Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer

Maintenance update.

Digitalne izboljšane brezvrvične telekomunikacije (DECT) – Skupni vmesnik (CI) – 5. del: Omrežna plast (NWK)

General Information

Status
Published
Publication Date
30-Nov-2003
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Dec-2003
Due Date
01-Dec-2003
Completion Date
01-Dec-2003

Buy Standard

Standard
SIST EN 300 175-5 V1.6.1:2003
English language
303 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN 300 175-5 V1.6.1:2003
01-december-2003
'LJLWDOQHL]EROMãDQHEUH]YUYLþQHWHOHNRPXQLNDFLMH '(&7 ±6NXSQLYPHVQLN &, ±
GHO2PUHåQDSODVW 1:.

Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5:

Network (NWK) layer
Ta slovenski standard je istoveten z: EN 300 175-5 Version 1.6.1
ICS:
33.070.30 'LJLWDOQHL]EROMãDQH Digital Enhanced Cordless
EUH]YUYLþQHWHOHNRPXQLNDFLMH Telecommunications (DECT)
'(&7
35.100.30 Omrežni sloj Network layer
SIST EN 300 175-5 V1.6.1:2003 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 300 175-5 V1.6.1:2003
---------------------- Page: 2 ----------------------
SIST EN 300 175-5 V1.6.1:2003
ETSI EN 300 175-5 V1.6.1 (2002-02)
European Standard (Telecommunications series)
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 5: Network (NWK) layer
---------------------- Page: 3 ----------------------
SIST EN 300 175-5 V1.6.1:2003
2 ETSI EN 300 175-5 V1.6.1 (2002-02)
Reference
REN/DECT-000194-5
Keywords
DECT, radio
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org

The present document may be made available in more than one electronic version or in print. In any case of existing or

perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).

In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive

within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, send your comment to:
editor@etsi.fr
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2002.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
SIST EN 300 175-5 V1.6.1:2003
3 ETSI EN 300 175-5 V1.6.1 (2002-02)
Contents

Intellectual Property Rights..............................................................................................................................14

Foreword...........................................................................................................................................................14

1 Scope......................................................................................................................................................15

2 References..............................................................................................................................................15

3 Definitions and abbreviations.................................................................................................................19

3.1 Definitions........................................................................................................................................................19

3.2 Abbreviations...................................................................................................................................................21

4 Overview of the NWK layer ..................................................................................................................23

5 Overview of procedures .........................................................................................................................25

5.1 General.............................................................................................................................................................25

5.2 Overview of Call Control (CC) ........................................................................................................................26

5.2.1 General........................................................................................................................................................26

5.2.2 Call establishment.......................................................................................................................................26

5.2.2.1 Call setup..............................................................................................................................................26

5.2.2.2 Service negotiation................................................................................................................................26

5.2.3 Call connect................................................................................................................................................27

5.2.4 Call information..........................................................................................................................................27

5.2.5 Service change............................................................................................................................................27

5.2.6 Call release..................................................................................................................................................27

5.3 Overview of Supplementary Services (SS) ......................................................................................................27

5.3.1 General........................................................................................................................................................27

5.3.2 Keypad protocol..........................................................................................................................................28

5.3.3 Feature key management protocol..............................................................................................................28

5.3.4 Functional protocol.....................................................................................................................................29

5.4 Overview of Connection Oriented Message Service (COMS).........................................................................29

5.4.1 General........................................................................................................................................................29

5.4.2 COMS establishment..................................................................................................................................29

5.4.3 Service negotiation.....................................................................................................................................30

5.4.4 COMS connect............................................................................................................................................30

5.4.5 COMS data transfer ....................................................................................................................................30

5.4.6 COMS suspend and resume........................................................................................................................30

5.4.7 COMS release.............................................................................................................................................30

5.5 Overview of ConnectionLess Message Service (CLMS).................................................................................30

5.5.1 Fixed length message service......................................................................................................................31

5.5.2 Variable length message service.................................................................................................................31

5.6 Overview of Mobility Management (MM) ......................................................................................................31

5.6.1 General........................................................................................................................................................31

5.6.2 Identity procedures.....................................................................................................................................31

5.6.3 Authentication procedures..........................................................................................................................32

5.6.4 Location procedures....................................................................................................................................32

5.6.5 Access rights procedures ............................................................................................................................32

5.6.6 Key allocation procedure ............................................................................................................................33

5.6.7 Parameter retrieval procedure.....................................................................................................................33

5.6.8 Ciphering related procedure........................................................................................................................33

5.7 Overview of Link Control Entity (LCE) ..........................................................................................................33

5.7.1 General........................................................................................................................................................33

