Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI) - Part 1: Overview

The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document contains an abstract of the other parts of the DECT standard together with a general description of:
- the objectives of the present document;
- the DECT Common Interface;
- the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the technical terms used in different parts of the present document. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

Digitalne izboljšane brezvrvične telekomunikacije (DECT) - Skupni vmesnik (CI) - 1. del: Pregled

V tem dokumentu sta predstavitev in pregled celotnega skupnega vmesnika (CI) za digitalne izboljšane brezvrvične telekomunikacije (DECT). V tem dokumentu je povzetek drugih delov standarda za DECT in splošen opis:
– namena tega dokumenta,
– skupnega vmesnika za DECT,
– arhitekture protokola DECT.
V tem dokumentu je tudi obsežen slovar, ki vključuje zlasti skupne definicije vseh tehničnih izrazov, uporabljenih v različnih delih tega dokumenta. Ta dokument vključuje novo generacijo digitalnih izboljšanih brezvrvičnih telekomunikacij, nadaljnji razvoj standarda za digitalne izboljšane brezvrvične telekomunikacije, ki uvaja širokopasovni govor, izpopolnjene podatkovne storitve, nove tipe rež in druge tehnične izpopolnitve.

General Information

Status
Published
Public Enquiry End Date
31-Jul-2013
Publication Date
23-Sep-2013
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
02-Sep-2013
Due Date
07-Nov-2013
Completion Date
24-Sep-2013
Standard
ETSI EN 300 175-1 V2.5.0 (2013-04) - Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview
English language
37 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ETSI EN 300 175-1 V2.5.1 (2013-08) - Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview
English language
37 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
SIST EN 300 175-1 V2.5.1:2013
English language
37 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


Draft ETSI EN 300 175-1 V2.5.0 (2013-04)

European Standard
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 1: Overview
2 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)

Reference
REN/DECT-000268-1
Keywords
7 kHz, audio, broadband, CODEC, DECT,
handsfree, IMT-2000, loudspeaking, mobility,
narrowband, quality, radio, speech, TDD, TDMA,
telephony, terminal
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2013.
All rights reserved.
TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
3 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
Contents
Intellectual Property Rights . 4
Foreword . 4
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definitions and abbreviations . 8
3.1 Definitions . 8
3.2 Symbols and abbreviations . 17
4 Structure . 23
4.1 Part 1: Overview . 23
4.2 Part 2: Physical Layer (PHL) . 24
4.3 Part 3: Medium Access Control (MAC) layer . 24
4.4 Part 4: Data Link Control (DLC) layer . 24
4.5 Part 5: Network (NWK) layer . 24
4.6 Part 6: Identities and addressing . 24
4.7 Part 7: Security features . 24
4.8 Part 8: Speech and audio coding and transmission . 25
5 The objectives of the CI standard . 25
6 General description of the system . 26
7 Description of the protocol architecture . 28
7.1 General . 28
7.2 The DECT layered structure . 28
7.3 Physical Layer (PHL) . 28
7.4 MAC layer . 29
7.5 DLC layer . 29
7.6 Network (NWK) layer . 29
7.7 Lower Layer Management Entity (LLME) . 29
7.8 Interworking Units (IWU) . 30
8 Proprietary escapes within the CI . 30
8.1 Primary escape routes . 30
8.2 Secondary escape routes . 31
9 Levels of conformance . 31
10 Further development of the DECT standard . 31
10.1 IMT-2000 . 31
10.2 The DECT Packet Radio Service (DPRS) . 31
10.3 DECT in international markets . 32
10.3.1 United States of America . 32
10.4 The New Generation DECT (NG-DECT) . 32
10.5 DECT Ultra Low Energy (ULE) . 33
Annex A (informative): Bibliography . 35
Annex B (informative): Change history . 36
History . 37

ETSI
4 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://ipr.etsi.org).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This draft European Standard (EN) has been produced by ETSI Technical Committee Digital Enhanced Cordless
Telecommunications (DECT), and is now submitted for the combined Public Enquiry and Vote phase of the ETSI
standards EN Approval Procedure.
The present document is part 1 of a multi-part deliverable covering the Common Interface (CI) for the Digital Enhanced
Cordless Telecommunications (DECT), as identified below:
Part 1: "Overview";
Part 2: "Physical Layer (PHL)";
Part 3: "Medium Access Control (MAC) layer";
Part 4: "Data Link Control (DLC) layer";
Part 5: "Network (NWK) layer";
Part 6: "Identities and addressing";
Part 7: "Security features";
Part 8: "Speech and audio coding and transmission".
The following aspects of the present document are subject to controlled distribution:
a) DECT identities, as defined in EN 300 175-6 [6];
b) Some DECT cryptographic algorithms.
The cryptographic algorithms subjected to controlled distribution specify the details of the DECT Standard
Authentication Algorithm (DSAA) and the DECT Standard Cipher (DSC). The cryptographic algorithms DECT
Standard Authentication Algorithm #2 (DSAA2) and DECT Standard Cipher #2 (DSC2) are not subjected to controlled
distribution.
These aspects are distributed on an individual basis. Further information and details of the current distribution
procedures can be obtained from the ETSI Secretariat at the address on the second page of the present document.
Further details of the DECT system may be found in TR 101 178 [i.4], ETR 043 [i.5] and TR 102 185 [i.6].

ETSI
5 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
Proposed national transposition dates
Date of latest announcement of this EN (doa): 3 months after ETSI publication
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 6 months after doa
Date of withdrawal of any conflicting National Standard (dow): 6 months after doa

