The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and
layer 3 of the DECT protocol stack.
The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification
for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer.
The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the
following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendation ITU-T
X.200 [i.3] and Recommendation ITU-T X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements. The present document also
includes super-wideband and fullband speech and audio services.

  • Standard
    377 pages
    English language
    sale 15% off
  • Standard
    377 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    377 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and layer 3 of the DECT protocol stack. The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendation ITU-T X.200 [i.3] and Recommendation ITU-T X.210 [i.4]. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. The present document also includes super-wideband and fullband speech and audio services.

  • Standard
    378 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    378 pages
    English language
    sale 15% off
  • Standard
    377 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and layer 3 of the DECT protocol stack.
The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer.
The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendations ITU-T X.200 [i.3] and ITU-T X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    372 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    372 pages
    English language
    sale 15% off
  • Standard
    372 pages
    English language
    sale 15% off

ISO/IEC TR 29189-9:2017 describes the general characteristics of Networking of Everything (NoE), which can be applied to Future Networks, especially from an Internet of Things (IoT) perspective. This document specifies: - a conceptual model of NoE and its definition; - problem statements in conventional networking; - standardization activities of other standards-development organizations; - requirements for NoE from an IoT perspective; - technical aspects. NOTE: Since networking issues are an integral part of IoT and Future Networks, while standards of IoT or Future Networks are under development in other standards-development organizations, this document focuses on networking issues to integrate diverse networking techniques to provide users' service and/or things requirement.

  • Technical report
    23 pages
    English language
    sale 15% off

ISO/IEC TR 29181-8:2017 describes the problem statements of current networks and the requirements for Future Network (FN) in the Quality of Service (QoS) perspective. This document mainly specifies: - problems of the current networks for QoS; - requirements for QoS support in Future Network.

  • Technical report
    14 pages
    English language
    sale 15% off

This European Standard specifies the medium access control/physical layer MAC/PHY and networking layer of a communication protocol for the exchange of data from metering devices to other devices within a mesh network.
The referenced documents in this European Standard contain specifications, interface descriptions, object descriptions, protocols and algorithms pertaining to this protocol standard, the device objects, device profile, the application framework, the network layer, and security services.
They are referenced in their entirety for reasons of backwards compatibility and interoperability with products in the field currently using this technology.

  • Standard
    6 pages
    English language
    sale 10% off
    e-Library read for
    1 day

This European Standard specifies the medium access control/physical layer MAC/PHY and networking layer of a communication protocol for the exchange of data from metering devices to other devices within a mesh network.
The referenced documents in this European Standard contain specifications, interface descriptions, object descriptions, protocols and algorithms pertaining to this protocol standard, the device objects, device profile, the application framework, the network layer, and security services.
They are referenced in their entirety for reasons of backwards compatibility and interoperability with products in the field currently using this technology.

  • Standard
    6 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and layer 3 of the DECT protocol stack. The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendations ITU-T X.200 [i.3] and X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    357 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    357 pages
    English language
    sale 15% off
  • Standard
    362 pages
    English language
    sale 15% off

ISO/IEC TR 29181-2:2014 describes the general characteristics of Future Network naming and addressing schemes, including problem statements, requirements, design objectives, gap analysis, and development directions. Problem Statements: The characteristics and problems of existing NAS in existing network will be discussed. Technical Challenges: A list of major technical challenges to assure that the FN-NAS will be able to provide solid Requirements: The general characteristics of Future Network are discussed and their impact on NAS design. Gap analysis: Examines the gap between existing network NAS and future network performance expectations. FN-NAS Standardization Plan, design objectives, gap analysis, development guidance, chronological scenarios for future network naming, and addressing guidance are described in detail. Though ISO/IEC TR 29181-2:2014 mainly presents a list of up-to-date surveyed problems, requirements, and plausible techniques for Future Network, it does not mean that all of those would be applied to a single Future Network in common, since the naming and addressing scheme can be applied to the various networks, such as global networks, local networks, access networks, mobile networks, etc. If a specific Future Network is designed and implemented, some appropriate parts of ISO/IEC TR 29181 would be considered depending on its network usage and its characteristics.

  • Technical report
    36 pages
    English language
    sale 15% off

ISO/IEC TR 29181-5:2014 describes the problem statements of current network and the requirements for Future Network in the security perspective. It mainly specifies problems of the current network in security environment, and requirements for security support in Future Network.

