the Attestation Provider and derived from a master public key of the same Attestation Provider. - The body of the JWE contains K(A), that is the attestation A encrypted using the symmetric key K (see step 1). 3) The RP receives the JWE and sends CP(K) and X to the Attestation Provider, asking the Attestation Provider to use the derived private key linked to X in order to decrypt CP(K). 4) The Attestation Provider retrieves from X which private key to use in order to decrypt CP(K); after doing so, it obtains K and sends K to the RP. 5) The RP uses K to decrypt K(A), thus retrieving A. Figure 1 below schematizes the above steps 1) - 5) with regards to Cyphered Attestation Presentation. Figure 1: Cyphered Attestation Presentation Scheme
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
5 Central Rulebook for Attributes
| |
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
5.1 Overview
|
The EUDI Wallet ecosystem is governed by a range of policies that address various aspects of user interaction, data security, attestation management and user privacy. These policies are designed to safeguard users' personal information and ensure that the ecosystem functions smoothly across EU boundaries. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 11 The EUDI Wallet is designed to comply with eIDAS 2.0 [i.12], ensuring compliance with strict privacy and security standards. Each interaction of the Wallet undergoes rigorous certification to meet high security requirements. For instance, the user consent policy guarantees that users retain full control over their data. When a RP requests access to specific attributers, the user should explicitly approve or deny the request. Attestation disclosure policies define which types of RP are allowed by Attestation Provider to access specific attributes from attestation. While these existing policies effectively address user rights, consent, and security, there is a noticeable gap in the area of business-related policies, which are crucial for ensuring the long-term sustainability of the ecosystem. To address this gap, the Pricing Policy is introduced in the present document, a guideline that outlines how Service Providers should determine the costs associated with their services or products. The Pricing Policy would complement existing frameworks by providing clarity and fairness in the pricing of Wallet User's attestation-related services or PID-related services, such as the presentation of attestation. Furthermore, to regulate and organize the market for these attestations, the usage of Attestation Rulebooks catalogue [i.4] is leveraged. This catalogue would serve as a standardized reference for the structure and pricing of different attestations, aligning with broader industry practices and helping to prevent fragmentation in implementation. The proposed Attestation Cyphered Presentation protocol does not require changes to the existing attestation issuance processes. It is format-agnostic, maintaining compatibility with all available attestation formats. A key advantage of this protocol is its flexibility in supporting various Pricing Policy options. For instance, it enables the selection between various approaches, like: 1) Free-to use attributes 2) Issuance-based fee 3) Verification-based fee
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
5.2 Attestation metadata extension
|
Attestation Providers could utilize the Attestation Rulebooks catalogue to publish their attributes when necessary. This catalogue mitigates the risks of uncontrolled implementation practices that could degrade system quality, increase complexity and maintenance costs. It facilitates the integration of the encrypted attestations approach with verification fees into the OID4VP [i.11] protocol. This ensures a more organized, cost-effective, and interoperable ecosystem. This catalogue would serve as a comprehensive repository of attestation-related information, including attestation Metadata, which provides essential details for identifying, verifying, and contextualizing attestations, as well as information on any associated policies. Additionally, a new "pricing_policy" parameter could be introduced. An attestation often includes embedded disclosure policy, which consists of a set of rules, embedded in the attestation by its provider, that indicates the conditions that a RP should meet to access the attestation. The pricing policy could originate from the embedded disclosure policy, meaning that the conditions for access to the attestation could include pricing-related criteria. This pricing policy would allow to specify all relevant details regarding the applied policy, including pricing model, price, currency, and URI linking to the Attestation Provider's detailed policy page. The following is an example snippet of attestation Metadata, where the metadata for a specific attestation includes a newly proposed parameter "pricing_policy". ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 12 Figure 2: Attestation Metadata The proposed solution could also allow to apply different price models: 1) Static price, which refers to a pricing strategy where the cost of the service remains unchanged; in practice, a static price is fixed and does not undergo frequent updates. This could be embedded directly into the attribute schema, clearly exposing the unit price per verification. This transparency allows the RP to quickly assess whether they are willing to accept the price or opt not to use the attribute, simplifying decision-making. 2) Dynamic price, which refers to a pricing strategy where the cost of the service fluctuates based on various factors. This approach allows businesses to maximize revenue by adjusting prices in real-time or at regular intervals. The affected stakeholders should check a specific URL, periodically updated, where prices are listed. This also allows Attestation Providers to better manage the attributes offering on a daily-basis and/or based on different agreements with several RPs. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 13 The OID4VP protocol can be extended to enable interaction with the central registry in the following manner: Figure 3: OID4VP extension for payment scenario 1) Discovery Phase: Before a Relying Party (RP) requests a Verifiable Presentation (VP), it queries the central registry to understand the available attributes, Attestation Providers, and associated costs. The RP includes the selected attributes in the request, specifying the willingness to pay associated verification fees. 2) Attestations Exchange as extension of OID4VP: Using the Encrypted attestations exchange described in clause 4.3 of the present document. 3) Verification Cost Exchange: During the Attestation Provider-RP interaction for decryption and verification, the Attestation Provider verifies whether the payment conditions (if any) are met. A secure payment protocol (e.g. token-based) could be used to process the fee.
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
6 Security Considerations
|
1) An overarching issue when dealing with the security of cryptographic systems in use today is the advent of quantum computers, more precisely Cryptographically Relevant Quantum Computers (CRQCs). This kind of computers could break the entire stack on which security is based today, by easily solving the mathematical problems that underpin classical cryptography. This applies both to the well-established RSA scheme and to the Elliptic Curve Cryptography, due to the presence of Shor's Algorithm. Currently this applies to all of the infrastructures providing trust, such as PKIs, and is a general threat that can be faced only through the replacement of the obsolete algorithms used today with quantum-safe ones, such as those approved by NIST in recent times. One well-known attack strategy is the "harvest now, decrypt later", which involves acquiring and stage currently encrypted data within the intention of decrypting it later, once advancements in decryption technology, like the quantum computing, make it accessible. This problem concerns all types of current cryptographic schemes, including the JWE with the cyphered attestation, highlighting the need for a transition to quantum-resistant cryptographic solutions to mitigate these threats. 2) Regardless of considerations about the future advent of quantum computers, a practical security consideration is that only approved curves and parameters should be used, such as those contained in NIST SP 800-56A Rev. 3 [i.9] or other recognized suits are described in ETSI TS 119 312 V1.5.1 [i.2] or in SOG-IS [i.13]. 3) The general security of the described mechanism is guaranteed, without taking into account the potential advent CRQCs, by the Discrete Logarithm Problem over Elliptic Curves and by the non-reversibility of the used hash functions. 4) An issue could be the fact that the mechanism of HD keys is not formally standardized (by a formal SDO) but is described in clause 4.4.4.2 of ETSI TR 119 476 [i.3]. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 14 5) The mechanism described does not suffer from the well-known weakness of leakage of the private key of the Attestation Provider, as described in BIP 32 [i.1], because this key is never exposed to the public.
|
80fdf3a3ce1a5e984582bc005dba2f5f
|
119 479-2
|
7 Privacy Considerations
|
The mechanism set up so far brings about some considerations regarding privacy, described below: 1) With regard to clause 4.3 about Cyphered Attestation Presentation, it should be highlighted that the Attestation Provider and the RP could collude in order to decrypt the JWE: this is due to the possibility to share the entire JWE with the Attestation Provider. 2) In principle, the Attestation Provider could generate a new private-public key couple for each request of a new attestation. This fact would allow a tracking of the Wallet User's activity by the Attestation Provider, resulting in a concern for the privacy. Therefore, it would be advisable to control the number of public keys available for the Attestation Provider: if the number of public keys increases over time, this could be an indicator of potentially malicious Attestation Provider's behaviour. 3) The entire mechanism allows for the Users' privacy because: - The cryptographic material (e.g. the public key CP in clause 4.3) is not directly generated by the Attestation Provider. It is, instead, derived by the Wallet starting from one of the Attestation Provider's public keys in such a way that the Attestation Provider is not aware of this generation; moreover, several "child" public keys can be generated starting from the same "parent" public key belonging to the Attestation Provider. - The Attestation Provider never gets the attestation in plain, unless the RP explicitly shares it with the Attestation Provider, without the User's consent. 4) In the worst-case scenario where the Attestation Provider has issued only one attestation, it would be possible to link the attestation to the Wallet User. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 15 Annex A: Hierarchical Deterministic (HD) Key Derivation The present clause describes the details of the key derivation already mentioned in clause 4.3 using the well-known "Alice and Bob" scenario, described in clause 4.4.4.2 of ETSI TR 119 476 [i.3]. At first, each of Alice and Bob choose their private-public key pair. They agree on an elliptic curve of order n over a finite field and with generator G = (Gx, Gy). Alice has her master private key MS (which is a scalar value) and the corresponding master public key is MP (which is a point on the elliptic curve). The equation that links MS and MP is the following: MP = MS ∙G where retrieving MS only from MP is deemed to be computationally hard due to the discrete logarithm problem over elliptic curves. Bob wants to derive "child" public keys CP1, CP2, … from MP, without having access to MS and in such a way that Alice can derive the same keys starting from the corresponding "child" private keys CS1, CS2, …, each of them derived from MS. The starting point is the idea, outlined in BIP 32 [i.1], according to which these keys are grouped into a hierarchical structure, for instance a tree, originating from one master key. This applies to private keys and to their public counterparts as well. More precisely, the mechanism goes as follows: • The master private key MS is generated in a random way starting from a seed. • The master public key MP is obtained as mentioned before. • Child public key CP1 is obtained from MP in the following way: CP = MP + HMAC MP, X ∗G where HMAC is a function that performs hashing through SHA512 algorithm, and successive children CP2, CP3, … are derived with the same mechanism but with different values of X, which is a combination of a random nonce produced by Bob and a timestamp; • Child private key CS1 is derived from MS using a similar mechanism: CS = MS + HMAC MP, X mod n where the only differences with the previous formula are the presence of MS instead of MP and the presence of the modulo operator. The described mechanism works because CP1 corresponds to CS1; in fact: CP = MP + HMAC MP, X ∗G = MS ∗G + HMAC MP, X ∗G = MS + HMAC MP, X ∗G = CS ∗G where: • the second equation derives from the definition of MP; • the operations in the third equation are performed mod n. The result shows that the public key CP1 is indeed corresponding to the private key CS1. Finally, in order to transpose the described mechanism into the EUDI Wallet ecosystem, it is necessary to recognize that Alice is the Attestation Provider, while Bob is the Wallet User; the RP is a generic third party interested in obtaining Bob's attestations. ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 16 The following diagram (Figure A.1) describes the aforementioned entire flow in the EUDI Wallet scenario. Figure A.1: Attestation Cyphered sequence diagram ETSI ETSI TR 119 479-2 V1.1.1 (2025-07) 17 History Document history V1.1.1 July 2025 Publication
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
1 Scope
|
A considerable amount of work has been conducted, mainly in the UK, to investigate the effect of wanted radio frequency transmissions from GSM MS and BTS on other equipment. The present document aims to summarize this work and to look at the implications for GSM. Since GSM EMC considerations extend outside the GSM arena, it is thought essential that GSM considers the implications of EMC and produces the present document.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
1.1 Void
| |
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
1.2 References
|
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication and/or edition number or version number) or non-specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. • For this Release 1997 document, references to GSM documents are for Release 1997 versions (version 6.x.y). [1] Council Directive 89/336/EEC of 3 May 1989 on the approximation of the laws of the Member States relating to electromagnetic compatibility. [2] EN 50082-1 (1992): "Electromagnetic compatibility - Generic immunity standard. Part 1: Residential, commercial and light industry". [3] IEC 801-3, (1984): "Immunity to radiated, radio frequency, electromagnetic fields". [4] GSM 01.04 (ETR 350): "Digital cellular telecommunications system (Phase 2+); Abbreviations and acronyms". [5] DTI/RA: "A summarized report on measurement techniques used to investigate potential interference from new digital systems". [6] INIRC (1988): "Guidelines on limits of exposure to radiofrequency electromagnetic fields in the frequency range 100 kHz to 300 GHz". [7] NRPB (1989): "Guidance as to restrictions on exposures to time varying electromagnetic fields and the 1988 recommendations of the International Non-Ionizing Radiation Committee". [8] IEEE C95.1 (1991): "IEEE standard for safety levels with respect to human exposure to radio frequency electromagnetic fields, 4 kHz to 300 GHz". [9] Draft DIN VDE 0848 Part 2 (1991): "Safety in electromagnetic fields; protection of persons in the frequency range from 30 kHz to 300 GHz". [10] CENELEC European prestandard ENV50166-2 (January 1995): "Human exposure to electromagnetic fields ,High Frequency (10 kHz to 300 GHz)".
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
2 Information available
|
A number of European organizations have conducted extensive investigations into GSM EMC. These investigations looked at the potential of a GSM transmission to interfere with a wide range of electrical apparatus. Having conducted both objective and subjective investigations, it was discovered that personal audio equipment (e.g. Walkmans) and hearing aids were most susceptible and most likely to be in close proximity to GSM apparatus. ETSI ETSI TR 101 640 V6.0.1 (2001-11) 6 (GSM 05.90 version 6.0.1 Release 1997) Of these two types of apparatus, hearing aids were considered the greatest potential problem and thus a considerable amount of modelling work was conducted in order to assess the likely incidence of interference in various scenarios. Interference with pace-makers was considered of utmost seriousness and consequently tests were made to investigate the possibility of interfering with certain types.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
3 Cause of potential EMC interference
|
The source of GSM interference is the 100 % amplitude modulated RF envelope introduced by burst transmission necessary for Time Division multiple Access (TDMA). Audio apparatus having some non-linear component able to demodulate this Amplitude Modulation (AM) envelope will be subject to interference in the audio pass-band since the frame and burst rates for GSM are 220 Hz and 1,7 kHz. Another source of interference is the DTX (Discontinuous Transmission) mode of operation in GSM. In the DTX mode there are two signal components with much lower frequencies than the normal GSM transmission: a component with a frequency of 2,1 Hz corresponding to the transmission of the 8 timeslots of the SID (Signal Descriptor) message block, and another with a frequency of 8,3 Hz corresponding to the repetition rate of SACCH.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
4 Laboratory results
| |
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
4.1 Hearing aids
|
Objective laboratory results from the United Kingdom, Department of Trade and Industry, Radiocommunications Agency (DTI/RA) [5] showed that a typical "behind the ear" hearing aid in normal (amplifying) mode was susceptible to peak GSM field intensities of: - between 10 V/m and 17 V/m in order to produce the same audio power as speech, 0,5 m in front of the hearing aid; and - between 5 V/m and 8,5 V/m to produce "audible, slightly annoying" interference. It was noted that the group of hearing aids tested showed a 4 dB spread in susceptibility in the normal mode and a 13 dB spread in susceptibility in the inductive loop mode. Subjective investigation conducted at BTRL with the hearing aid worn by the user showed that "audible, slightly annoying" interference was perceived when subject to a peak field intensity varying between 10 V/m and 4 V/m depending upon the orientation of the head. This was modelled by a peak field intensity of 10 V/m for a 270° arc and 4 V/m for the 90° arc not shielded by the head inferring an 8 dB attenuation provided by the head. This directional susceptibility corresponds to an average of 6,6 V/m and thus agrees with the DTI/RA objective results. These results were subsequently used for modelling activities to assess the consequences of this susceptibility in various scenarios. It should be noted that the susceptibility without head attenuation used in the model (4 V/m) is somewhat worse than the DTI measurements (5 V/m - 8,5 V/m) and thus the modelling results will be very much worst case. It was found that metallising the hearing aid case reduced the susceptibility with no head attenuation from 4 V/m to 12 V/m (10 dB). Laboratory measurements have been carried out also in Australia by Telecom Research Laboratories and National Acoustic Laboratories (annex F). In these measurements the field strength level causing useful "annoyance" threshold level of 10 dB above the noise floor of the hearing aids was measured and then compared to measured field strength of 2 W and 8 W GSM MS to determine the distances where the threshold levels can be expected. Both behind-the-ear and in-the-ear type hearing aids were measured, the former ones both with microphone input and telecoil input. The results are shown below. ETSI ETSI TR 101 640 V6.0.1 (2001-11) 7 (GSM 05.90 version 6.0.1 Release 1997) Table 1: Field strength and safety distances for noticeable interference Hearing aid type Field strength for noticeable interference Distance for noticeable interference 2 W MS 8 W MS Behind the ear, microphone input 0,7 - 3,1 V/m 2,0 - 10 m 3,5 - 20 m Behind the ear, telecoil input 0,4 - 4,9 V/m 1,5 - 20 m 2,5 - 40 m In the ear 4,9 - 32,3 V/m 0,2 - 0,6 m 0,4 - 1.5 m NOTE: The distances in table 1 can not be compared directly with those in table 2 because table 1 distances are approximate real-life distances whereas table 2 is based on theory. In Denmark a study initiated by the Danish ministry of communications has been carried out recently. The results of the study are in a report "Interference to hearing aids caused by GSM mobile telephones". Following are the main conclusions of the report: - so far there have not been many actual examples of interference but it must be foreseen that in 3 - 4 years there will be frequent reports of interference to hearing aids occasioned by GSM mobiles; - it is anticipated that existing hearing aids will be replaced by new models with generally greater immunity to GSM signals; in any event, in 5 - 7 years the risk of interference should have diminished significantly; - solutions to decrease the amount of interference based on GSM system will either have a highly limited effect (transmitter power regulation) or will be financially unfeasible (cell size optimization); - solutions based on design changes to hearing aids will generally be possible and must offer immunity against signal strengths of up to 10 V/m; some hearing aids used today already satisfy requirements and future models will be able to be so constructed as to meet them too; designing a new hearing aid with the requisite level of immunity would increase prices approx. DKK 100 per unit, which is a 4 - 7 % increase to a current price of a hearing aid.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
4.2 Cardiac pace-makers
|
Work was carried out by CSELT Italy to investigate the effects of GSM type burst structure on cardiac pace-makers (annex D). Unipolar and bipolar types from one manufacturer were tested. The results show that, although it was possible to interfere with pace-maker operation in free space, it was not possible, with the equipment power used, to interfere with operation when the pace-maker, leads and electrodes were placed in a phantom simulating realistic use in the human body. The equivalent maximum field strength used for this test would not normally be exceeded at further than 0,5 m away from any allowed GSM transmitter except the maximum power base station. For information the field strength required to defeat the pace-maker in free space was in excess of 40 V/m for the most sensitive class of pace-maker. As there does not appear to be a problem with defeating of pace-maker operation by a normal GSM signal, the remainder of the work done by GSM, and thus the remainder of the present document, is restricted to scenarios for audible interference with hearing aids.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
4.3 Domestic equipment
|
Tests carried out by various laboratories and collected together by the Radio Technology Laboratory (RTL) of the Radiocommunications Agency (annex E) show that for a limited number of devices under test the cassette decks, television receivers and portable radios/cassette players etc. are the most susceptible domestic equipment with the mean field intensities causing "visible/audible, but not annoying" interference being 2,9 V/m, 4,0 V/m and 5.6 V/m, respectively. For example for 8 W MS the field strength of 4 V/m will be found at distances less than 5 m (worst case assuming 100 % efficiency and free space path loss) as can be seen in table 1. This means that in practice, due to building attenuation etc., interference will not occur unless the transmitter and the victim equipment are in the same room. This is likely to occur if the GSM terminal is transportable (8 W output power for instance). ETSI ETSI TR 101 640 V6.0.1 (2001-11) 8 (GSM 05.90 version 6.0.1 Release 1997) Studies on the GSM interference to the fixed network telephone equipment have been carried out in France, Norway, U.K. and Italy (annex G). All the studies highlight the fact that due to the lack of an international immunity standard to the fixed network telephone equipment the interference problem varies from country to country depending on the national immunity standards. The study carried out in France summarizes that no telephone analogue equipment or audio terminal can comply with a 10 V/m GSM type field strength, and half of the telephone sets tested did comply with the 3 V/m immunity level, both results derived with a selected performance criteria of -50 dBmop/600 Ω in transmit direction and 50 dBA on receive direction. Regarding the maximum distances for potential interference the study gives the distances of 10 metres for 8 W GSM terminal and 5 metres for 2 W GSM terminal. The U.K. study tests the fixed network telephones and PBX equipment at 3 V/m and 10 V/m field strengths and concludes that in the U.K. the vast majority of telephones and telephone equipment is not susceptible at even 10 V/m. Hence, due to the immunity standard for fixed telephones the interference from GSM terminals is not considered as a major problem in U.K. In the Norwegian study it is summarized that with a 40 dB S/N ratio as a quality limit and with 10 W GSM transmitter 10 m away from a telephone, half of the telephones tested pass the test. Also, the study highlights the very large difference in the immunities of the fixed telephones, the immunities calculated in field strength being from 12,3 V/m to 0,6 V/m, with the same quality limit of 40 dB S/N ratio. The Italian study uses the same pass criteria as the French one and concludes that out of the tested fixed telephones, only an RF-shielded model and another with a very compact structure resulted complying with immunity requirements up to 6 V/m GSM field strength (that is 0,8 W GSM emission at 1 m distance), while some models did not even comply with 3 V/m (i.e. 0,8 W GSM emission at 2 m distance).
