REN/DECT-000201-5

Digitalne izboljšane brezvrvične telekomunikacije (DECT) – Skupni vmesnik (CI) – 5. del: Omrežna plast (NWK)

General Information

Status
Published
Publication Date
06-Jul-2003
Current Stage
12 - Completion
Due Date
14-Jul-2003
Completion Date
07-Jul-2003

Buy Standard

Standard
EN 300 175-5 V1.7.1:2003
English language
303 pages
world standards week 20% off
Preview
world standards week 20% off
Preview

e-Library read for
1 day

Standards Content (sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer35.100.30Omrežni slojNetwork layer33.070.30'(&7Digital Enhanced Cordless Telecommunications (DECT)ICS:Ta slovenski standard je istoveten z:EN 300 175-5 Version 1.7.1SIST EN 300 175-5 V1.7.1:2003en01-december-2003SIST EN 300 175-5 V1.7.1:2003SLOVENSKI

STANDARD
SIST EN 300 175-5 V1.7.1:2003

ETSI EN 300 175-5 V1.7.1 (2003-07)European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT);Common Interface (CI);Part 5: Network (NWK) layer

SIST EN 300 175-5 V1.7.1:2003
ETSI ETSI EN 300 175-5 V1.7.1 (2003-07) 2

Reference REN/DECT-000201-5 Keywords DECT, radio ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88

Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: editor@etsi.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2003. All rights reserved.

DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.

SIST EN 300 175-5 V1.7.1:2003
ETSI ETSI EN 300 175-5 V1.7.1 (2003-07) 3

Contents Intellectual Property Rights..............................................................................................................................14 Foreword...........................................................................................................................................................14 1 Scope......................................................................................................................................................15 2 References..............................................................................................................................................15 3 Definitions and abbreviations.................................................................................................................19 3.1 Definitions........................................................................................................................................................19 3.2 Abbreviations...................................................................................................................................................21 4 Overview of the NWK layer..................................................................................................................23 5 Overview of procedures.........................................................................................................................25 5.1 General.............................................................................................................................................................25 5.2 Overview of Call Control (CC)........................................................................................................................25 5.2.1 General........................................................................................................................................................25 5.2.2 Call establishment.......................................................................................................................................26 5.2.2.1 Call setup..............................................................................................................................................26 5.2.2.2 Service negotiation................................................................................................................................26 5.2.3 Call connect................................................................................................................................................26 5.2.4 Call information..........................................................................................................................................27 5.2.5 Service change............................................................................................................................................27 5.2.6 Call release..................................................................................................................................................27 5.3 Overview of Supplementary Services (SS)......................................................................................................27 5.3.1 General........................................................................................................................................................27 5.3.2 Keypad protocol..........................................................................................................................................28 5.3.3 Feature key management protocol..............................................................................................................28 5.3.4 Functional protocol.....................................................................................................................................28 5.4 Overview of Connection Oriented Message Service (COMS).........................................................................29 5.4.1 General........................................................................................................................................................29 5.4.2 COMS establishment..................................................................................................................................29 5.4.3 Service negotiation.....................................................................................................................................29 5.4.4 COMS connect............................................................................................................................................29 5.4.5 COMS data transfer....................................................................................................................................30 5.4.6 COMS suspend and resume........................................................................................................................30 5.4.7 COMS release.............................................................................................................................................30 5.5 Overview of ConnectionLess Message Service (CLMS).................................................................................30 5.5.1 Fixed length message service......................................................................................................................30 5.5.2 Variable length message service.................................................................................................................31 5.6 Overview of Mobility Management (MM)......................................................................................................31 5.6.1 General........................................................................................................................................................31 5.6.2 Identity procedures.....................................................................................................................................31 5.6.3 Authentication procedures..........................................................................................................................32 5.6.4 Location procedures....................................................................................................................................32 5.6.5 Access rights procedures............................................................................................................................32 5.6.6 Key allocation procedure............................................................................................................................33 5.6.7 Parameter retrieval procedure.....................................................................................................................33 5.6.8 Ciphering related procedure........................................................................................................................33 5.7 Overview of Link Control Entity (LCE)..........................................................................................................33 5.7.1 General........................................................................................................................................................33 5.7.2 Data Link Endpoint Identifier (DLEI)........................................................................................................34 5.7.3 Data link establishment...............................................................................................................................34 5.7.4 Data link re-establishment..........................................................................................................................34 5.7.5 Data link release.........................................................................................................................................35 5.7.6 Data link suspend and resume.....................................................................................................................35 5.7.7 Queuing of messages..................................................................................................................................35 5.7.8 Request paging............................................................................................................................................35 SIST EN 300 175-5 V1.7.1:2003

