Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) Layer

REN/DECT-000129-5

Digitalne izboljšane brezvrvične telekomunikacije (DECT) – Skupni vmesnik (CI) – 5. del: Omrežna plast (NWK)

General Information

Status
Published
Publication Date
22-Jun-1999
Current Stage
12 - Completion
Due Date
11-Jun-1999
Completion Date
23-Jun-1999

Buy Standard

Standard
EN 300 175-5 V1.4.2:2003
English language
267 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) Layer35.100.30Omrežni slojNetwork layer33.070.30'(&7Digital Enhanced Cordless Telecommunications (DECT)ICS:Ta slovenski standard je istoveten z:EN 300 175-5 Version 1.4.2SIST EN 300 175-5 V1.4.2:2003en01-december-2003SIST EN 300 175-5 V1.4.2:2003SLOVENSKI
STANDARD



SIST EN 300 175-5 V1.4.2:2003



EN 300 175-5 V1.4.2 (1999-06)European Standard (Telecommunications series)Digital Enhanced Cordless Telecommunications (DECT);Common Interface (CI);Part 5: Network (NWK) layerSIST EN 300 175-5 V1.4.2:2003



ETSIETSI EN 300 175-5 V1.4.2 (1999-06)2ReferenceREN/DECT-000129-5 (1md90jdc.PDF)KeywordsDECT, radioETSIPostal addressF-06921 Sophia Antipolis Cedex - FRANCEOffice address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16Siret N° 348 623 562 00017 - NAF 742 CAssociation à but non lucratif enregistrée à laSous-Préfecture de Grasse (06) N° 7803/88Internetsecretariat@etsi.frIndividual copies of this ETSI deliverablecan be downloaded fromhttp://www.etsi.orgIf you find errors in the present document, send yourcomment to: editor@etsi.frCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© European Telecommunications Standards Institute 1999.All rights reserved.SIST EN 300 175-5 V1.4.2:2003



ETSIETSI EN 300 175-5 V1.4.2 (1999-06)3ContentsIntellectual Property Rights.13Foreword.131Scope.142References.143Definitions and abbreviations.183.1Definitions.183.2Abbreviations.204Overview of the NWK layer.215Overview of procedures.235.1General.235.2Overview of Call Control (CC).235.2.1General.235.2.2Call establishment.235.2.2.1Call setup.235.2.2.2Service negotiation.245.2.3Call connect.245.2.4Call information.245.2.5Service change.245.2.6Call release.255.3Overview of Supplementary Services (SS).255.3.1General.255.3.2Keypad protocol.265.3.3Feature key management protocol.265.3.4Functional protocol.265.4Overview of Connection Oriented Message Service (COMS).265.4.1General.265.4.2COMS establishment.275.4.3Service negotiation.275.4.4COMS connect.275.4.5COMS data transfer.275.4.6COMS suspend and resume.275.4.7COMS release.285.5Overview of ConnectionLess Message Service (CLMS).285.5.1Fixed length message service.285.5.2Variable length message service.285.6Overview of Mobility Management (MM).285.6.1General.285.6.2Identity procedures.295.6.3Authentication procedures.295.6.4Location procedures.295.6.5Access rights procedures.305.6.6Key allocation procedure.305.6.7Parameter retrieval procedure.305.6.8Ciphering related procedure.305.7Overview of Link Control Entity (LCE).315.7.1General.315.7.2Data Link Endpoint Identifier (DLEI).315.7.3Data link establishment.315.7.4Data link re-establishment.325.7.5Data link release.325.7.6Data link suspend and resume.325.7.7Queuing of messages.325.7.8Request paging.33SIST EN 300 175-5 V1.4.2:2003