  • Technical report
    6 pages
    English language
    sale 15% off

ISO/IEC TR 29181-4:2013 describes the problem statements of current network and the requirements for Future Network in the mobility perspective. It mainly specifies problems of the current network in mobile environment, and requirements for mobility support in Future Network. In addition, ISO/IEC TR 29181-4:2013 gives information on existing mobility control schemes in the current network, examples of high-level mobility control architecture for Future Network, distributed mobility control in the Proxy Mobile IPv6 networks, and additional considerations for Future Network mobility.

  • Technical report
    21 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3 of the DECT protocol stack.
The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
- Call Control (CC);
- Supplementary Services (SS);
- Connection Oriented Message Service (COMS);
- ConnectionLess Message Service (CLMS);
- Mobility Management (MM);
- Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendations ITU-T X.200 [i.3] and X.210 [i.4]. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    365 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    365 pages
    English language
    sale 15% off

ISO/IEC TR 29181-7:2013 describes the problem statement, requirements and a functional building block for the Future Network (FN) from the perspective of service composition. The goal of ISO/IEC TR 29181-7:2013 is to: analyse and classify problems of the current solutions on the service composition, identify requirements on the service composition for the FN, describe some technical aspects of the service composition for the FN, and propose a functional building block of the service composition including functional components and their reference points among them. ISO/IEC TR 29181-7:2013 also introduces various on-going standardization and research activities related to service composition.

  • Technical report
    48 pages
    English language
    sale 15% off

ISO/IEC TR 29181-6:2013 describes the problem statement and requirements for the Future Network in the perspective of media transport. ISO/IEC TR 29181-6:2013 specifies: detailed description of the media transport requirements in the Future Network; identification and definition of services, basic and media services, which will fit the requirements for communications over heterogeneous environments supporting various user preferences, for any kind of media content, either time-dependent or time-independent; requirements and functionalities of Media Aware Network Elements, which are intended to be nodes in the network to provide seamless media experiences to users.

  • Technical report
    30 pages
    English language
    sale 15% off

ISO/IEC TR 29181-3:2013 contains the problem statement and requirements for switching and routing in the Future Network, in particular: description of the requirements for carrying data over digital networks; description of the ways in which these requirements are not satisfied by current networks; functional architecture for switching and routing in the Future Network; and requirements for control plane information flows for finding, setting up, and tearing down routes. The requirements in 4. include support for both current ("legacy") and future ("new") switching technologies, to aid the transition between them.

  • Technical report
    29 pages
    English language
    sale 15% off

ISO/IEC TR 29181-1:2012 describes the definition, general concept, problems and requirements for Future Network (FN). It also discusses a milestone for standardization on FN. The scope of ISO/IEC TR 29181-1:2012 includes: motivation of FN; definition, general concept, and terminologies of FN; services and applications in FN; problems with current networks; design goals and high-level requirements for FN; milestones for standardization on FN.

  • Technical report
    26 pages
    English language
    sale 15% off

ISO/IEC 18052:2012 specifies application protocol data units (APDUs) for the services described in ISO/IEC 18051.

  • Standard
    578 pages
    English language
    sale 15% off
  • Standard
    578 pages
    English language
    sale 15% off

ISO/IEC 18051:2012 specifies the Services and Event Reports for Computer-Supported Telecommunications Applications, Phase III (CSTA). It is focused on providing application service interfaces to a Switching Function, Computing Function and a Special Resource Function. A CSTA application interface is disassociated from the various user-network interfaces and network-network interfaces CSTA applications serve, observe or manipulate. Because CSTA operates with existing telecommunications interfaces indirectly, it operates generically so that differences among various existing interfaces are hidden from CSTA applications. Support of user-to-network interfaces is outside the scope of CSTA. Although most terminal equipment (TE) is suitable for use with CSTA, there will be instances of TE that will not be suitable in certain circumstances. ISO/IEC 18051:2012 defines services that allow functional integration between a computing network and a telecommunications network. Computing platforms (i.e., Application Programming Interfaces - APIs) that support such functionally-integrated applications are outside the scope of ISO/IEC 18051:2012. Communication between the computing and switching (i.e., telecommunications) networks can take place via intervening networks ranging from simple point-to-point connections to local- or wide-area telecommunications networks. ISO/IEC 18051:2012 is part of a suite of CSTA Standards and Technical Reports that provides a comprehensive description of the architectural and practical issues involved in applying, implementing, and utilizing CSTA-based CTI applications.

