ETSI EG 202 009-1 V1.3.1 (2014-12)
Current
The latest, up-to-date edition.
User Group; Quality of telecom services; Part 1: Methodology for identification of indicators relevant to the Users
Hardcopy , PDF
English
01-12-2014
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
4 About telecommunication service QoS
5 Scope of telecommunications offers
6 Methodology to identify the customer's
QoS requirements
7 Measurements
8 Conclusion
Annex A - Bibliography
History
Defines a methodology for the identification of parameters relevant to the users that can be used either to monitor the QoS of Telecom services used by the private customers or for a Service Level Agreement (SLA) between a business customer and a supplier of Telecommunications services such as that proposed in EG 202 009-3.
| DocumentType |
Standard
|
| Pages |
49
|
| PublisherName |
European Telecommunications Standards Institute
|
| Status |
Current
|
| ETSI EG 202 009-3 V1.3.1 (2015-07) | User Group; Quality of ICT services; Part 3: Template for Service Level Agreements (SLA) |
| ETSI EG 202 009-2 V1.3.1 (2014-12) | User Group; Quality of telecom services; Part 2: User related indicators on a service specific basis |
| ETSI EG 201 013 V1.1.1 (1997-04) | Human Factors (HF); Definitions, abbreviations and symbols |
| ISO/IEC 17021:2011 | Conformity assessment — Requirements for bodies providing audit and certification of management systems |
| ISO/IEC 18028-4:2005 | Information technology — Security techniques — IT network security — Part 4: Securing remote access |
| ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
| ISO 7498-2:1989 | Information processing systems — Open Systems Interconnection — Basic Reference Model — Part 2: Security Architecture |
| ISO/IEC 13888-1:2009 | Information technology — Security techniques — Non-repudiation — Part 1: General |
| ISO/IEC 9797-1:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher |
| ETSI EG 202 009-3 V1.3.1 (2015-07) | User Group; Quality of ICT services; Part 3: Template for Service Level Agreements (SLA) |
| ETSI GS ISI 003 V1.1.2 (2014-06) | Information Security Indicators (ISI); Key Performance Security Indicators (KPSI) to evaluate the maturity of security event detection |
| ETSI EG 202 009-2 V1.3.1 (2014-12) | User Group; Quality of telecom services; Part 2: User related indicators on a service specific basis |
| ISO/IEC 11770-3:2015 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.