ETSI ETSI EN 300 175-5 V1.7.1 (2003-07) 4

6 Message functional definitions...............................................................................................................36 6.1 Overview of message structures.......................................................................................................................36 6.1.1 Messages.....................................................................................................................................................36 6.1.2 Information elements..................................................................................................................................36 6.2 Message summaries..........................................................................................................................................37 6.2.1 Summary of CC messages..........................................................................................................................37 6.2.2 Summary of CISS messages.......................................................................................................................37 6.2.3 Summary of COMS messages....................................................................................................................38 6.2.4 Summary of CLMS messages.....................................................................................................................38 6.2.5 Summary of MM messages........................................................................................................................39 6.2.6 Summary of LCE messages........................................................................................................................39 6.3 S-FORMAT message functional contents........................................................................................................40 6.3.1 S-FORMAT message overview..................................................................................................................40 6.3.2 CC-messages...............................................................................................................................................41 6.3.2.1 {CC-SETUP}........................................................................................................................................41 6.3.2.2 {CC-INFO}...........................................................................................................................................42 6.3.2.3 {CC-SETUP-ACK}..............................................................................................................................43 6.3.2.4 {CC-CALL-PROC}..............................................................................................................................44 6.3.2.5 {CC-ALERTING}................................................................................................................................45 6.3.2.6 {CC-CONNECT}.................................................................................................................................46 6.3.2.7 {CC-CONNECT-ACK}........................................................................................................................47 6.3.2.8 {CC-RELEASE}...................................................................................................................................47 6.3.2.9 {CC-RELEASE-COM}........................................................................................................................48 6.3.2.10 {CC-SERVICE-CHANGE}..................................................................................................................49 6.3.2.11 {CC-SERVICE-ACCEPT}...................................................................................................................49 6.3.2.12 {CC-SERVICE-REJECT}....................................................................................................................50 6.3.2.13 {CC-NOTIFY}......................................................................................................................................50 6.3.2.14 {IWU-INFO}........................................................................................................................................51 6.3.3 SS-messages (call related and call independent)........................................................................................52 6.3.3.1 {FACILITY}.........................................................................................................................................52 6.3.3.2 {HOLD}................................................................................................................................................52 6.3.3.3 {HOLD-ACK}......................................................................................................................................53 6.3.3.4 {HOLD-REJECT}................................................................................................................................53 6.3.3.5 {RETRIEVE}.......................................................................................................................................53 6.3.3.6 {RETRIEVE-ACK}..............................................................................................................................54 6.3.3.7 {RETRIEVE-REJECT}........................................................................................................................54 6.3.3.8 {CISS-REGISTER}..............................................................................................................................55 6.3.3.9 {CISS-RELEASE-COM}.....................................................................................................................55 6.3.4 COMS-messages.........................................................................................................................................56 6.3.4.1 {COMS-SETUP}..................................................................................................................................56 6.3.4.2 {COMS-INFO}.....................................................................................................................................56 6.3.4.3 {COMS-ACK}......................................................................................................................................56 6.3.4.4 {COMS-CONNECT}...........................................................................................................................57 6.3.4.5 {COMS-RELEASE}.............................................................................................................................57 6.3.4.6 {COMS-RELEASE-COM}..................................................................................................................58 6.3.4.7 {COMS-NOTIFY}................................................................................................................................58 6.3.5 CLMS-message...........................................................................................................................................59 6.3.5.1 {CLMS-VARIABLE}..........................................................................................................................59 6.3.6 MM-messages.............................................................................................................................................60 6.3.6.1 {ACCESS-RIGHTS-ACCEPT}...........................................................................................................60 6.3.6.2 {ACCESS-RIGHTS-REJECT}.............................................................................................................60 6.3.6.3 {ACCESS-RIGHTS-REQUEST}.........................................................................................................61 6.3.6.4 {ACCESS-RIGHTS-TERMINATE-ACCEPT}...................................................................................61 6.3.6.5 {ACCESS-RIGHTS-TERMINATE-REJECT}....................................................................................62 6.3.6.6 {ACCESS-RIGHTS-TERMINATE-REQUEST}.................................................................................62 6.3.6.7 {AUTHENTICATION-REJECT}........................................................................................................63 6.3.6.8 {AUTHENTICATION-REPLY}..........................................................................................................63 6.3.6.9 {AUTHENTICATION-REQUEST}....................................................................................................64 6.3.6.10 {CIPHER-REJECT}.............................................................................................................................64 6.3.6.11 {CIPHER-REQUEST}.........................................................................................................................65 6.3.6.12 {CIPHER-SUGGEST}.........................................................................................................................65 6.3.6.13 {DETACH}...........................................................................................................................................66 SIST EN 300 175-5 V1.7.1:2003

