REN/DECT-000129-5

Digitalne izboljšane brezvrvične telekomunikacije (DECT) – Skupni vmesnik (CI) – 5. del: Omrežna plast (NWK)

General Information

Status
Published
Publication Date
22-Jun-1999
Current Stage
12 - Completion
Due Date
11-Jun-1999
Completion Date
23-Jun-1999

Buy Standard

Standard
EN 300 175-5 V1.4.2:2003
English language
267 pages
world standards week 20% off
Preview
world standards week 20% off
Preview

e-Library read for
1 day

Standards Content (sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) Layer35.100.30Omrežni slojNetwork layer33.070.30'(&7Digital Enhanced Cordless Telecommunications (DECT)ICS:Ta slovenski standard je istoveten z:EN 300 175-5 Version 1.4.2SIST EN 300 175-5 V1.4.2:2003en01-december-2003SIST EN 300 175-5 V1.4.2:2003SLOVENSKI

STANDARD
SIST EN 300 175-5 V1.4.2:2003

EN 300 175-5 V1.4.2 (1999-06)European Standard (Telecommunications series)Digital Enhanced Cordless Telecommunications (DECT);Common Interface (CI);Part 5: Network (NWK) layerSIST EN 300 175-5 V1.4.2:2003

ETSIETSI EN 300 175-5 V1.4.2 (1999-06)2ReferenceREN/DECT-000129-5 (1md90jdc.PDF)KeywordsDECT, radioETSIPostal addressF-06921 Sophia Antipolis Cedex - FRANCEOffice address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00

Fax: +33 4 93 65 47 16Siret N° 348 623 562 00017 - NAF 742 CAssociation à but non lucratif enregistrée à laSous-Préfecture de Grasse (06) N° 7803/88Internetsecretariat@etsi.frIndividual copies of this ETSI deliverablecan be downloaded fromhttp://www.etsi.orgIf you find errors in the present document, send yourcomment to: editor@etsi.frCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© European Telecommunications Standards Institute 1999.All rights reserved.SIST EN 300 175-5 V1.4.2:2003

ETSIETSI EN 300 175-5 V1.4.2 (1999-06)3ContentsIntellectual Property Rights.............................................................................................................................13Foreword..........................................................................................................................................................131Scope......................................................................................................................................................142References.............................................................................................................................................143Definitions and abbreviations................................................................................................................183.1Definitions.......................................................................................................................................................183.2Abbreviations...................................................................................................................................................204Overview of the NWK layer..................................................................................................................215Overview of procedures.........................................................................................................................235.1General.............................................................................................................................................................235.2Overview of Call Control (CC)........................................................................................................................235.2.1General.......................................................................................................................................................235.2.2Call establishment......................................................................................................................................235.2.2.1Call setup..............................................................................................................................................235.2.2.2Service negotiation...............................................................................................................................245.2.3Call connect................................................................................................................................................245.2.4Call information.........................................................................................................................................245.2.5Service change...........................................................................................................................................245.2.6Call release.................................................................................................................................................255.3Overview of Supplementary Services (SS)......................................................................................................255.3.1General.......................................................................................................................................................255.3.2Keypad protocol.........................................................................................................................................265.3.3Feature key management protocol..............................................................................................................265.3.4Functional protocol....................................................................................................................................265.4Overview of Connection Oriented Message Service (COMS).........................................................................265.4.1General.......................................................................................................................................................265.4.2COMS establishment..................................................................................................................................275.4.3Service negotiation.....................................................................................................................................275.4.4COMS connect...........................................................................................................................................275.4.5COMS data transfer....................................................................................................................................275.4.6COMS suspend and resume.......................................................................................................................275.4.7COMS release............................................................................................................................................285.5Overview of ConnectionLess Message Service (CLMS).................................................................................285.5.1Fixed length message service.....................................................................................................................285.5.2Variable length message service................................................................................................................285.6Overview of Mobility Management (MM)......................................................................................................285.6.1General.......................................................................................................................................................285.6.2Identity procedures.....................................................................................................................................295.6.3Authentication procedures..........................................................................................................................295.6.4Location procedures...................................................................................................................................295.6.5Access rights procedures............................................................................................................................305.6.6Key allocation procedure...........................................................................................................................305.6.7Parameter retrieval procedure....................................................................................................................305.6.8Ciphering related procedure.......................................................................................................................305.7Overview of Link Control Entity (LCE)..........................................................................................................315.7.1General.......................................................................................................................................................315.7.2Data Link Endpoint Identifier (DLEI)........................................................................................................315.7.3Data link establishment..............................................................................................................................315.7.4Data link re-establishment..........................................................................................................................325.7.5Data link release.........................................................................................................................................325.7.6Data link suspend and resume....................................................................................................................325.7.7Queuing of messages..................................................................................................................................325.7.8Request paging...........................................................................................................................................33SIST EN 300 175-5 V1.4.2:2003

