ImageVerifierCode 换一换
格式:PDF , 页数:19 ,大小:1.22MB ,
资源ID:727543      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-727543.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI EG 201 795-2000 Human Factors (HF) Issues Concerning User Identification in Future Telecommunications Systems (V1 1 1)《人为因素(HF) 在未来通信系统中关于用户识别的问题(版本1 1 1)》.pdf)为本站会员(medalangle361)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI EG 201 795-2000 Human Factors (HF) Issues Concerning User Identification in Future Telecommunications Systems (V1 1 1)《人为因素(HF) 在未来通信系统中关于用户识别的问题(版本1 1 1)》.pdf

1、ETSI EG 201 795 1.1.1 (2000-07) ETSI Guide Human Factors (HF); Issues concerning user identification in future telecommunications systems 2 ETSI EG 201 795 V1.l.l (2000-07) The pre ent d Reference DEG/HF-00003 Keywords addressing, system, user ETSI 650 Route des Lucioles F-O6921 Sophia Antipolis Ced

2、ex - FRANCE Tel.: +33 4 92 94 42 O0 Fax: +33 4 93 65 47 16 Siret No 348 623 562 0001 7 - NAF 742 C Association but non lucratif enregistre la Sous-prfecture de Grasse (06) No 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/w.etsi.aq cument mav be made

3、 available in more than one electronic version or in orint. In anv case f existing or perceived difference in coitents between such versions, the reference version is the Poiable Docuhent Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept o

4、n a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at ht?p:/.etsi.orn/lb/status/ If you find errors in the

5、present document, send your comment to: editor et.si.fr Coovriaht Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. O European Telecommunications Standards Institute 2000. All rights res

6、erved. ETSI 3 ETSI EG 201 795 V1.l.l (2000-07) Contents Intellectual Property Rights 4 Foreword 4 Introduction 4 1 2 3 3.1 3.2 4 4.1 4.2 4.3 5 6 6.1 6.1.1 6.1.2 6.2 6.2.1 6.2.2 6.2.3 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 7 7.1 7.2 7.3 7.4 7.5 8 9 Scope 5 References 5 Definitions and abbreviations 5 Defin

7、itions 5 Abbreviations . 5 Where is identification now? . 6 Telephony . 6 The internet and X.400 . 6 Developments in telecommunications 7 Being prepared . 7 Key Factors 7 Roles and goals . 7 Roles . 8 Goals . 8 Precise identification of a locationindividu al . 9 Redirection of calls intended for one

8、 identifier to the terminal associated with another identifier . 9 Agents . 10 Contactability . 10 Identifier specificity versus identity resolution . 9 Mode of communication . 10 Terminal types 12 Switched connection vs . Permanent connection . 12 Void 12 Purpose of communication . 13 Multicast and

9、 broadcast 13 Aliases 13 Interaction between method of identification, supplementary services and telecommunications technology 13 Convergence . 14 Specialized identification schemes . 15 Areas of potential concern . 16 The present position . 13 Supplementary Services . 14 Ownership of call control

10、. 16 Conclusion 17 Bibliography . 18 History 19 ETSI 4 ETSI EG 201 795 V1.l.l (2000-07) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for E

11、TSI members and non-members, and can be found in ETSI SR O00 3 14: “Intellectual Propero Rights (IPRs); Essential, or potentially Essential, IPRs notifed to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (-. Pursu

12、ant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR O00 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present docu

13、ment. Foreword This ETSI Guide (EG) has been produced by ETSI Technical Committee Human Factors (HF). Introduction The purpose of the work item is stated as: “To produce guidelines that reflect the user-oriented identification requirements of users of telecommunications systems. They would express i

14、mplementation free identification capabilities that future systems would need in order to enable users to locate users or services in ways that are natural and meaningful to them. The guidelines would be used by authors of standards to ensure that users identification needs are met by systems that f

