Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   Next

TR 22.947 (SA1)
Study on Personal Broadcast Service (PBS)

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  20 p.
V13.0.0  2016/01  20 p.
V12.0.0  2014/10  20 p.
V11.0.0  2012/09  20 p.
V10.0.0  2010/04  20 p.

Rapporteur:  Mr. Sultan, Alain
See also:  –

As a mobile service network evolves to a versatile packet data network, the service paradigm of mobile operators is gradually shifting from voice oriented communication to multimedia information sharing. A mobile device is no longer a simple tool for person to person communication, but now becomes an indispensable item for receiving essential information distributed for human society.

Information for entertainment services such as TV or Radio show, as well as information for public safety, energy saving, environmental conservation, and for searching emergency aid, need to be delivered to the right person at the right time in any location. The multimedia broadcast service, MBMS (TS 22.146), and packet switched streaming (TS 22.233, TS 26.234) is a widely deployed technique which fulfils the basic service requirements. However provisioning of content is currently allowed for a limited group of content providers, and ordinary users have no way to utilize the service.

The rationale of Personal Broadcast Service is to give an open opportunity for ordinary people to generate content, and broadcast it on air. A variety of broadcast services and a new device market may emerge once users are able to access the content distribution service. Abundant broadcast content will be available to be selected by 3GPP users. The extent of other potential service area is unbounded.

The objective of this document is to present some envisaged use cases of Personal Broadcast Service, for creative engineers and standard developers to pursue further investigation of PBS, and move to the next steps necessary for enhancement of relevant 3GPP standards.


Here   Top



1  ScopePDF-p. 6
2  References
3  Definitions, symbols and abbreviations
4  General description
5  Use casesPDF-p. 10
6  Charging
7  SecurityUp
8  Conclusion
A  Change historyPDF-p. 18

Up   Top