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
5 Modelling results
|
A wide range of scenarios were modelled (annexes A and B) to include the possible interference to hearing aid users from base stations, mobiles and handportables. Not surprisingly, by far the highest incidence of interference was caused in crowded urban environments where hearing aids and handportable transceivers are likely to be in closest proximity. It was found that a hearing aid user would experience 3 s of interference every 8 minutes whilst walking on a London street and would be subject to a 2,4 % probability of interference whilst travelling on a commuter train for a GSM system occupying 2 x 25 MHz. Further results showed that with 1 % of the train passengers using GSM transmitters (0,1 % previously) and an average susceptibility of 4 V/m, the probability of interference was 5 %. These modelling results were based on a small sample of hearing aids with immunities in the region of 3 V/m. More recent measurements have shown that some hearing aids, in particular the in-the-ear aids, have immunities up to 30 V/m (see annex F). This would reduce these probabilities by a factor of 100. It should be noted that the modelling work is based on free space path loses. The effect of, for example, people in a crowded train has not been measured, but in general it is expected that the presence of people or objects between the MS and the hearing aid will be to reduce the interference in most cases. It should be noted that all the scenarios examined assumed the hearing aid was active all the time. Clearly, there will be instances where the user will switch off the aid when not required to communicate. A further modelling exercise indicated that it was unlikely that a hearing aid user will be able to use GSM handportable terminals due to the interference effects.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
6 Solutions
|
The generic immunity standard, EN 50082-1, produced by CENELEC, calls for immunity to RF electromagnetic fields of 3 V/m. This work has shown that current hearing aids have immunities close to this proposed level and that a handportable GSM transmitter is likely to present a field strength greater than this at regular intervals in a crowded environment and thus cause interference to the hearing aid user (annex C). The actual field strength from a dipole, as calculated from IEC 801-3, is shown in table 2 (the values are independent of frequency). ETSI ETSI TR 101 640 V6.0.1 (2001-11) 9 (GSM 05.90 version 6.0.1 Release 1997) Table 2: Close proximity field strengths Peak transmit GSM MS power Peak field strength (V/m) power (Watts) class 1m 2m 5m 0,8 5 6,3 3,1 1,3 2 4 9,9 5,0 2,0 5 3 15,7 7,8 3,1 8 2 19,8 9,9 4,0 DCS 1 800 MS power class 0,25 2 3,5 1,8 0,7 1 1 7,0 3,5 1,4 A solution to this potential problem could be achieved by a combination of increased hearing aid immunity and constraints placed on the GSM system in urban environments. Due to the likely peak field strengths that will be experienced from GSM transmitters in crowded urban areas, it is proposed that the immunity of future body worn apparatus, such as hearing aids, should be increased to 10 V/m since this has been found to significantly reduce the probability of GSM interference (this 10 V/m figure is derived from considerations of frequencies around 900 MHz and may not be applicable to frequencies significantly higher or lower than 900 MHz). Further to this, a number of simple constraints for urban GSM system design should be adhered to: - dynamic power control to be implemented at the MS such that only the minimum required transmit power is used at all times (BS interference was shown not to be a problem); - urban cell sizes limited to reduce required transmit powers; - discontinuous transmission (DTX) to be implemented where possible; - GSM base site and mobile pay phone (e.g. on train) transmit antennas should not be located in close proximity to electrical apparatus likely to be susceptible to this type of interference. It is assumed that DTX will provide a reduced interference potential although this has not been verified.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
7 Non-ionizing radiation
|
Guideline levels for exposure to non-ionizing RF radiation have been published by many organizations including Non- Ionizing Radio Committee (INIRC), the UK National Radiological Protection Board (NRPB), the Institute of Electrical and Electronics Engineers (IEEE), German Electrotechnical Commission of DIN and VDE (DKE) and CENELEC. reference to these standards are given in reference [6] to [10].
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
8 Conclusion
|
Extensive research has highlighted a potential compatibility problem between GSM transmitters and body worn audio apparatus; in particular hearing aids. However, this research has been based on a limited sample of hearing aid types of fairly old design. An increased immunity for future body worn apparatus, enforced through the Community's EMC Directive (89/336/EEC), combined with some urban cellular design constraints aimed at ensuring the minimum transmit power is employed should ensure incidences of interference from GSM apparatus is kept to a minimum. The studies made have shown that the immunity level of currently available hearing aids may not protect hearing aids very well from the interference of GSM phones. Also, it has been shown that increasing the immunity to 10 V/m, as found possible by simple hearing aid modification, will reduce the probability of interference considerably. More recent research has shown some modern hearing aids to have 10 times the immunity of the older designs (in V/m). This would reduce the interference probabilities by a factor of 100. Concerning the domestic equipments it can be concluded that GSM transportable 8 W mobile stations are likely to cause problems to domestic equipment being used in a domestic environment. ETSI ETSI TR 101 640 V6.0.1 (2001-11) 10 (GSM 05.90 version 6.0.1 Release 1997) Further, it is recommended that the user's data (like user's manual) of the mobile should include a warning of the possible interference effects of the GSM mobile to the other electronic equipments.
|
f7d157762f0f1ce82de62a5fe14e2af8
|
101 640
|
9 Other EMC reports
|
CEPT-SE report "Summary document on the interference to radio and non-radio devices from TDMA-type transmissions". The report from CEPT covers much of the work included in the GSM report and considers EMC susceptibility of a far greater range of products. The findings of the two reports are similar. CEPT-SE report "Draft report from the ERC within CEPT on the impact from ISM emissions on mobile radio services operating in the 900 MHz band". The present document studies the potential for interference on GSM and other terminal equipment operating in the 900 MHz band caused by ISM equipment (Industrial, Scientific and Medical). It shows that spurious emissions from ISM equipment can degrade mobile radio service coverage at considerable distances. ETS 300 342-1 to 3 "Radio Equipment and Systems (RES); ElectroMagnetic Compatibility (EMC) for European digital cellular telecommunications system (GSM 900 MHz and DCS 1 800 MHz)". This standard defines performance requirements for radio communication equipment to meet the Community directive 89/336/EEC. It contains requirements for GSM terminal equipment but does not address the potential of interference with other electronic equipment such as hearing aids and cardiac pace-makers. Page 13 Annex A: A GSM interference model “ A GSM interference model. 22nd February 1990 Jon Short Cellular Radio Systems BT Laboratories 0473643954 ,’ Summarvo This document attempts to forecast the likely extent of intcrfercncc to hearing aid users fiwn GSM transmitters. The assessment is made through modclling of the GSM cellular system in various scenarios as the system matures fkom 1991 onwads. The potential intcrfczence in the individual scenarios is combined to asses the actual interference perceived by through modclling of ‘days in the life of hearing aid users. The critical inputs to the model are the hearing aid immunities as determined during extensive laboratory testing. The report concludes that a hearing aid user will experience regular daily intcrfemncc from GSM transmissions and this has been previously shown to be due to the TDMA name of the system. .“ .. (GSM 05.90 version 6.0.1 Release 1997) 11 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 14 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Qmmt!i 1) 2) 3) 4) ,,, 5) 6) 7) 8) Introduction Aasumptiona Cell Characterization 3.1) RF Link Budget 3.2) MinimumMS transmit POW= 3.3) Affetid area 3.4) Spectmm allocation 3.5) OveraUpmbabfity Scenarios 4.1) Vehicle mountedMS 4.1.1) Vehiclesand pedestrians 4.1.2) Trains 4.2) Bases 42.1) Low sites 4.2.2) High sites 4JL3) BuildingCWWW 4.3) Portableand transportableMS 4.3.1) Railway Station 4.3.2) 05ee 4.3.3) street 4.3.4) !lkain ‘ A day in the life of’ Eoexiarios 5.1) Daily commuterfi=omoutaidaLondon 5.2) Person workingand dwellingin Umdon 5.3) Retired person 5.4) Motommlytrafficjam . Ihamaaion 6.1) GSM Customerswith HearingAida. 6.1.1) Hand - Portables u~ 6.1.3) Mobiles 6.2) %hxtiona 6.3) ... Other interferences 6.4) Possiblevariables Conclusions References (GSM 05.90 version 6.0.1 Release 1997) ETSI 12 ETSI TR 101 640 V6.0.1 (2001-11) Page 15 ETR 357 (GSM 05.90 version 5.0.0): January 1997 u Introduction. Having completed extensive hearing aid immunity testing U. 5, 81 with simulatad GSM transmission, it was necessary to assess the likely impact of the laboratoryresults on hearing aid users. The key results taken km these laboratoryinvestigationswere that the hearing aids testedgave rise to ‘pemeptible’interkrance when subjectto a field strengthof 4V/m in some directions. A typical urbsn cell is eharactarizedusing an RF link budget and a number of necessaryassumptions.The salient assumptionsused in this paper are Iiatadin section 2 with local assumptionscontainedin individualscenarios. Having characterizedthe call, individualscenario’swithin the cell wherehearing aid usersmaycomein contactwith GSMtransmitterswerechosen.A conclusionis drawn horn the individualscenario’swhich highlightsthoselikelyto have the highestincidence of interference. Having arrived at a model covering separate scenmio’s, it was necessary to combinethese to build a ‘day in the life of a hearing aid user. Four typical ‘days’ were chosen -d illustratethe incidence of interferencewith respect to the hearingaid user. Subsequent discussion covers GSM subscribe who use hearing aids, possible solutionsand other interferences to hearingaids. It willbe notedthat this documenthasbeencompiledfiwn R@. 10,11and12with modificationsagreedat the coordinationmeetingsof 4/12189and 15/1/90heldat the DTL ~ i) ii) iii) iv) v) vi) vii) viii) ix) Aazmnmtione. A centralLondonbase site has a 2krnradiusand a base stationin power class4 (40W). All cells am operating at 50%capacity. Vehicle mounted transceivers have power control to sustain at least 102 uplink BER. Transportable arein power class2 (8W)andportablesin powerclass4 (2W)with antennashatig OdBigain. Subscriberswill be evenly distributedbetweenvehiclemountedtransceiver and portables/tranaportables. People are evenly distributedin the cell. Vehicle mountedtransceiversare locatedon threeconcentricrings withinthe ceII and are distributedin the ratio of their distancetlom the BS. The ri&ber of hearing aids in the UK is 1.5 miIIion(DEWSestimate 1 to 2 million)i.e 2.5% of the UK population. The mean duration of a call is 2 minutes. ETSI (GSM 05.90 version 6.0.1 Release 1997) 13 ETSI TR 101 640 V6.0.1 (2001-11) Page 16 ETR 357 (GSM 05.90 version 5.0.0): January 1997 & (W characterization S.1) RF link budget. This budgetis based on GSM Recommendation03.30. Rx RF input sensitivity= NF (dB) + Et/No (dB) + W - kT @BS for 102 BER (dBm) Where thermalnoiee, kT = -174 dBm/Hz@ 290K W (bitrate)= 10log 270.833kbit/s NF (noise figure)= 8dB E&o = 8dB Therefore,Rx RF input sensitivity@ BS = -104dBm. Ieotropicpower= RXsensitivity+ Interferencemargin+ Cable 10SS- btenna Gain Where interferencemargin= MB cable lees = 4dB antennagain = 12dBi , Therefore,Isotropicpower = -109dBm !’ Allowingfor Iognormel(5dB) and Rayleighfading(lOdB) marginsgives Minimumsignal level for 102BER = -94dBm. 32) Minimum MS tranarnit powers The requiredpowerto be radiatedfkoma mobilestationto maintaina 102uplink BER maybe fbundafter characterizationof the propagationpath lees. A typicalcentralLondoncell is 2kKnin radiusand has a BS located2m above the roof of a tall building.This buildingwillbe locatedin a denseurban environmentand of similarheight ta its surroundings(@m). Assuminga receive antennaheight of 2m and a fkequencyof 900MHz,the path loss maybe found from equation3.25 in Ref17 ~ti = 69.55+26.1610gf - 13.8210g& - A(hJ + (44.9-6.5510ghJlog ~~ (dB) where f- ikequencyin MHz (900) & - transmitantennaheight(62M) &-diatmca&om BSinkm and km equation3.27 in Ref7 A(k)”: 3.2(log(ll.75 hJ~ -4.97 (dB) L - receive antennaheight(2m) These equationsthus simplifi to L@= 121 + 3310g~ti (m) ETSI 14 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 17 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Such a callmaythusbe characterizedby a lkm interceptof 121dBand a pathloss of slops Y=3.3.Hence the minimum tran@t power needed - the MS to maintaina 104BER will be 121.94= 27dBm @ lkm (500mW’) .27+3310gl.5= 32.8dBm@ l.lkn (1.9W) 27+3310g2= 36.9dBm@ 2km (4.9W) all powersquoted being ERP at MS. Equationfor interferingdistance, &, S. 3?2 and S = G P, where S = power density E 4%~~ G = antennagain E = field strength Therefore, ~~ = G 302P, However, since path loss calculation leads to ERP‘:&m the mobile station then the antennagain term, G, is redundant.i.e G = 1. It was founcl during interference tests lJtE&5],that a realistic hearing aid susceptibilitywas 4 V/m for a 90 degreearc and 10V/m fbrthe remaining270 degreesas shown in Fig.lo -. Fig.1 Let interference radius at 4 V/m be & and at 10 V/m d10then %2= 30 P, = 1.875Pi and 16 . ETSI (GSM 05.90 version 6.0.1 Release 1997) 15 ETSI TR 101 640 V6.0.1 (2001-11) Page 18 ETR 357 (GSM 05.90 version 5.0.0): January 1997 di~ = 30 P, = 0.3Pi as shownin Fig.1 100 and & = 3z4d,7 = 0.71 Pt as shownin Fig.1 Therefore, &= Al+& = 2.18 Pi Eq. 1 3.4) spectrum allocation The GSMsystemwill probablyoperatewith3 basesitesper clusterandtherefore, even if sectorizationis employe&the entirespectrumallocationwill be used repeatedly by groups of these base sites. It has been assumedthat each base site ( BS ) covers a cimllar ma of radius 2kln. The GSM systemwill begin in 1991with an initial duplex spectrumallocationof 5MHz per operatorabove the current TACSbands.This allows252001sHz carriers and thus 25/3=8 tiers per BS and 8 x 8 time slots = 64 physid bek per BS w operator. Assuming that there will be no more than 8 of these time slots unavailablefor trafliq then 56 physical channelsremaingivinga maximumof 112 subscribers. Asthe GSMsystemmatures,thecurrentTACSallocationwillbe graduallyhanded over untilGSMoccupiestheentire25MHzcellularallocation.Eachoperatorwilltherefore have 12.5MHzor62200kHz carriersandthus620=21 carriersperbasesite.Thisnumber of carriers allows 21x8=168 physical channels and thus 160 available for traffic per operatorand 320in total. %5) Overall probability. It was found that a good approximationto even distributionof MS’s could be attained by assuming the transmitters were located on three concentric rings and distributedin the ratio of their distancefmm the BS. Two rings provedto be inaccurate with four givinglittle changein the result obtainedwith three. Using a 10MHzallocationand fidl cell capacitygives the followingresult: l12x~= 25 MS @ lkm 4.5 [email protected] 4.5 112x 2 =50 MS@2km 43 .. ETSI 16 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 19 ETR 357 (GSM 05.90 version 5.0.0): January 1997 The aflbctedarea around each transmitterfivm equation 1 is: 2.18 x 0.5 = l.lmz 2.18 X 1.9= 4.1m2 2.18 x 4.9 = 10.7m2 Giving a total a.fEectedarea from MS’s of 25x1.1 + 37x4.1 + 5ox1O.7= 714.2m*. Assumingthe BS is power class 4 (40W) then, fiwm equation 1 them will be a ibrther affectedarea of 87.2mzamnmdthe BS giving a total of 801.4m2. Since the ama of the 2km cell is YC(2000Y= 1.26x107mZthen the percentage @ected area is ~o,” o.oo649b Substitutingfigures for a fully loaded 25MHz systemyields a total affectedama of 2123.4m2or 0.017%. As yet, however, we have no informationconcerning the fiwquencyand duration of this interference. ~ 4s) u giving scenarios 1, Vehicle mounted MS. Vehicles and pedestrians. A mobile on the edge of the 2km cell has been shown to be transmitting4.9W rise to an ailkctedarea of 10.7m2and hence a meaninterferenceradiusof 1.8m. Assumingtheseparationbetweenpedestriansonthepavementandvehicleson the road is 4m, the hearing aid user will not experience interferenceh the transmitter. Evenif theaidis orientatedwithmaximumsusceptibilitytowardsthe road,thecarwould still have to be closer than 3m to causeinterkence. It is uniihely thut inteqkmce will be pemeived ~m vehide8 on the road whilst walking on the pavement. . 4.1.2 Trains. If it is assumed that there is a IOdB attenuation into a carriage fkom a rod mountedantenna,thena GSM pay phone on the train in power class 1 (20W) will have an affkctedradius in the train equivalentto that from a 2W transmitter. Aeeumingthetrawdttar klocatadinthe centreof thetrain,it is foundthat 1.2M or 1.2% of the train will be afEectedfkom equation 1. Assuming people are evenly distributedon the train then the probabilityof perceivingintetierence is 0.012. It should be noted that investigationhas shown that pemonal tape players are equallyas susceptibleto AM transmissionand there is likely to be a high densityof such equipmenton commutertrains. The probability of interference fim a pay phone on a train is 0.012. ETSI (GSM 05.90 version 6.0.1 Release 1997) 17 ETSI TR 101 640 V6.0.1 (2001-11) Page 20 ETR 357 (GSM 05.90 version 5.0.0): January” 1997 402) Bases. 4.2.1) Low sites. If it is assumedthat the BS is ~wer class 4 (40W),then the afkcted areawill be 942m2&am equation 1. Assuming people are evenly distributedwithinthe cell, then the probabilityof a hearing aid user experiencinginterferencewill be 942 = 7.5X l& 1.26x107 since the area of a 2km radius cell is 12.6km2. The probability of intetienmce j%oma base site whilst walking on the pavement is negligible. This is fiwther reduced since BS’S will be sited on top of buildings and not at ground level. 