ETSI
6 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
1 Scope
The present document gives an introduction and overview of the complete Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
The present document contains an abstract of the other parts of the DECT standard together with a general
description of:
• the objectives of the present document;
• the DECT Common Interface;
• the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the
technical terms used in different parts of the present document.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
2 References
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee
their long term validity.
2.1 Normative references
The following referenced documents are necessary for the application of the present document.
[1] Void.
[2] ETSI EN 300 175-2: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 2: Physical Layer (PHL)".
[3] ETSI EN 300 175-3: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 3: Medium Access Control (MAC) layer".
[4] ETSI EN 300 175-4: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 4: Data Link Control (DLC) layer".
[5] ETSI EN 300 175-5: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 5: Network (NWK) layer".
[6] ETSI EN 300 175-6: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 6: Identities and addressing".
[7] ETSI EN 300 175-7: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 7: Security features".
[8] ETSI EN 300 175-8: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 8: Speech and audio coding and transmission".
ETSI
7 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
[9] ETSI EN 300 176 (all parts): "Digital Enhanced Cordless Telecommunications (DECT); Test
specification".
[10] Recommendation ITU-R M.1457-10: "Detailed specifications of the terrestrial radio interfaces of
International Mobile Telecommunications-2000 (IMT-2000)".
[11] ETSI EN 301 649: "Digital Enhanced Cordless Telecommunications (DECT); DECT Packet
Radio Service (DPRS)".
[12] ETSI TS 102 497: "Digital Enhanced Cordless Telecommunications (DECT); DECT in the
1 920 MHz to 1 930 MHz Unlicensed Personal Communications Services (UPCS) frequency
band; Specific requirements".
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI EN 300 403-1: "Integrated Services Digital Network (ISDN); Digital Subscriber Signalling
System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call control;
Part 1: Protocol specification [ITU-T Recommendation Q.931 (1993), modified]".
[i.2] Recommendation ITU-R SM.1046-2: "Definition of spectrum use and efficiency of a radio
system".
[i.3] Recommendation ITU-R M.816-1: "Framework for services supported on International Mobile
Telecommunications-2000 (IMT-2000)".
[i.4] ETSI TR 101 178: "Digital Enhanced Cordless Telecommunications (DECT); A High Level Guide
to the DECT Standardization".
[i.5] ETSI ETR 043: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface
(CI); Services and facilities requirements specification".
[i.6] ETSI TR 102 185: "Digital Enhanced Cordless Telecommunications (DECT); Data Services
Profile (DSP); Profile overview".
[i.7] ETSI ETR 310: "Digital Enhanced Cordless Telecommunications (DECT); Traffic capacity and
spectrum requirements for multi-system and multi-service DECT applications co-existing in a
common frequency band".
[i.8] ETSI TS 102 265: "Digital Enhanced Cordless Telecommunications (DECT); DECT access to IP
networks".
[i.9] Recommendation ITU-T P.311: "Transmission characteristics for wideband (150-7000 Hz) digital
handset telephones".
[i.10] ETSI TR 102 570: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Overview and Requirements".
[i.11] ETSI TS 102 527-1: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 1: Wideband Speech".
[i.12] ETSI TS 102 527-2: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 2: Support of transparent IP packet data".
[i.13] ETSI TS 102 527-3: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 3: Extended wideband speech services".
[i.14] ETSI TS 102 527-4: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 4: Light Data Services; Software Update Over The Air (SUOTA), content
downloading and HTTP based applications".
[i.15] ETSI TS 102 527-5: " Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 5: Additional feature set nr. 1 for extended wideband speech services".
ETSI
8 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
[i.16] Recommendation ITU-T V.42: "Error-correcting procedures for DCEs using asynchronous-to-
synchronous conversion".
[i.17] Recommendation ITU-T V.24: "List of definitions for interchange circuits between Data Terminal
Equipment (DTE) and data circuit-terminating equipment (DCE)".
[i.18] ETSI TS 102 939-1: "Digital Enhanced Cordless Telecommunications (DECT); Ultra
Low Energy (ULE); Machine to Machine Communications; Part 1: Home Automation Network
(phase 1)".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply:
Access Rights Class (ARC): type of access to a DECT network, such as public, residential or private
Access Rights Details (ARD): unique number within one ARC
Access Rights Identity (ARI): globally unique identity that shows the access rights related to a service provider
NOTE: PARI = Primary ARI;
SARI = Secondary ARI;
TARI = Tertiary ARI.
algorithm: mathematical process or function that transforms an input into an output
algorithm identifier: designator to show which algorithm is in use, so that the correct one may be chosen
antenna diversity: diversity implies that the Radio Fixed Part (RFP) for each bearer independently can select different
antenna properties such as gain, polarization, coverage patterns and other features that may affect the practical coverage
NOTE: A typical example is space diversity, provided by two vertically polarized antennas separated by 10 cm to
20 cm.
asymmetric algorithm: See public key algorithm.
attach: process whereby a Portable Part (PP) within the coverage area of a Fixed Part (FP) to which it has access rights,
notifies the FP that it is operative
authentication: corroboration that an entity is the one that is claimed
authentication of Fixed radio Termination (FT): process whereby the identity of an FT is verified to a DECT PT
authentication of Portable radio Termination (PT): process whereby a DECT PT is positively verified to be a
legitimate user of a particular FP
authentication (of a subscriber): process whereby a DECT subscriber is positively verified to be a legitimate user of a
particular FP
authentication of user: process whereby a DECT user is positively verified to be a legitimate user of a particular FP
bearer: See Medium Access Control (MAC) bearer or bearer service.
bearer handover: internal handover process provided by the MAC layer, whereby one MAC connection can modify its
underlying bearers while maintaining the service provided to the Data Link Control (DLC) layer
bearer service: type of telecommunication service that provides a defined capability for the transmission of signals
between user-network interfaces
broadcast: simplex point-to-multipoint mode of transmission
ETSI
9 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
C-plane: control plane of the DECT protocol stacks, which contains all of the internal DECT protocol control, but may
also include some external user information
call: all of the Network (NWK) layer processes involved in one NWK layer peer-to-peer association
cell: domain served by a single antenna(e) system (including a leaky feeder) of one FP
Central Control Fixed Part (CCFP): physical grouping that contains the central elements of a FP
centrex: implementation of a private telecommunication network exchange that is not located on the premises of the
private network operator
Cipher Block Chaining Message Authentication Code (CBC-MAC): cryptographic technique for constructing a
message authentication code from a block cipher
Cipher Key (CK): value that is used to determine the transformation of plaintext to ciphertext in a cryptographic
algorithm
Cipher Key (CK) generation: process for generating cryptographic keys
ciphertext: output of a cryptographic algorithm
channel: See physical channel.
cluster: logical grouping of one or more cells between which bearer handover is possible
confidentiality: rendering information secret as ciphertext unless the capability is possessed to recover the plaintext
from ciphertext
connection: See MAC connection.
connection handover: internal handover process provided by the DLC layer, whereby one set of DLC entities (C-plane
and U-plane) can re-route data from one MAC connection to a second new MAC connection, while maintaining the
service provided to the NWK layer
ConnectionLess mode (C/L): transmission mode that transfers one packet (one self contained unit) of data from one
source point to one (or more) destination points in a single phase
Connection Oriented mode (C/O): transmission mode that transfers data from one source point to one or more
destination points using a protocol based on three phases:
• "Set-up";
• "Data transfer"; and
• "Release".
Cordless Radio Fixed Part (CRFP): Wireless Relay Station (WRS) that provides independent bearer control to a PT
and FT for relayed connections
Counter with CBC-MAC (CCM): authenticated encryption algorithm designed to provide both authentication and
confidentiality
countermeasure: device, instrument or procedure used to counteract or defend against a threat
coverage area: area over which reliable communication can be established and maintained
cryptography: secret writing
Data Encryption Standard (DES): United States Federal data encryption standard
Data Link Control (DLC): layer 2b of the DECT protocol stack
decipherment: rendering of ciphertext into plaintext
DECT NetWork (DNW): network that uses the DECT air interface to interconnect a local network to one or more
portable applications
ETSI
10 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
DECT Standard Authentication Algorithm (DSAA): algorithm used for authentication in DECT
DECT Standard Authentication Algorithm #2 (DSAA2): algorithm used for authentication in DECT
DECT Standard Cipher (DSC): algorithm used for data encryption in DECT
DECT Standard Cipher #2 (DSC2): algorithm used for data encryption in DECT
Default Cipher Key (DefCK): Derived Cipher Key (DCK) that is stored in both FP and PP to be used later by MAC to
immediately encrypt with connection establishment
Derived Cipher Key (DCK): Cipher Key (CK) that is established as part of the procedure used to authenticate the PT
distributed communication: ability of a DECT terminal to provide means for or assist direct communication between
any two terminals, members of a "closed" local DECT network
DLC broadband data link: link that can be associated with a logical MAC connection comprising a number of MAC
(physical) connections
DLC broadcast: simplex "connectionless" mode of transmission from the DLC broadcast entity of one FT to the DLC
broadcast entities in one or more PT
DLC data link (DLC link): association between two DLC layer entities
DLC frame: format used to structure all messages that are exchanged between DLC layer peer entities
double duplex bearer: use of two duplex bearers (see duplex bearer) which refer to the same MAC connection, sharing
their simplex bearers (see simplex bearer) for the information flow
double-simplex bearer: use of two simplex bearers operating in the same direction on two physical channels
th
double slot: one 12 of a TDMA frame which is used to support one high capacity physical channel
down-link: transmission in the direction FT to PT
duplex bearer: use of two simplex bearers operating in opposite directions on two physical channels
encipherment: rendering of plaintext into ciphertext
End System (ES): logical grouping that contains application processes and supports telecommunication services
expedited (messages, procedures, operations): MAC C/O operations (messages, procedures, operations) intended for
ultra fast setup and release of bearers, allowing in most cases reduction in the number of messages and early or late
U-plane transmission compared to regular procedures
expedited connections: advanced connections able to use the expedited messages of the advanced connection control
part 2 set and their associate procedures for bearer setup and release
extended MAC control messages: MAC messages of the B-field connection control set
external handover: process of switching a call in progress from one FP to another FP
Fast Encryption Algorithm (FEAL algorithm): particular encryption algorithm in the public domain
field: continuous region of data (i.e. adjacent bits) that jointly convey information
fixed geometry Portable Part (PP): PP in which the electro-acoustic transducers and their associated acoustic
components are held in fixed relative positions and/or orientations during all on-line conditions and test conditions of
the PP
Fixed Part (DECT Fixed Part) (FP): physical grouping that contains all of the elements in the DECT network
between the local network and the DECT air interface
Fixed radio Termination (FT): logical group of functions that contains all of the DECT processes and procedures on
the fixed side of the DECT air interface
flow control: mechanism that is used to regulate the flow of data between two peer entities
ETSI
11 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
fragment: one of the Service Data Units (SDUs) that is produced by the process of fragmentation
fragmentation: process of dividing a Protocol Data Unit (PDU) into more than one SDU for delivery to a lower layer
frame: See TDMA frame or DLC frame.
th
full slot (slot): one 24 of a TDMA frame which is used to support one physical channel
generic: generalized set or general purpose set, often in the sense of basic or ordinary
Generic Access Profile (GAP): standard in addition to the DECT CI that ensures interoperability between FPs and PPs
from different manufacturers
geographically unique: two FPs with the same PARI, or respectively two RFPs with the same RFPI, cannot be reached
or listened to at the same geographical position
Global NetWork (GNW): telecommunication network capable of offering a long distance telecommunication service
globally unique identity: identity is unique within DECT (without geographical or other restrictions)
guard space: nominal interval between the end of a radio transmission in a given slot and the start of a radio
transmission in the next successive slot
th
half slot: one 48 of a TDMA frame which is used to support one physical channel
handover: process of switching a call in progress from one physical channel to another physical channel
handset echo: echo, perceptible by the far-end user, resulting from the coupling between the receiving and sending
directions of the handset, mostly due to acoustic coupling between transducers
Headset PP (HPP): headset PP is a wireless headset telephone using the DECT air interface
NOTE: A HPP usually has only one speaker and one microphone combined with a limited set of keys (e.g. call
button, volume plus, and volume minus). Headsets provide the equivalent functionality of a PP with
hands-free operation.
Home Automation Network: network that connects all sensors and actors in a house or apartment, providing