5.7.2 Data Link Endpoint Identifier (DLEI) ........................................................................................................34

5.7.3 Data link establishment...............................................................................................................................34

5.7.4 Data link re-establishment ..........................................................................................................................34

5.7.5 Data link release .........................................................................................................................................35

5.7.6 Data link suspend and resume.....................................................................................................................35

5.7.7 Queuing of messages..................................................................................................................................35

5.7.8 Request paging............................................................................................................................................35

ETSI
---------------------- Page: 5 ----------------------
SIST EN 300 175-5 V1.6.1:2003
4 ETSI EN 300 175-5 V1.6.1 (2002-02)

6 Message functional definitions...............................................................................................................36

6.1 Overview of message structures.......................................................................................................................36

6.1.1 Messages.....................................................................................................................................................36

6.1.2 Information elements..................................................................................................................................36

6.2 Message summaries..........................................................................................................................................37

6.2.1 Summary of CC messages ..........................................................................................................................37

6.2.2 Summary of CISS messages .......................................................................................................................37

6.2.3 Summary of COMS messages ....................................................................................................................38

6.2.4 Summary of CLMS messages.....................................................................................................................38

6.2.5 Summary of MM messages ........................................................................................................................39

6.2.6 Summary of LCE messages........................................................................................................................39

6.3 S-FORMAT message functional contents........................................................................................................40

6.3.1 S-FORMAT message overview..................................................................................................................40

6.3.2 CC-messages...............................................................................................................................................41

6.3.2.1 {CC-SETUP}........................................................................................................................................41

6.3.2.2 {CC-INFO}...........................................................................................................................................43

6.3.2.3 {CC-SETUP-ACK}..............................................................................................................................44

6.3.2.4 {CC-CALL-PROC}..............................................................................................................................45

6.3.2.5 {CC-ALERTING}................................................................................................................................46

6.3.2.6 {CC-CONNECT}.................................................................................................................................47

6.3.2.7 {CC-CONNECT-ACK}........................................................................................................................48

6.3.2.8 {CC-RELEASE}...................................................................................................................................48

6.3.2.9 {CC-RELEASE-COM}........................................................................................................................49

6.3.2.10 {CC-SERVICE-CHANGE}..................................................................................................................50

6.3.2.11 {CC-SERVICE-ACCEPT}...................................................................................................................50

6.3.2.12 {CC-SERVICE-REJECT}....................................................................................................................51

6.3.2.13 {CC-NOTIFY}......................................................................................................................................51

6.3.2.14 {IWU-INFO}........................................................................................................................................52

6.3.3 SS-messages (call related and call independent) ........................................................................................53

6.3.3.1 {FACILITY}.........................................................................................................................................53

6.3.3.2 {HOLD}................................................................................................................................................53

6.3.3.3 {HOLD-ACK}......................................................................................................................................54

6.3.3.4 {HOLD-REJECT}................................................................................................................................54

6.3.3.5 {RETRIEVE}.......................................................................................................................................55

6.3.3.6 {RETRIEVE-ACK}..............................................................................................................................55

6.3.3.7 {RETRIEVE-REJECT}........................................................................................................................56

6.3.3.8 {CISS-REGISTER}..............................................................................................................................56

6.3.3.9 {CISS-RELEASE-COM}.....................................................................................................................57

6.3.4 COMS-messages.........................................................................................................................................57

6.3.4.1 {COMS-SETUP}..................................................................................................................................57

6.3.4.2 {COMS-INFO}.....................................................................................................................................58

6.3.4.3 {COMS-ACK}......................................................................................................................................58

6.3.4.4 {COMS-CONNECT}...........................................................................................................................59

6.3.4.5 {COMS-RELEASE}.............................................................................................................................59

6.3.4.6 {COMS-RELEASE-COM}..................................................................................................................60

6.3.4.7 {COMS-NOTIFY}................................................................................................................................60

6.3.5 CLMS-message...........................................................................................................................................61

6.3.5.1 {CLMS-VARIABLE}..........................................................................................................................61

6.3.6 MM-messages.............................................................................................................................................62

6.3.6.1 {ACCESS-RIGHTS-ACCEPT}...........................................................................................................62

6.3.6.2 {ACCESS-RIGHTS-REJECT}.............................................................................................................62

6.3.6.3 {ACCESS-RIGHTS-REQUEST}.........................................................................................................63

6.3.6.4 {ACCESS-RIGHTS-TERMINATE-ACCEPT}...................................................................................63

6.3.6.5 {ACCESS-RIGHTS-TERMINATE-REJECT}....................................................................................64

6.3.6.6 {ACCESS-RIGHTS-TERMINATE-REQUEST}.................................................................................64