4.2.2/ Hizh Sites. Many (MM BS will be located on top of tall buildingswhich maybe office blocks containing a high densityof people. hbgtieti~io ~ofa~doffi~~~~~x 15x15 mwitha BS antenna mounted 10M above the top floor then radiation at angles greater than 60 degrees from the main lobe will penetratethe buildingassuming the antennahas not been tilted to mo@ coverage. The vertical radiation pattern fkoma typical sectorizedBS antinna shows that radiationat 60 degreesor greatertim the mainlobeiasuppressedby 20dBto SOdBand thus, assuming an attenuationof 10dBlRef.6]into the buildingand a further 5dB from the roof (no windows ) gives a minimumattenuationof 35dB. Assuming the transmitteris in powerclass 1 (320W)55dBm,then the analogous scenario is a 55435= 20dBm (1OOMW)transmissioninto &es space. This equat8sto an interference radius of 0.26m at 60 degrees born the main lobe and O.&m (65dB attenuation)vertically downwardsfrom equation1. It is themfom unlikeiy thut hearing aid users in an ome block directly underneath a (2SM BS will experience any interfmnce even if they w at the top of the building and the BS is in power cltis 1. 4.2.3) Building coveraze. A typkal attenuationinto a building is 10dB [Ref.6] and thus the interference radius fmm a class 4 BS (40W) into a building will be equivalent to that &m a 4W . ~* an.cmensite. It fbllowsthat anY buiklbw within a 1.7mradiusfkomthe BS will have su&ie& field strength inside th~ buildi~ to hearing aid users. rise to 403) SLiLD As th,iadistance is not practically malisabls, it is most interfienmce in a@acent buildings. Portables and Tranaportables. Railwav Station. give *e to interferenceto unlikely that a BS will give Portable GSM transmitters may be in power class 4 and will hence have a ETSI 18 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 21 ETR 357 (GSM 05.90 version 5.0.0): January 1997 maximumpower of 2W. This gives ~ to an tiected ama of 4.4m9per transmitter, assumingno antennagain at the portable;fkomequation 1. Taking the area of a platform as IOOmx 10m = 1000rn*and the number of platformsas 10 then the total station area is 10,000m*.If each train has 10 carriages carrying 100 people, and a train arrives at each platform during the rush hour simultaneouslythen NM()x 10 = 10JMOpeople will be in the station at any one time leadingto 1 personper m2. Thepopulationof greaterLondonis roughly7 millionin an areaof 15801Rn2which is assumedto rise to roughIy10million,&un tra.i%cflow analysis,duringworkinghours. Assumingthe stationis locatedin a 2km radiuscall of ama 12.6km2and that the populationof Londonis evenly distributedin the 1580km*within Greater hmdon, then Ioxl@ X 12.6 = 80,000 1580 people will be in the cell. Since there are 10,000peoplein the station during rush hour (1/8thof the total), assumingthe cell is 50% loaded and that 50% of calls will be fkomhand portables then 28x l/8 = 3.5 calls will be activein the stationat any one time duringrush hour with a 10MHZallocation Since each transmitterhas an af%ctedarea of 4.4rn2around it then a total area of 3.5 x 4.4 = 15.4m2( 0.154% ) of the station area will be affbctad.Them is thus a probabilityof 0.00154that a hearing aid user will be in an a6@ed ama assumingclass 4 portabletransceivers. When the system @y occupies25MHz, the number of calls originatingin the stationiiwmhandportablesrisesto 80x l/8 = 10,the afIbctedareato 10x 4.4 = 44m2and thus the probabilityrises to 0.0044. Theprobability of interference~m a handportable tmnsceiver in a milwaystatwn is 0.00154 with a 10MHz allocation and 0.W44 with 25MHz. It has been found that there are 80,000 people in a 2km radius cell thus with a 50% loaded cell and a 10MHz allocation,28 of these ( 1 in 2800 ) will be using a GSM hand portable.A typical office has 1 personin l(hnaand hence with a 10 storeybuilding with 100 people per floor there will be 1000people in 10,000m2. Since 1in 2800peoplewill be usinga GSMtransmitter,0.36peoplein thebuilding will be radiating2W (class 4) givinga total affected area of 1.6m*fkomequation 1. This equates to 0.016% of the office area and hence a probability of interference of 0.00016 assumingeven distributionof workers. With a 25MHzallocation,1 in 1000peoplewill be using a GSM handportableand thus the totalfiected areawill be 4.4m2ikomequation1 and theinterferenceprobability rises taOJIUWL Thepmbabiiity of interjknce jhm hand portable tmnsceivers in an o#Ze bkch k 0.00016 with 10MHz allocated and 0.00044 with 25MHz. - 4.3.3] Street Assumingthe pavementsof central London are 3m in width and are locatedon both sides of the road then, knowing there are 17.5 km of road per km2,we have a pavementarea of 17.5xl@ x 2 x 3 = 100,000m2in Usm2.Assuming there is 1 personper 5m2then there will be 20,000 peopleon the pavementsin lkna2. Assumingthis representsa 50%loadedcell andthe allocationis 10MHzthenthere ETSI (GSM 05.90 version 6.0.1 Release 1997) 19 ETSI TR 101 640 V6.0.1 (2001-11) Page 22 ETR 357 (GSM 05.90 version 5.0.0): January 1997 will be 28 actively transmitting hand portablesdistributedbetween20,000 people ( 1 in 714 ). Since the pavement is 3m in width then there will be 1 person every 1.6m and hence 1 hand portable every 1.6x 714= l143m. Assumingthe transmitteris stationary and the hearing aid user is walkingat 3km/h (0.83m/s),then it will take 23 minutes to walk between transmitters. When the system occupies25MHz,there will be 1 in 250 people with an actively transmittinghand portable and thus one transmitterevery400m. At 3km/hit will take 8 mi!lllt= to -k bCtWW!Xitransmitters. If the transmitters in power class 4 (2W) thentheinterfimnce radiuswillbe 1.2m from equation 1, and thus the subject will have to walk fbr 2.4m whilst experiencing interference.At Win/h this will take 2.9 seoonds. The@re, a hearing aid ueer walhing along a Lm&n street duringpeak time will experience 2.9 seconds of inte~emnce j%omhand portable tmnsceivers every 23 minutes with 10MHz allocated and evay 8 minutes with 25MHz. 4.3.4) Train. Sinceit has bean shown that there are 80,000peoplein a 2km radius cell and assuming50%of the 112 channelcapacitywill be takenup by hand portablesthen 1 in 2800 people will camy portabletransceivers. .1 Assuming the train is carryingworkersto L&don, then roughly 0.36 people will be using a GSM hand portable.If this is a class 4 (2W) transmitterthen the interfering radius will be 1.2m and hence, assumingthe transmitteris not at the end of the train, a 0.36 x 2.4 = 0.9m length of the train ( 0.9% ) will be affected. Assuming an even distributionof peopie, the probabilityof interferenceis 0.009. Witha 25MHzallocation,thepenetration rises to 1transmitterin 1000peopleand thus 2.4% of the train will be afkted and the probabilityrises to 0.024. Again there are likely to be a large number of personaltape playem on such a train which have been found to be equallyas susceptibleto interference. Thepmbability of inte#emnce fim a hand portable transceiver on a train is 0.009 with 10MHz alkmzted and 0.024 with 25MHz. n ‘A Day in the life of scenarim 5.1) Daily commuter from outside I.andom This day in the life of a hearing aid user is made up of the followingscenarios Travel fkomhome ( mral ) to railwaystationand return 2 x 15mins= 30mins [email protected] tAhmdon 2xlhr =2hrs Time spent leaving and waiting for train 2x15mins=30inins Tubejourney 2x15mins=30mins Walking to ~d fkomoffice 2x15mins=30mins Time spent in office 8hrs The travel conducted in the rural area and on the tubemaybe ignored since them will be no interference. When traveling on the train, interferencemaybe causedby a pay phone on the train or fkom a hand portable. The probabilityof perceiving interference fkomeither of these ETSI 20 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 23 ETR 357 (GSM 05.90 version 5.0.0): January 1997 sources is P*, = Pm*+ pa+ PP*PH = 0.012+ 0.009 + 1.08x104 = 0.021for IOMHZ Pti = 0.012+ 0.024 + 2.88xl@ = 0.036for 25 MHz Assumingthe average durationof a call is 2minaand since the time spent on the train is 2 hours, then Total interferenceduration= 120x 0.021 = 2.5 mine Numberof calls = 2.5 = 1.26 calls 2 ‘.NmebetweencaIIs= 120 = 95 mine 1.26 SubstitutingP-l = 0.036 gives a correspondingtime between calls for a 25MHzsystem of 56 minutes. U will be notedthat if the probabili~ ofinterfemnm fiwrnthe pay phone and the handportabletransceiverareseparated,thetimebetweenexposuretointerferenceforthe duration of a call is 167 minutes due to the pay phone, 222 minutes due to the hand portablewith 10MHzallocatedand 83 minutesdue to the hand portable with 25MHz. Whilst on the train interference wiU be experienced for 2mhs evtvy 95mins for a 10MHz system and evew 56 minz fbr a 25MHz system. Whilst in tbe railway station,the probabilityof incidence of interference is 0.00154( 10MHz) or 0.0044 ( 25MHz ). Assuming 30 minutes ( 1800s ) are spent in the railway stationand a call lasts for 2mins, then Total interferenceduration= 1800x 0.00154= 2.8seconds Numberof calls = 2.8 = 0.02 calls m Time betweencidls = 30 = 22 hours a Substitutinga probabilityof 0.0044givesa correspondingtimebetweencalls for a 25MHz systemof 7.6 hours. Whilst in a milwa.. - interfikrenceLuillbe experiencedfor 2 reins eve~ 22 hours /br 10MHz and eve~ 7.6hours for 25MHz. It has been s@wn in section 4.3.3 that a 2.9 second burst of inteflenmce wiff be heard eve~ - 23 minutes jbr 10MHz and eve~ 8 minutes for 25MHz. During the 8 hours in the office, the probabilityof interferenceis 0.00016 with 10MHz and 0.00044with 25MHz.Assuming2 minutecall durationthen Total interferenceduration= 8 x60x60x 0.00016= 4.6seconds Number of calls = 4.6 = 0.038 calls ETSI (GSM 05.90 version 6.0.1 Release 1997) 21 ETSI TR 101 640 V6.0.1 (2001-11) Page 24 ETR 357 (GSM 05.90 version 5.0.0): January 1997 120 Time between calls = 8 = 208 hoiws 0~8 Substituting a probability of 0.00044 gives a correspondingtime between calls for a .25MHzSySteMof 75 hours. Whilst in the ofiee, inteqfmmce will be heard for 2 minutes eve~ 208 hours /br a 10 MHz system and evay 75 hours fir a 25MHz system. Ovendl conclusion of *cenaria S.10 The incidence’sof interference will be as follows: 10MHZ. 1 x 2 minutes every day on the train 1 x 2 minutes at the station every 1.5 months 1 x 3 secondburst every day whilst walking on the street 1 x 2 minutes every month in the @ice ? 25MHZ. 2 x 2 minutesevery day on the train 1 x 2 minutesat the station every 2 weeks 4 x 3 secondburst every day whilst walkingcmthe street lx2minutes every 9daysintheoffice M) Person working and dwelling in London. This day in the life of a hearing aid user maybe characterizedbt the followingscenarios . Walk &omhome to tube station 2x15mins=30rnins Tubejourney - No interference Walk *m tube station to office 2x15mins=30mins Total time on street= 60 mine ‘lYmespent in office 8 hours OvemU conclusion of scenario 63. Using the reasoning in 5.1, the incidenceof interferencewiIIbe as foIIows. 10MHZ. — .+ 3 x 3 second burst every day whilst walkingon the street 1 x 2 minutesevery month in the offke 25MHZ. 7 x 3 secondburst every day whilst walkingon the street ETSI 22 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 25 ETR 357 (GSM 05.90 version 5.0.0): January 1997 1 x 2 minutes every 9 days in the office 5.3) Retired peraom Whilst the retiredpersonis dwellingin a rural araa,the incidence of interfbnmcewill be negligible. However,if that person spends a day shopping in London, the day may be characterizedas f~ows. Travel fkomhome ( rural ) to railwaystation and return No Merf&wence Return trainjourney b London 2xlhr =2hrs Time spentleavingand waitingfor train 2x15mins=30mins Tubejourney No interference 3 hours shoppingof which 1 hour is spent in the street 1 hour Overall conckwn of 8cenario 5.3. Using the reasoningin 5.1, the incidenceof interferencewill be as follows. 10MHZ. lx2minutes onthe train Unlikelyincidenceof intdersnce at station ‘” 3 x 3 secondburst whilst walkingon the street 25MHZ. 2x2minutes onthetrain Unlikelyincidenceof interferenceat station 7 x 3 secondburst whilst walkingon the street 5.4) Motorway traffio jam Ithasbeenshown~f.10] thata hearingaiduserdrivinga vehicleon a motomvay, with the aid orientated such that maximum susceptibilityis towards the trafEc, will experienceinterferen~ if the adjacentvehicleis radiatinga (XM transmitpowerof more than 2W. It wasfoundthat theprobabilityof the adjacentvehiclehaving a GSM transceiver was 0.05 andthatif the traflichad a relativespeedof 5 mph interferencewould be heard for 2 secondsevery 4 minutis. 6.1) GSM customers with hearing aids. - 6.1.1) HandPortables. Equation1 states that&= 2.18 P, and hence d2mm= 2.18 P, K The distancebetweenthe ears is less than 0.25m and hence ETSI (GSM 05.90 version 6.0.1 Release 1997) 23 ETSI TR 101 640 V6.0.1 (2001-11) Page 26 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Pt= 0.252 = 90mW 0.7 or, the maximumtransmitpower fmm a hand-portabletransmitterheld to the unaided ear is less than 90MW to prevent interferenceto the hearing aid on the other ear. Ifit is assumedthat minimum susceptibilityis in the directionof the transmlGtter ( i.e throughthe head) than this power may rise to 210mW.Since GSM hand portable’s in power class 5 will be radiating 800MW,a hearing aid user will be unableto use such a transceiverwhen not under power control. mm nmmtables. Transportable transceivers will be in power class 2 end will hence radiate a maximumpowerof8W with an interferenceradiusof 2.4m&omequation 1.‘I%eoperator of such a transceiver will obviously be within this radius and hence interferencewill be perceivedby a he*g ~d -r whi~t a @ iSbetig made. It is Pmsiblethat thesubject could orientate himself with respect to the antenna to eliminate the interfkrencaand make a call possible. 6.1.3) Mobiles. An investigationM.9] has shownthata hearingaideddriverof a vehicleis likely to be ableto use a GSM mobiletransmitterprwided the antennais mountedin thecentre of a continuousmetallicroof. Other antennapositiom or a non-metallicsun-roofmaylead to unacceptablyhigh field strength inside the vehicle. 62) &dUtiOIML It was noted during in&fbrence testing, that the 100% AM introducedby the TDMA structure of GSM was the cause of the interkrence and that continuousGMSK had no effect. The inter&rence &m the base site could therefbrebe eliminatedby till loading at all times i.e all time slots active all the time and constant amplitude transmission.However this dramaticallyincreasesCA fm the fbllowingreasons: i) Continuoustransms“ sion requires unused time slots to be active . ii) Discontinuoustransmission(DTX) at the BS wouldbe impossibleleadingto a two fold degradationin spectral efficiency since one way speechis interspersedwithroughly50% of silence. iii) Adaptivepower control at the BS wouldbe impossiblesince this wouldbe requiredon individual-timeslots leading to amplitudemodulationof the carrier. It should be noted that anythingless than 100%loading WWresult in a similar audiospectrumperceivedby the subjectashavingonly one timeslot active.Thisis tosay that the audio spectrum demodulated&oma one time slot activeBS will be the sameas that from one with one time slot inactive. The base site scenarios presentedin this documentarebased on the resultsof the interferencestudies at BTRL i.e one camier active.However,a GSM basesite will have 8 carriers per cell when occupying 5MHz per operator and utilking a three cell repeat pattarm.Since TDMA fkames on separate carriers will be synchronbed at the BS, the broadband AM demodulation process may give rise to 8 times (9dB) increase in ETSI 24 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 27 ETR 357 (GSM 05.90 version 5.0.0): January 1997 interferencelevel when correspondingtime slots are active. 6=6) Other interferences. Thetwo hearingaid users whotookpartin theoriginalsusceptibilitytesting were given a questionnaireconcerningcurrentlevelsof interibrence. It wasdeterminedthatonesubjectusedhishearingaidonly once or twice a month where the other used his for the mqjori~ of the working day. The times when the aids would defitely be used were in the office, at meetingsand during lecturw. Bothsubjectsveryrarelypemeivedanyinterferenceto theiraidswithone recalling only ever hearing a single burst lasting for several minutes. The second subject recalled hearing bursts lasting a second or so very intkequentlyand identified the source as fluorescent lights. 6.4) Possible variabl~ The scopeof this model is seen to be smalland dominatedby assumptions.There follows a list of variables that may significantlyaffect the conclusions drawn fkomthe model. i) ii) iii) iv) v) vi) vii) viii) ix) The hearing aid user may switch the aid off for periods of the day when verbal communicationis not essential. Hearingaidusersmay identi&the sourceof theinterferenceand learn to position themselvesaway * this source. The scenariosonly apply to GreaterLondon. There tendsto be a naturalexclusionzonearounda personusing a hand portable transceiverwhich will reduce the areain which a hearing aided pedestrian may be and hence reduce the probabilityof interference. Discontinuoustransmissionat the MS will produce breaks in transmission will change the way in which interferenceis perceived. . Not all trainswill have a publicpayphoneand those that do will have the phone locatedbetweencarriagesi.e where thereare no passengers. The hearing aided populationwill be biased towards retired people who do not commuteinto the city. Due to the natureof the calculation,the numberof exposures to interfiince are averagefigures.The standarddeviationawaytim this mean is likely to be large. The ‘l&d portableon a train’figuresmaybe si~cantly reduced if the hearing aid is not locatedin the centreof the trainand if a significantattenuation of the transmittedsignal is createdby the crowdedenvironment. ETSI (GSM 05.90 version 6.0.1 Release 1997) 25 ETSI TR 101 640 V6.0.1 (2001-11) Page 28 ETR 357 (GSM 05.90 version 5.0.0): January 1997 n i) ii) iii) iv) v) vi) vii) viii) ix) x) xi) Concluaions. The scenariospresentedin this documentsuggestthat the maximum incidence of GSMinterfbmncewill be 5om hand portableandtransportabletransmv“em Since this appsuatusis carried by the public into areasof high populationconcentration. There is also a significant probability of interferencefkoma public pay phoneon a commutertrain. It appears that a hearing aid user will be unable to use a GSM portable or transportabletransca‘ver in any power class. Itislikely thatahearing aiduger will beableto usea vehicle mounted transceiverprovided the antenna is mountedin the centre of the mof Sinceit hasbeen found that interferencemaybe perceivedinikaquentlytim other sources, then it is GSM interference perceiveddaily that gives rise to the most concern. Of the four ‘dayin the life of scenarioschosenthe dailycommuterto La&n from a rural areais mostlikely b experienceregularintarkrence with a dailyexposure fm the duration of a call (2mins) whilst on the train and a 9 second daily burst whilst walking on the street even with the initial 10MHzallocation. This rises to two daily exposuresfa a cdl durationandfour 8 semmddailybursts when the allocationreaches 25MHz. The scenario of the London worker dwelling in the aty highlight a smaller eXPOSIUW tointerference.