interoperability for devices of different vendors and typically has a connection to the Internet. The Home Automation
Network is used for various applications, from Home Automation and Security to Climate Control and Energy
Management.
Hybrid Part (HyP): DECT terminal that provides FT as well as PT capabilities
impersonation: where one identity claims the part of another identity
incoming call: call received at a PP
Integrated Services Digital Network (ISDN): digital telecommunications infrastructure to the Consultative
Committee on International Telegraphy and Telephony (CCITT) standards
intercell handover: switching of a call in progress from one cell to another cell
internal call: call between 2 users that does not make use of the local network resources
internal handover: handover processes that are completely internal to one FT
International Portable User Identity (IPUI): identity that uniquely defines one user within the domain defined by his
access rights related to this IPUI
interoperability: capability of FPs and PPs, that enable a PP to obtain access to teleservices in more than one location
area and/or from more than one operator (more than one service provider)
interoperator roaming: roaming between FP coverage areas of different operators (different service providers)
InterWorking Unit (IWU): unit that is used to interconnect subnetworks
ETSI
12 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
intracell handover: switching of a call in progress from one physical channel of one cell to another physical channel of
the same cell
intraoperator roaming: roaming between different FP coverage areas of the same operator (same service provider)
isochronous: essential characteristic of a time-scale or a signal such that the time intervals between consecutive
significant instants either have the same duration or durations that are integral multiples of the shortest duration
key management: way in which cryptographic keys are generated, distributed and used
Key Stream Generator (KSG): cryptographic algorithm which produces a stream of binary digits which can be used
for encipherment and decipherment
link: See DLC data link.
Local Area Network (LAN): electronic systems which are interconnected and in physical proximity to each other
Local Network (LNW): telecommunication network capable of offering local telecommunication services
locally unique identity: identity is unique within one FP or location area, depending on application
location area: domain in which a PP may receive (and/or make) calls as a result of a single location registration
location registration: process whereby the position of a DECT portable termination is determined to the level of one
location area, and this position is updated in one or more databases
logical channel: generic term for any distinct data path
logical connection: association between two instances of the MAC MBC that can be used by higher layers to exchange
U-plane or C-plane data
Lower Layer Management Entity (LLME): management entity that spans a number of lower layers, and is used to
describe all control activities which do not follow the rules of layering
Lower Tester (LT): logical grouping that contains the test equipment, a functionally equivalent DECT PT, a
functionally equivalent DECT FT and a test controller
MAC bearer (bearer): service element that is provided by each Cell Site Function (CSF)
MAC connection (connection): association between one source MAC Multi-Bearer Control (MBC) entity and one
destination MAC MBC entity
Machine-to-Machine (M2M) solution: combination of devices, software and services that operate with little or no
human interaction
masquerading: where one identity plays the part of, or acts as, another identity
Medium Access Control (MAC): layer 2a of the DECT protocol stack
Message Authentication Code (CCM): short piece of information generated by a cryptographic function used to
authenticate and to protect the data integrity of a message
Message Integrity Code (CCM): alternative name for the Message Authentication Code
minimal MMS-message attributes: message meta-information used in the request-to-send, etc.
MMS-message attributes: message meta-information
mobility class 1: local area applications, for which terminals are pre-registered off-air with one or more specific fixed
parts, and establishment of service and user parameters is therefore implicit, according to a profile-defined list
mobility class 2: private and public roaming applications for which terminals may move between FPs within a given
domain and for which association of service parameters is explicit at the time of service request
multiframe: repeating sequence of 16 successive TDMA frames, that allows low rate or sporadic information to be
multiplexed (e.g. basic system information or paging)
ETSI
13 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
Multimedia Messaging Service (MMS): generic set of commands, information elements and functionality for
file/messaging service
mutual authentication: where two entities corroborate the identity of each other
network (telecommunication network): all the means of providing telecommunication services between a number of
locations where the services are accessed via equipment attached to the network
network echo: echo, perceptible by the DECT user, resulting from reflections in the network. It is mostly due to hybrid
impairments at both ends of the communication
New Generation DECT: further development of the DECT standard introducing wideband speech, improved data
services, new slot types and other technical enhancements
node: point at which switching occurs
operator (DECT operator): individual or entity who or which is responsible for operation of one or more DECT FPs
outgoing call: call originating from a PP
Packet Data Protocol (PDP): terminology used in GPRS and 3GPP that refers to any of the data protocols transported
over the radio packet service (IP, X.25, etc.)
paging: process of broadcasting a message from a DECT FP to one or more DECT PPs
paging area: domain in which the PP will be paged as a part of incoming call establishment
PARK Length Indicator (PLI): associates a group of FP ARIs to the PARK, by indicating how many of the first
ARC + ARD bits are relevant
PDP context: terminology used in GPRS and 3GPP to denote the context associated to a packet data connection. It is
equivalent to "virtual circuit"
Permanent Virtual Circuit (PVC): Virtual Circuit that can be established and cleared only by configuration
Personal Identity Number (PIN): short sequence of numbers (usually 4 to 8 digits) which may be used in an
authentication process to prove identity
phase: one discrete part of a procedure, where the start and end of the part can be clearly identified (e.g. by the arrival
or dispatch of a primitive)
Physical (PHY): layer 1 of the DECT protocol stack
physical channel (channel): simplex channel that is created by transmitting in one particular slot on one particular RF
channel in successive TDMA frames
plaintext: information or data which is intelligible to everyone
Portable Access Rights Key (PARK): this states the access rights for a PP
Portable Application (PA): logical grouping that contains all the elements that lie beyond the DECT network
boundary on the portable side
Portable HandSet (PHS): single physical grouping that contains all of the portable elements that are needed to provide
a teleservice to the user
Portable Part (DECT Portable Part) (PP): physical grouping that contains all elements between the user and the
DECT air interface
Portable radio Termination (PT): logical group of functions that contains all of the DECT processes and procedures
on the portable side of the DECT air interface
Portable User Number (PUN): globally or locally unique number within one PUT
Portable User Type (PUT): this shows the numbering plan structure of a PUN
Primary Access Rights Identity (PARI): most frequently transmitted ARI
ETSI
14 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
primitive: distinct (but abstract) data element that is passed between adjacent protocol layers
private: attribute indicating that the application of the so qualified term, e.g. a network, an equipment, a service, is
offered to, or is in the interest of, a determined set of users
proprietary algorithm: algorithm which is the intellectual property of a legal entity
public: attribute indicating that the application of the so qualified term, e.g. a network, an equipment, a service, is
offered to, or is in the interest of, the general public
Public Access Profile (PAP): profile which ensures interoperability between FPs and PPs for public access services
public access service: service that provides access to a public network for the general public
public key algorithm: cryptographic algorithm in which a different key is used for encipherment and for decipherment
radio channel: See RF channel or physical channel.
radio end point: physical grouping that contains one radio transceiver (transmitter/receiver), fixed or portable
Radio Fixed Part (RFP): one physical sub-group of a FP that contains all the radio end points (one or more) that are
connected to a single system of antennas
Radio Fixed Part Identity (RFPI): identity frequently transmitted by every RFP:
• PARI;
• the RFPs local identity within that FP;
• domains for handover and location areas.
random number: number generated by a non-deterministic process
registration: See either location registration or subscription registration.
REpeater Part (REP): WRS that relays information within the half frame time interval
Resume: procedure to re-establish the physical connection for a logical connection in suspended state
Resumed state: state of an established Logical connection, open at MB, DLC and NWK, with active TBCs and
physical layer
RF carrier (carrier): centre frequency occupied by one DECT transmission
RF channel: nominal range of frequencies (RF spectrum) allocated to the DECT transmissions of a single RF carrier
roaming: movement of a PP from one FP coverage area to another FP coverage area, where the capabilities of the FPs
enable the PP to make or receive calls in both areas
roaming service: service which can be used in more than one FP coverage area
RS: a cryptographic parameter used for the calculation of authentication session keys
RS : 128 bit variant of RS
RS ': the RS used for the generation of KS'
128 128
RS1 / RS2: components of RS when RS is assembled from two parts
128 128
Rivest, Shamir and Adleman (RSA) algorithm: public key algorithm
Secondary Access Rights Identity (SARI): less frequently broadcast than the PARI
security attribute: protocol element indicating security services, mechanisms, processes or algorithms that are
supported
segment: one of the pieces of data that is produced by the process of segmentation
ETSI
15 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
segmentation: process of partitioning one SDU from a higher layer into more than one PDU
Session Key (KS): key which is used only for a single session
service call: call initiated by a DECT PT for entering of FT related service and adjustment procedures in a transparent
way
service provider (telecommunications service provider): individual, or entity, who, or which, interfaces to the
customer in providing telecommunications service
service type A: low speed frame relay, with a net sustainable throughput of up to 24 kbit/s, optimized for burst data,
low power consumption and low complexity applications such as hand-portable equipment
service type B: high performance frame relay, with a net sustainable throughput of up to 552 kbit/s, optimized for high
speed and low latency with burst data
service type C: non-transparent connection of data streams requiring Link Access Protocol (LAP) services, optimized
for high reliability and low additional complexity
service type D: non-transparent service that supports Isochronous Data Bearer Services and is suitable for transparent
transfer of isochronous data streams
service type E: short message transfer or paging service which may be unacknowledged or acknowledged, optimized
for small SDUs, low PP complexity and ultra-low power consumption
service type F: application profile specifically supporting teleservices such as fax, building upon the services offered
by the type A/B and C profiles, optimized for terminal simplicity, spectrum efficiency and network flexibility
sequencing (sequence numbering): process of adding a sequence number to a set of data packets so that the packets
can be reassembled in the correct order, regardless of the order they are received
simplex bearer: simplex bearer is the MAC layer service that is created using one physical channel
Single Radio Fixed Part (SRFP): radio FP that contains only one radio end point
stream cipher: algorithm in which the output is combined bit by bit with plaintext to produce the ciphertext
Subscriber Interface Module (SIM): smart card used for authentication in GSM
subscriber (customer): natural person or juristic person who has subscribed to telecommunication services, and is,
therefore, responsible for payment
subscription registration: infrequent process whereby a subscriber obtains access rights to one or more FPs
super-wideband speech: voice service with enhanced quality compared to ADPCM G.726 and allowing the
transmission of a maximum vocal frequency of at least 14 kHz
Supplementary Service (SS): service that modifies or supplements a basic telecommunication service:
1) DECT TRANSPARENT supplementary services:
- the service elements are unspecified within EN 300 175;
2) DECT STANDARD supplementary services:
- the service elements are specified within EN 300 175 by reference to other standards;
3) DECT SPECIFIC supplementary services:
- the service elements are fully specified within EN 300 175.
suspend: procedure to release the physical connection without releasing the logical connection
suspended state: state of an established logical connection open at MBC, DLC and NWK but with no associated TBCs
and physical layer resources
ETSI
16 Draft ETSI EN 300 175-1 V2.5.0 (2013-04)
switching: process of interconnecting functional units, transmission channels or telecommunication circuits for as long
as required to convey signals
symmetric algorithm: cryptographic algorithm in which the same key is used for both encipherment and decipherment
synchronization: methods used to ensure that time correspondence exists between processes to ensure that data is not
repeated or lost
synchronous: essential characteristics of time-scales or signals such that their corresponding significant instants occur
at precisely the same average rate
synchronous transmission: transmission using isochronous signals in which the sending and receiving instruments are
operating continuously in a constant time difference between corresponding significant instants
TDMA frame: time-division multiplex of 10 ms duration containing 24 successive full slots
telecommunication: any transmission and/or emission and/or reception of signals representing signs, writings, images,
and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic systems
teleservice: type of telecommunication service that provides the complete capa
...


