Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer

The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the EN 300 175 and layer 3 of the DECT protocol stack.The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in ITU-T Recommendation X.200 and ITU-T Recommendation X.210.

Digitalne izboljšane brezvrvične telekomunikacije (DECT) – Skupni vmesnik (CI) – 5. del: Omrežna plast (NWK)

General Information

Status
Published
Publication Date
28-Feb-2006
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Mar-2006
Due Date
01-Mar-2006
Completion Date
01-Mar-2006

Buy Standard

Standard
SIST EN 300 175-5 V1.9.1:2006
English language
309 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer35.100.30Omrežni slojNetwork layer33.070.30'(&7Digital Enhanced Cordless Telecommunications (DECT)ICS:Ta slovenski standard je istoveten z:EN 300 175-5 Version 1.9.1SIST EN 300 175-5 V1.9.1:2006en01-marec-2006SIST EN 300 175-5 V1.9.1:2006SLOVENSKI

STANDARD
SIST EN 300 175-5 V1.9.1:2006

ETSI EN 300 175-5 V1.9.1 (2005-09)European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT);Common Interface (CI);Part 5: Network (NWK) layer

SIST EN 300 175-5 V1.9.1:2006
ETSI ETSI EN 300 175-5 V1.9.1 (2005-09) 2

Reference REN/DECT-000230-5 Keywords DECT, radio ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88

Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2005. All rights reserved.

DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. SIST EN 300 175-5 V1.9.1:2006

ETSI ETSI EN 300 175-5 V1.9.1 (2005-09) 3

Contents Intellectual Property Rights..............................................................................................................................14 Foreword...........................................................................................................................................................14 1 Scope......................................................................................................................................................15 2 References..............................................................................................................................................15 3 Definitions and abbreviations.................................................................................................................19 3.1 Definitions........................................................................................................................................................19 3.2 Abbreviations...................................................................................................................................................21 4 Overview of the NWK layer..................................................................................................................24 5 Overview of procedures.........................................................................................................................26 5.1 General.............................................................................................................................................................26 5.2 Overview of Call Control (CC)........................................................................................................................26 5.2.1 General........................................................................................................................................................26 5.2.2 Call establishment.......................................................................................................................................26 5.2.2.1 Call setup..............................................................................................................................................26 5.2.2.2 Service negotiation................................................................................................................................27 5.2.3 Call connect................................................................................................................................................27 5.2.4 Call information..........................................................................................................................................27 5.2.5 Service change............................................................................................................................................28 5.2.6 Call release..................................................................................................................................................28 5.3 Overview of Supplementary Services (SS)......................................................................................................28 5.3.1 General........................................................................................................................................................28 5.3.2 Keypad protocol..........................................................................................................................................29 5.3.3 Feature key management protocol..............................................................................................................29 5.3.4 Functional protocol.....................................................................................................................................29 5.4 Overview of Connection Oriented Message Service (COMS).........................................................................29 5.4.1 General........................................................................................................................................................29 5.4.2 COMS establishment..................................................................................................................................30 5.4.3 Service negotiation.....................................................................................................................................30 5.4.4 COMS connect............................................................................................................................................30 5.4.5 COMS data transfer....................................................................................................................................30 5.4.6 COMS suspend and resume........................................................................................................................30 5.4.7 COMS release.............................................................................................................................................31 5.5 Overview of ConnectionLess Message Service (CLMS).................................................................................31 5.5.1 Fixed length message service......................................................................................................................31 5.5.2 Variable length message service.................................................................................................................31 5.6 Overview of Mobility Management (MM)......................................................................................................31 5.6.1 General........................................................................................................................................................31 5.6.2 Identity procedures.....................................................................................................................................32 5.6.3 Authentication procedures..........................................................................................................................32 5.6.4 Location procedures....................................................................................................................................33 5.6.5 Access rights procedures............................................................................................................................33 5.6.6 Key allocation procedure............................................................................................................................33 5.6.7 Parameter retrieval procedure.....................................................................................................................33 5.6.8 Ciphering related procedure........................................................................................................................34 5.6.9 External protocol information procedure....................................................................................................34 5.7 Overview of Link Control Entity (LCE)..........................................................................................................34 5.7.1 General........................................................................................................................................................34 5.7.2 Data Link Endpoint Identifier (DLEI)........................................................................................................34 5.7.3 Data link establishment...............................................................................................................................35 5.7.4 Data link re-establishment..........................................................................................................................35 5.7.5 Data link release.........................................................................................................................................35 5.7.6 Data link suspend and resume.....................................................................................................................35 5.7.7 Queuing of messages..................................................................................................................................36 SIST EN 300 175-5 V1.9.1:2006