-t operatingwitha 10MHzallocation,three3 second burstswill be experiencedon the streeteve~ dayrisingto sevendailyburstswith systemmaturity. The retired personis fhr more likely to be wearinga hearing aid but less likelyto be in the city. If spending a day shoppingin the sty, the exposureto intdbmnce will be high during that day with a burst for a call duration during the train journey andthwe 3 secondbumtawhilstwalkingbetweenshops.Thisrisesto two exposuresfor a call duration and seven 3 secondbursts with systemmaturity. Whilst in a vehicle in a motomvaytrafficjam moving at 5mph, a hearingaid user will experienceburataof interference lastingz secondsevery 4 minutes. It caaba seen that givan the cument immunityof NHS hearing aids to 900MHz GSM EMI, a person wearing such an aid and requiring to use it during the working / traveling day will experience regular daily interference as the GSM system maturee. If the incidence of interference is deemed unacceptable,a greater hearing aid immunityat 900MHzwill be requiredtoreducetheincidenceof GSMinterference, since there appearsto be no practicalmodificationto the GSM stmcture that will achieve this. ETSI 26 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) al 1) .2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) Page 29 ETR 357 (GSM 05.90 version 5.0.0): Janua~ 1997 References. CentralStatisticalOfEce- ‘Annualabstractof statistics 1987’ HMSO No. 123 Central Statistical Office - ‘&giOIl&dtrends 1985’ HMso CCIR - ‘VHF and UHF propagationcumes for land mobile services’ CCIR Rec.529Rep.567-3 GSM recommendations 03.30 and 05.05 Short J M - ‘An investigationinto the eft’ectsof RF interferenceon hearing aid users’ W8f89 IEE GroupEll - Propagation ktors andinteflerence modellingfor mobileradio systems’ IEE Colloquium,DigestNo. 1988/123 HolbecheR J - ‘Land mobile radio systems’IEE Telecommsseries 14 Peter Peregrinus 1985 t Tattersall P R - ‘Domestic equipment susceptibility to GSM mobile radio transmission’ X3W89 Short J M - ‘An investigation to determine the penetration of 900MHz RF into vehicles’ 23/lW89 Muaday P J - ‘GSM EMC scenariomodel - MotoxwaytdEc jam’ 9/lf80 ShortJ M - ‘GSM InterferenceScenarios’ 3W11/89 Short JM-’Adayin thelife ofahearingeiduse# 9n/90 Munday P J - Correspondenceof 31/1/90and 12/12/89 . ETSI (GSM 05.90 version 6.0.1 Release 1997) 27 ETSI TR 101 640 V6.0.1 (2001-11) Page 30 ETR 357 (GSM 05.90 version 5.0.0): January 1997 AnnexB: GSM -Hearingaidinterference modelling parameters MODELLINGP~ Intarfarwce levels causing 1 4v/m in mOdd ‘audibleslightly~9’ (5to 8.5V/m measured) interference. Attenuationproduced by wearer’s head: VP to ~ dB GSM Power ~Vdm DistancefzomG5M Transmitter 2W o.8m to lo9m 5R 1.3m to 3oom 8W 1.6mto 3.8m 2oi? 2.4m to 6.Om — Note - Best 8i& T&at side of head of head Metallishg hearingaid casegave about 10dB reduction“inmwceptti~ty ETSI 28 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 31 ETR 357 (GSM 05.90 version 5.0.0): January 1997 1 other 10 other patmengaz pamengers o 0 in o 0 !, m, 12v/m ZW,4V/m area area 0 0 0 Cxowded Train Scenario Crowded !l!raim sC81i?Ui0 Assume : Half GSMEPU88used on a given journey Averagecalllast8Z dn Passengers with 21?GsMEPu 1* --- 3% 10% mobabilitsr of 2 * id-f-- on a given- jouzney 4V/m 5% 14* 40% lZV/m. 0.5% 1.5* 5* ETSI (GSM 05.90 version 6.0.1 Release 1997) 29 ETSI TR 101 640 V6.0.1 (2001-11) Page 32 ETR 357 (GSM 05.90 version 5.0.0): January 1997 1/ /’ i,I \ \ \ 1... . . . . G ,-’ . . . . r ..“ .“ ,“ .J ,.~ . ,, )2 ,.” . ,. . -- -. ..”.- ------- G . . -.”. . . . . . . . . .. ..- . l!loto-ayTxafficJam Soe=io ———— -- MotorwayTrafficJam Scenario . lwsume: 5% of vehicleshave GSM phone 20t of GSM phonesactive at a the Averageoallalast 2 *UteS Traffic Interference 2W18W120W 8W 20W 4V/n 8V/m 12vhn 4v/in4v/in Stationary 2 min interference burstswith Prob+ 2% 58 lot .. Lanespassing Interferencebursts+ O.7uevery 28 38 at IOkm/hr (onaverage) 3min everyeveq 3min 2-5 B ETSI 30 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 33 FTR 357 (GSM 05.90 version 5.0.0): January 1997 Annex C: New digital transmission technologies - the EMC conundrum IJEW DIGITAL TRANSMISSION TECHNOLOGIES - THE EMC CONUNDRUM 1 INTRODUCTION The growth of our ‘cordless’ society has placed a premium on personal mobility. In the telecommunications sector the growth in the use of cordless telephones and cellular radios has been spectacular. To provide for this growth, in an age where frequency spectrum is similarly in demand, has required the development of new technologies. 2 RADIO TECENOLOGXES Recent developments in radio in Europe and worldwide have selected ‘time division multiple access’ (TDMA) technologies for assigning channels to individual radio users. The traditional frequency division multip,le access (FD~)# mainlY analogue, techniques are still used extensively but are slowly being replaced by digital TDMA systems, which offer both improved performance and spectral efficiency, particularly in large ‘public systemsl. 3 WANTED RP EMISSION In a TDMA system the ‘channel’ used by an individual represents one time slot from say 10, allocated to that user normally at a sub-audio rate, for example, 200Hz. The resultant effect is that a burst of RF is transmitted at that sub-audio rate, in the example above the RF burst would last for 5 msec and be repeated every 50 msec. The 5m-= RF burst would contain the transmitted information at a rate 10 times faster than the basic rate to provide a continuous transmission for the user. The RF signal described above is amplitude modulated (AM), in this case at 200Hz, this AM is in addition to the modulation contained within the RF burst itself. Tests to date have shown that many radicrand non-radio (particularly audio products) are susceptible to an RF signal with these characteristics. .. The growth of cordless telephones and personal communications equipment also means that the transmitter will be physically much closer to potentially susceptible equipment. 4 EMC DIRECTIVE AND LEGISL74TIVE PROVISION The Community’s EMC Directive requires that all electrical/electronic equipment neither emit nor radiate unwanted RF signals, and not be susceptible to other (wantedl RF signals, ie legitimate radio transmissions. Legitimate radio transmissions are licensed in the UK by the Radiocommunications Agency of DTI, under the ‘Wireless Telegraphy’ Acts. The licence provision includes the frequency, form of modulation, permitted power level and ETSI (GSM 05.90 version 6.0.1 Release 1997) 31 ETSI TR 101 640 V6.0.1 (2001-11) Page 34 ETR 357 (GSM 05.90 version 5.0.0): January 1997 controls spurious and other parameters by only licensing equipment approved to definitive standards of performance. The EMC Directive will come into force on 1 January 1992; it offers the power to control, from that date, equipment ‘placed on the market’ and will require compliance with essential immunity’ standards. The pan-European digital cellular radio system - GSM - which is also supported by a Community Directive, should become operational at a similar date. The WT Act licence offers the potential to control the power levels of GSM equipment. s 2!EE CONUNDRUM The ‘generic’ immunity standard being set by CENELEC has been currently agreed to be set at ‘3 volts per metre~ The immunity standard necessary to avoid interference from a GSM equipment will need to be in the range ‘IO volts per metre~ to ~20 volts per metrel if the current power levels of GSM equipments are to be maintained. IIIt is, of course, subject to the distance between the &M transmitter and the target device being defined. The obvious incompatibility and potential hazard to ‘safety related’ or ‘pseudo-medical$ applications eg hearing aids, provides the conundrum. 6 DISCUSSION Scant regard, has in the past been paid to the design of equipment with realistic immunity standards - particularly in the domestic market. The EMC Directive provides the legislative framework to correct this deficiency. The ‘generic’ immunity standard of ‘3 volts per metre’ has been pitched at a level that most equipment designs already meet and thus provides little or no real improvement. A more realistic figure would be ‘1O volts per metre~. The adoption of TDMA technology, with its inherent advantages is more intrusive, in EMC terms, than previous FDMA technologies. This is particularly true of ‘audio* equipments such as”~a~ stereos, which have& high prd)ab~~~ at being in close proximity to the new digital radio telephones. It could.-be argued that the AM component of the TDMA transmission is also Iunwantedl and hence covered by the EMC Directive; this view is not shared by the spectrum managers, where it seen as a legitimate and efficient transmission. The spectrum manager has the option of defining the maximum radiated power, to a level compatible with realistic immunity standards. ETSI 32 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 35 ETR 357 (GSM 05.90 version 5.0.0): January 1997 7 CONCLUSION A compromise between ‘immunity’ standards for all radio and non-radio equipments, coupled with a limitation of radiated power from, particularly hand held TDMA transmitters, will be essential to avoid unwanted EMC problems. The attached Annex proposes a scenario for discussion purposes. o J WHEATON 4.5.90 I ‘ EMCCONUN ETSI (GSM 05.90 version 6.0.1 Release 1997) 33 ETSI TR 101 640 V6.0.1 (2001-11) Page 36 ETR 357 (GSM 05.90 version 5.0.0): January 1997 ANNEx EMC CONSIDERATIONS 1 Assumpt ions: the minimal distance between a radio transmitter and a target radio or non-radio equipment shall be 1 metre; safety conscious and pseudo medical have higher immunity standards than standard level. 2 Proposes that: systems shall the ‘generic’ generic immunity standards for all equipment be set at 10 volts per metre minimum: sectorial immunity standards for body worn audio equipments be set at 15 volts per metre minimum; sectorial immunity standards for any ‘safety conscious’ system be set at 25 volts per metre minimum. t 3 Transmitters using AM ox TDM,Atechnologies be limited in radiated power to: hand held devices - 1 watt peak power: vehicle mounted equipment, where the antenna is at a minimum height of 1.5m, located at least 0.75m from the vehicle~s outline - 5 watt peak power. . “ EMCCONUN ETSI 34 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 37 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex D: Potential GSM hazards on cardiac pacemakers Source: CSELT (Italy) Potential GSNI Hazards on Cardiac Pacemakers Operation arc pulse generators implanted in subjects suffering from 1 = Pacemaker Cardiac pacemakers hcan disease in order to stimulate artificially the beat of the heart. 1, Demand types sense when the heart beat is abnormal and make necessary corrections. Most pacemakers in use arc of the demand type. A simplified block diagram of a demand type pacemaker is shown in fig. 1. The circuit and the power supply (a solid state battery) arc sealed in a titanium package to reduce the rejection phenomena as weil as to improve the electromagnetic shielding. The circuit is implanted in the abdomen of the patient while the pacing lead carncs the pulses directly to the hcmt. The pacing lead is a catheter introduced through veins and has the double function of exciting the cardiac activity and detecting the spontaneous signals. In fact when the detector reveals the natural heart beat (which is an electric pulse with G peak to peak ampIitudc near to 5 mV) turns off the pulse generator (which give out G peak to peak pulse of approximately 5 V). So acting the pacemaker reduces the power consumption and avoids unnecessary stimulations. There Grc two different kinds of pacing leads: unipolar and bipolar, bipolar leads arc less sensitive to the external interferences but they are ICSS sensitive to the cardiac signal too. Single channel and multichannel dcviccs (i.e. with a stimulation irtrd dwecrim in more than a single hcan point) arc available according to the patient needs. In a large part of the pacemakers the physician can program the parameters of the implanted generator (e.g. amplitude, frequency, sensitivity) using a radio int crface cent rolled by a computer. Moreover the radio interface allows the physician to get the operating parameters of the stimulator using some !clcmctry measurement functions built in into the device. 2 - GSM Interference to Pacemakers Since the pacing lead acts as an antenna. exposure to an electromagnetic field may: a ) Introduce cuments from the leads into the heart causing fibrillation or locai heating: ETSI (GSM 05.90 version 6.0.1 Release 1997) 35 ETSI TR 101 640 V6.0.1 (2001-11) ETR 357 (GSM 05.90 version 5.0.0): January 1997 b ) Induce voltages in the lead that damage the pulse generatoc c ) Induce voltages in the lead that the pacemaker confuses with the intrinsic heart signal and turn off the pulse generator. - Additionally implantable pulse generators incorporate reed switches which are used for controlling the battery charge and may be Gctivated by strong magnetics fields. T& safety of implantablc pacemakers and their protection against EMI (E1ectro Magnetic Interference) is the subject of the CENELEC European Standard 5600]. A draft amendment prepared by the Technical Committee 62 [1] suggests both the maximum ratings of interference and the measurement methods to which pacemakers should comply. Surely clauses a) and b) do not concern the GSM system because the power of a direct radiation excited in the lead which can damage the hcan or the pulse generator is very much higher than the power of the GSM fixed or mobile equipments. Moreover the transmission frequencies of the GSM system arc so high that the by-pass capacitor which protects the pacemaker input filtrates enough the residua) components. For instance it has been verified that AM radio broadcast transmissions using very high power.’ (kilowatts or megawatts) can introduce a strong hazard. instead. clause c) has needed some investigations because an interfering signal with low frequency components approximating the heart beat could cause potential hazards even if their power is relatively low. In caac of GSM signals, while the normal burst transmission has a repetition rate of 216 Hz Gnd risks cannot Grise (consider that a 50 Hz component is already strongly filtered by the post-detector filter of the pacemaker detector input), the particular case of DTX (Discontinuous Transmission) mode had to be carefully investigated. In fact DTX mode has signal components Gt frequencies much lower than in the case of normal C3SM transmissions (see fig. 2): there is a sub-component with G repetition rate of ?.08 Hz, which corresponds to the transmission of the 8 timesiots of the SID (Silence Descriptor) message block frame and another low frequency component rcprescntcd by the SACC14 repetition rate (8.33 Hz). The amplitude Gnd duty cycle (one timcslot out of 26) of this component are much lower than those of the previous one. Since electrical signals with G periodicity below 6-8 Hz inhibit the pulse generator while interfering signals with G penodicity above 6-8 Hz will reven the paccmakcr operation into the so called asynchronous mode at the basic prugrtmmmk me, it Waa” fW&Wtcaad- importance to identify possible danger thresholds, In fact, if the power excited by these signals in an active enough, the pulse generator could bc turned off and the heart failure. 3 - Experimental Tests pacemaker were high person could have a Compatibility tests have been conducted both with unipolar and bipolar pacemakers manufactured by SORIN using the test set-up shown in fig. 3. ETSI 36 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 39 ETR 357 (GSM 05.90 version 5.0.0): January 1997 An arbitrary waveform generator jointly with an RF generator simulated the 900 MHz DTX transmission. The signal was amplified by a power amplifier. Pacemakers were placed in a phantom, an imitali.on of the human body filled with G physiological solution (water and NaCl whose concentration corresponded to a specific conductivity of 0.5 S/m al 20”C room lcmpcraturc) according to the -standard values. The phantom was a Plexiglas cylinder 1.7 m ta[l, with G diameter of 0.3 m. The pacing lead was placed in 8 loop similar to the one really done in the human chest and his distance from the plexiglas wail was not larger than 1 cm. An oscilloscope con-ted to two steeJ plates plunged into the soiution was used to detect the regular operation of the generators. Experiments were conducted in a controlled (anechoic) environment with the aim of measuring the field strength next to the phantom chest by an isotropic detector atvoiding any unwanted component. The measurement results show that no risk of hazards exists aminst Pacemakers from GSM quiprncnt. In fact it has been verified that it is necessary (corresponding to 8 W transmit peak power distance) for inhibiting an unipolar pacemaker air with the pacing lead loaded with a 500 interface. . an electric field of Gt least b V/m of- a GSM equipment at 0.S m when the device is leaved in the ohm resistor simulating the tissue On the other hand, when the device was put into the physiological solution, it was not poasibie to inhibit his regular operation even with electric fields of 200 V/m (corrcaponding to 208 W transmit peak power at 0.5 m distance). For bipolar pacemakers the results are even more reassuring: with the device in the opeu air the electrical field could inhibit the pub generator only if it was above 75 V/m (corresponding to G transmit peak power of 28 W at 0.5 m distance). Obviously no inhibitions have been detected with the Dacemaker plunged - into the solution. “ 4 - Cmchasions DTX transmissions of a GSM equipment produce waveforms which cardiac stimulators but formal experiments carried out with modern bipolar pacemakers manufactured by SORIN have demonstrated hazard exists. References [1] “S8fety of implantable cardiac pacemakers”, Draft CENELEC (1989) could inhibit unipoIar and that no real pr EN 50 061 [2] “immunity to disturbance of cardiac pacemakers in RF fields of powerful radio transmitters”, Institut fur Runfunklcchnik GMBH, Munchcn, 1987. ETSI 37 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 40 ETR 357 (GSM 05.90 version 5.0.0): January 1997 i I I I I I I I I i I ----- --- -4------ ------ -_1 I I I I I I I I “i I I I ; I I I I I I I I 1- 1- ----- ----- _____ _. I I I I I I I I I I I I 3 I I I I I I I I I I ! I I I I I ----- --~ Em .- U & .- I& (GSM 05.90 version 6.0.1 Release 1997) 38 ETSI ETSI TR 101 640 V6.0.1 (2001-11) i!{— .. !i<— Page 41 ETR 357 (GSM 05.90 version 5.0.0): January 1997 j t-,, ==f -*-- B w & .