European Standard
Digital Enhanced Cordless Telecommunications (DECT);
Common Interface (CI);
Part 1: Overview
2 ETSI EN 300 175-1 V2.5.1 (2013-08)

Reference
REN/DECT-000268-1
Keywords
7 kHz, audio, broadband, CODEC, DECT,
handsfree, IMT-2000, loudspeaking, mobility,
narrowband, quality, radio, speech, TDD, TDMA,
telephony, terminal
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2013.
All rights reserved.
TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
3 ETSI EN 300 175-1 V2.5.1 (2013-08)
Contents
Intellectual Property Rights . 4
Foreword . 4
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definitions, symbols and abbreviations . 8
3.1 Definitions . 8
3.2 Symbols and abbreviations . 17
4 Structure . 23
4.1 Part 1: Overview . 23
4.2 Part 2: Physical Layer (PHL) . 24
4.3 Part 3: Medium Access Control (MAC) layer . 24
4.4 Part 4: Data Link Control (DLC) layer . 24
4.5 Part 5: Network (NWK) layer . 24
4.6 Part 6: Identities and addressing . 24
4.7 Part 7: Security features . 24
4.8 Part 8: Speech and audio coding and transmission . 25
5 The objectives of the CI standard . 25
6 General description of the system . 26
7 Description of the protocol architecture . 28
7.1 General . 28
7.2 The DECT layered structure . 28
7.3 Physical Layer (PHL) . 28
7.4 MAC layer . 29
7.5 DLC layer . 29
7.6 Network (NWK) layer . 29
7.7 Lower Layer Management Entity (LLME) . 29
7.8 Interworking Units (IWU) . 30
8 Proprietary escapes within the CI . 30
8.1 Primary escape routes . 30
8.2 Secondary escape routes . 31
9 Levels of conformance . 31
10 Further development of the DECT standard . 31
10.1 IMT-2000 . 31
10.2 The DECT Packet Radio Service (DPRS) . 31
10.3 DECT in international markets . 32
10.3.1 United States of America . 32
10.4 The New Generation DECT (NG-DECT) . 32
10.5 DECT Ultra Low Energy (ULE) . 33
Annex A (informative): Bibliography . 35
Annex B (informative): Change history . 36
History . 37

