Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI) - Part 5: Network (NWK) layer

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and
layer 3 of the DECT protocol stack.
The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification
for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer.
The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the
following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendation ITU-T
X.200 [i.3] and Recommendation ITU-T X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements. The present document also
includes super-wideband and fullband speech and audio services.

Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 5. del: Omrežna plast (NWK)

Ta dokument je eden od delov specifikacije skupnega vmesnika (CI) za digitalne izboljšane brezvrvične telekomunikacije (DECT).
Ta dokument določa omrežno plast (NWK). Omrežna plast je 5. del standarda ETSI EN 300 175 in plast 3 sklada protokolov digitalnih izboljšanih brezvrvičnih telekomunikacij.
Ta dokument določa samo C-raven (nadzorno raven) omrežne plasti digitalnih izboljšanih brezvrvičnih telekomunikacij. Ne vsebuje specifikacije za U-raven (uporabniško raven), ker je U-raven na omrežni plasti digitalnih izboljšanih brezvrvičnih telekomunikacij enaka nič za vse storitve.
C-raven vsebuje vse notranje signalizacijske informacije in protokoli omrežne plasti so združeni v naslednje družine postopkov:
• nadzor klicev (CC),
• nadomestne storitve (SS),
• sporočilna storitev, usmerjena na povezavo (COMS),
• sporočilna storitev brez povezave (CLMS),
• upravljanje mobilnosti (MM),
• entiteta kontrole povezave (LCE).
Ta dokument uporablja načela in terminologijo modela plasti, kot je opisano v priporočilih ITU-T X.200 [i.3] in X.210 [i.4].
Ta dokument vključuje novo generacijo digitalnih izboljšanih brezvrvičnih telekomunikacij, nadaljnji razvoj standarda o digitalnih izboljšanih brezvrvičnih telekomunikacijah, ki uvaja širokopasovni govor, izpopolnjene podatkovne storitve, nove tipe rež in druge tehnične izpopolnitve. Ta dokument vključuje tudi super širokopasovne in polnopasovne govorne in zvočne storitve.

General Information

Status
Published
Public Enquiry End Date
22-Mar-2022
Publication Date
05-Apr-2022
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
04-Apr-2022
Due Date
09-Jun-2022
Completion Date
06-Apr-2022

Buy Standard

Standard
ETSI EN 300 175-5 V2.9.1 (2022-03) - Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer
English language
377 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
SIST EN 300 175-5 V2.9.1:2022
English language
377 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Draft
oSIST prEN 300 175-5 V2.8.5:2022
English language
377 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (sample)

ETSI EN 300 175-5 V2.9.1 (2022-03)
EUROPEAN STANDARD
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 5: Network (NWK) layer
---------------------- Page: 1 ----------------------
2 ETSI EN 300 175-5 V2.9.1 (2022-03)
Reference
REN/DECT-00355
Keywords
DECT, IMT-2000, mobility, radio, TDD, TDMA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx

If you find a security vulnerability in the present document, please report it through our

Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2022.
All rights reserved.
ETSI
---------------------- Page: 2 ----------------------
3 ETSI EN 300 175-5 V2.9.1 (2022-03)
Contents

Intellectual Property Rights .............................................................................................................................. 16

Foreword ........................................................................................................................................................... 16

Modal verbs terminology .................................................................................................................................. 16

1 Scope ...................................................................................................................................................... 17

2 References .............................................................................................................................................. 17

2.1 Normative references ....................................................................................................................................... 17

2.2 Informative references ...................................................................................................................................... 22

3 Definition of terms, symbols and abbreviations ..................................................................................... 23

3.1 Terms ................................................................................................................................................................ 23

3.2 Symbols ............................................................................................................................................................ 23

3.3 Abbreviations ................................................................................................................................................... 24

4 Overview of the NWK layer .................................................................................................................. 28

5 Overview of procedures ......................................................................................................................... 29

5.1 General ............................................................................................................................................................. 29

5.2 Overview of Call Control (CC) ........................................................................................................................ 30

5.2.1 General ........................................................................................................................................................ 30

5.2.2 Call establishment ....................................................................................................................................... 30

5.2.2.1 Call setup .............................................................................................................................................. 30

5.2.2.2 Service negotiation ................................................................................................................................ 31

5.2.3 Call connect ................................................................................................................................................ 31

5.2.4 Call information .......................................................................................................................................... 31

5.2.5 Service change ............................................................................................................................................ 31

5.2.6 Call release.................................................................................................................................................. 32

5.3 Overview of Supplementary Services (SS) ...................................................................................................... 32

5.3.1 General ........................................................................................................................................................ 32

5.3.2 Keypad protocol .......................................................................................................................................... 33

5.3.3 Feature key management protocol .............................................................................................................. 33

5.3.4 Functional protocol ..................................................................................................................................... 33

5.4 Overview of Connection Oriented Message Service (COMS) ......................................................................... 33

5.4.1 General ........................................................................................................................................................ 33

5.4.2 COMS establishment .................................................................................................................................. 34

5.4.3 Service negotiation ..................................................................................................................................... 34

5.4.4 COMS connect ............................................................................................................................................ 34

5.4.5 COMS data transfer .................................................................................................................................... 34

5.4.6 COMS suspend and resume ........................................................................................................................ 34

5.4.7 COMS release ............................................................................................................................................. 35

5.5 Overview of ConnectionLess Message Service (CLMS) ................................................................................. 35