- L& (GSM 05.90 version 6.0.1 Release 1997) 39 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 42 ETR 357 (GSM 05.90 version 5.0.0): January 1997 ii . .. . u) IA (GSM 05.90 version 6.0.1 Release 1997) 40 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 43 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex E: Summary document on GSM-TDMA interference PROJKT : 60 Support to R2/MTS2 July 1991 Project Manager Project Technicians -. Approved F Mellish, 1.Eng. MIEIE L williams, I.Eng. FIEIE Head of Research and Development ETSI 41 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 44 ETR 357 (GSM05.90 version 5.0.0): January 1997 “ , Comlmtms G 1. Summary of Requirement. 2. Summary of Findings. 3. Immunity Data. s, 3.1 Sources of Data 3.2 Normalisation of Data. 3.3 linalysisof Data. 4. Observations. 5. Conclusions. .. ETSI 42 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 45 ETR 357 (GSM 05.90 version 5.0.0): January 1997 In the course of a meeting to disouss the potential interference [1] problems associated with the introduction of GSM and other transmission systems eqloying IZIMAtechniques, Mr Williams of the Radio Technology Laboratory was tasked with producing a .. summary document covering all of the work carried out to date. The minutes of that meeting are reproduced in annex 5, it should be noted that the chairman stated that the summary report should aim to concern itself with the direct breakthrough problem only, and ILQ&the TV image problem which may affect the UK only. [z] Interference to TV, radio, audio and information technology equipment, including personal stereo equipment and hearing aids. ., . ETSI (GSM 05.90 version 6.0.1 Release 1997) 43 ETSI TR 101 640 V6.0.1 (2001-11) Page 46 ETR 357 (GSM05.90 version 5.0.0): January 1997 2. Summary of Fidingm . 2.1 Domestic Equipments . Television receivers and portable radios/cassette players etc. proved to be the most susceptible domestic equipments with mean immunities of 4.0 and 5.6V/mreepectively. _nua recg$ ~J these ew~-ts ‘ould ‘nly suf~er er interference from a 20 W GSM mobile at distances of less than about 8 metres (worse case ass@n9 100* effici~cl’ -d free space path loss). ~is means that in practice, due to building attenuation etc., interference will not occur unless the transmitter and victim equipment are very close, and within the same room. 2.2 liearingAids. G Hearing aids also proved fairly’ susceptible, having a me= ilmnunityof 4.1 v/m. Interference to hearing aids (andportable cassette players etc.) outside the domestic environmentis likely to prwe more problematic since the interfering GSM transmission is unlikely to be under the control of the user of the victim eguipment. Work conducted by the RTL and Racal Research Ltd. suggests that the ixnunity of small behind the ear hearing aids canbe improved at reasonable cost (by -t 10 m) by applying conductivePaint to the inside of the hearing aids plastic case. This would reduce the interfering range of a 5 W portable GSM transceiver to about 0.5 metres which is considered acceptable. 2.3 Eighu Frequenoy Systems, DECT, DCS1800 etc. ds ~rw~re su~ to 1900 MlkkhWA This has obvious implications regarding the Introduction of DBCT etc. ETSI 44 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 47 ETR 357 (GSM 05.90 version 5.0.0): January 1997 3. Xnrmunity Data. 3.1 Sources of Data. Reports from the following laboratories were analysed to produce this summaq document; Radio Technology Laboratory Reports KJ109, KJ132, SCJ132a,KJ181 Partl, XJ181 Part2. British Telecom Research Laboratories Report RT4123 Netherlands Pm (hoofddirectieteleconnnunicatie en post) Report Radio Frequency Investigations Report RFI\TR2\2294 3.2 Normalisation of Data. The above laboratories presented their findings in a variety of forms. Introducing this summary report it was necessary to unify the various abstract results and findings, by calculation and extrapolation, to a corrunonform - ,= tv . at w= t was on CCIR grade 3.5 impairment was considered an appropriate limit of acceptabilityfor GSM interferencesince it falls halfway between the impaiment that is considered acceptable, by the CCIR, for continuous interference (CCIR grade 4), and that which is only considered acceptable for a very small percentage of the time (CCIR grade 3). The approximate field intensitiesthat would result in CCIR grade 3 or 4 impairments can be obtained by adding or subtracting 5 dB audio impairment respectively (since a 1 dB change in the field intensity results in approximately a 2 dB change in the audio impairment (square law), multiplying or dividing the grade 3.5 field intensity by 1.33 will produce the approximate grade 3 and 4 field intensities respectively). A description of the impairment associated with each of the standard CCIR impairment grades is given in Annex 1. 3.3 Analysis of the IIata. The original laboratories data and its conversion to field intensity for grade 3.5 impairment is given in Annex 2. The Mean and Standard Deviation of the extrapolated data is given in Annex 3, and Summarised in Annex 4. ETSI 45 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 48 ETR 357 (GSM 05.90 version 5.0.0): January 1997 4 G Obaaz=atiansG 4.1 Earlier work at the RTL has shown that the magnitude of AM or pulse [2] interference is related to the peak envelope power of the transmission. i.e. A victim equipment demonstrating immunity to 3 V/m (carrier)with lkHz, 80% emplitude modulation, is also demonstrating immunity to S.4 V/m peak i.e. a TDMA .immunity of 5•4 Vlln. This is supported by the recent tests conducted on hearing aids by RFI. [2] 1:24< duty ~cl@ <24:1 4.2 The recent tests conducted by RFI shows that the majority of the hearing aids tested (the smaller ones) were more susceptible at 1900 MKz than at 900 MHz (the mean izxzunitywas 7 dB worse). l’hisfinding has obvious inqlications regarding the introduction of DECT etc., and is supported by some (limited) earlier work conducted by the RTIJ (KJ132a). 4.3 Inteationallybhmkforreportwdimmminatedoutdle theAgi?rIcy. ETSI 46 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) 5. Page 49 ETR 357 (GSM 05.90 version 5.0.0): January 1997 cmclus*oa8• 5.1 The extrapolated mean/median peak TDMA field intensities at which various equipments would suffer visible/audible, but not annoying interference (approximatelyCCIR grade 3.5) are listed below. Typo of Xqupanent Hearing Aids Television Receivers Video Cassette Recorders Satellite Television Receivers Tuners/amplifiers Cassette Decks CD Players Portable Radios & Cassette Players etc. Telephones Computers Commters (HOMe/GameS) Piold Intensity (V/=) 4.1 4.0 >13.9 9.5 >8.3 >2.9 >13G 9 5.6 >7.6 >8.5 >13G 5 G&ral Electrical/ElectronicEquipment. >7.8 From the above generalisation it can be seen that the most susceptible equipments are hearing aids, television receive=t cassette decks end portable radios/cassetteplayers etc. ~ ~f these ‘Ould only “Uffer interference from a 20 W mobile at distances of less than about 8 metres (worsecase assuming 100% efficiency and free space path loss). This means that in practice, due to building attenuation etc., interference will not occur unless the transmitter and victim equipment are very close, and within the same room. It can therefore be concluded that GSM interference is unlikely to cause any serious problems to domestic equipment, being used in a domestic environment. Interference to hearing aids and portable cassette players etc. being used outside the domestic environment is more likely. ~rlier work conductedby the RTL and Racal Research Ltd. suggests that the immunity of small behind the ear hearing aids canbe improved at reasonable cost (by about 10 dB) by applying conductivepaint to the inside of the hearing aids plastic case. This would reduce the interfering range of a 5 W portable GSM to about 0.5 metres which is considered acceptable. [41 Although it was requested that this sununaryreport should aim to concern itself with the c!im!?ct_~ poblemonlyr =& not the TV image problem which may affect the UK only, following background information is included for completeness. !- The image (spurious) response of television receivers is potentially quite problematic because, for some of the higher Band V channels, this response falls within the bands allocated to TACS and GSM. However, interference via this mechanism is no worse for GSM (or other ‘IWA systa) t- it is for ~l~e systems e.g. TACS. As no cases of TV image interference from TAC!S have been recorded during several years of operation,major image interference problems from GSM are not anticipated. ETSI (GSM 05.90 version 6.0.1 Release 1997) 47 ETSI TR 101 640 V6.0.1 (2001-11) Page 50 ETR 357 (GSM 05.90 version 5.0.0): January 1997 5.2 The following pertinent information has been extracted from RET’s test report RFI\TR2\2494; 5.2.1 h-iC XZIUJUUityS~. The draft generic immunity standard (prm 50082-1) requires the BUT to be tested at 3 V/m fmm27 MEz to 500 MHz, but since there is no requirement to modulate the field it is unlikely that any hearing aid equipme=t would fail this test. The final version will almost certainly require that two further tests listed in the informative annex to be carried out: Electromagnetic field at a severity level of 3 V/m 80* &itude modulated with 1 kSiztone swept from 80 MHz to 1 GHz. 2. electromagnetic field at a severity level of 3 V/m pulse modulated with a 100 Hz square wave at a frequency of 1.89 GHz. 5.2.2 Field Strength Produced by Porteblo Transcdvers. WfimhumQWwe Wikluhe Qm,ezic a~ RFI have calculated how closely the user of a piece of hearing aid eguipment may approach a portable transceiver before the level of unwanted interference table; symtm C!T2 GSM DX!T becomes unacceptable, Puuer (w) 0.01 2.00 5.00 8.00 20.00 0.25 and produced the following Mlxthum Distance (m) 0.1 M 2.8 4.5 0.5 RFI state that; These figures only provide a rough guide as they make no allowance for the type of modulation employed or for the disturbance of the electromagnetic field caused by the person using the hearing aid. and that; The values calculated above would suggest that users of hearing aid equipment are likeIy to experience ~interferenoe frcxBGSM. mobiles in close any of the above - proxiziityand that they will not be able to use systems themselves. . ETSI 48 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 51 . ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex F: Interference to hearing aids by the new digital mobile telephone system, Global System for Mobile (GSM) communications standard . Intarforoxxm to Moaring Aids by tho now Digital Mobil. Telephone System, Global systam for Mobil- (GSM Communications Standard ,, Ken H. Joyner Mike Wood ELECTROMAGNETIC COMPATIBILITY SECTION TEI&COM RESEARCH LABORATORIES and Eric Burwood Derek Allison Ross Le Strange ENGINEERING SECTION NATIONAL ACOUSTIC LABORATORIES .. NATIONAL ACOUSTIC LABORATORIES a Divisionof AUSTRALIANHEARINGSERVICES SYDNEY, 30 March, 1993. A AA ETSI (GSM 05.90 version 6.0.1 Release 1997) 49 ETSI TR 101 640 V6.0.1 (2001-11) Page 52 ETR 357 (GSM 05.90 version 5.0.0): January 1997 ABSTRACT :‘ This report gives the details of some measurements on the interference caused to hearing aids by mobile telephones using the new “Global system for Mobilem (GSM) Communications Standard. The widespread use of this system may cause considerable interference to users of hearing aids. It is not known at present if hearing aids can be designed to be completely immune from this interference. This report has been written to alert all hearing aid users and those concerned with the use of hearing aids to the possible disruption to the use of hearing aids that may be caused by the new GSM system. . . . ETSI 50 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) 1 2 3 4 5 6 7 8 9 10 11 Page 53 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Ta.bloof Contants Introduction Acknowledgments Nature of Transmission from GSM Mobile Telephones Interference to Hearing Aids Description of Measurements Interpretation of the Results Interfering Mechanism Remedies Conclusion Recommendation References !,s List of Tables 1 Field Strength for Noticeable Interference to Hearing Aids 2 Threshold Distances for Noticeable Interference to Hearing Aids 3 Measured Field Strengths Near GSM 8 Watt Transportable Mobile Telephone 4 Measured Field Strengths Near GSM 2 Watt Hand-Held Mobile Telephone Li=t of Figures 1 Sample Frequency Spectrum of a Hearing Aid Output with Interference 2 GSM Transmitter - Test Set-Up for Simulating Transmission 3 Hearing Aid Output with an Interfering Signal - Test set-up 4 Sample Acoustic Frequency Response of Hearing Aid 1 1 1 2 2 3 4 4 5 5 5 6 7 8 9 10 11 12 13 .. ETSI (GSM 05.90 version 6.0.1 Release 1997) 51 ETSI TR 101 640 V6.0.1 (2001-11) Page 54 ETR 357 (GSM 05.90 version 5.0.0): January 1997 1 Introduction The new mobile telephone system, using the ‘Global System for Mobile” (GSM) communications standard, is due for introduction in April this year. It uses digital technology and operates at radio frequencies (RF) in the 900 MHZ region. The portable hand held and transportable telephones are capable of interfering with commonly used electronic equipment and can degrade the performance or even prevent the operation of hearing aids. NAL was approached by Telecom Research Laboratories Electromagnetic Compatibility Section about the possibility of checking if the system interferes with hearing aids. Telecom was undertaking an investigation into interference caused by the digital telephones. As a result NAL and Telecom staff undertook a series of measurements designed to establish the nature and extent of interference to hearing aids. The following is a report of these measurements, together with some recommendations. 2 A=knowlodgmeats Dr. Ken Joyner, Head of the Electromagnetic Compatibility Section, Telecom Research Laboratories, first approached NAL through Mr. Eric Burwood and visited NAL on 18th and 19th February, 1993 when it was established that interference may be a problem. Subsequently, measurements were carried out on 4th and 5th March 1993 to quantify the extent of the interference likely to be experienced by hearing aid users. Dr. Joyner and Mike Wood of Telecom Research Laboratories Electromagnetic Compatibility Section set up the equipment to generate the radio frequency field to simulate the telephone emissions and also provided Tables 3 and 4 of field strengths emitted by the GSM mobile telephones. 19essrs. Eric Burwood, Derek Allison and Ross La Strange of National Acoustic Laboratories carried out the hearing aid measurements. . 3 Nature of Transmission from For the GSM system the GSX Mobile Telephones radio spectrum available for mobile-to-base (i.-e.mobile telephone) transmission is between 890 and 915 MHz, and for base-to-mobile it is 935 to 960 MHz. The modulation produces 0.6 MS bursts of RF energy from each telephone transmitter at a pulse rate of 217 Hz. A number of peak power leveIs and equipms-configuzvrtlm are available fox GSM mobile telephones for use within Australia. These include a 2 watt hand held unit and an 8 watt transportable unit. When due account is taken of the pulsed nature of the transmissions, the corresponding average power levels are 0.25 watt and 1 watt respective y. The peak RF field strengths close to the antenna of the mobile telephone can be quite high. At 10 cm from an SW transportable unit a peak RF field of 70-80 V/m has been measured. The GSM system is a pulsed system with a higher peak power than the present analog mobile telephone system. This makes the G!W ETSI 52 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 55 ETR 357 (GSM 05.90 version 5.0.0): January 1997 system much more likely to cause interference into electronic equipment which is apparently not affected by analog RF fields. Obviously the potential for interference depends on the number of GSM mobile telephones in use in the community and this is unlikely to be very high in the next few years. 4 Xnterfarenoe to Xearing Aid* Interference to a hearing aid is considerable, the amount depending on the details of its design. Considerable concern is felt by the European Hearing Instrument Manufacturers Association as the new system is being implemented in all European countries. The Australian Telecommunications Authority, Austel is embarking on an investigation into Nmerging technologies for the delivery of wireless personal communications. The interference from one transmitter is heard in the hearing aid as a constant, distinctive buzzing sound while the telephone is transmitting nearby. Figure 1 shows a typical frequency spectrum of the output of a hearing aid with interference, which occurs across the useable range from 200 to over 5000 Hz. Hearing aids from all manufacturers will be similarly prone to this interference. ., 5 Description of Measurements - Sensitivity of the Hearing Aids to the Interfering RF signal a ~: To measure how the effect of the interference varies with the peak RF field strength, so that useful predictions could be made about the effect on hearing aids in proximity to these telephone transmitters. This was done by:- i Measuring the output of the aids subjected to varying RF field strengths, and ii Subjectively comparing the interfering output with a sound of known intensity. bMWM:” i ii The hearing aids were placed in a known variable RF field generated by the system provided by Telecom shown in Figure 2. The sound output of the hearing aid was measured in a 2 cc coupler with a B&K 2120 FreWencY Analyser set for wide band with a 100 Hz high pass filter ~w= ~t lQW f=w=JcY -ient noise J ‘efer ‘o G The noise floor of each aid was measured with the mic~ophone blocked to ambient noise. The hearing aid output was then measured under a suitable range of field strengths, including that which produced an output 10 dB above-the noise floor. Frecaut-xifi . c : i The measuring microphone and large metallic objects which around the hearing aids. In acoustic 2 cc coupler are alter the field strength order to obtain reasonably ETSI (GSM 05.90 version 6.0.1 Release 1997) 53 ETSI TR 101 640 V6.0.1 (2001-11) Page 56 ETR 357 (GSM 05.90 version 5.0.0): January 1997 accurate field strength at the aid, the 2 cc coupler and microphone were moved away from the vicinity of the aid. A 460 mm length of 2 mm diameter Tygon tubing was necessary tO COUple the iIid6 to the 2CC COUpler. This changed the acoustic frequency response of the aid, an example of which is shown in Figure 4. This change of response does not invalidate the measurements for the purpose of this investigation, since the bandwidth was not reduced significantly. The peak RF field strengths were measured using the apparatus shown in Figure 2. The output of the generator was varied with its attenuator in order to adjust the RF field incident on the hearing aid under test. ii On rotating the aids in the RF field the received interference changed. However, for