  • Standard
    741 pages
    English language
    sale 15% off
  • Standard
    741 pages
    English language
    sale 15% off

ISO/IEC 18056:2012 specifies an XML protocol for the services defined in ISO/IEC 18051. It provides an alternative protocol to the ASN.1 based protocol specified in ISO/IEC 18052. In addition to the CSTA-specific protocol details, it also describes the concepts underlying the request/response model, application association, notation and service, and describes the template it uses. It also specifies the PICS used and provides examples of CSTA XML encodings.

  • Standard
    498 pages
    English language
    sale 15% off
  • Standard
    498 pages
    English language
    sale 15% off

Update the standard to include new functions defined for NG DECT. Support of the new mechanisms introduced in NG-DECT part 5. Enhancement of security.

  • Standard
    355 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). This part of the DECT CI specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3 of the DECT protocol stack.The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
- Call Control (CC);
- Supplementary Services (SS);
- Connection Oriented Message Service (COMS);
- ConnectionLess Message Service (CLMS);
- Mobility Management (MM);
- Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in ITU-T Recommendations X.200 [i.3] and X.210 [i.4]. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    348 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    348 pages
    English language
    sale 15% off
  • Standard
    348 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). This part of the DECT CI specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3 of the DECT protocol stack. The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in ITU-T Recommendations X.200 [i.3] and X.210 [i.4]. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    331 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    331 pages
    English language
    sale 15% off
  • Standard
    332 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). This part of the DECT CI specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3
of the DECT protocol stack. The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in ITU-T Recommendation X.200 and ITU-T Recommendation X.210. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    314 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3 of the DECT protocol stack.The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
- Call Control (CC);
- Supplementary Services (SS);
- Connection Oriented Message Service (COMS);
- ConnectionLess Message Service (CLMS);
- Mobility Management (MM);
- Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in ITU-T Recommendation X.200 and ITU-T Recommendation X.210.

  • Standard
    310 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3 of the DECT protocol stack.The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in ITU-T Recommendation X.200 and ITU-T Recommendation X.210.

  • Standard
    309 pages
    English language
    sale 10% off
    e-Library read for
    1 day

ISO/IEC TR 22767:2005 describes how CSTA can be used to provide a subset of CSTA call control functionality, called first party call control, for Session Initiation Protocol (SIP) user agents. The term uaCSTA (for user agent CSTA) refers to transporting ECMA-323 (CSTA XML) messages over a SIP session. SIP is a control (signalling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. CSTA standardizes a very powerful and flexible set of application services to observe and control voice and non-voice media calls as well as control and observe non-call related features. uaCSTA leverages SIP mechanisms to provide a highly featured, robust, and extensible set of features to support applications in the Enterprise environment. uaCSTA can be implemented by several different types of SIP user agents: directly by a SIP user agent on a SIP phone, uaCSTA can also be implemented by a SIP B2BUA to augment 3PCC functionality, and by a proxy server that is front-ending a PBX.

  • Technical report
    82 pages
    English language
    sale 15% off

to provide an update based on SPS5 meeting (Galway 05/96) TDs 107, 151, 153, and 234, and to include the agreed Q.931 changes documented in the output of ITU-T SG11 meeting (Miyazaki 02/96)

  • Standard
    80 pages
    English language
    sale 10% off
    e-Library read for
    1 day

To update the Date/Time information element according to contribution TD 207 and the BC, LLC with new codepoints. Supporting ETSI Member Organisations; VIAG Interkom, Swisscom, KPN, Telenor.

  • Standard
    78 pages
    English language
    sale 10% off
    e-Library read for
    1 day

Produce a new edition of the network side TSS&TP that incorporates changes necessitated by the maintenance work of STF122 on the ATS part

  • Standard
    88 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The RapidIO architecture was developed to address the need for a high-performance low pin count packet-switched system level interconnect to be used in a variety of applications as an open standard. The architecture is targeted toward networking, telecom, and high performance embedded applications. It is intended primarily as an intra-system interface, allowing chip-to-chip and board-toboard communications at Gigabyte per second performance levels. It provides a rich variety of features including high data bandwidth, low-latency capability and support for high-performance I/O devices, as well as providing globally shared memory, message passing, and software managed programming models.

  • Standard
    405 pages
    English language
    sale 15% off

To update ETS 300 175  Edition 3 based upon change requests received.