ETSI
4 ETSI EN 300 175-1 V2.5.1 (2013-08)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://ipr.etsi.org).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This European Standard (EN) has been produced by ETSI Technical Committee Digital Enhanced Cordless
Telecommunications (DECT).
The present document is part 1 of a multi-part deliverable covering the Common Interface (CI) for the Digital Enhanced
Cordless Telecommunications (DECT), as identified below:
Part 1: "Overview";
Part 2: "Physical Layer (PHL)";
Part 3: "Medium Access Control (MAC) layer";
Part 4: "Data Link Control (DLC) layer";
Part 5: "Network (NWK) layer";
Part 6: "Identities and addressing";
Part 7: "Security features";
Part 8: "Speech and audio coding and transmission".
The following aspects of the present document are subject to controlled distribution:
a) DECT identities, as defined in EN 300 175-6 [6];
b) Some DECT cryptographic algorithms.
The cryptographic algorithms subjected to controlled distribution specify the details of the DECT Standard
Authentication Algorithm (DSAA) and the DECT Standard Cipher (DSC). The cryptographic algorithms DECT
Standard Authentication Algorithm #2 (DSAA2) and DECT Standard Cipher #2 (DSC2) are not subjected to controlled
distribution.
These aspects are distributed on an individual basis. Further information and details of the current distribution
procedures can be obtained from the ETSI Secretariat at the address on the second page of the present document.
Further details of the DECT system may be found in TR 101 178 [i.4], ETR 043 [i.5] and TR 102 185 [i.6].

ETSI
5 ETSI EN 300 175-1 V2.5.1 (2013-08)
National transposition dates
Date of adoption of this EN: 20 August 2013
Date of latest announcement of this EN (doa): 30 November 2013
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 31 May 2014
Date of withdrawal of any conflicting National Standard (dow): 31 May 2014