5.5.0 General ........................................................................................................................................................ 35

5.5.1 Fixed length message service...................................................................................................................... 35

5.5.2 Variable length message service ................................................................................................................. 35

5.6 Overview of Mobility Management (MM) ...................................................................................................... 35

5.6.1 General ........................................................................................................................................................ 35

5.6.2 Identity procedures ..................................................................................................................................... 36

5.6.3 Authentication procedures .......................................................................................................................... 36

5.6.4 Location procedures .................................................................................................................................... 37

5.6.5 Access rights procedures ............................................................................................................................ 37

5.6.6 Key allocation procedure ............................................................................................................................ 37

5.6.7 Parameter retrieval procedure ..................................................................................................................... 38

5.6.8 Ciphering related procedure ........................................................................................................................ 38

5.6.9 External protocol information procedure .................................................................................................... 38

5.7 Overview of Link Control Entity (LCE) .......................................................................................................... 38

5.7.1 General ........................................................................................................................................................ 38

5.7.2 Data Link Endpoint Identifier (DLEI) ........................................................................................................ 38

5.7.3 Data link establishment ............................................................................................................................... 39

ETSI
---------------------- Page: 3 ----------------------
4 ETSI EN 300 175-5 V2.9.1 (2022-03)

5.7.4 Data link re-establishment .......................................................................................................................... 39

5.7.5 Data link release ......................................................................................................................................... 39

5.7.6 Data link suspend and resume..................................................................................................................... 40

5.7.7 Queuing of messages .................................................................................................................................. 40

5.7.8 Request paging ............................................................................................................................................ 40

6 Message functional definitions ............................................................................................................... 40

6.1 Overview of message structures ....................................................................................................................... 40

6.1.1 Messages ..................................................................................................................................................... 40

6.1.2 Information elements .................................................................................................................................. 41

6.2 Message summaries .......................................................................................................................................... 42

6.2.1 Summary of CC messages .......................................................................................................................... 42

6.2.2 Summary of CISS messages ....................................................................................................................... 42

6.2.3 Summary of COMS messages .................................................................................................................... 43

6.2.4 Summary of CLMS messages ..................................................................................................................... 43

6.2.5 Summary of MM messages ........................................................................................................................ 44

6.2.6 Summary of LCE messages ........................................................................................................................ 44

6.3 S-FORMAT message functional contents ........................................................................................................ 45

6.3.1 S-FORMAT message overview .................................................................................................................. 45

6.3.2 CC-messages............................................................................................................................................... 45

6.3.2.1 {CC-SETUP} ........................................................................................................................................ 45

6.3.2.2 {CC-INFO} ........................................................................................................................................... 47

6.3.2.3 {CC-SETUP-ACK} .............................................................................................................................. 48

6.3.2.4 {CC-CALL-PROC} .............................................................................................................................. 49

6.3.2.5 {CC-ALERTING} ................................................................................................................................ 50

6.3.2.6 {CC-CONNECT} ................................................................................................................................. 51

6.3.2.7 {CC-CONNECT-ACK} ........................................................................................................................ 52

6.3.2.8 {CC-RELEASE} ................................................................................................................................... 52

6.3.2.9 {CC-RELEASE-COM} ........................................................................................................................ 53

6.3.2.10 {CC-SERVICE-CHANGE} .................................................................................................................. 54

6.3.2.11 {CC-SERVICE-ACCEPT} ................................................................................................................... 55

6.3.2.12 {CC-SERVICE-REJECT} .................................................................................................................... 55

6.3.2.13 {CC-NOTIFY}...................................................................................................................................... 56

6.3.2.14 {IWU-INFO} ........................................................................................................................................ 57

6.3.3 SS-messages (call related and call independent) ........................................................................................ 58

6.3.3.1 {FACILITY} ......................................................................................................................................... 58

6.3.3.2 {HOLD} ................................................................................................................................................ 59

6.3.3.3 {HOLD-ACK} ...................................................................................................................................... 59

6.3.3.4 {HOLD-REJECT} ................................................................................................................................ 60

6.3.3.5 {RETRIEVE} ....................................................................................................................................... 60

6.3.3.6 {RETRIEVE-ACK} .............................................................................................................................. 61

6.3.3.7 {RETRIEVE-REJECT} ........................................................................................................................ 61

6.3.3.8 {CISS-REGISTER} .............................................................................................................................. 62

6.3.3.9 {CISS-RELEASE-COM} ..................................................................................................................... 63

6.3.4 COMS-messages ......................................................................................................................................... 63

6.3.4.1 {COMS-SETUP} .................................................................................................................................. 63

6.3.4.2 {COMS-INFO} ..................................................................................................................................... 64

6.3.4.3 {COMS-ACK} ...................................................................................................................................... 64

6.3.4.4 {COMS-CONNECT} ........................................................................................................................... 65

6.3.4.5 {COMS-RELEASE} ............................................................................................................................. 65

6.3.4.6 {COMS-RELEASE-COM} .................................................................................................................. 66

6.3.4.7 {COMS-NOTIFY}................................................................................................................................ 66

6.3.5 CLMS-message ........................................................................................................................................... 67

6.3.5.1 {CLMS-VARIABLE} .......................................................................................................................... 67

6.3.6 MM-messages ............................................................................................................................................. 68

6.3.6.1 {ACCESS-RIGHTS-ACCEPT} ........................................................................................................... 68

6.3.6.2 {ACCESS-RIGHTS-REJECT} ............................................................................................................. 68

