• There are no items in your cart

EG 201 897 : 1.2.1

Current

Current

The latest, up-to-date edition.

SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); SERVICE PROVIDER ACCESS; SERVICE PROVIDER ACCESS REQUIREMENTS IN A FIXED AND MOBILE ENVIRONMENT

Available format(s)

Hardcopy , PDF

Language(s)

English

€46.74
Excluding VAT

Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Introduction
  4.1 Current situation
  4.2 Regulatory aspects
  4.3 Security aspects
  4.4 Service interaction aspects
  4.5 Charging aspects
  4.6 Guidelines for the Service Provider Access Requirements
5 Functional requirements for the Service Provider Access
  5.1 Location determination
      5.1.1 Network location determination
      5.1.2 Geographic location determination
  5.2 Management of terminal capabilities
      5.2.1 Determination of the terminal capabilities of the SP's
            service user
      5.2.2 Modification of the terminal capabilities of the SP's
            service user
      5.2.3 Modification of the personality device/module of the SP's
            service user
      5.2.4 SP retrieval of profile from user terminal
      5.2.5 SP modification of its service user's profile
      5.2.6 Terminal retrieval of profile from its user's service
            provider
      5.2.7 Terminal modification of SP's service user's profile
  5.3 Management of the profile of the SP's service subscriber
      5.3.1 Alteration of the profile of the SP's service subscriber
      5.3.2 SP retrieval of profile from the PTN
  5.4 Event and call management
      5.4.1 Indication of the disconnection of a call
      5.4.2 Join operation of individual legs of a call
      5.4.3 Split operation of individual legs of a call
      5.4.4 Delivery of information to the SP's service user prior
             to alerting
      5.4.5 Supervision of a dropped-back call
      5.4.6 Avoidance of the cyclical routeing of signalling or
             user messages
      5.4.7 Multimedia multiparty call control
      5.4.8 user interaction for text delivery
      5.4.9 user-plane resource negotiation and selection
      5.4.10 user request for confidential communication
      5.4.11 Service Provider request for confidential communication
      5.4.12 PTN request for confidential communication
      5.4.13 Communication priority
  5.5 Network management
      5.5.1 Reporting of network events for measuring the Quality of
            Service
      5.5.2 Reporting of network events for the purpose of fault
            diagnostics
      5.5.3 Request for event monitoring and subsequent reporting
      5.5.4 Electronic ordering of network management functions
      5.5.5 SP request for authentication
      5.5.6 PTN request for SP's service user authentication
      5.5.7 Terminal authentication performed by the PTN
  5.6 Provision of accounting information
      5.6.1 Provision of call charging information in real time
      5.6.2 Exchange of charge detail record information in real time
  5.7 Service Presence, Discovery and Binding
      5.7.1 Context request to SP with specified service capabilities
            from the service user and SP
      5.7.2 Discovery of PTN service capabilities by SP
      5.7.3 Binding to PTN with specified service capabilities between
            the service user and SP
      5.7.4 SP request for presence and availability on a PTN with
            specified service capabilities
6 Functional requirements
  6.1 Location determination
      6.1.1 Network location determination
            6.1.1.1 Priority
            6.1.1.2 Example of usage
            6.1.1.3 Technical aspects
            6.1.1.4 Information flow chart
      6.1.2 Geographic location determination
            6.1.2.1 Priority
            6.1.2.2 Example of usage
            6.1.2.3 Technical aspects
            6.1.2.4 Information flow chart
  6.2 Management of terminal capabilities
      6.2.1 Determination of the terminal capabilities of the SP's
            service user
            6.2.1.1 Priority
            6.2.1.2 Example of usage
            6.2.1.3 Technical aspects
            6.2.1.4 Information flow chart
      6.2.2 Modification of the terminal capabilities of the SP's
            service user
            6.2.2.1 Priority
            6.2.2.2 Example of usage
            6.2.2.3 Technical aspects
            6.2.2.4 Information flow chart
      6.2.3 Modification of the personality device/module of the SP's
            service user
            6.2.3.1 Priority
            6.2.3.2 Example of usage
            6.2.3.3 Technical aspects
            6.2.3.4 Information flow chart
      6.2.4 SP retrieval of profile from user terminal
            6.2.4.1 Priority
            6.2.4.2 Example of usage
            6.2.4.3 Technical aspects
            6.2.4.4 Information flow chart
      6.2.5 SP modification of its service user's profile
            6.2.5.1 Priority
            6.2.5.2 Example of usage
            6.2.5.3 Technical aspects
            6.2.5.4 Information flow chart
      6.2.6 Terminal retrieval of profile from its user's
            service provider
            6.2.6.1 Priority
            6.2.6.2 Example of usage
            6.2.6.3 Technical aspects
            6.2.6.4 Information flow chart
      6.2.7 Terminal modification of SP's service user's profile
            6.2.7.1 Priority
            6.2.7.2 Example of usage
            6.2.7.3 Technical aspects
            6.2.7.4 Information flow chart
  6.3 Management of the profile of the SP's service subscriber
      6.3.1 Alteration of the profile of the SP's service subscriber
            6.3.1.1 Priority
            6.3.1.2 Example of usage
            6.3.1.3 Technical aspects
            6.3.1.4 Information flow chart
      6.3.2 SP retrieval of profile from the PTN
            6.3.2.1 Priority
            6.3.2.2 Example of usage
            6.3.2.3 Technical aspects