15、ollow their standards.“ The present document sets out to highlight and discuss some of the issues that are relevant to user-centred identification and provides a basis for further work. ETSI 5 ETSI EG 201 795 V1.l.l (2000-07) 1 Scope The present document identifies issues on the user-oriented identi

16、fication requirements of users of telecommunications systems. It expresses implementation free identification capabilities that future systems need in order to enable users to locate other users or services in ways that are natural and meaningful to them. The present document is concerned explicitly

17、 with the set-up of communications and not with the content of those communications. The present document should be used by authors of standards to ensure that users identification needs are met by systems that follow their standards. 2 References The following documents contain provisions which, th

18、rough reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest

19、 version applies. A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same number. il Pl 31 ITU-T Recommendation E. 164: “Numbering plan for the ISDN era“. ITU-T Recommendation X.400: “Message handling system and service overview“. ITU-T Reco

20、mmendation X.500: “Information technology - Open systems Interconnection - The Directory: Overview of concepts, models and services“. CENELEC EN 304: “Heating boilers - Test code for heating boilers for atomizing oil burners“. 41 3 3.1 Definitions and abbreviations Definitions For the purposes of th

21、e present document, the following definition applies: Computer Telephony Integration (CTI): facility to use a computer to control and monitor a number of telephony functions such as dialling, Calling Line Identification display and telephone number storage. 3.2 Abbreviations For the purposes of the

22、present document, the following abbreviations apply: CTI GSM IETF IN ISDN PBX PC PSTN SCP Computer Telephony Integration Group System Mobile Internet Engineering Task Force Intelligent Network Integrated Services Digital Network Private Branch Exchange Personal Computer Public Switched Telephone Net

23、work Service Control Point ETSI 6 ETSI EG 201 795 V1.l.l (2000-07) UPT Universal Personal Telecommunications URL Universal Resource Locator www World Wide Web 4 4.1 Where is identification now? Telephony In the very earliest days of telephony the user had access to one of the most powerful user inte

24、rfaces that it is possible to envisage - a voice activated intelligent connection system that could often make use of up-to-date knowledge of the location of the intended user. This person, of course, was the Telephone operator. As the number of telephone subscribers increased the operator could no

25、longer have intimate knowledge of the whereabouts of her subscribers and hence she would have been unable to explain why a call is unanswered. Also the caller would be increasingly unlikely to be successful connected to the required person by just quoting the persons name - other identification info

26、rmation would be needed to resolve potential ambiguities. Current practice in the user interface to telecommunications systems is based upon taking very low-functionality terminals (telephones containing a keypad with 0-9, * and # keys) as the assumed control device. This leads to control procedures

27、 that utilize very long strings of numbers and symbols (e.g. ITU-T Recommendation E.164 11 telephone numbers and supplementary service *# codes). 4.2 The internet and X.400 Telephone systems have been around for much longer than the internet. It is interesting to look at how the user interface to in

28、ternet services differs to that of the telephone system. In the field of person-to-person communication the differences in identification are quite revealing. In telephone systems the remote party is identified by a string of digits that contains little information about the person being contacted.

29、In the internet the standard internet email address (and the World Wide Web (WWW) Universal Resource Locator (URL) can contain very much more meaningful information - typically the name of the person or organization being reached and either the organization type or the country of origin. Where email

30、 addresses and URLs are not fully known, search tools exist to aid the user. The WWW points to some other interesting areas of user interface simplicity. The widespread availability of search tools and simple point-and-click navigation in the WWW contrast with the reliance on directory enquiry syste

31、ms and *# supplementary service control sequences in telephony. The rapid uptake and short learning curve for the WWW also contrasts with the significant under-use of telephony supplementary services, even those directly paid for by users. Identification in the ITU-T Recommendation X.400 2 email sys

32、tem shares many features with internet email addresses. Both systems allow meaningful naming of individuals/organizations and both share the concept of named domains forming part of the address. Where they differ is that the construction of internet addresses is straightforward as they consist of a