  • Standard
    267 pages
    English language
    sale 10% off
    e-Library read for
    1 day

Maintenance update to include elements for the high speed DECT service.

  • Standard
    303 pages
    English language
    sale 10% off
    e-Library read for
    1 day

To update ETS 300 175  based upon experiences from the development of TBR 6 & 10  and comments received.

  • Standard
    272 pages
    English language
    sale 10% off
    e-Library read for
    1 day

This International Standard specifies a protocol which is used by Network Layer entities operating the protocol specified in ISO 8473 in Intermediate Systems to maintain routeing information for the purpose of routeing within a single routeing domain. The protocol specified in this International Standard relies upon the provision of a connectionless-mode underlying service.1) This International Standard specifies: a) procedures for the transmission of configuration and routeing information between network entities residing in Intermediate Systems within a single routeing domain; b) the encoding of the protocol data units used for the transmission of the configuration and routeing information; c) procedures for the correct interpretation of protocol control information; and d) the functional requirements for implementations claiming conformance to this International Standard. The procedures are defined in terms of a) the interactions between Intermediate system Network entities through the exchange of protocol data units; b) the interactions between a Network entity and an underlying service provider through the exchange of subnetwork service primitives; and c) the constraints on route determination which must be observed by each Intermediate system when each has a routeing information base which is consistent with the others.

  • Standard
    201 pages
    English language
    sale 15% off

ISO/IEC 8348:2002 defines the set of capabilities, in terms of abstract service definition, provided by the Network Layer to the Transport Layer. For designers of Transport Layer protocols, it provides a definition of the Network service to allow design and implementation independent of details of the Network Layer protocol. For designers of Network Layer protocols, it defines the set of capabilities to be made available through the action of the protocol.

  • Standard
    60 pages
    English language
    sale 15% off
  • Standard
    67 pages
    French language
    sale 15% off

This International Standard specifies the procedures, formats and facilities at the Packet Layer for Data Terminal Equipment (DTE) operating in conformance with ITU-T Recommendation X.25. Both Virtual Call and Permanent Virtual Circuit modes of operation are covered. The Packet Layer protocol specified herein can be used in both Open Systems Interconnection (OSI) and non-OSI environments. When used within the context of OSI, the Packet Layer protocol is encompassed in the Network Layer of the OSI Reference Model, ITU-T Rec. X.200 | ISO/IEC 7498-1. This International Standard covers DTE operation at the Packet Layer when accessing a public or private packet-switched network conforming to ITU-T Recommendation X.25 by means of a dedicated path or a circuit-switched connection. It also covers the additional Packet Layer procedures necessary for two DTEs conforming to this International Standard to communicate directly (i.e., without an intervening packet-switched network) over a dedicated path, a circuit-switched connection, or a local area network (LAN). This International Standard also covers private networks that use ITU-T Recommendation X.25 to connect to packet-switched public data networks and that may also offer an X.25 interface to a DTE (see annex A). To evaluate conformance of a particular implementation, it is necessary to have a statement of which capabilities and options have been implemented. Such a statement is called a Protocol Implementation Conformance Statement (PICS), as defined in ITU-T Rec. X.290 | ISO/IEC 9646-1. Annex B provides the PICS proforma in accordance with the relevant guidance given in ITUT Rec. X.296 | ISO/IEC 9646-7. The first edition of this International Standard was based on the 1984 CCITT Red Book text of Recommendation X.25. It also contained the necessary provisions for compatibility with the earlier 1980 CCITT Yellow Book text of Recommendation X.25. The second edition was based on the 1988 CCITT Blue Book text of Recommendation X.25. The third edition is based upon the 1993 version of X.25. This fourth edition is based on the 1996 version of X.25. Retained within this fourth edition are the necessary provisions for compatibility with the 1993, 1988, 1984 and 1980 versions of X.25. The differences between various editions of this International Standard are summarized in annex C. CCITT Recommendation X.613 (1992) | ISO/IEC 10588 : 1993, Information technology Use of X.25 Packet Layer Protocol in conjunction with X.21/X.21bis to provide the OSI connectionmode Network Service CCITT Recommendation X.614 (1992) | ISO/IEC 10732 : 1993, Information technology Use of X.25 Packet Layer Protocol to provide the OSI connection-mode Network Service over the telephone network

  • Standard
    170 pages
    English language
    sale 15% off

This Technical Report contains definitions of technical terms and acronyms used throughout the suite of publications comprising CSTA Phase III.