ETSI
6 ETSI EN 300 175-1 V2.5.1 (2013-08)
1 Scope
The present document gives an introduction and overview of the complete Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
The present document contains an abstract of the other parts of the DECT standard together with a general
description of:
• the objectives of the present document;
• the DECT Common Interface;
• the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the
technical terms used in different parts of the present document.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
2 References
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
reference document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
http://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee
their long term validity.
2.1 Normative references
The following referenced documents are necessary for the application of the present document.
[1] Void.
[2] ETSI EN 300 175-2: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 2: Physical Layer (PHL)".
[3] ETSI EN 300 175-3: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 3: Medium Access Control (MAC) layer".
[4] ETSI EN 300 175-4: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 4: Data Link Control (DLC) layer".
[5] ETSI EN 300 175-5: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 5: Network (NWK) layer".
[6] ETSI EN 300 175-6: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 6: Identities and addressing".
[7] ETSI EN 300 175-7: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 7: Security features".
[8] ETSI EN 300 175-8: "Digital Enhanced Cordless Telecommunications (DECT); Common
Interface (CI); Part 8: Speech and audio coding and transmission".
ETSI
7 ETSI EN 300 175-1 V2.5.1 (2013-08)
[9] ETSI EN 300 176 (all parts): "Digital Enhanced Cordless Telecommunications (DECT); Test
specification".
[10] Recommendation ITU-R M.1457-10: "Detailed specifications of the terrestrial radio interfaces of
International Mobile Telecommunications-2000 (IMT-2000)".
[11] ETSI EN 301 649: "Digital Enhanced Cordless Telecommunications (DECT); DECT Packet
Radio Service (DPRS)".
[12] ETSI TS 102 497: "Digital Enhanced Cordless Telecommunications (DECT); DECT in the
1 920 MHz to 1 930 MHz Unlicensed Personal Communications Services (UPCS) frequency
band; Specific requirements".
2.2 Informative references
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI EN 300 403-1: "Integrated Services Digital Network (ISDN); Digital Subscriber Signalling
System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call control;
Part 1: Protocol specification [ITU-T Recommendation Q.931 (1993), modified]".
[i.2] Recommendation ITU-R SM.1046-2: "Definition of spectrum use and efficiency of a radio
system".
[i.3] Recommendation ITU-R M.816-1: "Framework for services supported on International Mobile
Telecommunications-2000 (IMT-2000)".
[i.4] ETSI TR 101 178: "Digital Enhanced Cordless Telecommunications (DECT); A High Level Guide
to the DECT Standardization".
[i.5] ETSI ETR 043: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface
(CI); Services and facilities requirements specification".
[i.6] ETSI TR 102 185: "Digital Enhanced Cordless Telecommunications (DECT); Data Services
Profile (DSP); Profile overview".
[i.7] ETSI ETR 310: "Digital Enhanced Cordless Telecommunications (DECT); Traffic capacity and
spectrum requirements for multi-system and multi-service DECT applications co-existing in a
common frequency band".
[i.8] ETSI TS 102 265: "Digital Enhanced Cordless Telecommunications (DECT); DECT access to IP
networks".
[i.9] Recommendation ITU-T P.311: "Transmission characteristics for wideband (150-7000 Hz) digital
handset telephones".
[i.10] ETSI TR 102 570: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Overview and Requirements".
[i.11] ETSI TS 102 527-1: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 1: Wideband Speech".
[i.12] ETSI TS 102 527-2: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 2: Support of transparent IP packet data".
[i.13] ETSI TS 102 527-3: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 3: Extended wideband speech services".
[i.14] ETSI TS 102 527-4: "Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 4: Light Data Services; Software Update Over The Air (SUOTA), content
downloading and HTTP based applications".
[i.15] ETSI TS 102 527-5: " Digital Enhanced Cordless Telecommunications (DECT); New Generation
DECT; Part 5: Additional feature set nr. 1 for extended wideband speech services".
ETSI
8 ETSI EN 300 175-1 V2.5.1 (2013-08)
[i.16] Recommendation ITU-T V.42: "Error-correcting procedures for DCEs using asynchronous-to-
synchronous conversion".
[i.17] Recommendation ITU-T V.24: "List of definitions for interchange circuits between Data Terminal
Equipment (DTE) and data circuit-terminating equipment (DCE)".
[i.18] ETSI TS 102 939-1: "Digital Enhanced Cordless Telecommunications (DECT); Ultra
Low Energy (ULE); Machine to Machine Communications; Part 1: Home Automation Network
(phase 1)".
3 Definitions, symbols and abbreviations
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply:
Access Rights Class (ARC): type of access to a DECT network, such as public, residential or private
Access Rights Details (ARD): unique number within one ARC
Access Rights Identity (ARI): globally unique identity that shows the access rights related to a service provider
NOTE: PARI = Primary ARI;
SARI = Secondary ARI;
TARI = Tertiary ARI.
algorithm: mathematical process or function that transforms an input into an output
algorithm identifier: designator to show which algorithm is in use, so that the correct one may be chosen
antenna diversity: diversity implies that the Radio Fixed Part (RFP) for each bearer independently can select different
antenna properties such as gain, polarization, coverage patterns and other features that may affect the practical coverage
NOTE: A typical example is space diversity, provided by two vertically polarized antennas separated by 10 cm to
20 cm.
asymmetric algorithm: See public key algorithm.
attach: process whereby a Portable Part (PP) within the coverage area of a Fixed Part (FP) to which it has access rights,
notifies the FP that it is operative
authentication: corroboration that an entity is the one that is claimed
authentication of Fixed radio Termination (FT): process whereby the identity of an FT is verified to a DECT PT
authentication of Portable radio Termination (PT): process whereby a DECT PT is positively verified to be a
legitimate user of a particular FP
authentication (of a subscriber): process whereby a DECT subscriber is positively verified to be a legitimate user of a
particular FP
authentication of user: process whereby a DECT user is positively verified to be a legitimate user of a particular FP
bearer: See Medium Access Control (MAC) bearer or bearer service.
bearer handover: internal handover process provided by the MAC layer, whereby one MAC connection can modify its
underlying bearers while maintaining the service provided to the Data Link Control (DLC) layer
bearer service: type of telecommunication service that provides a defined capability for the transmission of signals
between user-network interfaces
broadcast: simplex point-to-multipoint mode of transmission
ETSI
9 ETSI EN 300 175-1 V2.5.1 (2013-08)
C-plane: control plane of the DECT protocol stacks, which contains all of the internal DECT protocol control, but may
also include some external user information
call: all of the Network (NWK) layer processes involved in one NWK layer peer-to-peer association
cell: domain served by a single antenna(e) system (including a leaky feeder) of one FP
Central Control Fixed Part (CCFP): physical grouping that contains the central elements of a FP
centrex: implementation of a private telecommunication network exchange that is not located on the premises of the
private network operator
Cipher Block Chaining Message Authentication Code (CBC-MAC): cryptographic technique for constructing a
message authentication code from a block cipher
Cipher Key (CK): value that is used to determine the transformation of plaintext to ciphertext in a cryptographic
algorithm
Cipher Key (CK) generation: process for generating cryptographic keys
ciphertext: output of a cryptographic algorithm
channel: See physical channel.
cluster: logical grouping of one or more cells between which bearer handover is possible
confidentiality: rendering information secret as ciphertext unless the capability is possessed to recover the plaintext
from ciphertext
connection: See MAC connection.
connection handover: internal handover process provided by the DLC layer, whereby one set of DLC entities (C-plane
and U-plane) can re-route data from one MAC connection to a second new MAC connection, while maintaining the
service provided to the NWK layer
ConnectionLess mode (C/L): transmission mode that transfers one packet (one self contained unit) of data from one
source point to one (or more) destination points in a single phase
Connection Oriented mode (C/O): transmission mode that transfers data from one source point to one or more
destination points using a protocol based on three phases:
• "Set-up";
• "Data transfer"; and
• "Release".
Cordless Radio Fixed Part (CRFP): Wireless Relay Station (WRS) that provides independent bearer control to a PT
and FT for relayed connections
Counter with CBC-MAC (CCM): authenticated encryption algorithm designed to provide both authentication and
confidentiality
countermeasure: device, instrument or procedure used to counteract or defend against a threat
coverage area: area over which reliable communication can be established and maintained
cryptography: secret writing
Data Encryption Standard (DES): United States Federal data encryption standard
Data Link Control (DLC): layer 2b of the DECT protocol stack
decipherment: rendering of ciphertext into plaintext
DECT NetWork (DNW): network that uses the DECT air interface to interconnect a local network to one or more
portable applications
ETSI
10 ETSI EN 300 175-1 V2.5.1 (2013-08)
DECT Standard Authentication Algorithm (DSAA): algorithm used for authentication in DECT
DECT Standard Authentication Algorithm #2 (DSAA2): algorithm used for authentication in DECT
DECT Standard Cipher (DSC): algorithm used for data encryption in DECT
DECT Standard Cipher #2 (DSC2): algorithm used for data encryption in DECT
Default Cipher Key (DefCK): Derived Cipher Key (DCK) that is stored in both FP and PP to be used later by MAC to
immediately encrypt with connection establishment