33、simple concatenation of all the elements in a standard order “nameorganization.domain“ where “organization“ can often contain more than one element. The range of domains has been chosen to have clearly understandable meanings e.g. country types or types of organization. Once a specific email address

34、 is known it can be used in the same way in all circumstances. In contrast ITU-T Recommendation X.400 2 defines domains that can have little significance to users. An administrative domain specifies the administration supplying the ITU-T Recommendation X.400 2 service and is an identity element that

35、 most users would not find useful. Also in ITU-T Recommendation X.400 2 many of the fields are optional and may always need to be used in one ITU-T Recommendation X.400 2 identifier and not in another, and may have to be specified in one mail system and not in another. The specifiers of ITU-T Recomm

36、endation X.400 2 expected everyone to have access to ITU-T Recommendation X.500 3 directory services to locate mail recipients - in practice only large organizations have such directory services as commercial constraints prevented widespread adoption of public ITU-T Recommendation X.500 3 services.

37、As a result of these user interface difficulties (and the lack of ITU-T Recommendation X.500 3 services), the much simpler internet email system has largely replaced ITU-T Recommendation X.400 2 messaging. ETSI 7 ETSI EG 201 795 V1.l.l (2000-07) 4.3 Developments i n t elecom m un cat ions There has

38、been very accelerated development in many fields in telecommunications terminals and service capabilities. Many of the easiest alternatives to this basic interface appear in the field of Computer Telephony Integration (CTI). Where the power of a PC is used it becomes possible to have large amounts o

39、f locally stored information about known contacts and these can be easily searched and controlled with a computer keyboard, mouse or voice interface. The developments in the field of mobile telephones have led to many advanced user features including speech control and the flexible programmability o

40、f features associated with SIM cards. The danger is that although manufacturers will continue to innovatively introduce features in terminals, the lack of supporting standards in the networks and for communication between different terminals, will mean that end-users will not obtain the maximum pote

41、ntial benefits that these developments could realize. There are a number of attempts at integrating intelligence into the network. This then permits more innovative solutions such as voice dialling to be used to simplify the users task. Most of these initiatives are limited in that they have to be s

42、uperimposed on a telephone system that uses a very basic numeric identification system to identify individual telephone terminals. Another significant innovation that is emerging in telecommunications is the concept of connectionless communication delivered directly to the home. This technology woul

43、d allow a user to have what appears to be a “permanent connection“ to a remote person or service but only pay for the actual information that is sent (e.g. the actual time that active speech is taking place) and pay nothing for idle time. Currently users have a model that calling another party invol

44、ves not only identifying the party with whom they wish to communicate, but also of starting the clock on what can be a costly period during which the conversation shall be tailored to make “the best use of time“. Identifying the other party in a connectionless environment can be simply the way of de

45、fining the person with whom you wish to communicate and nothing else. The cost of conversations in this environment need only be related to the total amount of the person to person dialogue and not the length of the time period during which this dialogue takes place. It is clear that a number of dif

46、ferent ways for service providers to present telecommunications services and charge for their usage can be greatly expanded in the connectionless world. It is likely that users will need to develop different models than the one they currently have if they are to understand life in this brave new con

47、nectionless world. 5 Being prepared Historically, issues related to the usability of telecommunications services have only been addressed after the services have been fully specified in standards. This order of setting standards has limited the options for improving the usability of current and futu

48、re telecommunications services. Developments in computing and communication capabilities are making it much easier to produce terminals, networks and intelligent peripherals that will support significantly better methods for the user to interact with telecommunications services. If the capabilities

49、required by users are understood in advance, new technical standards can be drafted in a way that ensures that these capabilities can be realized. 6 6.1 Key Factors Roles and goals Two key factors that help to determine which identification scheme will be most appropriate in any particular instance are: the role of the person(s) and I or organizations with whom you intend to communicate; your goal when attempting to communicate. Where the above two factors are matched communication is likely to be successful, where there is a significant mismatch, c

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1