  • Technical report
    23 pages
    English language
    sale 15% off

This part of ISO/IEC 8882 specifies a set of abstract tests for verifying that the implementation of X.25 protocols for use by Data Terminal Equipment (DTE), conforms to the requirements of International Standards that specify those protocols. Testing of a DCE is not subject of this test suite. Testing of a DTE in DCE mode is covered in test group 28 of this test suite a) specifies a PIXIT proforma; b) describes the relationship of the PICS to the test suite, c) describes the relationship of the PIXIT to the test suite, d) specifies a set of abstract tests using TTCN Graphical notation. This part of ISO/IEC 8882 defines the testing of a DTE operating at the packet layer designed to access a public or private packet-switched network conforming to CCITT respectively ITU-T Recommendation X.25 (1980, 1984, 1988, 1993) or another DTE conforming to ISO 8208. The specification of test cases in executable/machine processable TTCN is outside the scope of this part of ISO/IEC 8882.

  • Standard
    779 pages
    English language
    sale 15% off

This part of ISO/IEC 8882 defines an abstract test suite for testing the conformance of the Data Link Layer of an IUT with respect to ISO/IEC 7776 (1986, 1995) or the ITU-T Recommendation X.25 (1980, 1984, 1988, 1993). Conformance of a Data Terminal Equipment (DTE) to the above ISO International Standard or ITU-T Recommendations is tested using a dedicated circuit between the tester and the DTE. It is noted that ITU-T Recommendations X.25 (1980), X.25 (1984), X.25 (1988) and X.25 (1993) are written from the perspective of a DCE and therefore do not always explicitly specify the DTE's operation. In such cases it is assumed that recommended operation of a DTE is included by implication because of the need to communicate with X.25 DCE's. This part of ISO/IEC 8882 excludes the testing of the LAP procedures given in the ITU-T Recommendations. NOTE Test cases for extended mode operation (Modulo 128), multilink procedure and DTE-DTE operation as per ISO/IEC 7776 are for further study. The tests in this part of ISO/IEC 8882 are designed for six possible interworking situations, shown in Figure 1. This part specifies tests for all six cases shown in Figure 1, but recognizes that not every test may apply to a particular DTE. A test selection procedure has to be performed to determine the applicability of a test to a particular DTE. Such selection will be based on the PICS and the PIXIT. Figure 1 — Testing X.25-DTE/DCE and X.25-DTE/DTE Interworking In the rest of this part of ISO/IEC 8882, the term "X.25 standards" means all four of ITU-T Recommendations X.25 (1980), X.25 (1984), X.25 (1988), X.25 (1993), and International Standards ISO/IEC 7776 (1995) and ISO/IEC 7776 (1986), unless stated otherwise.

  • Standard
    378 pages
    English language
    sale 15% off

This Recommendation | Technical Report provides: a) the description of a means to permit a protocol to be identified; b) a record of the structure and allowable ranges of protocol identifier(s) which can be assigned by ITU-T, ISO/IEC and other authorities; c) a record of the values of protocol identifiers used by OSI Network layer protocols and non-OSI protocols occupying a similar position: in particular, protocols with protocol control information commencing in octet 1 of the protocol data unit (header-oriented protocols), and protocols with protocol control information commencing in the final octet of the protocol data unit (trailer-oriented protocols), are covered; and d) a record of the values that are in use as protocol control information in non-Network layer protocols where they impact on Network layer protocol identification. The application of this Recommendation | Technical Report is: a) in the identification of internationally standardized Network layer protocols operating directly above the Data Link service; b) in the identification of protocols used in conjunction with internationally standardized Network layer protocols that operate directly above the Data Link service; and c) to distinguish between Internationally standardized Network layer protocols, and other internationally standardized protocols used in conjunction with internationally standardized Network layer protocols. This Recommendation | Technical Report is for use by ITU-T Study Groups, ISO/IEC Technical Committees and other authorities in applying the principles contained in clause 4, and in selecting an unused value or values from the range of values permitted in clauses 5 or 6, as appropriate. When a new value is selected, that value and its usage should be brought to the attention of ITU-T Study Group 7 or ISO/IEC JTC 1 SC6 so that this Recommendation | Technical Report can be amended.

  • Technical report
    19 pages
    English language
    sale 15% off