ETSI ETSI EN 300 175-5 V1.9.1 (2005-09) 4

5.7.8 Request paging............................................................................................................................................36 6 Message functional definitions...............................................................................................................36 6.1 Overview of message structures.......................................................................................................................36 6.1.1 Messages.....................................................................................................................................................36 6.1.2 Information elements..................................................................................................................................37 6.2 Message summaries..........................................................................................................................................37 6.2.1 Summary of CC messages..........................................................................................................................37 6.2.2 Summary of CISS messages.......................................................................................................................38 6.2.3 Summary of COMS messages....................................................................................................................38 6.2.4 Summary of CLMS messages.....................................................................................................................38 6.2.5 Summary of MM messages........................................................................................................................39 6.2.6 Summary of LCE messages........................................................................................................................39 6.3 S-FORMAT message functional contents........................................................................................................40 6.3.1 S-FORMAT message overview..................................................................................................................40 6.3.2 CC-messages...............................................................................................................................................40 6.3.2.1 {CC-SETUP}........................................................................................................................................40 6.3.2.2 {CC-INFO}...........................................................................................................................................42 6.3.2.3 {CC-SETUP-ACK}..............................................................................................................................43 6.3.2.4 {CC-CALL-PROC}..............................................................................................................................44 6.3.2.5 {CC-ALERTING}................................................................................................................................45 6.3.2.6 {CC-CONNECT}.................................................................................................................................46 6.3.2.7 {CC-CONNECT-ACK}........................................................................................................................47 6.3.2.8 {CC-RELEASE}...................................................................................................................................47 6.3.2.9 {CC-RELEASE-COM}........................................................................................................................48 6.3.2.10 {CC-SERVICE-CHANGE}..................................................................................................................49 6.3.2.11 {CC-SERVICE-ACCEPT}...................................................................................................................50 6.3.2.12 {CC-SERVICE-REJECT}....................................................................................................................50 6.3.2.13 {CC-NOTIFY}......................................................................................................................................51 6.3.2.14 {IWU-INFO}........................................................................................................................................51 6.3.3 SS-messages (call related and call independent)........................................................................................52 6.3.3.1 {FACILITY}.........................................................................................................................................52 6.3.3.2 {HOLD}................................................................................................................................................52 6.3.3.3 {HOLD-ACK}......................................................................................................................................53 6.3.3.4 {HOLD-REJECT}................................................................................................................................53 6.3.3.5 {RETRIEVE}.......................................................................................................................................53 6.3.3.6 {RETRIEVE-ACK}..............................................................................................................................54 6.3.3.7 {RETRIEVE-REJECT}........................................................................................................................54 6.3.3.8 {CISS-REGISTER}..............................................................................................................................55 6.3.3.9 {CISS-RELEASE-COM}.....................................................................................................................55 6.3.4 COMS-messages.........................................................................................................................................56 6.3.4.1 {COMS-SETUP}..................................................................................................................................56 6.3.4.2 {COMS-INFO}.....................................................................................................................................56 6.3.4.3 {COMS-ACK}......................................................................................................................................57 6.3.4.4 {COMS-CONNECT}...........................................................................................................................57 6.3.4.5 {COMS-RELEASE}.............................................................................................................................58 6.3.4.6 {COMS-RELEASE-COM}..................................................................................................................58 6.3.4.7 {COMS-NOTIFY}................................................................................................................................59 6.3.5 CLMS-message...........................................................................................................................................59 6.3.5.1 {CLMS-VARIABLE}..........................................................................................................................59 6.3.6 MM-messages.............................................................................................................................................60 6.3.6.1 {ACCESS-RIGHTS-ACCEPT}...........................................................................................................60 6.3.6.2 {ACCESS-RIGHTS-REJECT}.............................................................................................................60 6.3.6.3 {ACCESS-RIGHTS-REQUEST}.........................................................................................................61 6.3.6.4 {ACCESS-RIGHTS-TERMINATE-ACCEPT}...................................................................................61 6.3.6.5 {ACCESS-RIGHTS-TERMINATE-REJECT}....................................................................................62 6.3.6.6 {ACCESS-RIGHTS-TERMINATE-REQUEST}.................................................................................62 6.3.6.7 {AUTHENTICATION-REJECT}........................................................................................................63 6.3.6.8 {AUTHENTICATION-REPLY}..........................................................................................................63 6.3.6.9 {AUTHENTICATION-REQUEST}....................................................................................................64 6.3.6.10 {CIPHER-REJECT}.............................................................................................................................64 6.3.6.11 {CIPHER-REQUEST}.........................................................................................................................65 SIST EN 300 175-5 V1.9.1:2006