6.3.6.3 {ACCESS-RIGHTS-REQUEST} ......................................................................................................... 69

6.3.6.4 {ACCESS-RIGHTS-TERMINATE-ACCEPT} ................................................................................... 69

6.3.6.5 {ACCESS-RIGHTS-TERMINATE-REJECT} .................................................................................... 70

6.3.6.6 {ACCESS-RIGHTS-T ERMI NAT E-REQUEST } ................................................................................. 70

6.3.6.7 {AUTHENTICATION-REJECT} ........................................................................................................ 71

ETSI
---------------------- Page: 4 ----------------------
5 ETSI EN 300 175-5 V2.9.1 (2022-03)

6.3.6.8 {AUTHENTICATION-REPLY} .......................................................................................................... 71

6.3.6.9 {AUTHENTICATION-REQUEST} .................................................................................................... 72

6.3.6.10 {CIPHER-REJECT} ............................................................................................................................. 73

6.3.6.11 {CIPHER-REQUEST} ......................................................................................................................... 73

6.3.6.12 {CIPHER-SUGGEST} ......................................................................................................................... 74

6.3.6.13 {DETACH} ........................................................................................................................................... 74

6.3.6.14 {IDENTITY-REPLY} .......................................................................................................................... 75

6.3.6.15 {IDENTITY-REQUEST} ..................................................................................................................... 75

6.3.6.16 {KEY-ALLOCATE} ............................................................................................................................ 76

6.3.6.17 {LOCATE-ACCEPT} .......................................................................................................................... 77

6.3.6.18 {LOCATE-REJECT} ............................................................................................................................ 77

6.3.6.19 {LOCATE-REQUEST} ........................................................................................................................ 78

6.3.6.20 {MM-INFO-ACCEPT} ........................................................................................................................ 79

6.3.6.21 {MM-INFO-REJECT} .......................................................................................................................... 79

6.3.6.22 {MM-INFO-REQUEST} ...................................................................................................................... 80

6.3.6.23 {MM-INFO-SUGGEST} ...................................................................................................................... 80

6.3.6.24 {TEMPORARY-IDENTITY-ASSIGN} ............................................................................................... 81

6.3.6.25 {TEMPORARY-IDENTITY-ASSIGN-ACK} ..................................................................................... 82

6.3.6.26 {TEMPORARY-IDENTITY-ASSIGN-REJ} ....................................................................................... 82

6.3.6.27 {MM-IWU} .......................................................................................................................................... 83

6.3.6.28 {MM-NOTIFY} .................................................................................................................................... 83

6.3.7 LCE-messages ............................................................................................................................................ 84

6.3.7.1 {LCE-PAGE-RESPONSE} .................................................................................................................. 84

6.3.7.2 {LCE-PAGE-REJECT} ........................................................................................................................ 84

6.4 B-FORMAT message functional contents ....................................................................................................... 85

6.4.1 B-FORMAT message overview ................................................................................................................. 85

6.4.2 {LCE-REQUEST-PAGE} .......................................................................................................................... 85

6.4.3 {CLMS-FIXED}......................................................................................................................................... 86

7 S-FORMAT message structures ............................................................................................................. 86

7.1 Overview .......................................................................................................................................................... 86

7.2 Protocol Discrimination (PD) element ............................................................................................................. 87

7.3 Transaction Identifier (TI) element .................................................................................................................. 87

7.4 Message type element ...................................................................................................................................... 88

7.4.0 General ........................................................................................................................................................ 88

7.4.1 Messages for CC ......................................................................................................................................... 89

7.4.2 Messages for SS .......................................................................................................................................... 89

7.4.3 Messages for COMS ................................................................................................................................... 89

7.4.4 Messages for CLMS ................................................................................................................................... 90

7.4.5 Messages for MM ....................................................................................................................................... 90

7.4.6 Messages for LCE ....................................................................................................................................... 90

7.5 Other information elements .............................................................................................................................. 91

7.5.1 Coding rules ................................................................................................................................................ 91

7.5.2 Extensions of codesets ................................................................................................................................ 93

7.5.3 Locking shift procedure .............................................................................................................................. 93

7.5.4 Non-locking shift procedure ....................................................................................................................... 94

7.5.5 Display and keypad elements...................................................................................................................... 94

7.5.6 Repeated elements ...................................................................................................................................... 94

7.6 Fixed length information elements ................................................................................................................... 95

7.6.1 Summary ..................................................................................................................................................... 95

7.6.2 Sending complete, delimiter request and use TPUI .................................................................................... 95

7.6.3 Repeat indicator .......................................................................................................................................... 96

7.6.4 Basic service ............................................................................................................................................... 96

7.6.5 Single display.............................................................................................................................................. 97

7.6.6 Single keypad .....................
...

SLOVENSKI STANDARD
SIST EN 300 175-5 V2.9.1:2022
01-maj-2022

Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 5.

del: Omrežna plast (NWK)

Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI) - Part

5: Network (NWK) layer
Ta slovenski standard je istoveten z: ETSI EN 300 175-5 V2.9.1 (2022-03)
ICS:
33.070.30 Digitalne izboljšane Digital Enhanced Cordless
brezvrvične telekomunikacije Telecommunications (DECT)
(DECT)
35.100.30 Omrežni sloj Network layer
SIST EN 300 175-5 V2.9.1:2022 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 300 175-5 V2.9.1:2022
---------------------- Page: 2 ----------------------
SIST EN 300 175-5 V2.9.1:2022
ETSI EN 300 175-5 V2.9.1 (2022-03)
EUROPEAN STANDARD
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 5: Network (NWK) layer
---------------------- Page: 3 ----------------------
SIST EN 300 175-5 V2.9.1:2022
2 ETSI EN 300 175-5 V2.9.1 (2022-03)
Reference
REN/DECT-00355
Keywords
DECT, IMT-2000, mobility, radio, TDD, TDMA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx

If you find a security vulnerability in the present document, please report it through our

Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2022.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
SIST EN 300 175-5 V2.9.1:2022
3 ETSI EN 300 175-5 V2.9.1 (2022-03)
Contents

Intellectual Property Rights .............................................................................................................................. 16

Foreword ........................................................................................................................................................... 16

Modal verbs terminology .................................................................................................................................. 16

1 Scope ...................................................................................................................................................... 17

2 References .............................................................................................................................................. 17

2.1 Normative references ....................................................................................................................................... 17

2.2 Informative references ...................................................................................................................................... 22

3 Definition of terms, symbols and abbreviations ..................................................................................... 23

3.1 Terms ................................................................................................................................................................ 23

3.2 Symbols ............................................................................................................................................................ 23

3.3 Abbreviations ................................................................................................................................................... 24

4 Overview of the NWK layer .................................................................................................................. 28

5 Overview of procedures ......................................................................................................................... 29

5.1 General ............................................................................................................................................................. 29

5.2 Overview of Call Control (CC) ........................................................................................................................ 30

5.2.1 General ........................................................................................................................................................ 30

5.2.2 Call establishment ....................................................................................................................................... 30

5.2.2.1 Call setup .............................................................................................................................................. 30

5.2.2.2 Service negotiation ................................................................................................................................ 31

5.2.3 Call connect ................................................................................................................................................ 31

5.2.4 Call information .......................................................................................................................................... 31

5.2.5 Service change ............................................................................................................................................ 31

5.2.6 Call release.................................................................................................................................................. 32

5.3 Overview of Supplementary Services (SS) ...................................................................................................... 32

5.3.1 General ........................................................................................................................................................ 32

5.3.2 Keypad protocol .......................................................................................................................................... 33

5.3.3 Feature key management protocol .............................................................................................................. 33

5.3.4 Functional protocol ..................................................................................................................................... 33

5.4 Overview of Connection Oriented Message Service (COMS) ......................................................................... 33

5.4.1 General ........................................................................................................................................................ 33

5.4.2 COMS establishment .................................................................................................................................. 34

5.4.3 Service negotiation ..................................................................................................................................... 34

5.4.4 COMS connect ............................................................................................................................................ 34

5.4.5 COMS data transfer .................................................................................................................................... 34

5.4.6 COMS suspend and resume ........................................................................................................................ 34

5.4.7 COMS release ............................................................................................................................................. 35

5.5 Overview of ConnectionLess Message Service (CLMS) ................................................................................. 35

5.5.0 General ........................................................................................................................................................ 35

5.5.1 Fixed length message service...................................................................................................................... 35

5.5.2 Variable length message service ................................................................................................................. 35

5.6 Overview of Mobility Management (MM) ...................................................................................................... 35

5.6.1 General ........................................................................................................................................................ 35

5.6.2 Identity procedures ..................................................................................................................................... 36

5.6.3 Authentication procedures .......................................................................................................................... 36

5.6.4 Location procedures .................................................................................................................................... 37

5.6.5 Access rights procedures ............................................................................................................................ 37

5.6.6 Key allocation procedure ............................................................................................................................ 37

5.6.7 Parameter retrieval procedure ..................................................................................................................... 38

5.6.8 Ciphering related procedure ........................................................................................................................ 38

5.6.9 External protocol information procedure .................................................................................................... 38

5.7 Overview of Link Control Entity (LCE) .......................................................................................................... 38

5.7.1 General ........................................................................................................................................................ 38

5.7.2 Data Link Endpoint Identifier (DLEI) ........................................................................................................ 38

5.7.3 Data link establishment ............................................................................................................................... 39

ETSI
---------------------- Page: 5 ----------------------
SIST EN 300 175-5 V2.9.1:2022
4 ETSI EN 300 175-5 V2.9.1 (2022-03)

5.7.4 Data link re-establishment .......................................................................................................................... 39

5.7.5 Data link release ......................................................................................................................................... 39

5.7.6 Data link suspend and resume..................................................................................................................... 40

5.7.7 Queuing of messages .................................................................................................................................. 40

5.7.8 Request paging ............................................................................................................................................ 40

6 Message functional definitions ............................................................................................................... 40

6.1 Overview of message structures ....................................................................................................................... 40

6.1.1 Messages ..................................................................................................................................................... 40

6.1.2 Information elements .................................................................................................................................. 41

6.2 Message summaries .......................................................................................................................................... 42

6.2.1 Summary of CC messages .......................................................................................................................... 42

6.2.2 Summary of CISS messages ....................................................................................................................... 42

6.2.3 Summary of COMS messages .................................................................................................................... 43

6.2.4 Summary of CLMS messages ..................................................................................................................... 43

6.2.5 Summary of MM messages ........................................................................................................................ 44

6.2.6 Summary of LCE messages ........................................................................................................................ 44

6.3 S-FORMAT message functional contents ........................................................................................................ 45

6.3.1 S-FORMAT message overview .................................................................................................................. 45