the purpose of this investigation, it was decided that the orientation which produced the most interference in the majority of aids would be used, since time was insufficient for a more extensive exploration and it is unlikely that significantly more useful information would have been obtained. iii The frequency response of ,each aid was graphed with normal acoustic termination and also with the extra tubing using a NAL 8500 system whose calibration was checked with a B&X calibrator. This shows that the aids were operating correctly. d ~: i The outputs of each aid was recorded with and without interference for subsequent subjective evaluation. ii Recordings were made of the output of some of the hearing aids with test speech passages of known average SPL with and without interference to ascertain what may be deemed a suitable threshold for characterizing the effect of interference. It was confirmed that a useful ‘annoyance” threshold.is the RF field strength that causes an output 10 dB above the noise floor of the hearing aid, i.e. the output without interference and when the microphone was blocked to ambient sound. Increasing levels of interference rapidly increases the level of discomfort~ e.g. when the interference was increased to 20 dB above the noise floor, the effect became unacceptable, even though the accompanying speech was still intelligible. iii It is intended to prepare-a cassette tape recording with samples of a hearing aid output with and without ,.. interference to speech. ETSI 54 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 57 ETR 357 (GSM 05.90 version 5.0.0): January 1997 6 Int@rprct8tioa of tho R@8Ult8 a ~’ Table 1 shows the threshold values obtained with the hearing aids issued by AHS. Interference when the telecoil is used is slightly different to that with the microphone. b ~’ Table 2 gives an approximate indication of the relative distances at which the 20 dB threshold is reached from a 2 watt GSM hand-held mobile telephone, and from an 8 watt GSM Transportable mobile telephone. These are estimated from the hearing aid thresholds in Table 1, and by extrapolating from the peak RF field strength measurements over grass in Tables 3 and 4. AS indicated in Tables 3 and 4, significant variations occur in field strengt~ depnding on the ~ediate enviro~ent~ however the estimated values rank the aids correctly and give a realistic indication of the range where interference will occur. dit&ns under W1’Q~uterf~e Occurs G c G. i The telephones interfere with all the hearing aids tested. A user of one of these hearing aids will not be able to use these telephones, and a hearing aid will often become useless or cause the wearer discomfort close to a telephone when it is being used. This situation is representative of currently available hearing aids. It will be noticed that the 1T312 has the least interference. m explanation is given below. ii Behind-the-Ear hearing aids experience more interference than In-the-Ear aids. iii Hearing aids such as the VHX are likely to be unusable even several metres away from either the hand-held or the transportable telephones. 7 Interfering Meehamism a From the expWimental work we can say that the interference occurs at the most sensitive part of the hearing aid amplifier, where the RF field induces signals in the wires connected to the microphone or the telecoil and detected (rectified) by the transistor input, and possibly W *e output of the microphone which has a simple buffer amplifier. This mechanism applies in high gain audio amplifiers such a those used in public address sptsm?s that are eubject te AU radio and television transmissions. These are normally shielded from this interference and the input shorted by a small capacitor to eliminate the problem. b The higher peak pulses of RF power radiated and the close proximity to the hearing aids where they will normally be used, combine to make this interference more severe than the above cases. c Sometimes a small capacitor is used shunting the amplifier input to prevent RF signals being detected and heard by the wearer. The Calaid Sonata has a small capacitor, but is not ETSI (GSM 05.90 version 6.0.1 Release 1997) 55 ETSI TR 101 640 V6.0.1 (2001-11) Page 58 ETR 357 (GSM 05.90 version 5.0.0): January 1997 close to either the amplifier chip or the microphone. The Serenade, VLK and VMK/MK do not. This explains the lower threshold RF field strengths of the V aids. The new XT312 has much shorter microphone leads than the previous ITE hearing aids Sonata and Serenade, since the microphone is solidly mounted next to the amplifier board. The lower sensitivity to interference is consistent with the above mechanism. i Filtering: The shunt capacitor is a simple filter. It should be placed physically very near the amplifier integrated circuit chip with very short wires. It may also be necessary to place one across the microphone output at the microphone. The capacitors are restricted by their affect on the circuit operation as well as taking up valuable space. By using a small ferrite inductor in series with the microphone leads in conjunction with the shunt capacitor it may be possible to eliminate interference. ,$ ii Shielding: Complete shielding of the whole hearing aid with a conductive sheath will eliminate the interference, but is likely to be impractical. Suitable methods include thin metallic coating on the inside of the case parts, impregnation of the plastic with fine conducting particles and using a Wmetallicn paint. It may reduce the sensitivity of a telecoil if fitted. It is likely to be impossible to completely shield the aid, and connecting leads for audio input and induction pickup coil (telecoil) that are not shielded would present problems. iii Feasibility: It is not known now if these or other remedies will work and to what extent they may work. iv Restricting the use of the new GSM mobile telephones will prevent interference, but would probably make the GSM system useless. b ~: Changes to the large number of existing hearing aids has the following problems: i It may be logistically difficult, if not impractical. ii Feasible. -ications are likeU! to be of minimal effectiveness because of the difficulty in app~ying effective remedial treatments to an existing product. iii .’Modifications to existing aids may be very expensive. c : If effective means to prevent interference are developed, they could be designed into new hearing aids. 9 conclusion a It is likely that hearing aid users will be inconvenienced to some extent very soon after the new telephones are ETSI 56 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 59 ETR 357 (GSM 05.90 version 5.0.0): January-l 997 b c d e 10 a b c 12 a b introduced. Widespread use of the new GSM mobile telephones may make existing hearing aids useless for much of the time. Unless there is a realistic design remedy, new hearing aids will be affected, but possibly to a lesser extent, since partial remedies seem to be possible. Co-operative work to investigate effective design solutions is necessary, to establish if they can be developed. Monitoring the uptake of the GSM service and reports of interference to hearing aid users to gauge the extent of the problem in the short term and in the longer term undertake a co-operative programme to find practical and cost effective solutions. Rocommeadatioa Make this problem known through: i Austel, ii Hearing Aid user Groups, iii Hearing Aid manufacturers, ‘“ iv Relevant government departments, Initiate co-operative work to look for a suitable design solution, Keep the above mentioned bodies informed about the extent of the GSM system and inform GSM mobile telephone users about the interference that may be caused to hearing aid users. Reforona** Buropean Hearing Instrument Manufacturers Association, ‘Implications of GSM for the hearing handicapped”, Bosstraat 135, B1780 Wemmel, Belgium, Tel 32-2-460 2284, Fat. 32-2-460 42449. . AUSTEL, ‘Dispassion Paper: Wireless Personal Communication Semricesm, Mobile Equipment Standards Section, AUSTEL, P.O. Box 7443, St Kilda Road, Melbourne. Victoria, 3004 -. ETSI (GSM 05.90 version 6.0.1 Release 1997) 57 ETSI TR 101 640 V6.0.1 (2001-11) Page 60 ETR 357 (GSM 05.90 version 5.0.0): January 1997 !Mhlo 1 n Field Strangth for Ieotiuoahla Hearing Aids (?rox moa8ur8mon*8of ASS ImtOXfOr@mC@ to Eaaring Aids) Mierophoao 8witahod In T810eoil 8wit8h@d In r Eoariag RFField ?kwdng d8- ~ - d’llm~ Aid (vol&$/ ~ - (volts/ && -) ~ ~) (m RF) -) ~m (noRF) I 9*4 I 69.5 I 10.0 1 9 s 4*9 66.0 10.5 2 Jm12 32.3 78.0 9.5 N?U&- -. ETSI 58 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 61 ETR 357 (GSM 05.90 version 5.0.0): January 1997 TS.blo 2 Threshold Distawos for BIotiuoab18Inttrforenco to Soaring Aids (Calculated from measured aid sensitivity and approximate field strengths near the telephones) m MEms MIC MEIRES +& 50.0I INPW 50.0 i 021 llm2 0.2 0.1 0.11 amllllMmT2.D .. ETSI 59 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 62 ETR 357 (GSM 05.90 version 5.0.0): January 1997 T8blo 3 M@asurod Field 8trongttw Blou 6sM 8 Watt Tr8asportable Mobil. Tol@phoaa, (Source TelecoxnResearch Laboratories personal communication) (m) 0.1 0.2 0.3 0.4 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 5.0 Fidd = 81.8 53.4 34.9 27.4 21.8 1.2.o Fidd lii?iiE 76.3 51.6 36.9 30.7 23.3 32.0 25.0 3.2.4 10.1 5.7 6’.2 5.9 9.6 4.0 I 7.5 4.1 , 2.8 5.8 .. ETSI 60 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 63 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Tsblc 4 [email protected] ?i.ld Strmigths M.sr GSlf 2 Watt Hamd-R.ld Xobila Talophona, (Saurce Telecom Research Laboratories personal communication) 0.1 0.2 0.25 0.3 0.4 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 5.0 41.9 38.7 28.7 27.1 24.1 20.8 21.3 3S.0 16.3 13.1 14.7 5.5 7.1 6.2 3.4 6.4 2.4 4.1 3.0 1.7 3.5 1.7 4.3 4.3 1.1 4.0 1.2 2.7 0.8 . . ETSI 61 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 64 ETR 357 (GSM 05.90 version 5.0.0): January 1997 100 90 80 70 60 50 4a 3C 1 68mplo Frquoauy spectrum of G x88riAg Aid output with Iatarfarana. BRNDWIDTH : 1/24 OCT. tWERF@INQ : El@. } 16s ,*, I 20 & I t I 1 I I 12s 250 500 lk 2k 4k 8k Hz . -. ETSI 62 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Figuro 2 Page 65 ETR 357 (GSM 05.90 version 5.0.0): January 1997 GSN Txaa8mittor - Test Sot-Up for 8imulmting Tran8missioa ~ W 19019 PULSE GENEMTOR I 1- %=FCp P!i!El RR POUS? RHFLXFIER 25U1OOOH7 + 223 CORX 30” + Clonl) ROBERTS 900MHz DIPOLE I LENGTH 7.9CIU 1 Zrn I 90014Hz COW TO.. b/WEt3UIEmTOR I TEKTRONIX 2782 sPEcTRl#laNFILYsER 3 ETSI 63 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 66 ETR357(GSM05.90 version 5.0.0): January 1997 Figure 3 Hoariag Aid Output with an Xatorforing Signal - T*8t s-t-up . B&K 4230 CALIBRATOR TUBING HEARING AID 460 MM 2MM DIA MEASURING UNDER TEST A 2 cc COUPLER MICROPHONE & I TAS($AM TAPE RECORDER B&K 2120 MODEL 58-OB L FREQUENCY IJEL_l PHILIPS PM97 SCOPEMEER -i MONITORING AMPLIFIER H LOUDSPEAKER I -. ETSI 64 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) 4 Page 67 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Ssmpl. Acoustic ?raquonoy Rasponse of Haaring Aid, with and w$thout artmdod tubo to 2GC coupler Gaoustio load. 110 100 mlNwIEu ?0 aSPL UITH 4SRN9 x 82.0 m To SwmFmD 55 - 2ccml@LER-ONSE 00 ~;mL& 7n --s .* .6 M(HX ETSI 65 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) ETSI ETSI TR 101 640 V6.0.1 (2001-11) 66 (GSM 05.90 version 6.0.1 Release 1997) Annex G: Studies on interference from GSM terminals to the fixed network telephone equipment This annex includes four studies on the interference from GSM terminals to the fixed network telephone equipment. The studies are made by BTL, France Telecom, CSELT/SIP and Televerkets Forskningsinstitutt. See attached PDF file. ETSISTCSMG2No.S 9tb-12thMarch1993 Brigbttm, UK Same: BTL(USC) Page 69 ETR 357 (GSM 05.90 version 5.0.0): January 1997 T.Doc S2/93 Rev 1 Subject : EMC Considerations forH telephones bttheUK TMtablebdow showsthexesdtsoftestingths imnmnityofvariousfixedtdcphoncsandPBXup@um (both analoguc anddigkd) available intheUK The@dngwasconducted at3V/m and 10V/m using a simulated GSM testsignalasthsintufercncs. “ 10 “ if 3 . . 10 . cm 3 “ G 10 910 Cw 3 . . 10 “ AM 3 “ “ 10 * cm 3 “ 10 955 iv 3 “ 10 “ if 3 . . 10 . m 3 . . 10 R E s u L T 18 lb lb 2 3 & & k J 6 . F F . F . . F F . F F F F . . . . F- . . . . . . . F- ,* F ‘. . . . . F- . i- . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Itcanbc ssenthattbsvast majorityoftclep--klqti equipmcnttsstalis notsawzptiblcat evcn10V/3nThisfisIda&uut13will betwssetUSta~of lmfroma Class4mobik. ThcrCfm. skboughit isrecognisedtha{interferem% tim GSMmobilesto fixedtelephonesis anNXUC, duetothe UKimmunitystandardforfixedtelephones,this is notconsidereda majorproblemin theUK. * :“ F Failsd test . Passsdteat . Nottsstcd whenfailllm Uitelia Wss40dBPa. 1 PBXwithvarious tsrminaI equipment 2 PayPhone 3 MIDUDEMUXequipment 4 PBX with various terminal equipment 5 ISDNrquipment 6 Lineterminaleqwpment ETSI 67 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 70 ETR 357 (GSM 05.90 version 5.0.0): January 1997 source: France Teleoom Subject: EIWCoonsiderattons for = Wephonee in France f.lmmduc?ion Mobile GSM PO** terminals have been identified in France as primwy SOU_ of mterferenoe to fbd telepho-, elao&o~ devime and video displays. As these wmat firat,subjecdvamults, bating of W immunityof Vdous M telephones al dose distmme of G pmgmmmable GSA pwtabie equipment was undwtaken. A oommerciisllyGmiletie GSM urdtwas used fortheee teets,withG apadlk test SIM card. mls-m-mm~t ia~mtimm~~daa~,ti frequency (channel),the peak powr and the aequance as well as many other parameters. p Performsnoe orite~ A vefy impoftant point ~ming the immunityd the telephone is the pXfOmUtn= @tefia. For fixed telephones or aoouSM~, themain pelfonnanoe cdte*ktif-tim noise should be fm’tenadto, oaueed by the GSM TDMA pulses (217 Hz Gnd harmonbs) occuring by Gudb mctMoa@n in the IC Gmpillfars,or non linear dmuits of the electroacmmtic4 devices. In sddition, for fixad telaphohes or PABXs, the audio recMcaM“ signal should not be sent in dff’Fef8fW mOde along the tatephone tine. It means that the cxmespondent shoutdnot tieten -to the demodulated signals occunng by the pmsanoe of GSM unit dose to the telephone at the other end. TwQcriteria wedafinedi nFmnsf orthe tek@meemcaming their immunity to the radiated or oonductad interference. R~, ~RF_titi ~~tiatittiphm finetia~kvd higherthan -50 dBm in the Gudii transmission band , on G 600 Ohms ~tde@mne line vuttha differential mode. Second, no nois+higher than 50 dBa weighted, should be listened m the earphone or in the audiimnsducers These pammeters camcterize the performance criteria in the presenoe of RF W-m and provide a generally accepted mpresentadon of the ef!ect of good performance.Of murse, no intem@on of call, neitherbee of stored numbers in memory should ooeur The appendix shw the test deadptbn and detailed resultson these immunitytests. ETSI 68 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 71 ETR 357 (GSM 05.90 version 5.0.0): January 1997 3 R-u?tsGtd ooncluslq tthasto bementioned that no-d ongoing cd,nodiaiingo rmr, m- of stored informationoccxred, buttha dafn@@t8d bvel was u~ptabb. . Even, ifitcouldbe@midemd thetifinthefutur8,88peC#io 82andw’df romthecENELEc ammning telephone oould include euch immunity requirwnente, the GSM interferemoe potentialWay ieto be Wan into aocount beoauee there q millionsoftelaphone equipment that me eusceptlbb to dose dietanoe GSM Gmbaione . We ameidertha! ifa 8 Wpodabk GSM tetmhalk used, he mexhnumdstance ofpotenthl intwbmnce& t@ca#y abouf $0 met- maxhum, andif•2 Watta GSM terminalisused thi3dWenceismduoedtoa~m of5mdu8. in any case, we mcmnwnd Uut for non ar~badmd GSM teminde, the radmed power should not be higherthan 2 Watte paak power. A oonbibutionon thie eubjeot oonoeming G epedllo EMC standard of tetephone and PAM equipm- shouldbe 8entto CENELEC. ltisconeiderad thatintatfamoafm mGSM tarminaletofbcedMephoneeand PA6X isan iseue fhrough the European oommunity, aven lf body worn Gudii and heafth eleotmnic equipment*s major Gnd muohmom important i8eue. ETSI 69 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 72 ETR 357 (GSM 05.90 version 5.0.0): January 1997 AQm!i!k ‘1.Me8swementOfdl 8 hnrnunttv of fixed taIenhotw ado mor@ In otder to evaluate the immunity of eleob’oniotelephones to the emission of GSM terminals, twotypes of experimentsware oarriedout First, a subjective t8$t in 8 aacret8fy -, the ~ is a formal immunity teat in a sem~ aneohoic room. I.1.SubieotNe ~ G h an ordnary secretsIY oflioe, many differentfixedtelephoneswere ins@led . We asked to Va*US people prasant them to call with these Wephone$. An openstorusinga GSMportabk 8W_PSak~-a ~titi-mti. Assoonasthe fhtpheaa of GSM~~-f@d, 8Utheteiephone$ WlWin~fi= were mom or less hightyd~rbad by the presence of the GSM emission by w~rimP@ng a noise on the telephone Gudm bend. Fortie~@ Wowmti~rti tiGSM~, W*wsti-mM(l m tY@osflY)and-* PS@O IJV@mferthef, ths oommun-n was made pos@b@. ,* Typically, at a diatanoe higher of 5 meters, the communidkm with the GSM dd not d~urb the uther telephones. l.nnl munlhr ~ ~e-m GSMtetiti -tibamtia~ F~~a&tiadtin= ofl meters some fixed telephone terminals wem * up with G test fbdwu in order to evaluate the demodulated Gudo noise prwided by wdio n!dbabo.nMti~@toneandonthe telephone line. To avoid Gny coupling with the fiatd strength , the maasumnent equipment vvaa put outside the semi-aneohok room. The field strength w ~. monbrad to make a oormlationbetween~- ~r, the tleld strength and the demwhbted output. 3$.RESUL~ The limits are -50 dBrnopJ600 Ohms of clemodulatad level along the line differential mode (DM),and typically 50 dBA on acoustic Ievd at the earphone ETSI 70 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 73 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Source: CSELT / SIP EMC considerations for fixed telephones in Italy 1 G Introduction some SMG2 documents have been produced up to now on the potential disturbances of GSM transmitters on fixed telephones in UK (SMG2 Tdoc. 52/93), in France (SMG2 Tdoc. 89/93) and in Norway (SMG2 Tdoc. 100/93). This document adds some information to the problem, by discussing the results of some tests pedormed in Italy using a set of fixed telephones interfered by GSM emissions at different power. ~, 2- Measurement proceduro The immunity of fixed telephones to the interference of GSM emissions was measured in two different environments: a Gtiz-TEM cell and a properiy equipped flat roof. 2.7- Generation of the GSM intedenmce Most experiments were carried out using an interfering signal produced by a transportable GSM mobile equipment communicating with a base station at a constant power level (since the power control function of the GSM was not active during the test). A portion of the GSM signal was split by a 20 dB directional coupler and sent to the radiating antenna through an RF power amplifier. The signal power level at the antenna was regulated by a variable attenuator and checked by means of a peak power meter. Other experiments were also performed by emulating the GSM emission through a sine-wave (gmmmtedby mearra of a-fr~ SYWU@S@ modulated by pulses (produced by an arbitrary waveform generator). Two modulating signals were considered: a pulse reproducing the GSM frame (repetition ~ateequal to 216.6 Hz, duty cycle of 1/8, guard time equivalent to that of GSM bursts) and a 200 Hz square wave with a duty cycle of 50940. 