Resources

Filter

NG.102 IMS Profile for Converged IP Communications v1.0

Document

Tuesday 19 May 2015 | All Documents | Networks Group |

This document defines a profile that identifies a minimun mandatory set of common IMS functionalities, defined in 3GPP specifications and other GSMA PRDs, that a wireless device and network are required ...

NG.103 VoLTE – RCS Roaming and Interconnection Guidelines v1.

Document

Tuesday 19 May 2015 | All Documents | Networks Group |

This document defines guidelines for IMS service roaing in an Inter-Service provider enviroment, and targets existing IMS service deplyments.  

IR.60 Prepaid Service Roaming Test v5.0

Document

Saturday 4 Apr 2015 | All Documents | Networks Group |

IR.60 provides End2End functional test cases for CAMEL prepaid services. The template allows the user to decide which tests scenarios deem useful for inter-operator tests.

WWG.04 Network Management of Encrypted Traffic v1.0

Document

Saturday 28 Feb 2015 | All Documents | Internet Group |

Due to many factors, the use of encryption is on the rise on the Internet. The move towards encrypted protocols, such as HTTPS, poses challenges to how mobile network operators manage their networks. This document explores some options ...

IR.84 Video Share Phase 2 Interoperability Specification v3.0

Document

Friday 16 Jan 2015 | All Documents | Networks Group |

IR.84 presents the technical principles for terminal interoperable Real-Time Live Video Share services for Phase 2, and describes backward compatibility with the technical principles within Phase 1 as described in IR.74 "Video Share ...

IR.40 Guidelines for IPv4 Addressing and AS Numbering for GPRS Network Infrastructure and Mobile Terminal v8.0

Document

Monday 12 Jan 2015 | All Documents | Networks Group |

IR.40 provides the following guidelines to GSM operators for the implementation of General Packet Radio Service (GPRS).  IPv4 addressing for the GPRS network infrastructure, autonomous System  Numbering for IP network routing within ...

SG.13 Confidentiality and Restricted Usage Undertaking Related to Test Data for the cipher algorithm A5 v3.2

Document

Tuesday 23 Dec 2014 | All Documents | Fraud and Security Group |

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...

SG.20 Voicemail Security Guidelines v1.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This PRD describes the security risks posed by voicemail services, how they can be mitigated with robust technical configurations and appropriate policies. The document provides valuable information for mobile users and network ...

SG.18 IMEI Database File Format Specification v5.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

SG.18 covers the following areas: Introduction to the concept of the Equipment Identity Register Introduction to the IMEI Database (previously known as the Central Equipment Identity ...

SG.16 GPRS Security Guide for Users v3.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This document presents the general security model of various GPRS connection types. The document is intended as a security primer for users of GPRS services. It is not a formal training document, but provides general high level ...

SG.04 Confidentiality and Restricted Usage Undertaking Related to the Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) for Authentication and Cipher Key Generation in the GSM System v3.4

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...

SG.03 Rules for the Management and the Distribution of the GSM Example Algorithm A3/A8 (COMP 128, COMP 128-2, and COMP128-3) used for Authentication and Cipher Key Generation v3.6

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This PRD sets out the rules under which the GSM example authentication algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be ...

SG.02 Confidentiality and Restricted Usage Undertaking Related to the A5/1 Algorithm for Signalling and Data privacy in the GSM System v4.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

The document sets out a legally binding confidentiality agreement in which the roles of the beneficiary and the provider are clearly identified. The obligations of both parties are set out and the document is then signed by authorised ...

SG.01 Rules for the Management and the Distribution of the GSM A5/1 Algorithm use for Signalling and Data Privacy v4.1

Document

Tuesday 16 Dec 2014 | All Documents | Fraud and Security Group |

This PRD sets out the rules under which the GSM cipher algorithms must be managed and distributed by the GSM Association, its members, and suppliers. The document sets out the rules under which the algorithms must be administered by ...

IR.79 Image Share Interoperability Specification v2.0

Document

Tuesday 28 Oct 2014 | All Documents | Networks Group |

IR.79 describes the terminal interoperable Image (Live & Pre-stored) Share service. Download

IR.74 Video Share Interoperability Specification v2.0

Document

Tuesday 28 Oct 2014 | All Documents | Networks Group |

IR.74 specifies the terminal interoperable Real-Time Live Video Share service. The intended audience of IR.74 is terminal or software vendors who wish to implement an inter-operable Video Share service.  Mobile operators who seek to ...

IR.49 M2M Roaming Guidelines v1.0

Document

Wednesday 15 Oct 2014 | All Documents | Networks Group |

IR.49 specifies recommendations related to network aspects of managing roaming M2M (machine to Machine) devices in mobile networks. it is intended to be used by mobile network operators, and covers the Congestion and Overload Handling ...

IR.58 IMS Profile for Voice over HSPA v6.0

Document

Wednesday 24 Sep 2014 | All Documents | Networks Group |

IR.58 provides details on the IP Multimedia Subsystem (IMS) Profile for Voice over High-Speed Packet Access (HSPA), it defines and identifies a minimum mandatory set of features which are defined in 3GPP specifications that a wireless ...

IR.36 Adaptive Multirate Wide Band v3.0

Document

Thursday 11 Sep 2014 | All Documents | Networks Group |

IR.36 presents material about wideband voice. It explains the benefits for the end users, and documents the Adaptive Multirate Wide Band codec. It also details impacts on the terminal and the network, and gives recommendations for ...

TS.28 Enhancing Mobile Network Efficiency – Recommendations for Devices v1.0

Document

Wednesday 16 Jul 2014 | All Documents | Terminal Steering Group |

TS.28 addresses mobile network efficiency issues related to smartphones experienced by operators and manufacturers and makes a number of recommendations for device implementations to improve mobile network efficiency.