ETSIETSI EN 300 175-5 V1.4.2 (1999-06)46Message functional definitions..............................................................................................................336.1Overview of message structures.......................................................................................................................336.1.1Messages....................................................................................................................................................336.1.2Information elements..................................................................................................................................346.2Message summaries.........................................................................................................................................346.2.1Summary of CC messages..........................................................................................................................346.2.2Summary of CISS messages.......................................................................................................................356.2.3Summary of COMS messages....................................................................................................................356.2.4Summary of CLMS messages....................................................................................................................356.2.5Summary of MM messages........................................................................................................................366.2.6Summary of LCE messages........................................................................................................................366.3S-FORMAT message functional contents........................................................................................................376.3.1S-FORMAT message overview..................................................................................................................376.3.2CC-messages..............................................................................................................................................386.3.2.1{CC-SETUP}.......................................................................................................................................386.3.2.2{CC-INFO}..........................................................................................................................................406.3.2.3{CC-SETUP-ACK}..............................................................................................................................416.3.2.4{CC-CALL-PROC}..............................................................................................................................426.3.2.5{CC-ALERTING}................................................................................................................................436.3.2.6{CC-CONNECT}.................................................................................................................................446.3.2.7{CC-CONNECT-ACK}.......................................................................................................................456.3.2.8{CC-RELEASE}..................................................................................................................................456.3.2.9{CC-RELEASE-COM}........................................................................................................................466.3.2.10{CC-SERVICE-CHANGE}.................................................................................................................476.3.2.11{CC-SERVICE-ACCEPT}...................................................................................................................476.3.2.12{CC-SERVICE-REJECT}....................................................................................................................486.3.2.13{CC-NOTIFY}.....................................................................................................................................486.3.2.14{IWU-INFO}........................................................................................................................................496.3.3SS-messages (call related and call independent)........................................................................................506.3.3.1{FACILITY}........................................................................................................................................506.3.3.2{HOLD} ..............................................................................................................................................506.3.3.3{HOLD-ACK}.....................................................................................................................................516.3.3.4{HOLD-REJECT}................................................................................................................................516.3.3.5{RETRIEVE}.......................................................................................................................................526.3.3.6{RETRIEVE-ACK}.............................................................................................................................526.3.3.7{RETRIEVE-REJECT}.......................................................................................................................526.3.3.8{CISS-REGISTER}.............................................................................................................................536.3.3.9{CISS-RELEASE-COM}.....................................................................................................................536.3.4COMS-messages........................................................................................................................................546.3.4.1{COMS-SETUP}.................................................................................................................................546.3.4.2{COMS-INFO}....................................................................................................................................546.3.4.3{COMS-ACK}.....................................................................................................................................556.3.4.4{COMS-CONNECT}...........................................................................................................................556.3.4.5{COMS-RELEASE}............................................................................................................................556.3.4.6{COMS-RELEASE-COM}..................................................................................................................566.3.4.7{COMS-NOTIFY}...............................................................................................................................566.3.5CLMS-message..........................................................................................................................................576.3.5.1{CLMS-VARIABLE}..........................................................................................................................576.3.6MM-messages............................................................................................................................................586.3.6.1{ACCESS-RIGHTS-ACCEPT}...........................................................................................................586.3.6.2{ACCESS-RIGHTS-REJECT}............................................................................................................586.3.6.3{ACCESS-RIGHTS-REQUEST}........................................................................................................596.3.6.4{ACCESS-RIGHTS-TERMINATE-ACCEPT}...................................................................................596.3.6.5{ACCESS-RIGHTS-TERMINATE-REJECT}....................................................................................606.3.6.6{ACCESS-RIGHTS-TERMINATE-REQUEST}................................................................................606.3.6.7{AUTHENTICATION-REJECT}........................................................................................................616.3.6.8{AUTHENTICATION-REPLY}.........................................................................................................616.3.6.9{AUTHENTICATION-REQUEST}....................................................................................................626.3.6.10{CIPHER-REJECT}............................................................................................................................626.3.6.11{CIPHER-REQUEST}.........................................................................................................................63SIST EN 300 175-5 V1.4.2:2003