6.3.2 CC-messages............................................................................................................................................... 45

6.3.2.1 {CC-SETUP} ........................................................................................................................................ 45

6.3.2.2 {CC-INFO} ........................................................................................................................................... 47

6.3.2.3 {CC-SETUP-ACK} .............................................................................................................................. 48

6.3.2.4 {CC-CALL-PROC} .............................................................................................................................. 49

6.3.2.5 {CC-ALERTING} ................................................................................................................................ 50

6.3.2.6 {CC-CONNECT} ................................................................................................................................. 51

6.3.2.7 {CC-CONNECT-ACK} ........................................................................................................................ 52

6.3.2.8 {CC-RELEASE} ................................................................................................................................... 52

6.3.2.9 {CC-RELEASE-COM} ........................................................................................................................ 53

6.3.2.10 {CC-SERVICE-CHANGE} .................................................................................................................. 54

6.3.2.11 {CC-SERVICE-ACCEPT} ................................................................................................................... 55

6.3.2.12 {CC-SERVICE-REJECT} .................................................................................................................... 55

6.3.2.13 {CC-NOTIFY}...................................................................................................................................... 56

6.3.2.14 {IWU-INFO} ........................................................................................................................................ 57

6.3.3 SS-messages (call related and call independent) ........................................................................................ 58

6.3.3.1 {FACILITY} ......................................................................................................................................... 58

6.3.3.2 {HOLD} ................................................................................................................................................ 59

6.3.3.3 {HOLD-ACK} ...................................................................................................................................... 59

6.3.3.4 {HOLD-REJECT} ................................................................................................................................ 60

6.3.3.5 {RETRIEVE} ....................................................................................................................................... 60

6.3.3.6 {RETRIEVE-ACK} .............................................................................................................................. 61

6.3.3.7 {RETRIEVE-REJECT} ........................................................................................................................ 61

6.3.3.8 {CISS-REGISTER} .............................................................................................................................. 62

6.3.3.9 {CISS-RELEASE-COM} ..................................................................................................................... 63

6.3.4 COMS-messages ......................................................................................................................................... 63

6.3.4.1 {COMS-SETUP} .................................................................................................................................. 63

6.3.4.2 {COMS-INFO} ..................................................................................................................................... 64

6.3.4.3 {COMS-ACK} ...................................................................................................................................... 64

6.3.4.4 {COMS-CONNECT} ........................................................................................................................... 65

6.3.4.5 {COMS-RELEASE} ............................................................................................................................. 65

6.3.4.6 {COMS-RELEASE-COM} .................................................................................................................. 66

6.3.4.7 {COMS-NOTIFY}................................................................................................................................ 66

6.3.5 CLMS-message ........................................................................................................................................... 67

6.3.5.1 {CLMS-VARIABLE} .......................................................................................................................... 67

6.3.6 MM-messages ............................................................................................................................................. 68

6.3.6.1 {ACCESS-RIGHTS-ACCEPT} ........................................................................................................... 68

6.3.6.2 {ACCESS-RIGHTS-REJECT} ............................................................................................................. 68

6.3.6.3 {ACCESS-RIGHTS-REQUEST} ......................................................................................................... 69

6.3.6.4 {ACCESS-RIGHTS-TERMINATE-ACCEPT} ................................................................................... 69

6.3.6.5 {ACCESS-RIGHTS-TERMINATE-REJECT} .................................................................................... 70

6.3.6.6 {ACCESS-RIGHTS-T ERMI NAT E-REQUEST } ................................................................................. 70

6.3.6.7 {AUTHENTICATION-REJECT} ........................................................................................................ 71

ETSI
---------------------- Page: 6 ----------------------
SIST EN 300 175-5 V2.9.1:2022
5 ETSI EN 300 175-5 V2.9.1 (2022-03)

6.3.6.8 {AUTHENTICATION-REPLY} .......................................................................................................... 71

6.3.6.9 {AUTHENTICATION-REQUEST} .................................................................................................... 72

6.3.6.10 {CIPHER-REJECT} ............................................................................................................................. 73

6.3.6.11 {CIPHER-REQUEST} ......................................................................................................................... 73

6.3.6.12 {CIPHER-SUGGEST} ......................................................................................................................... 74

6.3.6.13 {DETACH} ........................................................................................................................................... 74

6.3.6.14 {IDENTITY-REPLY} .......................................................................................................................... 75

6.3.6.15 {IDENTITY-REQUEST} ..................................................................................................................... 75

6.3.6.16 {KEY-ALLOCATE} ............................................................................................................................ 76

6.3.6.17 {LOCATE-ACCEPT} .......................................................................................................................... 77

6.3.6.18 {LOCATE-REJECT} ............................................................................................................................ 77

6.3.6.19 {LOCATE-REQUEST} ........................................................................................................................ 78

6.3.6.20 {MM-INFO-ACCEPT} ........................................................................................................................ 79

6.3.6.21 {MM-INFO-REJECT} .......................................................................................................................... 79

6.3.6.22 {MM-INFO-REQUEST} ...................................................................................................................... 80

6.3.6.23 {MM-INFO-SUGGEST} ...................................................................................................................... 80

6.3.6.24 {TEMPORARY-IDENTITY-ASSIGN} ............................................................................................... 81

6.3.6.25 {TEMPORARY-IDENTITY-ASSIGN-ACK} ..................................................................................... 82

6.3.6.26 {TEMPORARY-IDENTITY-ASSIGN-REJ} ....................................................................................... 82