Derived Cipher Key (DCK): Cipher Key (CK) that is established as part of the procedure used to authenticate the PT
distributed communication: ability of a DECT terminal to provide means for or assist direct communication between
any two terminals, members of a "closed" local DECT network
DLC broadband data link: link that can be associated with a logical MAC connection comprising a number of MAC
(physical) connections
DLC broadcast: simplex "connectionless" mode of transmission from the DLC broadcast entity of one FT to the DLC
broadcast entities in one or more PT
DLC data link (DLC link): association between two DLC layer entities
DLC frame: format used to structure all messages that are exchanged between DLC layer peer entities
double duplex bearer: use of two duplex bearers (see duplex bearer) which refer to the same MAC connection, sharing
their simplex bearers (see simplex bearer) for the information flow
double-simplex bearer: use of two simplex bearers operating in the same direction on two physical channels
th
double slot: one 12 of a TDMA frame which is used to support one high capacity physical channel
down-link: transmission in the direction FT to PT
duplex bearer: use of two simplex bearers operating in opposite directions on two physical channels
encipherment: rendering of plaintext into ciphertext
End System (ES): logical grouping that contains application processes and supports telecommunication services
expedited (messages, procedures, operations): MAC C/O operations (messages, procedures, operations) intended for
ultra fast setup and release of bearers, allowing in most cases reduction in the number of messages and early or late
U-plane transmission compared to regular procedures
expedited connections: advanced connections able to use the expedited messages of the advanced connection control
part 2 set and their associate procedures for bearer setup and release
extended MAC control messages: MAC messages of the B-field connection control set
external handover: process of switching a call in progress from one FP to another FP
Fast Encryption Algorithm (FEAL algorithm): particular encryption algorithm in the public domain
field: continuous region of data (i.e. adjacent bits) that jointly convey information
fixed geometry Portable Part (PP): PP in which the electro-acoustic transducers and their associated acoustic
components are held in fixed relative positions and/or orientations during all on-line conditions and test conditions of
the PP
Fixed Part (DECT Fixed Part) (FP): physical grouping that contains all of the elements in the DECT network
between the local network and the DECT air interface
Fixed radio Termination (FT): logical group of functions that contains all of the DECT processes and procedures on
the fixed side of the DECT air interface
flow control: mechanism that is used to regulate the flow of data between two peer entities
ETSI
11 ETSI EN 300 175-1 V2.5.1 (2013-08)
fragment: one of the Service Data Units (SDUs) that is produced by the process of fragmentation
fragmentation: process of dividing a Protocol Data Unit (PDU) into more than one SDU for delivery to a lower layer
frame: See TDMA frame or DLC frame.
th
full slot (slot): one 24 of a TDMA frame which is used to support one physical channel
generic: generalized set or general purpose set, often in the sense of basic or ordinary
Generic Access Profile (GAP): standard in addition to the DECT CI that ensures interoperability between FPs and PPs
from different manufacturers
geographically unique: two FPs with the same PARI, or respectively two RFPs with the same RFPI, cannot be reached
or listened to at the same geographical position
Global NetWork (GNW): telecommunication network capable of offering a long distance telecommunication service
globally unique identity: identity is unique within DECT (without geographical or other restrictions)
guard space: nominal interval between the end of a radio transmission in a given slot and the start of a radio
transmission in the next successive slot
th
half slot: one 48 of a TDMA frame which is used to support one physical channel
handover: process of switching a call in progress from one physical channel to another physical channel
handset echo: echo, perceptible by the far-end user, resulting from the coupling between the receiving and sending
directions of the handset, mostly due to acoustic coupling between transducers
Headset PP (HPP): headset PP is a wireless headset telephone using the DECT air interface
NOTE: A HPP usually has only one speaker and one microphone combined with a limited set of keys (e.g. call
button, volume plus, and volume minus). Headsets provide the equivalent functionality of a PP with
hands-free operation.
Home Automation Network: network that connects all sensors and actors in a house or apartment, providing
interoperability for devices of different vendors and typically has a connection to the Internet. The Home Automation
Network is used for various applications, from Home Automation and Security to Climate Control and Energy
Management.
Hybrid Part (HyP): DECT terminal that provides FT as well as PT capabilities
impersonation: where one identity claims the part of another identity
incoming call: call received at a PP
Integrated Services Digital Network (ISDN): digital telecommunications infrastructure to the Consultative
Committee on International Telegraphy and Telephony (CCITT) standards
intercell handover: switching of a call in progress from one cell to another cell
internal call: call between 2 users that does not make use of the local network resources
internal handover: handover processes that are completely internal to one FT
International Portable User Identity (IPUI): identity that uniquely defines one user within the domain defined by his
access rights related to this IPUI
interoperability: capability of FPs and PPs, that enable a PP to obtain access to teleservices in more than one location
area and/or from more than one operator (more than one service provider)
interoperator roaming: roaming between FP coverage areas of different operators (different service providers)
InterWorking Unit (IWU): unit that is used to interconnect subnetworks
ETSI
12 ETSI EN 300 175-1 V2.5.1 (2013-08)
intracell handover: switching of a call in progress from one physical channel of one cell to another physical channel of
the same cell
intraoperator roaming: roaming between different FP coverage areas of the same operator (same service provider)
isochronous: essential characteristic of a time-scale or a signal such that the time intervals between consecutive
significant instants either have the same duration or durations that are integral multiples of the shortest duration
key management: way in which cryptographic keys are generated, distributed and used
Key Stream Generator (KSG): cryptographic algorithm which produces a stream of binary digits which can be used
for encipherment and decipherment
link: See DLC data link.
Local Area Network (LAN): electronic systems which are interconnected and in physical proximity to each other
Local Network (LNW): telecommunication network capable of offering local telecommunication services
locally unique identity: identity is unique within one FP or location area, depending on application
location area: domain in which a PP may receive (and/or make) calls as a result of a single location registration
location registration: process whereby the position of a DECT portable termination is determined to the level of one
location area, and this position is updated in one or more databases
logical channel: generic term for any distinct data path
logical connection: association between two instances of the MAC MBC that can be used by higher layers to exchange
U-plane or C-plane data
Lower Layer Management Entity (LLME): management entity that spans a number of lower layers, and is used to
describe all control activities which do not follow the rules of layering
Lower Tester (LT): logical grouping that contains the test equipment, a functionally equivalent DECT PT, a
functionally equivalent DECT FT and a test controller
MAC bearer (bearer): service element that is provided by each Cell Site Function (CSF)
MAC connection (connection): association between one source MAC Multi-Bearer Control (MBC) entity and one
destination MAC MBC entity
Machine-to-Machine (M2M) solution: combination of devices, software and services that operate with little or no
human interaction
masquerading: where one identity plays the part of, or acts as, another identity
Medium Access Control (MAC): layer 2a of the DECT protocol stack
Message Authentication Code (CCM): short piece of information generated by a cryptographic function used to
authenticate and to protect the data integrity of a message
Message Integrity Code (CCM): alternative name for the Message Authentication Code
minimal MMS-message attributes: message meta-information used in the request-to-send, etc.
MMS-message attributes: message meta-information
mobility class 1: local area applications, for which terminals are pre-registered off-air with one or more specific fixed
parts, and establishment of service and user parameters is therefore implicit, according to a profile-defined list
mobility class 2: private and public roaming applications for which terminals may move between FPs within a given
domain and for which association of service parameters is explicit at the time of service request
multiframe: repeating sequence of 16 successive TDMA frames, that allows low rate or sporadic information to be
multiplexed (e.g. basic system information or paging)
ETSI
13 ETSI EN 300 175-1 V2.5.1 (2013-08)
Multimedia Messaging Service (MMS): generic set of commands, information elements and functionality for
file/messaging service
mutual authentication: where two entities corroborate the identity of each other
network (telecommunication network): all the means of providing telecommunication services between a number of
locations where the services are accessed via equipment attached to the network
network echo: echo, perceptible by the DECT user, resulting from reflections in the network. It is mostly due to hybrid
impairments at both ends of the communication
New Generation DECT: further development of the DECT standard introducing wideband speech, improved data
services, new slot types and other technical enhancements
node: point at which switching occurs
operator (DECT operator): individual or entity who or which is responsible for operation of one or more DECT FPs
outgoing call: call originating from a PP