ETSIETSI EN 300 175-5 V1.4.2 (1999-06)46Message functional definitions.336.1Overview of message structures.336.1.1Messages.336.1.2Information elements.346.2Message summaries.346.2.1Summary of CC messages.346.2.2Summary of CISS messages.356.2.3Summary of COMS messages.356.2.4Summary of CLMS messages.356.2.5Summary of MM messages.366.2.6Summary of LCE messages.366.3S-FORMAT message functional contents.376.3.1S-FORMAT message overview.376.3.2CC-messages.386.3.2.1{CC-SETUP}.386.3.2.2{CC-INFO}.406.3.2.3{CC-SETUP-ACK}.416.3.2.4{CC-CALL-PROC}.426.3.2.5{CC-ALERTING}.436.3.2.6{CC-CONNECT}.446.3.2.7{CC-CONNECT-ACK}.456.3.2.8{CC-RELEASE}.456.3.2.9{CC-RELEASE-COM}.466.3.2.10{CC-SERVICE-CHANGE}.476.3.2.11{CC-SERVICE-ACCEPT}.476.3.2.12{CC-SERVICE-REJECT}.486.3.2.13{CC-NOTIFY}.486.3.2.14{IWU-INFO}.496.3.3SS-messages (call related and call independent).506.3.3.1{FACILITY}.506.3.3.2{HOLD} .506.3.3.3{HOLD-ACK}.516.3.3.4{HOLD-REJECT}.516.3.3.5{RETRIEVE}.526.3.3.6{RETRIEVE-ACK}.526.3.3.7{RETRIEVE-REJECT}.526.3.3.8{CISS-REGISTER}.536.3.3.9{CISS-RELEASE-COM}.536.3.4COMS-messages.546.3.4.1{COMS-SETUP}.546.3.4.2{COMS-INFO}.546.3.4.3{COMS-ACK}.556.3.4.4{COMS-CONNECT}.556.3.4.5{COMS-RELEASE}.556.3.4.6{COMS-RELEASE-COM}.566.3.4.7{COMS-NOTIFY}.566.3.5CLMS-message.576.3.5.1{CLMS-VARIABLE}.576.3.6MM-messages.586.3.6.1{ACCESS-RIGHTS-ACCEPT}.586.3.6.2{ACCESS-RIGHTS-REJECT}.586.3.6.3{ACCESS-RIGHTS-REQUEST}.596.3.6.4{ACCESS-RIGHTS-TERMINATE-ACCEPT}.596.3.6.5{ACCESS-RIGHTS-TERMINATE-REJECT}.606.3.6.6{ACCESS-RIGHTS-TERMINATE-REQUEST}.606.3.6.7{AUTHENTICATION-REJECT}.616.3.6.8{AUTHENTICATION-REPLY}.616.3.6.9{AUTHENTICATION-REQUEST}.626.3.6.10{CIPHER-REJECT}.626.3.6.11{CIPHER-REQUEST}.63SIST EN 300 175-5 V1.4.2:2003



ETSIETSI EN 300 175-5 V1.4.2 (1999-06)56.3.6.12{CIPHER-SUGGEST}.636.3.6.13{DETACH}.646.3.6.14{IDENTITY-REPLY}.646.3.6.15{IDENTITY-REQUEST}.656.3.6.16{KEY-ALLOCATE}.656.3.6.17{LOCATE-ACCEPT}.666.3.6.18{LOCATE-REJECT}.666.3.6.19{LOCATE-REQUEST}.676.3.6.20{MM-INFO-ACCEPT}.676.3.6.21{MM-INFO-REJECT}.686.3.6.22{MM-INFO-REQUEST}.686.3.6.23{MM-INFO-SUGGEST}.696.3.6.24{TEMPORARY-IDENTITY-ASSIGN}.696.3.6.25{TEMPORARY-IDENTITY-ASSIGN-ACK}.706.3.6.26{TEMPORARY-IDENTITY-ASSIGN-REJ}.706.3.7LCE-messages.716.3.7.1{LCE-PAGE-RESPONSE}.716.3.7.2{LCE-PAGE-REJECT}.716.4B-FORMAT message functional contents.726.4.1B-FORMAT message overview.726.4.2{LCE-REQUEST-PAGE}.726.4.3{CLMS-FIXED}.727S-FORMAT message structures.737.1Overview.737.2Protocol Discrimination (PD) element.747.3Transaction Identifier (TI) element.747.4Message type element.757.4.1Messages for CC.767.4.2Messages for SS.767.4.3Messages for COMS.767.4.4Messages for CLMS.777.4.5Messages for MM.777.4.6Messages for LCE.777.5Other information elements.777.5.1Coding rules.777.5.2Extensions of codesets.797.5.3Locking shift procedure.807.5.4Non-locking shift procedure.807.5.5Display and keypad elements.817.5.6Repeated elements.817.6Fixed length information elements.827.6.1Summary.827.6.2Sending complete, delimiter request and use TPUI.827.6.3Repeat indicator.837.6.4Basic service.837.6.5Single display.847.6.6Single keypad.847.6.7Release reason.847.6.8Signal.857.6.9Timer restart.867.6.10Test hook control.877.7Variable length information elements.877.7.1Summary.877.7.2Allocation type.897.7.3Alphanumeric.907.7.4Auth type.917.7.5Call attributes.927.7.6Call identity.947.7.7Called party number.957.7.8Called party subaddress.96SIST EN 300 175-5 V1.4.2:2003



ETSIETSI EN 300 175-5 V1.4.2 (1999-06)67.7.9Calling party number.967.7.10Cipher info.977.7.11Connection attributes.987.7.12Connection identity.1007.7.13Duration.1017.7.14End-to-end compatibility.1027.7.15Facility.1057.7.16Feature activate.1057.7.17Feature indicate.1087.7.18Fixed identity.1107.7.19Identity type.1117.7.20Info type.
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.