6.3.6.27 {MM-IWU} .......................................................................................................................................... 83

6.3.6.28 {MM-NOTIFY} .................................................................................................................................... 83

6.3.7 LCE-messages ............................................................................................................................................ 84

6.3.7.1 {LCE-PAGE-RESPONSE} .................................................................................................................. 84

6.3.7.2 {LCE-PAGE-REJECT} ........................................................................................................................ 84

6.4 B-FORMAT message functional contents ....................................................................................................... 85

6.4.1 B-FORMAT message overview ................................................................................................................. 85

6.4.2 {LCE-REQUEST-PAGE} .......................................................................................................................... 85

6.4.3 {CLMS-FIXED}......................................................................................................................................... 86

7 S-FORMAT message structures ............................................................................................................. 86

7.1 Overview .......................................................................................................................................................... 86

7.2 Protocol Discrimination (PD) element ............................................................................................................. 87

7.3 Transaction Identifier (TI) element .................................................................................................................. 87

7.4 Message type element ...................................................................................................................................... 88

7.4.0 General ........................................................................................................................................................ 88

7.4.1 Messages for CC ......................................................................................................................................... 89

7.4.2 Messages for SS .......................................................................................................................................... 89

7.4.3 Messages for COMS ................................................................................................................................... 89

7.4.4 Messages for CLMS ................................................................................................................................... 90

7.4.5 Messages for MM ....................................................................................................................................... 90

7.4.6 Messages for LCE ....................................................................................................................................... 90

7.5 Other information elements .............................................................................................................................. 91

7.5.1 Coding rules ................................................................................................................................................ 91

7.5.2 Extensions of codesets ................................................................................................................................ 93

7.5.3 Locking shift procedure .............................................................................................................................. 93

7.5.4 Non-locking shift procedure ....................................................................................................................... 94

7.5.5 Display and keypad elements...................................................................................................................... 94

7.5.6 Repeated elements ...................................................................................................................................... 94

7.6 Fixed length information elements ...............
...

SLOVENSKI STANDARD
oSIST prEN 300 175-5 V2.8.5:2022
01-marec-2022

Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 5.

del: Omrežna plast (NWK)

Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI) - Part

5: Network (NWK) layer
Ta slovenski standard je istoveten z: ETSI EN 300 175-5 V2.8.5 (2021-12)
ICS:
33.070.30 Digitalne izboljšane Digital Enhanced Cordless
brezvrvične telekomunikacije Telecommunications (DECT)
(DECT)
35.100.30 Omrežni sloj Network layer
oSIST prEN 300 175-5 V2.8.5:2022 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
oSIST prEN 300 175-5 V2.8.5:2022
---------------------- Page: 2 ----------------------
oSIST prEN 300 175-5 V2.8.5:2022
Draft ETSI EN 300 175-5 V2.8.5 (2021-12)
EUROPEAN STANDARD
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 5: Network (NWK) layer
---------------------- Page: 3 ----------------------
oSIST prEN 300 175-5 V2.8.5:2022
2 Draft ETSI EN 300 175-5 V2.8.5 (2021-12)
Reference
REN/DECT-00355
Keywords
DECT, IMT-2000, mobility, radio, TDD, TDMA
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search

The present document may be made available in electronic versions and/or in print. The content of any electronic and/or

print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any

existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI

deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx

If you find errors in the present document, please send your comment to one of the following services:

https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Notice of disclaimer & limitation of liability

The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of

experience to understand and interpret its content in accordance with generally accepted engineering or

other professional standard and applicable regulations.

No recommendation as to products and services or vendors is made or should be implied.

In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.

Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not

limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property

rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages

for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use

of or inability to use the software.
Copyright Notification

No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and

microfilm except as authorized by written permission of ETSI.

The content of the PDF version shall not be modified without the written authorization of ETSI.

The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2021.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
oSIST prEN 300 175-5 V2.8.5:2022
3 Draft ETSI EN 300 175-5 V2.8.5 (2021-12)
Contents

Intellectual Property Rights .............................................................................................................................. 16

Foreword ........................................................................................................................................................... 16

Modal verbs terminology .................................................................................................................................. 16

1 Scope ...................................................................................................................................................... 17

2 References .............................................................................................................................................. 17

2.1 Normative references ....................................................................................................................................... 17

2.2 Informative references ...................................................................................................................................... 22

3 Definition of terms, symbols and abbreviations ..................................................................................... 23

3.1 Terms ................................................................................................................................................................ 23

3.2 Symbols ............................................................................................................................................................ 23

3.3 Abbreviations ................................................................................................................................................... 24

4 Overview of the NWK layer .................................................................................................................. 28

5 Overview of procedures ......................................................................................................................... 29

5.1 General ............................................................................................................................................................. 29

5.2 Overview of Call Control (CC) ........................................................................................................................ 30

5.2.1 General ........................................................................................................................................................ 30

5.2.2 Call establishment ....................................................................................................................................... 30

5.2.2.1 Call setup .............................................................................................................................................. 30

5.2.2.2 Service negotiation ................................................................................................................................ 31

5.2.3 Call connect ................................................................................................................................................ 31

5.2.4 Call information .......................................................................................................................................... 31

5.2.5 Service change ............................................................................................................................................ 31

5.2.6 Call release.................................................................................................................................................. 32

5.3 Overview of Supplementary Services (SS) ...................................................................................................... 32