ETSI ETSI EN 300 175-5 V1.9.1 (2005-09) 5

6.3.6.12 {CIPHER-SUGGEST}.........................................................................................................................65 6.3.6.13 {DETACH}...........................................................................................................................................66 6.3.6.14 {IDENTITY-REPLY}..........................................................................................................................67 6.3.6.15 {IDENTITY-REQUEST}.....................................................................................................................67 6.3.6.16 {KEY-ALLOCATE}............................................................................................................................68 6.3.6.17 {LOCATE-ACCEPT}..........................................................................................................................68 6.3.6.18 {LOCATE-REJECT}............................................................................................................................69 6.3.6.19 {LOCATE-REQUEST}........................................................................................................................69 6.3.6.20 {MM-INFO-ACCEPT}........................................................................................................................70 6.3.6.21 {MM-INFO-REJECT}..........................................................................................................................70 6.3.6.22 {MM-INFO-REQUEST}......................................................................................................................71 6.3.6.23 {MM-INFO-SUGGEST}......................................................................................................................72 6.3.6.24 {TEMPORARY-IDENTITY-ASSIGN}...............................................................................................72 6.3.6.25 {TEMPORARY-IDENTITY-ASSIGN-ACK}.....................................................................................73 6.3.6.26 {TEMPORARY-IDENTITY-ASSIGN-REJ}.......................................................................................73 6.3.6.27 {MM-IWU}..........................................................................................................................................74 6.3.6.28 {MM-NOTIFY}....................................................................................................................................74 6.3.7 LCE-messages............................................................................................................................................75 6.3.7.1 {LCE-PAGE-RESPONSE}..................................................................................................................75 6.3.7.2 {LCE-PAGE-REJECT}........................................................................................................................75 6.4 B-FORMAT message functional contents.......................................................................................................76 6.4.1 B-FORMAT message overview.................................................................................................................76 6.4.2 {LCE-REQUEST-PAGE}..........................................................................................................................76 6.4.3 {CLMS-FIXED}.........................................................................................................................................77 7 S-FORMAT message structures.............................................................................................................77 7.1 Overview..........................................................................................................................................................77 7.2 Protocol Discrimination (PD) element.............................................................................................................78 7.3 Transaction Identifier (TI) element..................................................................................................................78 7.4 Message type element......................................................................................................................................79 7.4.1 Messages for CC.........................................................................................................................................80 7.4.2 Messages for SS..........................................................................................................................................80 7.4.3 Messages for COMS...................................................................................................................................80 7.4.4 Messages for CLMS...................................................................................................................................81 7.4.5 Messages for MM.......................................................................................................................................81 7.4.6 Messages for LCE.......................................................................................................................................81 7.5 Other information elements..............................................................................................................................82 7.5.1 Coding rules................................................................................................................................................82 7.5.2 Extensions of codesets................................................................................................................................84 7.5.3 Locking shift procedure..............................................................................................................................84 7.5.4 Non-locking shift procedure.......................................................................................................................85 7.5.5 Display and keypad elements......................................................................................................................85 7.5.6 Repeated elements......................................................................................................................................85 7.6 Fixed length information elements...................................................................................................................86 7.6.1 Summary.....................................................................................................................................................86 7.6.2 Sending complete, delimiter request and use TPUI....................................................................................86 7.6.3 Repeat indicator..........................................................................................................................................87 7.6.4 Basic service...............................................................................................................................................87 7.6.5 Single display..............................................................................................................................................88 7.6.6 Single keypad..............................................................................................................................................88 7.6.7 Release reason............................................................................................................................................88 7.6.8 Signal..........................................................................................................................................................89 7.6.9 Timer restart................................................................................................................................................90 7.6.10 Test hook control........................................................................................................................................91 7.7 Variable length information elements..............................................................................................................91 7.7.1 Summary.....................................................................................................................................................91 7.7.2 Allocation type............................................................................................................................................93 7.7.3 Alphanumeric.............................................................................................................................................94 7.7.4 Auth type....................................................................................................................................................95 7.7.5 Call attributes..............................................................................................................................................96 7.7.6 Call identity................................................................................................................................................99 7.7.7 Called party number....................................................................................................................................99 SIST EN 300 175-5 V1.9.1:2006

ETSI ETSI EN 300 175-5 V1.9.1 (2005-09) 6

7.7.8 Called party subaddress............................................................................................................................100 7.7.9 Calling party number.

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.