ETSIETSI EN 300 175-5 V1.4.2 (1999-06)56.3.6.12{CIPHER-SUGGEST}.........................................................................................................................636.3.6.13{DETACH}..........................................................................................................................................646.3.6.14{IDENTITY-REPLY}..........................................................................................................................646.3.6.15{IDENTITY-REQUEST}....................................................................................................................656.3.6.16{KEY-ALLOCATE}............................................................................................................................656.3.6.17{LOCATE-ACCEPT}..........................................................................................................................666.3.6.18{LOCATE-REJECT}...........................................................................................................................666.3.6.19{LOCATE-REQUEST}.......................................................................................................................676.3.6.20{MM-INFO-ACCEPT}........................................................................................................................676.3.6.21{MM-INFO-REJECT}.........................................................................................................................686.3.6.22{MM-INFO-REQUEST}.....................................................................................................................686.3.6.23{MM-INFO-SUGGEST}.....................................................................................................................696.3.6.24{TEMPORARY-IDENTITY-ASSIGN}..............................................................................................696.3.6.25{TEMPORARY-IDENTITY-ASSIGN-ACK}.....................................................................................706.3.6.26{TEMPORARY-IDENTITY-ASSIGN-REJ}......................................................................................706.3.7LCE-messages............................................................................................................................................716.3.7.1{LCE-PAGE-RESPONSE}..................................................................................................................716.3.7.2{LCE-PAGE-REJECT}........................................................................................................................716.4B-FORMAT message functional contents.......................................................................................................726.4.1B-FORMAT message overview.................................................................................................................726.4.2{LCE-REQUEST-PAGE}.........................................................................................................................726.4.3{CLMS-FIXED}........................................................................................................................................727S-FORMAT message structures............................................................................................................737.1Overview..........................................................................................................................................................737.2Protocol Discrimination (PD) element.............................................................................................................747.3Transaction Identifier (TI) element..................................................................................................................747.4Message type element......................................................................................................................................757.4.1Messages for CC........................................................................................................................................767.4.2Messages for SS.........................................................................................................................................767.4.3Messages for COMS..................................................................................................................................767.4.4Messages for CLMS...................................................................................................................................777.4.5Messages for MM......................................................................................................................................777.4.6Messages for LCE......................................................................................................................................777.5Other information elements..............................................................................................................................777.5.1Coding rules...............................................................................................................................................777.5.2Extensions of codesets...............................................................................................................................797.5.3Locking shift procedure.............................................................................................................................807.5.4Non-locking shift procedure.......................................................................................................................807.5.5Display and keypad elements.....................................................................................................................817.5.6Repeated elements......................................................................................................................................817.6Fixed length information elements...................................................................................................................827.6.1Summary....................................................................................................................................................827.6.2Sending complete, delimiter request and use TPUI....................................................................................827.6.3Repeat indicator.........................................................................................................................................837.6.4Basic service..............................................................................................................................................837.6.5Single display.............................................................................................................................................847.6.6Single keypad.............................................................................................................................................847.6.7Release reason............................................................................................................................................847.6.8Signal.........................................................................................................................................................857.6.9Timer restart...............................................................................................................................................867.6.10Test hook control.......................................................................................................................................877.7Variable length information elements..............................................................................................................877.7.1Summary....................................................................................................................................................877.7.2Allocation type...........................................................................................................................................897.7.3Alphanumeric.............................................................................................................................................907.7.4Auth type....................................................................................................................................................917.7.5Call attributes.............................................................................................................................................927.7.6Call identity................................................................................................................................................947.7.7Called party number...................................................................................................................................957.7.8Called party subaddress..............................................................................................................................96SIST EN 300 175-5 V1.4.2:2003

ETSIETSI EN 300 175-5 V1.4.2 (1999-06)67.7.9Calling party number..................................................................................................................................967.7.10Cipher info.................................................................................................................................................977.7.11Connection attributes..................................................................................................................................987.7.12Connection identity..................................................................................................................................1007.7.13Duration...................................................................................................................................................1017.7.14End-to-end compatibility..........................................................................................................................1027.7.15Facility.....................................................................................................................................................1057.7.16Feature activate........................................................................................................................................1057.7.17Feature indicate........................................................................................................................................1087.7.18Fixed identity...........................................................................................................................................1107.7.19Identity type.............................................................................................................................................1117.7.20Info type..............................................................................................................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.