5.3.1 General ........................................................................................................................................................ 32

5.3.2 Keypad protocol .......................................................................................................................................... 33

5.3.3 Feature key management protocol .............................................................................................................. 33

5.3.4 Functional protocol ..................................................................................................................................... 33

5.4 Overview of Connection Oriented Message Service (COMS) ......................................................................... 33

5.4.1 General ........................................................................................................................................................ 33

5.4.2 COMS establishment .................................................................................................................................. 34

5.4.3 Service negotiation ..................................................................................................................................... 34

5.4.4 COMS connect ............................................................................................................................................ 34

5.4.5 COMS data transfer .................................................................................................................................... 34

5.4.6 COMS suspend and resume ........................................................................................................................ 34

5.4.7 COMS release ............................................................................................................................................. 35

5.5 Overview of ConnectionLess Message Service (CLMS) ................................................................................. 35

5.5.0 General ........................................................................................................................................................ 35

5.5.1 Fixed length message service...................................................................................................................... 35

5.5.2 Variable length message service ................................................................................................................. 35

5.6 Overview of Mobility Management (MM) ...................................................................................................... 35

5.6.1 General ........................................................................................................................................................ 35

5.6.2 Identity procedures ..................................................................................................................................... 36

5.6.3 Authentication procedures .......................................................................................................................... 36

5.6.4 Location procedures .................................................................................................................................... 37

5.6.5 Access rights procedures ............................................................................................................................ 37

5.6.6 Key allocation procedure ............................................................................................................................ 37

5.6.7 Parameter retrieval procedure ..................................................................................................................... 38

5.6.8 Ciphering related procedure ........................................................................................................................ 38

5.6.9 External protocol information procedure .................................................................................................... 38

5.7 Overview of Link Control Entity (LCE) .......................................................................................................... 38

5.7.1 General ........................................................................................................................................................ 38

5.7.2 Data Link Endpoint Identifier (DLEI) ........................................................................................................ 38

5.7.3 Data link establishment ............................................................................................................................... 39

ETSI
---------------------- Page: 5 ----------------------
oSIST prEN 300 175-5 V2.8.5:2022
4 Draft ETSI EN 300 175-5 V2.8.5 (2021-12)

5.7.4 Data link re-establishment .......................................................................................................................... 39

5.7.5 Data link release ......................................................................................................................................... 39

5.7.6 Data link suspend and resume..................................................................................................................... 40

5.7.7 Queuing of messages .................................................................................................................................. 40

5.7.8 Request paging ............................................................................................................................................ 40

6 Message functional definitions ............................................................................................................... 40

6.1 Overview of message structures ....................................................................................................................... 40

6.1.1 Messages ..................................................................................................................................................... 40

6.1.2 Information elements .................................................................................................................................. 41

6.2 Message summaries .......................................................................................................................................... 42

6.2.1 Summary of CC messages .......................................................................................................................... 42

6.2.2 Summary of CISS messages ....................................................................................................................... 42

6.2.3 Summary of COMS messages .................................................................................................................... 43

6.2.4 Summary of CLMS messages ..................................................................................................................... 43

6.2.5 Summary of MM messages ........................................................................................................................ 44

6.2.6 Summary of LCE messages ........................................................................................................................ 44

6.3 S-FORMAT message functional contents ........................................................................................................ 45

6.3.1 S-FORMAT message overview .................................................................................................................. 45

6.3.2 CC-messages............................................................................................................................................... 45

6.3.2.1 {CC-SETUP} ........................................................................................................................................ 45

6.3.2.2 {CC-INFO} ........................................................................................................................................... 47

6.3.2.3 {CC-SETUP-ACK} .............................................................................................................................. 48

6.3.2.4 {CC-CALL-PROC} .............................................................................................................................. 49

6.3.2.5 {CC-ALERTING} ................................................................................................................................ 50

6.3.2.6 {CC-CONNECT} ................................................................................................................................. 51

6.3.2.7 {CC-CONNECT-ACK} ........................................................................................................................ 52

6.3.2.8 {CC-RELEASE} ................................................................................................................................... 52

6.3.2.9 {CC-RELEASE-COM} ........................................................................................................................ 53

6.3.2.10 {CC-SERVICE-CHANGE} .................................................................................................................. 54

6.3.2.11 {CC-SERVICE-ACCEPT} ................................................................................................................... 55

6.3.2.12 {CC-SERVICE-REJECT} .................................................................................................................... 55

6.3.2.13 {CC-NOTIFY}...................................................................................................................................... 56

6.3.2.14 {IWU-INFO} ........................................................................................................................................ 57

6.3.3 SS-messages (call related and call independent) ........................................................................................ 58

6.3.3.1 {FACILITY} ......................................................................................................................................... 58

6.3.3.2 {HOLD} ................................................................................................................................................ 59

6.3.3.3 {HOLD-ACK} ...................................................................................................................................... 59

6.3.3.4 {HOLD-REJECT} ................................................................................................................................ 60

6.3.3.5 {RETRIEVE} ....................................................................................................................................... 60

6.3.3.6 {RETRIEVE-ACK} .............................................................................................................................. 61

6.3.3.7 {RETRIEVE-REJECT} ........................................................................................................................ 61

6.3.3.8 {CISS-REGISTER} .............................................................................................................................. 62

6.3.3.9 {CISS-RELEASE-COM} ..................................................................................................................... 63

6.3.4 COMS-messages ......................................................................................................................................... 63