ETSI ETSI EN 300 175-5 V1.7.1 (2003-07) 5

6.3.6.14 {IDENTITY-REPLY}..........................................................................................................................66 6.3.6.15 {IDENTITY-REQUEST}.....................................................................................................................67 6.3.6.16 {KEY-ALLOCATE}............................................................................................................................67 6.3.6.17 {LOCATE-ACCEPT}..........................................................................................................................68 6.3.6.18 {LOCATE-REJECT}............................................................................................................................68 6.3.6.19 {LOCATE-REQUEST}........................................................................................................................69 6.3.6.20 {MM-INFO-ACCEPT}........................................................................................................................69 6.3.6.21 {MM-INFO-REJECT}..........................................................................................................................70 6.3.6.22 {MM-INFO-REQUEST}......................................................................................................................70 6.3.6.23 {MM-INFO-SUGGEST}......................................................................................................................71 6.3.6.24 {TEMPORARY-IDENTITY-ASSIGN}...............................................................................................71 6.3.6.25 {TEMPORARY-IDENTITY-ASSIGN-ACK}.....................................................................................72 6.3.6.26 {TEMPORARY-IDENTITY-ASSIGN-REJ}.......................................................................................72 6.3.6.27 {MM-IWU}..........................................................................................................................................72 6.3.7 LCE-messages............................................................................................................................................73 6.3.7.1 {LCE-PAGE-RESPONSE}..................................................................................................................73 6.3.7.2 {LCE-PAGE-REJECT}........................................................................................................................73 6.4 B-FORMAT message functional contents.......................................................................................................74 6.4.1 B-FORMAT message overview.................................................................................................................74 6.4.2 {LCE-REQUEST-PAGE}..........................................................................................................................74 6.4.3 {CLMS-FIXED}.........................................................................................................................................75 7 S-FORMAT message structures.............................................................................................................75 7.1 Overview..........................................................................................................................................................75 7.2 Protocol Discrimination (PD) element.............................................................................................................76 7.3 Transaction Identifier (TI) element..................................................................................................................76 7.4 Message type element......................................................................................................................................77 7.4.1 Messages for CC.........................................................................................................................................78 7.4.2 Messages for SS..........................................................................................................................................78 7.4.3 Messages for COMS...................................................................................................................................78 7.4.4 Messages for CLMS...................................................................................................................................79 7.4.5 Messages for MM.......................................................................................................................................79 7.4.6 Messages for LCE.......................................................................................................................................79 7.5 Other information elements..............................................................................................................................80 7.5.1 Coding rules................................................................................................................................................80 7.5.2 Extensions of codesets................................................................................................................................82 7.5.3 Locking shift procedure..............................................................................................................................82 7.5.4 Non-locking shift procedure.......................................................................................................................83 7.5.5 Display and keypad elements......................................................................................................................83 7.5.6 Repeated elements......................................................................................................................................83 7.6 Fixed length information elements...................................................................................................................84 7.6.1 Summary.....................................................................................................................................................84 7.6.2 Sending complete, delimiter request and use TPUI....................................................................................84 7.6.3 Repeat indicator..........................................................................................................................................85 7.6.4 Basic service...............................................................................................................................................85 7.6.5 Single display..............................................................................................................................................86 7.6.6 Single keypad..............................................................................................................................................86 7.6.7 Release reason............................................................................................................................................86 7.6.8 Signal..........................................................................................................................................................87 7.6.9 Timer restart................................................................................................................................................88 7.6.10 Test hook control........................................................................................................................................89 7.7 Variable length information elements..............................................................................................................89 7.7.1 Summary.....................................................................................................................................................89 7.7.2 Allocation type............................................................................................................................................91 7.7.3 Alphanumeric.............................................................................................................................................92 7.7.4 Auth type....................................................................................................................................................93 7.7.5 Call attributes..............................................................................................................................................94 7.7.6 Call identity................................................................................................................................................97 7.7.7 Called party number....................................................................................................................................97 7.7.8 Called party subaddress..............................................................................................................................98 7.7.9 Calling party number..................................................................................................................................99 7.7.10 Cipher info................................................................................................................................................100 SIST EN 300 175-5 V1.7.1:2003

ETSI ETSI EN 300 175-5 V1.7.1 (2003-07) 6
7.7.11 Connection attributes...........................................
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.