6.3.6.7 {AUTHENTICATION-REJECT}........................................................................................................65

6.3.6.8 {AUTHENTICATION-REPLY}..........................................................................................................65

6.3.6.9 {AUTHENTICATION-REQUEST}....................................................................................................66

6.3.6.10 {CIPHER-REJECT}.............................................................................................................................66

6.3.6.11 {CIPHER-REQUEST}.........................................................................................................................67

6.3.6.12 {CIPHER-SUGGEST}.........................................................................................................................67

6.3.6.13 {DETACH}...........................................................................................................................................68

ETSI
---------------------- Page: 6 ----------------------
SIST EN 300 175-5 V1.6.1:2003
5 ETSI EN 300 175-5 V1.6.1 (2002-02)

6.3.6.14 {IDENTITY-REPLY}..........................................................................................................................68

6.3.6.15 {IDENTITY-REQUEST}.....................................................................................................................69

6.3.6.16 {KEY-ALLOCATE}............................................................................................................................69

6.3.6.17 {LOCATE-ACCEPT}..........................................................................................................................70

6.3.6.18 {LOCATE-REJECT}............................................................................................................................70

6.3.6.19 {LOCATE-REQUEST}........................................................................................................................71

6.3.6.20 {MM-INFO-ACCEPT}........................................................................................................................71

6.3.6.21 {MM-INFO-REJECT}..........................................................................................................................72

6.3.6.22 {MM-INFO-REQUEST}......................................................................................................................72

6.3.6.23 {MM-INFO-SUGGEST}......................................................................................................................73

6.3.6.24 {TEMPORARY-IDENTITY-ASSIGN}...............................................................................................73

6.3.6.25 {TEMPORARY-IDENTITY-ASSIGN-ACK}.....................................................................................74

6.3.6.26 {TEMPORARY-IDENTITY-ASSIGN-REJ}.......................................................................................74

6.3.6.27 {MM-IWU}..........................................................................................................................................75

6.3.7 LCE-messages............................................................................................................................................75

6.3.7.1 {LCE-PAGE-RESPONSE}..................................................................................................................75

6.3.7.2 {LCE-PAGE-REJECT}........................................................................................................................76

6.4 B-FORMAT message functional contents .......................................................................................................76

6.4.1 B-FORMAT message overview .................................................................................................................76

6.4.2 {LCE-REQUEST-PAGE}..........................................................................................................................77

6.4.3 {CLMS-FIXED}.........................................................................................................................................77

7 S-FORMAT message structures.............................................................................................................78

7.1 Overview..........................................................................................................................................................78

7.2 Protocol Discrimination (PD) element .............................................................................................................78

7.3 Transaction Identifier (TI) element ..................................................................................................................79

7.4 Message type element ......................................................................................................................................80

7.4.1 Messages for CC.........................................................................................................................................80

7.4.2 Messages for SS..........................................................................................................................................80

7.4.3 Messages for COMS...................................................................................................................................81

7.4.4 Messages for CLMS...................................................................................................................................81

7.4.5 Messages for MM.......................................................................................................................................81

7.4.6 Messages for LCE.......................................................................................................................................82

7.5 Other information elements..............................................................................................................................82

7.5.1 Coding rules................................................................................................................................................82

7.5.2 Extensions of codesets ................................................................................................................................84

7.5.3 Locking shift procedure..............................................................................................................................84

7.5.4 Non-locking shift procedure.......................................................................................................................85

7.5.5 Display and keypad elements......................................................................................................................85

7.5.6 Repeated elements......................................................................................................................................85

7.6 Fixed length information elements...................................................................................................................86

7.6.1 Summary.....................................................................................................................................................86

7.6.2 Sending complete, delimiter request and use TPUI....................................................................................86

7.6.3 Repeat indicator..........................................................................................................................................87

7.6.4 Basic service...............................................................................................................................................87

7.6.5 Single display..............................................................................................................................................88

7.6.6 Single keypad..............................................................................................................................................88

7.6.7 Release reason............................................................................................................................................88

7.6.8 Signal..........................................................................................................................................................89

7.6.9 Timer restart................................................................................................................................................90

7.6.10 Test hook control ........................................................................................................................................91

7.7 Variable length information elements ..............................................................................................................91

7.7.1 Summary.....................................................................................................................................................91

7.7.2 Allocation type............................................................................................................................................93

7.7.3 Alphanumeric.............................................................................................................................................94

7.7.4 Auth type....................................................................................................................................................95

7.7.5 Call attributes..............................................................................................................................................96

7.7.6 Call identity................................................................................................................................................99

7.7.7 Called party number....................................................................................................................................99

7.7.8 Called party subaddress ..........................................................................................................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.