6.3.4.1 {COMS-SETUP} .................................................................................................................................. 63

6.3.4.2 {COMS-INFO} ..................................................................................................................................... 64

6.3.4.3 {COMS-ACK} ...................................................................................................................................... 64

6.3.4.4 {COMS-CONNECT} ........................................................................................................................... 65

6.3.4.5 {COMS-RELEASE} ............................................................................................................................. 65

6.3.4.6 {COMS-RELEASE-COM} .................................................................................................................. 66

6.3.4.7 {COMS-NOTIFY}................................................................................................................................ 66

6.3.5 CLMS-message ........................................................................................................................................... 67

6.3.5.1 {CLMS-VARIABLE} .......................................................................................................................... 67

6.3.6 MM-messages ............................................................................................................................................. 68

6.3.6.1 {ACCESS-RIGHTS-ACCEPT} ........................................................................................................... 68

6.3.6.2 {ACCESS-RIGHTS-REJECT} ............................................................................................................. 68

6.3.6.3 {ACCESS-RIGHTS-REQUEST} ......................................................................................................... 69

6.3.6.4 {ACCESS-RIGHTS-TERMINATE-ACCEPT} ................................................................................... 69

6.3.6.5 {ACCESS-RIGHTS-TERMINATE-REJECT} .................................................................................... 70

6.3.6.6 {ACCESS-RIGHTS-T ERMI NAT E-REQUEST } ................................................................................. 70

6.3.6.7 {AUTHENTICATION-REJECT} ........................................................................................................ 71

ETSI
---------------------- Page: 6 ----------------------
oSIST prEN 300 175-5 V2.8.5:2022
5 Draft ETSI EN 300 175-5 V2.8.5 (2021-12)

6.3.6.8 {AUTHENTICATION-REPLY} .......................................................................................................... 71

6.3.6.9 {AUTHENTICATION-REQUEST} .................................................................................................... 72

6.3.6.10 {CIPHER-REJECT} ............................................................................................................................. 73

6.3.6.11 {CIPHER-REQUEST} ......................................................................................................................... 73

6.3.6.12 {CIPHER-SUGGEST} ......................................................................................................................... 74

6.3.6.13 {DETACH} ........................................................................................................................................... 74

6.3.6.14 {IDENTITY-REPLY} .......................................................................................................................... 75

6.3.6.15 {IDENTITY-REQUEST} ..................................................................................................................... 75

6.3.6.16 {KEY-ALLOCATE} ............................................................................................................................ 76

6.3.6.17 {LOCATE-ACCEPT} .......................................................................................................................... 77

6.3.6.18 {LOCATE-REJECT} ............................................................................................................................ 77

6.3.6.19 {LOCATE-REQUEST} ........................................................................................................................ 78

6.3.6.20 {MM-INFO-ACCEPT} ........................................................................................................................ 79

6.3.6.21 {MM-INFO-REJECT} .......................................................................................................................... 79

6.3.6.22 {MM-INFO-REQUEST} ...................................................................................................................... 80

6.3.6.23 {MM-INFO-SUGGEST} ...................................................................................................................... 80

6.3.6.24 {TEMPORARY-IDENTITY-ASSIGN} ............................................................................................... 81

6.3.6.25 {TEMPORARY-IDENTITY-ASSIGN-ACK} ..................................................................................... 82

6.3.6.26 {TEMPORARY-IDENTITY-ASSIGN-REJ} ....................................................................................... 82

6.3.6.27 {MM-IWU} .......................................................................................................................................... 83

6.3.6.28 {MM-NOTIFY} .................................................................................................................................... 83

6.3.7 LCE-messages ............................................................................................................................................ 84

6.3.7.1 {LCE-PAGE-RESPONSE} .................................................................................................................. 84

6.3.7.2 {LCE-PAGE-REJECT} ........................................................................................................................ 84

6.4 B-FORMAT message functional contents ....................................................................................................... 85

6.4.1 B-FORMAT message overview ................................................................................................................. 85

6.4.2 {LCE-REQUEST-PAGE} .......................................................................................................................... 85

6.4.3 {CLMS-FIXED}......................................................................................................................................... 86

7 S-FORMAT message structures ............................................................................................................. 86

7.1 Overview .......................................................................................................................................................... 86

7.2 Protocol Discrimination (PD) element ............................................................................................................. 87

7.3 Transaction Identifier (TI) element .................................................................................................................. 87

7.4 Message type element ...................................................................................................................................... 88

7.4.0 General ........................................................................................................................................................ 88

7.4.1 Messages for CC ......................................................................................................................................... 89

7.4.2 Messages for SS .......................................................................................................................................... 89

7.4.3 Messages for COMS ................................................................................................................................... 89

7.4.4 Messages for CLMS ................................................................................................................................... 90

7.4.5 Messages for MM ....................................................................................................................................... 90

7.4.6 Messages for LCE ....................................................................................................................................... 90

7.5 Other information elements .............................................................................................................................. 91

7.5.1 Coding rules ................................................................................................................................................ 91

7.5.2 Extensions of codesets ................................................................................................................................ 93

7.5.3 Locking shift procedure .............................................................................................................................. 93

7.5.4 Non-locking shift procedure ....................................................................................................................... 94

7.5.5 Display and keypad elements...................................................................................................................... 94

7.5.6 Repeated elements ...................................................................................................................................... 94

7.6 Fixed length information elements ................................................................................................................... 95

7.6.1 Summary ......................................
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.