2.2- Performance criteria for the immunity tests The following parameters were used in order to evaluate the immunity of the fixed telephone to radiated or conducted interferences. ETSI 71 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 74 ETR 357 (GSM 05.90 version 5.0.0): January 1997 G JWM3 re~a the tinQ .(expressed in dBmop on 600 Q), measured by a psophometer and weighted by CCllT curve. A maximum value of -50 dBmop is consistent with the current trend in CENELEC standards. . . G vel of tht? ae~ (expressed in dB-SPL, weighted with the A curve) listened by an artificial ear coupled with the handset. Even if no limits are currently specified, on the basis of laboratory experience, a level of 60 dB-SPL can be considered clearly audible, while a level of 70 dB-SPL gives trouble to the conversation. 2.3- Test setup Formal tests were carried out in a GHz-TEM cell using the block diagram shown in fig. 1; the devices under test were interfered by a verticaliy- polarised plane-wave produced by a radiating element fed by the GSM test signal. The acoustic disturbance was measured by an audio analyser connected to an artificial ear, while the noise rejected along.,;the line was measured by a psophometer. A preliminary calibration of the electrical field strength was pdormed by using a continuous wave signal, whose equivalence with the level of the GSM stimulus was established by means of a peak power meter. Measurement have been performed for electrical field strength of 3, 6, 10 and 15 V/m. The correspondence between, the electrical field measured in the GHz-TEM cell and the power transmitted by a GSM mobile was verified separately on a propefiy equipped flat roof covered with a metal plating and supplied with panels of absorbing mat#rial, which attenuate the scattering from other directions. It has been verified -I the #ectricat field values measured at one meter distance from the calibrated dipple had a good correspondence with the expected values of the .trarmr@ttad power (-6 V/m for 0.8 W, -10 V/m for 2 W, -16 V/m for 5 W and -20 V/m for 8 W). - The equipped flat roof was also used for informal tests: the devices under test were placed on a ~wooden and plastic support. Some experiments were carried out with the same stimuli as those used in the GHz-TEM cell, transmitted by a calibrated electric dipole mounted on a tripod. Other informal experiments were performed by a man bringing the active GS.M transmitters (hand held and portable) directly near the device under test. Ttw disturbances or’r ttNJ fixed telephones were measured in the same way as in the GHz-TEM cell case. ..- 3- Test results A certain number of telephones commonly used in the Italian public network were tested both using the GHz-TEM cell and the equipped flat roof. As far as the GHz-TEM cell is concerned, figs. 2 and 3 show respectively the noise rejected along the line and the level of the acoustic disturbance vs. the electrical field strength of the GSM interferer. Telephones. labelled as T1, T2, T6, 17 are samples produced by different manufacturers of a ETSI 72 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 75 ETR 357 (GSM 05.90 version 5.0.0): January 1997 very common model in Italy. The wide spread between the cumes (more than 10 d8) can be justified by the different ‘sensitivity of the electronic devicesput on the circuit boards of the telephones, by a slightly different arrangement of the device under test and of its wires and by the unceflainty of the measuring equipment. The shape ofthe telephone labelled as T3 looks like that of the previous ones, but its circuits are shielded by a metallic box, making it suitable for strong electromagnetic inteflerence environments. lts immunity (rejected noise lower than -50 dBmop and acoustic level of the order of 50 dB-SPL) is higher than that of the previous models. An immunity of the same oder of magnitude was also achieved by a rugged and compact model (Iabelled T5) without any pecu~ar shielding. The lowest immunity to the radiation was instead obtained by the modelkbelled T4. which uses”more sophisticated electronics for the automatic answering function. tt is worthwhile noting that the sensitivity to the GSM intefierence was caused in all cases by the electronic circuitv of the fixed telephones: in fact the tests performed on an oid electro=mechanicd analoguetelephone did not detect any kind of disturbance, even with very high intefieflng transmitted power (up to 20 w). The immunity of two selected telephones (Tl and 13) to the GSM interference was alsocompared with the irnmuni’ty to different stimuli (GSM-lik8 emulated signal and sine-wave modulated. by a 200 Hz square-wave). Thd resutts of the comparison are shown in figs. 4 and 5 respectively for the noise rejected along the line and the level of the. acoustic disturbance. Note that the spread between the curves is narrow, even if the true-GSM case resutts slightly worse. For the same selected telephones, figs. 6 and 7 compare the immunity parameters (noise rejected along the line and level of the acoustic disturbance) measured in the GJ=fzoTEMcell with those measured on the roof. The levels of the electric field measured in the GHz-TEM cell have been translated to power values in order to use the same scales for the two environments. The measurements on the roof have Ken performed with the dipole vertically and horizontally polarised and with the telephone kept vertical and horizontal, 1 m far from the dipole. The spread between the curves is wide (more than 10 dB), showing that the position of the interferer is crucial. The closest results between the two environments have been obtained when using the same physical conditions (telephone put in horizontal position and radiating antenna with vefticaf polarisation), while the worst results have been detected when putting the telepkmin ver?icaL posithn and using a radiating. antenna with horizontal polarisation, which, on. the other hand, .is a very unuSual arrangement. ‘ 4 = Conclusions From the performed measurements, it fesutts that the disturbances on the fixed telephones. are due to the impulse shape of the TDMA GSM transmission processed by the electronic circuitry of such telephones. Therefore, only the old electro-mechanical analogue telephones are immune from the GSM interference, while all the other current equipment is susceptible to close distance GSM emissions, showing a strong dependence from the power of such an emission. ETSI 73 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 76 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Simple and reliable measurements done with pulsed sine-waves give immunity results quite similar to the true=GSM case. This measurement technique can therefore be proposed as an effective alternative for the immunity tests of the telephones when only low cost, general purpose instrumentation is available (for instance for telephone manufacturers). Out of the tested fixed telephones, just an RF-shielded model and another with a very compact structure resulted complying with immunity requirements up to 6 V/m GSM field strength (that is 0.8 W GSM emission at 1 m distance), while some models did not even comply with 3 V/m (i.e. 0.8 W GSM emission at 2 m distance). The recent decisions made in SMG#7 to leave just the two lowest classes for GSM hand-held units (0.8 W and 2 W) and to assign the remaining two classes (5 W and 8 W) to the Vehiclelpoftable mobiles are then also suppofled by the above considerations. l“. : .!$ 1: I ,’ ,L .’1 .* i !, ,, I ETSI 74 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 77 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Fig. 1 Fig. 2 GW x— // /-; .......................... 1,...................... f ::’11 n, .,. “t--i-” Representation .ofthe experimental setup for the measurements Cell o “lo “20 “so dBm~ -40 “so “60 G70 .,!: . . . ,; ,, ,.4 ‘. , in the GHz-TEM ................. .......................................... ..... ........ ........ . .. ........ ,: ...... ............. ( . . . . . .. . .. . .. . . . .. . .. . . ---n-- ....... ~~................... ......................... .................................................. .......... ................................. a 3 6 9 12 1s VI m --- Rejected noise along the tine for the measured telephones in the GHz-TEM the GSM cell with ETSI 75 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 78 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Fg. 3 Fig. 4 100 90 80 c16-SPL 70 60 so 40 0 3 6 9 12 1s V/m ,’ Level 01 with the - - the acoustic disturbance for the measured telephones in the GHz+TEM cell GSM signal. 1 0 “1o -20 “so amp 40 40 40 ??0 :, .’ T1~ ................................................................................................................ ......... ........................................................................................... ................................................................ “.>’.:...-.-. ...~a(allm$ ................. .................................................................. ............................. ........ ...! ,. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. .. ....... . ....... . ... .. .. ... .... .... ... .. .. ... ... . .. .. ......... ... ........... .. .... .. .... ... . . .. .................. .. ... .. .... ... .... ..... ... ........ , 0 3 6 9 12 1s V/m Rejected noise along the line for two s&mples of telephones in the Gtiz-TEM cell with the GSM signal (straight line), the GSM pulse simulation and the 200 Hz square wave pulse modulation (dotted lines). ETSI 76 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 79 ETR 357 (GSM 0!5.90version 5.0.0): January 1997 Fig. 5 Fig. 6 100 90 80 d64PL ?0 60 so 40 . ..... . . ... ... .............................................. ................. .. ......... ....,, . ...... ...... ..................... ........ ............................... ....... ........................ .... ,.,. . ,-,.. n~) ~ ............................................... ..... 0 s 6 9 12 1s VI m Level of the acoustic disturbance for for two samples of telephones in the Gt=tz-TEM cell with the GSM signal (straight line), the GSM pulse Simulation and the 200 Hz square wave pulse modulation (dotted lines). .m . -------- --- .........................- * ---::--.--- ..-z~---% ... ......... e.,.. !.... .K. ..-”R. . .... .... ... .... .... .. ...... .... ... ... .. .... . ...... ........... ...... ........ . -. --sin-- - .--:Z---. -- -- .... .... ........ ........... . .... . ..... .... .. .. ... .. ....... ..... ... . .. .. . . ... ..... .... ... ...... .... ... .... %=== --, ‘“/ : 1 -------.-.-.-L---- ‘ ~~'.............................................................. ,_~*~..= -==--------------------- ------ “ - .,, .,. ,, ? m. I I o 1 z 3 4 s . w Rejected noise along the line for two samples of telephones in the GHz-TEM cell with the GSM signal (straight line) and in the roof environment for various antenna polarisations and phone positions (dotted lines). ETSI 77 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 80 ETR 357 (GSM 05.90 version 5.0.0): January 1997 100 90 80 d6+PL 70 60 so 40 I . ...... ......... -e.=: =........................................... ................................ . ...... -- ................. .... ..” . ...4 .4 .:.;.:. .........G.........0... u.Oa.*..................................................................... w .......... . .. . . .. ... .... ... ...... . . . . . . ................ .. .. ............ ...................... ......................................... .... ........ 1 m. o ,1 Fig. 7 Level of the acoustic disturbance 2 3 6 s w for two samptes of telephones in the GHz-TEM cell with the GSM signal (straight line) and in the roof environment for antenna polarisations and phone positions (dotted lines). various I ,,.: I ,, .I. l ,. : .’ ETSI 78 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 81 ETR 357 (GSM 05.90 version 5.0.0): January 1997 m TeleverketsForskningsinstitutt Tittel ‘rF-rapport R 4CW2 Intcrkms fiaTDMA-sndmnencidigital mobilkommunikaajon p&PSTN ISBN 82-423-0230=8 ISSN Prosjekt W Forfattem Innsatsmdde M~mu*jon EgilHaugcr Tilgjengdighet Apm Antall tdder 28 D&to 921006 Emneord EMC TDMA Mobbmunikasjon Sammendmg E@ponentarfcmscgTDMA -Tme Division Multiple Access -mndmxeniGSM ogDEC3 systcmenc ogp@& farcn forhdrbar intsrfcrcna iekkmonisk utstyr msdaudio-tttgang. Dct m forctatt intcrferens mtig @ 12godkjente tdsfonappamtcr ogrssul~ viscr enmegststoc -g iimmttnitcten. GSM-systemct vilgisjawrendc intctfctuaa imange av tdefoncne p&flue metersGvstand. Title ktdcmxe from theTDMA structurein digital mobb communicationto PSTN Abstract Therqcm dealswiththeTDMA- Tnc Division MultipleAccess - structurein theGSMand DECT systems and pays attentionto therisk of audibleintctfcrcncein slcctronic devices with rnudiooutput.For 12 type approvedanalogPSTN telephonesets, theinterferencehas been me- Esumdand theresults show a greatvariationin immunity level. I’heGSMsystemwillgiverisetoharmfulintctfctcncein manyof theexamined tckphottc sets fora distance of many metxcs. ETSI 79 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 82 ETR 357 (GSM 05.90 version 5.0.0): January 1997 @ Teledircktoratetsforskningsavdcling 1992 Wtm4&b*tibTumm&t~aWax~*i “Lov om oppbavsmtttil indsvcrk”, “k om rctt til fotografi” ogi“Avta&nMU~ _ ogrctighctshavcrncs aganisasjoncr om kopicringw opphawettsligbkyttet vcrki unden&@svkksomhct”. ,’ . ETSI 80 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 83 ETR 357 (GSM 05.90 version 5.0.0): January 1997 1 Introduction TDh& Tmc Division Multiple Access, is becoming widely used in modem digital radio, particularly formobilecommunication. Inthisway thecarrier canbcsharedbyanurnbcr ofusers. inGSM, thenew digital mobilecommunkation developed byETSI,a 900MHz carrier isdivkkdinto8 slots for8 different mobileusers. Eachtimcslot is0.5428ms with arepetition frequency of217Hz.Intheremaining OFF condition whenthe7 otherusers arconair,the900MHz carrier istobcbelow70dB rcfcrrcd totheON condition. ‘ From an intcrbencc point ofview,thisisanamplitude modulation whichhasthepossibili- tytocrcatc a lotofintcrfcrencc inotherelccaunic &viccs.Analogmobilecommunication suchasNMT andTACS hasaccmstant RF envelope withnamowbandfrequency xnodula- tionandotherelectronic devices am notsensitive tothe=RF signals Serious interferenceis mainlydue to rapidchangesin the envelope of the high frquency interfererand therefore all kinds of amplitude modulation of a potential interferer will in- cmasc the risk for i,ncompatibilkybetween systems using radio communicatkm andother IT-quipment. ETSI 81 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 84 ETR 357 (GSM 05.90 version 5.0.0): January 1997 contents 1 2 3 4 4.1 4.1.1 4.1.2 4.13 5 6 Introduction .““—-” ”””””*.”””-”..””””””*....”.. ... ..““.*..””...*..“..“..-.””-=.”-.. TDIW&Danoduiatcd kpency spcctmm ““”.. ””...O.”...-..” . . ..........”=00.......00.0 Measurementeet-up,method of ~ .. . . . . . . . . . . . ..... ............... ..... .. Measurementsresults for GSM-TDMA~ .-”-””.. --”-”-- ....-..””------- CkxwquencesforPSTNw mthreediffcmntinterferenceuwimnmcnts.. ... . ....... office """"-"Q-"..*"-""-"-"""..--"-""..""..-"-""--....""-""*. .*... ... . . . . .... village ...”-” ”””-..”-”..-”-.---”...-- ”-..”..00..””.....0..”.........00....... . ......-......9..”” .. Best steticmsurroundings .**”””*.-*-. . ... . .. ... . . ... ... ..... . ........... ......... ........ Mumrementsresultsfor DE~-TDMA structm .....”.. ””””...- ....- ......==” -..-... conclusion ".."* -*no-"""-""-"""""""..-"" """"-""..--..* -........"--" .......