• Shopping Cart
    There are no items in your cart

ETS 300 392-3-5 : 20001

Current

Current

The latest, up-to-date edition.

TERRESTRIAL TRUNKED RADIO (TETRA) - VOICE PLUS DATA (V+D) - PART 3: INTERWORKING AT THE INTER-SYSTEM INTERFACE (ISI) - SUB-PART 5: ADDITIONAL NETWORK FUNCTIONS MOBILITY MANAGEMENT (ANF-ISIMM)

Available format(s)

Hardcopy , PDF

Language(s)

English

€87.65
Excluding VAT

Foreword
1 Scope
2 References
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Overview
  4.1 General
  4.2 Applicability
  4.3 Testability
  4.4 Provision/withdrawal
  4.5 Activation/deactivation
  4.6 Charging
5 The generic ANF-ISIMM stage 1 service model
  5.1 ANF-ISIMM - the service provider
  5.2 SwMI MMs - the ANF-ISIMM service users
  5.3 Stage 1 description conventions
6 Migration service description (stage 1)
  6.1 Pre-requisite requirements for the migration
      service
  6.2 Service definition
  6.3 Service description
  6.4 Service architecture
  6.5 Normal procedures
  6.6 Exceptional procedures
  6.7 Interactions
  6.8 Dynamic description
7 Restricted migration service description (stage 1)
  7.1 Pre-requisite requirements for the restricted
      migration service
  7.2 Service definition
  7.3 Service description
  7.4 Service architecture
  7.5 Normal procedures
  7.6 Exceptional procedures
  7.7 Interactions
  7.8 Dynamic description
8 Removal of Subscriber Information (RSI) service
  description (stage 1)
  8.1 Service definition
  8.2 Service description
  8.3 Service architecture
  8.4 Normal procedures
  8.5 Exceptional procedures
  8.6 Interaction with authentication
  8.7 Dynamic description
9 De-registration service description (stage 1)
  9.1 Service definition
  9.2 Service description
  9.3 Service architecture
  9.4 Normal procedures
  9.5 Exceptional procedures
10 Profile update service description (stage 1)
  10.1 Service definition
  10.2 Service description
  10.3 Service architecture
  10.4 Normal procedures
  10.5 Exceptional operation
  10.6 Dynamic description
11 SS-profile update service description (stage 1)
  11.1 Service definition
  11.2 Service description
  11.3 Service architecture
  11.4 Normal procedures
  11.5 Exceptional operation
  11.6 Dynamic description
12 Authentication service description (stage 1)
  12.1 Pre-requisite requirements for the
       authentication service
  12.2 Service definition
  12.3 Service description
  12.4 Service architecture
  12.5 Normal procedures
  12.6 Exceptional procedures
  12.7 Interaction with migration and restricted
       migration
  12.8 Dynamic description
13 Over The Air Re-keying (OTAR) service description
   (stage 1)
  13.1 Pre-requisite requirements
  13.2 Service definition
  13.3 Service description
  13.4 Service architecture
  13.5 Normal procedures
  13.6 Exceptional procedures
  13.7 Dynamic description
14 Individual subscriber Database Recovery (IDR)
   service description (stage 1)
  14.1 Service definition
  14.2 Service description
  14.3 Service architecture
  14.4 Normal procedures
  14.5 Exceptional procedures
  14.6 Dynamic description
15 Group attachment service description (stage 1)
  15.1 Service definition
  15.2 Service description
  15.3 Service architecture
  15.4 Normal procedures
  15.5 Exceptional procedures
  15.6 Interactions
  15.7 Dynamic description
16 Group detachment service description (stage 1)
  16.1 Service definition
  16.2 Service description
  16.3 Service architecture
  16.4 Normal procedures
  16.5 Exceptional procedures
  16.6 Interactions
  16.7 Dynamic description
17 Group Database Recovery (GDR) service description
   (stage 1)
  17.1 Service definition
  17.2 Service description
  17.3 Service architecture
  17.4 Normal procedures
  17.5 Exceptional procedures
  17.6 Dynamic description
18 Group linking/unlinking service description (stage
   1)
  18.1 Service definition
  18.2 Service description
  18.3 Service architecture
  18.4 Normal procedures
  18.5 Exceptional procedures
19 ANF-ISIMM stage 2 specification
  19.1 General
  19.2 Functional model
  19.3 Information flow diagrams
20 Migration - stage 2 information flow sequences
  20.1 Normal operation
  20.2 Exceptional operation
  20.3 FE actions for subscriber migration
21 Restricted migration - stage 2 information flow
   sequences
  21.1 Normal operation
22 Removal of Subscriber Information - stage 2
   information flow sequences
  22.1 Normal operation
  22.2 Exceptional operation
  22.3 FE actions for subscriber migration
23 De-registration - stage 2 information flow sequences
  23.1 Normal operation
  23.2 Exceptional operation
  23.3 FE actions
24 Profile update - stage 2 information flow sequences
  24.1 Normal operation
  24.2 Profile update rejection
  24.3 FE actions for Profile update
25 SS-profile update - stage 2 information flow
   sequences
  25.1 Normal operation
  25.2 SS-profile update rejection
  25.3 FE actions for SS-profile update
26 Authentication - stage 2 information flow sequences
  26.1 Normal operation
  26.2 Authentication invoked in conjunction with
       migration
  26.3 Exceptional operation
  26.4 FE actions for authentication
27 Over The Air Re-keying (OTAR) - stage 2 information
   flow sequences
  27.1 Normal operation
  27.2 Exceptional operation
  27.3 FE actions for OTAR
28 Individual subscriber database recovery - stage 2
   information flow sequences
  28.1 Normal operation
  28.2 Exceptional operation
  28.3 FE actions
29 Group attachment - stage 2 information flow
   sequences
  29.1 Normal operation
  29.2 Exceptional operation
  29.3 FE actions
30 Normal operation for group detachment - stage 2
   information flow sequences
  30.1 Normal operation
  30.2 Exceptional operation
  30.3 FE actions
31 Group database recovery - stage 2 information flow
   sequences
  31.1 Normal operation
  31.2 Exceptional operation
  31.3 FE actions
32 Group linking/unlinking - stage 2 information flow
   scenarios
  32.1 Normal operation
  32.2 Exceptional operation - group linking rejected
       by participating SwMI
  32.3 FE actions
33 Definition of stage 2 information flows
  33.1 AUTHENTICATION DEMAND
  33.2 AUTHENTICATION RESPONSE
  33.3 AUTHENTICATION RESULT
  33.4 AUTH REJECT
  33.5 DE-REGISTRATION
  33.6 DE-REG REJECT
  33.7 GROUP ATTACHMENT
  33.8 GROUP ATT REJECT

Provides basic inter-working of TETRA systems in support of user mobility. Supporting ETSI Members, Alcatel, Bosch, Motorola, Nokia and Philips.

Committee
TETRA 3
DevelopmentNote
1ED 2000 is a historical version. (09/2004)
DocumentType
Standard
Pages
429
PublisherName
European Telecommunications Standards Institute
Status
Current

Standards Relationship
PN ETS 300 392-3-5 : 2005 Identical
DIN ETS 300392-3-5:2001-07 Identical

TS 101 747 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); IP INTERWORKING (IPI)
NF EN 300392 11-14 : 2002 TERRESTRIAL TRUNKED RADIO (TETRA) - VOICE PLUS DATA (V+D) - PART 11: SUPPLEMENTARY SERVICES STAGE 2 - SUB-PART 14: LATE ENTRY (LE)

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.