            6.3.2.4 Information flow chart
  6.4 Event and call management
      6.4.1 Indication of the disconnection of a call
             6.4.1.1 Priority
             6.4.1.2 Example of usage
             6.4.1.3 Technical aspects
             6.4.1.4 Information flow chart
      6.4.2 Join operation of individual legs of a call
             6.4.2.1 Priority
             6.4.2.2 Example of usage
             6.4.2.3 Technical aspects
             6.4.2.4 Information flow chart
      6.4.3 Split operation of individual legs of a call
             6.4.3.1 Priority
             6.4.3.2 Example of usage
             6.4.3.3 Technical aspects
             6.4.3.4 Information flow chart
      6.4.4 Delivery of information to the SP's service user prior
             to alerting
             6.4.4.1 Priority
             6.4.4.2 Example of usage
             6.4.4.3 Technical aspects
             6.4.4.4 Information flow chart
      6.4.5 Supervision of a dropped-back call
             6.4.5.1 Priority
             6.4.5.2 Example of usage
             6.4.5.3 Technical aspects
             6.4.5.4 Information flow chart
      6.4.6 Avoidance of the cyclical routeing of signalling or user
             messages
             6.4.6.1 Priority
             6.4.6.2 Example of usage
             6.4.6.3 Technical aspects
             6.4.6.4 Information flows
      6.4.7 Multimedia multiparty call control
             6.4.7.1 Priority
             6.4.7.2 Example of usage
             6.4.7.3 Technical aspects
             6.4.7.4 Information flow chart
      6.4.8 User Interaction for text delivery
             6.4.8.1 Priority
             6.4.8.2 Example of usage
             6.4.8.3 Technical aspects
             6.4.8.4 Information flow chart
      6.4.9 User-Plane resource negotiation and selection
             6.4.9.1 Priority
             6.4.9.2 Example of usage
             6.4.9.3 Technical aspects
             6.4.9.4 Information flow chart
      6.4.10 User request for confidential communication
             6.4.10.1 Priority
             6.4.10.2 Example of usage
             6.4.10.3 Technical aspects
             6.4.10.4 Information flow chart
      6.4.11 Service Provider request for confidential communication
             6.4.11.1 Priority
             6.4.11.2 Example of usage
             6.4.11.3 Technical aspects
             6.4.11.4 Information flow chart
      6.4.12 PTN request for confidential communication
             6.4.12.1 Priority
             6.4.12.2 Example of usage
             6.4.12.3 Technical aspects
             6.4.12.4 Information flow chart
      6.4.13 Communication priority
             6.4.13.1 Priority
             6.4.13.2 Example of usage
             6.4.13.3 Technical aspects
  6.5 Network management events
      6.5.1 Reporting of network events for measuring the Quality
            of Service
            6.5.1.1 Priority
            6.5.1.2 Example of usage
            6.5.1.3 Technical aspects
            6.5.1.4 Information flow chart
      6.5.2 Reporting of network events for the purpose of fault
            diagnostics
            6.5.2.1 Priority
            6.5.2.2 Example of usage
            6.5.2.3 Technical aspects
            6.5.2.4 Information flow chart
      6.5.3 Request for event monitoring and subsequent reporting
            6.5.3.1 Priority
            6.5.3.2 Example of usage
            6.5.3.3 Technical aspects
            6.5.3.4 Information flow chart
      6.5.4 Electronic ordering of network management functions
            6.5.4.1 Priority
            6.5.4.2 Example of usage
            6.5.4.3 Technical aspects
            6.5.4.4 Information flow chart
      6.5.5 SP request for Authentication
            6.5.5.1 Priority
            6.5.5.2 Example of usage
            6.5.5.3 Technical aspects
            6.5.5.4 Information flow chart
      6.5.6 PTN request for SP's service user authentication
            6.5.6.1 Priority
            6.5.6.2 Example of usage
            6.5.6.3 Technical aspects
            6.5.6.4 Information flow chart
      6.5.7 Terminal Authentication performed by the PTN
            6.5.7.1 Priority
            6.5.7.2 Example of usage
            6.5.7.3 Technical aspects
            6.5.7.4 Information flow chart
  6.6 Provision of call charging information
      6.6.1 Provision of call charging information in real time
            6.6.1.1 Priority
            6.6.1.2 Example of usage
            6.6.1.3 Technical aspect
            6.6.1.4 Information flow chart
      6.6.2 Exchange of charge detail record information in real time
            6.6.2.1 Priority
            6.6.2.2 Example of usage
            6.6.2.3 Technical aspect
            6.6.2.4 Information flow chart
  6.7 Service presence, discovery and binding
      6.7.1 Context request to Service Provider with specified service
            capabilities from the service user and SP
            6.7.1.1 Priority
            6.7.1.2 Example of usage
            6.7.1.3 Technical aspects
            6.7.1.4 Information flow chart
      6.7.2 Discovery of PTN service capabilities by SP
            6.7.2.1 Priority
            6.7.2.2 Example of usage
            6.7.2.3 Technical aspects
            6.7.2.4 Information flow chart
      6.7.3 Binding to PTN with specified service capabilities
            between the service user and SP
            6.7.3.1 Priority
            6.7.3.2 Example of usage
            6.7.3.3 Technical aspects
            6.7.3.4 Information flow chart
      6.7.4 SP request for presence and availability on a PTN with
            specified service capabilities
            6.7.4.1 Priority
            6.7.4.2 Example of usage
            6.7.4.3 Technical aspects
            6.7.4.4 Information flow chart
7 Architectural view of the Service Provider Access
Annex A (informative): Bibliography
History