- Anne%l”15 ,! , . . ETSI 82 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 85 ETR 357 (GSM 05.90 version 5.0.0): January 1997 2 TDMA, Demodulated fkequency spect~m TheRF spectrum fromonemobilemaybe likefig1below.Thish theRF burstfroma GSM mobileinthe900MHz frequency band. A— ~ — ~ T -t to to-o.577 ma Td.615 ma Figur2.1: T13MA StiCtUre forGSM The amplitude of the ficquency spectrum is now given by (2.1) The relative spectmm is shown in annex 1. As can be seen, there is a component foreach 217Hz and the spectrum has zeroes given by T/totimesthepulse repetition frequency. In the same way wc can calculate the TDMA spectrum for the DECI’ system. Here the RF pulse duration is 0.4167 ms with a pulse repetition fkquency of 100 HZ This relative frequ- ency spectrum is given in annex 2. This TDMA structure @es a component fm each 1~ Hz with zeroes for each T/to ( - 24) times 100Hz. ThespechumfromthisTDMA structure ghwsmostofthedemodulated energyintheau- diofrequency band. Thercfom there is a great risk that suchTDMA signals give audible in- terference in electronic devices intended foraudiooutputsuchas hearhg aids and ordiiary PSTN telephone set. Xnthisreport we willgiveresults frommeasurements on~ approved analogPSTN sets. ETSI 83 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 86 ETR 357 (GSM 05.90 version 5.0.0): January 1997 3 Measurement set-up, method of measurement For the time being there is no existing requirement for immunity of analog telephone sets. Therefore there is nostandardized measurement act-up md methodof measurements. In the frequency band we am talkingaboug 1 G& and above, the generation oftheRF- field andbow thefield iscoupledtothevictim’s electronic circuit isofgreatest importance totheintctfenmce resul~Oursuggestionis thatthe measurement should be as “real life” as possible and therefore much effort is given to assm a reproducoableand maiistic immu- nity test W~ch gives as exact as possible the intexforcncelevel the user can, in the worst case, be exposed to. Amex 3gives the ove!viewof the instrument set-up ina semi-anechoic chamber. tiring themeasurement we reslbed theveryimportance ofpositioning thetelephone setandthe transmit antennaThetelephone setwasplacedcma turntable for rotation 0-360 dgr and the antenna wasrotated inthehorizontal andvertical position intheheight from0.95to 2.20m The highest interference level occuncd at an exact position of both the telephone and the antema indicating that the RIVield was coupled to the PCB of the telephone and not indu- ced via telephone line or handset oable. In an ordinary desk telephone where the FCB is ho- rizontal the intetfercncc level was muchhigherfor horizontalpolarizedfield thanfor verti- cal, althoughthe telephone line and the handset cable were vertical as shown on the set-up. Now the antenna in a mobiie system is fomeen to be vertical, but when using a handheld mobileseLthe angle to the verticalis about 65 degrees and in practice ~e angle can be in the whole range fi’omOto 90 degrees. Forcarmountedantennag theangleshouldbenear- lyO degrees tothevertical, but even here the antenna maybe more horizmtsl because of the convenient capacitive coupled window antenna When using acme piece telephone S04 the angle can of course be the same for the fixed and the mobile telephone. ‘l’hemeastmments are taken at a distance of 3 m from the intetiercr antenna to the tele- phone. In this frequency band the far field distance is less than 0.25 ~ so y6u can easily calculate theinterference level foranydistance ofinterest. The interference level was messumd both at receive and transmit side of the fixed telepho- ne. On the receive side, the interference waswe@ed withA-fiker and on transmitside the psophometer fflter wasuse& Due to the high electric ficla andproblem of fdtcring to the anechoic chamber, we had to usc a passive acoustic coupler with tight coupling. This tight coupling had of course snmc influence of the f~uency response of the handse~ but when using the A-falterthe influen- ce was tninitnizd A typical frequency msponsc is given in annex 4 ftx tdephone set no 8. ETSI 84 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 87 ETR 357 (GSM 05.90 version 5.0.0): January 1997 4 Measurements resuh for GSM-TDMA structure TIM immunity mcasurcmcnts have been taken for 12 scpexatctelephcmesets,8 ordinary desk telephonesand 4 one piece, hsndhelz telephme sets.They are all type approvedfor use in the fixed telephone network in Norway. When measuring interference noise at the receive side of the telephone. we used 1000HZ with -10 dBm ffom the fixed side as reference. me noise was then weighted with A-filter and the S/N ratio was calculated The noise measurement at the transmit side was absolute value, weighted with psophometric fitcr. The results are shown in annex 5 for receive and 6 for transrnk As can be seen them is a quadratic function from RF-power to noise power. When increasing the RF-power by 3 dB, the noiseincreasesby 6 dB. ‘Iltehigh transmit noi- se level fortelephone no 4 with low interferencepower is due to high intend noise. Be- low 8wattsGSM powertheinternal noise is dominantin this telephone. If we use 0.8 W RF-power on 3 m distance, the S/N for the reccivcr for the most immune telephone set is about 60 dB and down to 7.7dB for the most sensitive one. This extmrne difference is hard to explain, but this is the consequence of the lack of requirements for field immunity. On the ~smit side the same function can be seen, but there arc differen- ces in intcrfercncc noise tim reccivc to transmit side. If we mfcr to the same RF-power the most immune telephone has a noise level of -71 dBmp and the most sensitive one a noi- selevel of-21.8 dBmp. From the measurednoise valuesforthereceive sidem annex5we can calculate the graph where the S/N ratio is given as a functicmof distance from the interferer. Annex )4 and 15 give the signalhoise with 0.8 W handheld and 10 W car-mounted GSM-telephone.NOW we can divide the telephone sets into three groups Set no 1, 2, 8 and 12 am the most sensi- tive, 5 and 7 arc in the middle group, whiie the most immune ate sets no 3,4,6, 9, 10and 11. If we accept 40 dB S/N as a minimum quality level and the interferer is a 10W GSM tele- phone 10 m away from the fixed telephone, 6 of the 12 telephone sets must be rejected. They all have too high interference noise and for telephone set no 2 the car must be more than 70 m away to satisfy the fixed telephone user. However, we cannot draw the conchJ- sion that eve~ user of telephone no 2 is disturbed by the GSM telephone 70 m away, this is a worst case situation, but this exemise gives us an idea of the problem and indicates that sooner a later this poblem will ark In thesemeasurements we have always used RF-power as reference, but when talking im- munity, field st’sengthis the most Commofdyused.critmi& If we look at the instrument set- up in annex 3 where we have a halfwave dipole 0.95-22 m above perfect reflecting ground and an RF-power of 0.8 W 900 MHz we come up with 3.9 V/m for horizontal pola- rized field and 3.7 V/m for vertical field. This calculation is based on far field quation and with maximizingtheheight of the transmitter antcnrm If we have a quality standatrl of 40 ciBSiN un ihe receive tide, from the graph of annex 5 wc can calculate the immunity for each of the 12 telephonesets The besttelcphcmehas an immunityof 123 V/m and the most sensitive can only withstand 0.6 V/n ‘I%is26 dB vsri- ation in immunity brings dramatic consequences in quality perfmmances. As mentioned earlier, lhc TDMA fkequencyspccaum has most of its energy in the audio frequency band. In annex 7 to 10 there are examples of frequency plot on the rcceivc side for telephone no 2,3,5 and 8. For reference the 1000Hz / -10 dBm tone is also plotted on ETSI 85 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 88 ETR 357 (GSM 05.90 version 5.0.0): January 1997 thesamediagram, By comparing thismessud spectrum withthatofthecalculated oncin chapter 2,agreatconformity h found.Inthelowestfrequency band you have lower interfe- rence wduesduetothe ter. 4.1 Consequences ments clectrichwousticfrequency resp(mse of the telephone and the A-fil- for PSTN user in three different interference environ- Theinterference frommobiletransmitters usingI’!DMAisinfluenced byapat numberof factomWe havetheRF-power, thedistance fromtheinterferer totheVictims, antenna posi- tion, additional attenuation m wallsandthepossibi)ky ofshadowing efiects ofthehuman bodyorotherobstacles. Theuserenvironment isthcmfcae divi&dintothreedifferent inter- ference case~office, village andbase-station surroundings. 4.1.1 Ofiiee In a typical office environment there is a fmcd telc~one in each room and when the mobi- le user is walking m the corridor outside, the ixttcrfmnce distance is m the range ofthree meters. ‘l’he RF-powerfromtheGSM mobilemaybe ashighas20 W anddownto10 mW. Theplot5 and6 cantherefore beusedwithout anychanges. lheantenna efficiency fm thehandheld station isintherangeofO to-3dB referred todipole, sothatwhenrefer- ringtopowerdelivered todipole youmusttakethislossintoconsideration. 4.1.2Village A village w smalltownk,especially inNorway,characterised bysingle-family houses madebywoodsituated neartheroad.Inthissituation theinterference environment forthe fuedtelephone userisquitedifferent fromtheoffice situation. TheRF-powerfromticcar mountedmobdetelephone can,according toGSM specf~cation, beupto20W, butwhen talking to mobileoperators 10W b morerealistic. ‘Iheintelfemnce distance from the road to the freed telephone may be in the range of 5-10 m The dry wooden walls give no addh tional attenuation. If we look at a situation where a 10W mobile is nmning 6 m away from the fixed tele- X=, ~WA-k=~=-U~wk- &lephmeno2. As~wh quality of 40 dB S/N is obtained when the car is 73 m away. In the Nowegian m.quirement for f~ed telephone, the internal noise to the freed lines should be below -65 dBmp. In or- der to meet this requirement the interference distance is mom than 80 m. This exerciseis of come extremein the sense that you havetheworstcaseofinterference andde fried teitqtk~e IJsti has the most seitsitive telephone, but if you look at the great number of freed telephones and the number of GSM mobileswhich is expected in the futu- re, the worst case will also arise. As mentionedearlier, there is a great d~crence in the capability to withstand this ‘fi)MA interference. Themeanvalueforall12telephone setsis36.8dB S/Nandstandard devin- tion19.9dB whentheinterference distance is3 m andtheRF power0.8w. Forthetrans- mitter themeanpsophometric noiseis-46.2dBmp with standard deviation of 15.0 dB. ETSI 86 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 89 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Using this figure fm calculating the necessaryinterference distancewe come up with 12.8 m for 40 dB S/’Non the receive side and 31.4 m for -65 dBmp on the transmit side. ‘Iheconclusionfor fixed telephoneusers in villageareas is that thcmis a strongpossibility for unacceptableTDMAinterferencefrom car mounted(3SMtelephones. 4.13 Base StdOSl surroundings The TDMA stsuctureoftheRF signal k afunction ofthetraffic loadinthebasestation, butyoucanhavethesameRF bum inthisdirection asfromthemobile. TheRF powerk upto40W foreachcarriersnd theantenna gainmsybelOdB.Ifthkkthecasewhen calculating thenccesaaxy interfkrencc distance youcomeupWith198 m in orderto meet the noise mquimmentson the transmitside usingthe meanvaluefm the 12tclepbe sets. In this situationusing the highestpowerand high gain antennathe numberof nearbyfixed telephoneswill probablybe low. A more realistic situaticmwill be using 10 W RF power and 6 dB gain antmtm l%c interference distance is now 62 m for -65 dBmp on the trsns- rnitside snd2Smfor40dB S/N onthe receive side. ?hc base station is on the air all the time and the f~ed telephone user will be exposedto this TDMA interference whenever the subscriber hi calling. Fortheoperator thereisalsothepossibility thatthefwedtelephone atthebasestation ser- vicecenter will be disturbd The operatcxofTDMA atmcture mobde systems must be aware of the relatively strong pos- sibility ofunwanteddistudmnces forthefuedsubscriber inthebasestations ne@bour- hood. ETSI 87 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 90 ETR 357 (GSM 05.90 version 5.0.0): January 1997 5 Measurements results for DECT-’I’3)~ structure The ‘I’DMAstructure for DE(X is somewhat diffcmnt than shown in chapter 2. ‘Ihe pulse repetition fiequcncy is 100 Hz giving the fiqucncy spoctmm in annex 2. The RF power is dcfmcd to be maximum 2S0 mW EIRP and the interference level for tele- phone no 2,5 and 8 is shown in annex 11 to 13. Comparing this interference to a GSM te- lephone with 0.8 W the noise is 30-40 dB lower fm DECI’ tclcphonc than for GSM. This lower interference is caused by a lot of factcxs The reduction of RF-power lower the noise by 10 dB, the doubling of the fiequcncy gives 6 dB lower interference voltage cau- sing 12 dB lower noise, and with this high= frequency the distributed capacitance on the PCB acts as a low pass filter reducing the induced interference voltage. Thepotential TDMA intcrkmnce fromDE(3 into fwed telephone acts is then seen to be much lower than for GSM due to the higher fiquency and the lower radiated power. This is not to say that TDMA in 2 GHz band is of no problem from an interfcrcncc point of view. ETSI 88 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 91 ETR 357 (GSM 05.90 version 5.0.0): January 1997 6 Conclusion As the mcsaummcnts have show there is a high interference potential from a TDMA struc- ture mobile communication system particular with the high powcr transmittm as in the GSM syszcm.TIMlack of immunity rquimmcnta in the VHHUHF band for amplitude me dulatcd field is a scrious matter which has to be dealt with within the relevant standardi- zing idtUtiollS, hke =1 and CENELK, Some considerations has been given to this sub- ject in fcx instance ETSL In a meeting in Paris 10-14 November 1990 in ‘TCRES a“psper WSS pxescntd by UK DTI - RfidiOCOItUINUdCILtiOn A@ItCy “THE EMC CONUNDRUM- ‘1’DMATECHNOLOGY”.A lot of measurements results fi’ombearing aids exposed by TDMA interference arc presented and the conclusions are %hat the proposed generic immu- nity standard of 3 V/m does not offer adequate protection from radio transmitters”. But for the fixed telephones already in use there is little help in better standards for the fu- ture. The mobile system operators must be responsible and take proper action to assure the f~cd subscriber a conversation * ftom TDMA interference also in the future. This is not an easy match, but the cost must be on the intcrfcrw and not the victim ETSI 89 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 92 ETR 357 (GSM 05.90 version 5.0.0): January 1997 I (GSM 05.90 version 6.0.1 Release 1997) 90 ETSI ETSI TR 101 640 V6.0.1 (2001-11) %1 ) t ) . - —— Page 93 ETR 357 (GSM 05.90 vekion 5.0.0): January 1997 17-! I =d=d I , ,.- ------- q 1 0 Annex 2 . . . (GSM 05.90 version 6.0.1 Release 1997) 91 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 94 ETR 357 (GSM 05.90 version 5.0.0): January 1997 ------ [ E m 0 .---- ----- I E m- 0 ------ - P------ --- > > > > > > > > > > > > > (GSM 05.90 version 6.0.1 Release 1997) 92 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 95 ETR 357 (GSM 05.90 version 5.0.0): January-1997 Annex 4 T . . N G o 0 Gz m n 4-Jm k“ ,, 42! . . . . . . G ., . 0 4... mlm m G I I 1 4 L -~= m= Ubto” manl Otx I I (GSM 05.90 version 6.0.1 Release 1997) 93 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 96 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 5 zt- U) L 4 i% — 0 N 0 o Q o N o . 0 (GSM 05.90 version 6.0.1 Release 1997) 94 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 97 ETR 357 (GSM 05.90 version 5.0.0): January 1997 z Annex 6 o w 2 . 0 No0 (GSM 05.90 version 6.0.1 Release 1997) 95 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 98 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 7 . -@ -*s 111—+=i=i= r.. o G 0 0 - I (GSM 05.90 version 6.0.1 Release 1997) 96 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 99 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 8 . 1 I I Ge & & o 0. 0 m - . . . . .* G G G . . uw m L r3 L L >0= . . . (GSM 05.90 version 6.0.1 Release 1997) 97 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 100 ETR 357 (GSM 05.90 version 5.0.0): January 1997 . Annex 9 I 1 1 I I ‘1 I — I I -H= . . IEEE12 . .19 ”}” . I I I ZU n . Ln G G . . . .* G I I I I I 4 I I I — , ti’ - In 1 I 1 1 I I — . I >. (GSM 05.90 version 6.0.1 Release 1997) 98 ETSI ETSI TR 101 640 V6.0.1 (2001-11) 4) Res.Elw 24.6 HZ[3dR] Vid.B~ 30 Hz Date 12.Jun. ’92 The 10:24:09 llF.Att 10 dfl Ref .Lvl CF.Stp 500.000 Hz -10.00 dBm Unit [dEl] o -lO.O -20*o -30.0 -40.0 -50.0 -60.0 -70.0 -80.0 -90.0 -100.0 uin -1 0aio 0 itart Span ‘ Center Weep stop > g ~ oHz 5 kHz 2.5 kHz 26 s 5 kHz S 58 x ma A o i5i5 qd Telephone set nr 8 (GSM 05.90 version 6.0.1 Release 1997) 99 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 102 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 11 — — I T . . . .* — .* . . . I — 1 , L . !_ L (GSM 05.90 version 6.0.1 Release 1997) 100 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 103 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 12 N & o00 sz m I - , 1 I 4 .* } . . 1 - I T . 1 lH’ - m m a . . al la k=t=E I I . E (GSM 05.90 version 6.0.1 Release 1997) 101 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Page 104 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 13 s G - N . E ‘Nu= a E . . . . . — o G o 1 . . . . G . . . . . . I (GSM 05.90 version 6.0.1 Release 1997) 102 ETSI ETSI TR 101 640 V6.0.1 (2001-11) Annex 14 GSM-power 0,8 w (Handheld) dB S/N 70 60 50 40 30 20 10 I . I 11 J 0.75! 3 6 10 12 20 24 I 30 m 1:5 EH.O2WO1O2 ETSI 103 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) Page 106 ETR 357 (GSM 05.90 version 5.0.0): January 1997 Annex 15 GSM-power 10 w (Car-mounted) 70 60 50 40 30 20 10 0 10 20 30 40 50 60 70 so go 100 m S4.920S01-1 ETSI 104 (GSM 05.90 version 6.0.1 Release 1997) ETSI TR 101 640 V6.0.1 (2001-11) ETSI ETSI TR 101 640 V6.0.1 (2001-11) 105 (GSM 05.90 version 6.0.1 Release 1997) History Document history V6.0.1 November 2001 Publication
|
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
1 Scope
|
The present document is a descriptive recommendation to be helpful in cell planning.
|
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
1.1 References
|
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. • A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same number. • For this Release 1998 document, references to GSM documents are for Release 1998 versions (version 7.x.y). [1] GSM 01.04: "Digital cellular telecommunications system (Phase 2+); Abbreviations and acronyms". [2] GSM 05.02: "Digital cellular telecommunications system (Phase 2+); Multiplexing and multiple access on the radio path". [3] GSM 05.05: "Digital cellular telecommunications system (Phase 2+); Radio transmission and reception". [4] GSM 05.08: "Digital cellular telecommunications system (Phase 2+); Radio subsystem link control". [5] CCIR Recommendation 370-5: "VHF and UHF propagation curves for the frequency range from 30 MHz to 1000 MHz". [6] CCIR Report 567-3: "Methods and statistics for estimating field strength values in the land mobile services using the frequency range 30 MHz to 1 GHz". [7] CCIR Report 842: "Spectrum-conserving terrestrial frequency assignments for given frequency-distance seperations". [8] CCIR Report 740: "General aspects of cellular systems".
|
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
1.2 Abbreviations
|
Abbreviations used in the present document are given clause 6 (Glossary) and in GSM 01.04 [1].
|
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
2 Traffic distributions
| |
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
2.1 Uniform
|
A uniform traffic distribution can be considered to start with in large cells as an average over the cell area, especially in the country side. ETSI ETSI TR 101 362 V7.1.0 (2000-04) 7 (GSM 03.30 version 7.1.0 Release 1998)
|
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
2.2 Non-uniform
|
A non-uniform traffic distribution is the usual case, especially for urban areas. The traffic peak is usually in the city centre with local peaks in the suburban centres and motorway junctions. A bell-shaped area traffic distribution is a good traffic density macro model for cities like London and Stockholm. The exponential decay constant is on average 15 km and 7,5 km respectively. However, the exponent varies in different directions depending on how the city is built up. Increasing handheld traffic will sharpen the peak. Line coverage along communication routes as motorways and streets is a good micro model for car mobile traffic. For a maturing system an efficient way to increase capacity and quality is to build cells especially for covering these line concentrations with the old area covering cells working as umbrella cells. Point coverage of shopping centres and traffic terminals is a good micro model for personal handheld traffic. For a maturing system an efficient way to increase capacity and quality is to build cells on these points as a complement to the old umbrella cells and the new line covering cells for car mobile traffic.
|
f48e0f9fa2d7ccfd80e612b2641fd571
|
101 362
|
3 Cell coverage
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.