Describes generic functional requirements regarding the service provider access (SPA). The priority of each requirement is based on the need perceived from the service provider's viewpoint. To fulfil these requirements, appropriate protocols may have to be enhanced or developed based on information flows and taking into account network integrity considerations expressed in the present document.

Committee
SPAN 14
DocumentType
Standard
Pages
62
PublisherName
European Telecommunications Standards Institute
Status
Current

EG 201 916 : 1.1.1 SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); SERVICE PROVIDER ACCESS; DEVELOPMENT OF STANDARDS TO SUPPORT OPEN INTER-NETWORK INTERFACES AND SERVICE PROVIDER ACCESS
EG 201 965 : 1.1.1 SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); SERVICE PROVIDER ACCESS; SERVICE PROVIDER ACCESS MANAGEMENT REQUIREMENTS FOR OPEN NETWORK ACCESS

EG 201 807 : 1.1.1 NETWORK ASPECTS (NA); INTELLIGENT NETWORK (IN); NETWORK OPERATORS' REQUIREMENTS FOR THE DELIVERY OF SERVICE PROVIDER ACCESS
TR 101 664 : 1.1.1 INTELLIGENT NETWORK (IN) - IN INTERCONNECT SECURITY FEATURES
ETR 322 : 20001 INTELLIGENT NETWORK (IN) - VOCABULARY OF TERMS AND ABBREVIATIONS FOR CS-1 AND CS-2
EG 201 916 : 1.1.1 SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); SERVICE PROVIDER ACCESS; DEVELOPMENT OF STANDARDS TO SUPPORT OPEN INTER-NETWORK INTERFACES AND SERVICE PROVIDER ACCESS
EG 201 781 : 1.1.1 INTELLIGENT NETWORKS (IN); LAWFUL INTERCEPTION
ETR 339 : 20001 INTELLIGENT NETWORK (IN); IN INTERCONNECT BUSINESS REQUIREMENTS
ETS 300 374-1 : 20001 INTELLIGENT NETWORK (IN) - INTELLIGENT NETWORK CAPABILITY SET 1 (CS1) CORE INTELLIGENT NETWORK APPLICATION PROTOCOL (INAP) - PROTOCOL SPECIFICATION
ES 201 158 : 1.2.1 TELECOMMUNICATIONS SECURITY; LAWFUL INTERCEPTION (LI); REQUIREMENTS FOR NETWORK FUNCTIONS
TR 101 365 : 1.1.1 INTELLIGENT NETWORK (IN); IN INTERCONNECT THREAT ANALYSIS
EG 201 899 : 1.1.1 SERVICES AND PROTOCOLS FOR ADVANCED NETWORKS (SPAN); SERVICE PROVIDER ACCESS; MODELLING SERVICE PROVIDER ACCESS REQUIREMENTS USING AN API APPROACH
EG 201 722 : 1.2.1 INTELLIGENT NETWORK (IN); SERVICE PROVIDER ACCESS REQUIREMENTS; ENHANCED TELEPHONY SERVICES

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.