Packet Data Protocol (PDP): terminology used in GPRS and 3GPP that refers to any of the data protocols transported
over the radio packet service (IP, X.25, etc.)
paging: process of broadcasting a message from a DECT FP to one or more DECT PPs
paging area: domain in which the PP will be paged as a part of incoming call establishment
PARK Length Indicator (PLI): associates a group of FP ARIs to the PARK, by indicating how many of the first
ARC + ARD bits are relevant
PDP context: terminology used in GPRS and 3GPP to denote the context associated to a packet data connection. It is
equivalent to "virtual circuit"
Permanent Virtual Circuit (PVC): Virtual Circuit that can be established and cleared only by configuration
Personal Identity Number (PIN): short sequence of numbers (usually 4 to 8 digits) which may be used in an
authentication process to prove identity
phase: one discrete part of a procedure, where the start and end of the part can be clearly identified (e.g. by the arrival
or dispatch of a primitive)
Physical (PHY): layer 1 of the DECT protocol stack
physical channel (channel): simplex channel that is created by transmitting in one particular slot on one particular RF
channel in successive TDMA frames
plaintext: information or data which is intelligible to everyone
Portable Access Rights Key (PARK): this states the access rights for a PP
Portable Application (PA): logical grouping that contains all the elements that lie beyond the DECT network
boundary on the portable side
Portable HandSet (PHS): single physical grouping that contains all of the portable elements that are needed to provide
a teleservice to the user
Portable Part (DECT Portable Part) (PP): physical grouping that contains all elements between the user and the
DECT air interface
Portable radio Termination (PT): logical group of functions that contains all of the DECT processes and procedures
on the portable side of the DECT air interface
Portable User Number (PUN): globally or locally unique number within one PUT
Portable User Type (PUT): this shows the numbering plan structure of a PUN
Primary Access Rights Identity (PARI): most frequently transmitted ARI
ETSI
14 ETSI EN 300 175-1 V2.5.1 (2013-08)
primitive: distinct (but abstract) data element that is passed between adjacent protocol layers
private: attribute indicating that the application of the so qualified term, e.g. a network, an equipment, a service, is
offered to, or is in the interest of, a determined set of users
proprietary algorithm: algorithm which is the intellectual property of a legal entity
public: attribute indicating that the application of the so qualified term, e.g. a network, an equipment, a service, is
offered to, or is in the interest of, the general public
Public Access Profile (PAP): profile which ensures interoperability between FPs and PPs for public access services
public access service: service that provides access to a public network for the general public
public key algorithm: cryptographic algorithm in which a different key is used for encipherment and for decipherment
radio channel: See RF channel or physical channel.
radio end point: physical grouping that contains one radio transceiver (transmitter/receiver), fixed or portable
Radio Fixed Part (RFP): one physical sub-group of a FP that contains all the radio end points (one or more) that are
connected to a single system of antennas
Radio Fixed Part Identity (RFPI): identity frequently transmitted by every RFP:
• PARI;
• the RFPs local identity within that FP;
• domains for handover and location areas.
random number: number generated by a non-deterministic process
registration: See either location registration or subscription registration.
REpeater Part (REP): WRS that relays information within the half frame time interval
Resume: procedure to re-establish the physical connection for a logical connection in suspended state
Resumed state: state of an established Logical connection, open at MB, DLC and NWK, with active TBCs and
physical layer
RF carrier (carrier): centre frequency occupied by one DECT transmission
RF channel: nominal range of frequencies (RF spectrum) allocated to the DECT transmissions of a single RF carrier
roaming: movement of a PP from one FP coverage area to another FP coverage area, where the capabilities of the FPs
enable the PP to make or receive calls in both areas
roaming service: service which can be used in more than one FP coverage area
RS: a cryptographic parameter used for the calculation of authentication session keys
RS : 128 bit variant of RS
RS ': the RS used for the generation of KS'
128 128
RS1 / RS2: components of RS when RS is assembled from two parts
128 128
Rivest, Shamir and Adleman (RSA) algorithm: public key algorithm
Secondary Access Rights Identity (SARI): less frequently broadcast than the PARI
security attribute: protocol element indicating security services, mechanisms, processes or algorithms that are
supported
segment: one of the pieces of data that is produced by the process of segmentation
ETSI
15 ETSI EN 300 175-1 V2.5.1 (2013-08)
segmentation: process of partitioning one SDU from a higher layer into more than one PDU
Session Key (KS): key which is used only for a single session
service call: call initiated by a DECT PT for entering of FT related service and adjustment procedures in a transparent
way
service provider (telecommunications service provider): individual, or entity, who, or which, interfaces to the
customer in providing telecommunications service
service type A: low speed frame relay, with a net sustainable throughput of up to 24 kbit/s, optimized for burst data,
low power consumption and low complexity applications such as hand-portable equipment
service type B: high performance frame relay, with a net sustainable throughput of up to 552 kbit/s, optimized for high
speed and low latency with burst data
service type C: non-transparent connection of data streams requiring Link Access Protocol (LAP) services, optimized
for high reliability and low additional complexity
service type D: non-transparent service that supports Isochronous Data Bearer Services and is suitable for transparent
transfer of isochronous data streams
service type E: short message transfer or paging service which may be unacknowledged or acknowledged, optimized
for small SDUs, low PP complexity and ultra-low power consumption
service type F: application profile specifically supporting teleservices such as fax, building upon the services offered
by the type A/B and C profiles, optimized for terminal simplicity, spectrum efficiency and network flexibility
sequencing (sequence numbering): process of adding a sequence number to a set of data packets so that the packets
can be reassembled in the correct order, regardless of the order they are received
simplex bearer: simplex bearer is the MAC layer service that is created using one physical channel
Single Radio Fixed Part (SRFP): radio FP that contains only one radio end point
stream cipher: algorithm in which the output is combined bit by bit with plaintext to produce the ciphertext
Subscriber Interface Module (SIM): smart card used for authentication in GSM
subscriber (customer): natural person or juristic person who has subscribed to telecommunication services, and is,
therefore, responsible for payment
subscription registration: infrequent process whereby a subscriber obtains access rights to one or more FPs
super-wideband speech: voice service with enhanced quality compared to ADPCM G.726 and allowing the
transmission of a maximum vocal frequency of at least 14 kHz
Supplementary Service (SS): service that modifies or supplements a basic telecommunication service:
1) DECT TRANSPARENT supplementary services:
- the service elements are unspecified within EN 300 175;
2) DECT STANDARD supplementary services:
- the service elements are specified within EN 300 175 by reference to other standards;
3) DECT SPECIFIC supplementary services:
- the service elements are fully specified within EN 300 175.
suspend: procedure to release the physical connection without releasing the logical connection
suspended state: state of an established logical connection open at MBC, DLC and NWK but with no associated TBCs
and physical layer resources
ETSI
16 ETSI EN 300 175-1 V2.5.1 (2013-08)
switching: process of interconnecting functional units, transmission channels or telecommunication circuits for as long
as required to convey signals
symmetric algorithm: cryptographic algorithm in which the same key is used for both encipherment and decipherment
synchronization: methods used to ensure that time correspondence exists between processes to ensure that data is not
repeated or lost
synchronous: essential characteristics of time-scales or signals such that their corresponding significant instants occur
at precisely the same average rate
synchronous transmission: transmission using isochronous signals in which the sending and receiving instruments are
operating continuously in a constant time difference between corresponding significant instants
TDMA frame: time-division multiplex of 10 ms duration containing 24 successive full slots
telecommunication: any transmission and/or emission and/or reception of signals representing signs, writings, images,
and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic systems
teleservice: type of telecommunication service that provides the complete capability, including terminal equipment
functions, for communication between users, according to protocols that are established by agreement
Tertiary Access Rights Identity (TARI): available as
...


2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI) - Part 1: Overview33.070.30'(&7Digital Enhanced Cordless Telecommunications (DECT)ICS:Ta slovenski standard je istoveten z:EN 300 175-1 Version 2.5.1SIST EN 300 175-1 V2.5.1:2013en01-oktober-2013SIST EN 300 175-1 V2.5.1:2013SLOVENSKI
STANDARD
European Standard SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 2
Reference REN/DECT-000268-1 Keywords 7 kHz, audio, broadband, CODEC, DECT, handsfree, IMT-2000, loudspeaking, mobility, narrowband, quality, radio, speech, TDD, TDMA, telephony, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88
Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2013. All rights reserved.
DECTTM, PLUGTESTSTM, UMTSTM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association. SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 3 Contents Intellectual Property Rights . 4 Foreword . 4 1 Scope . 6 2 References . 6 2.1 Normative references . 6 2.2 Informative references . 7 3 Definitions, symbols and abbreviations . 8 3.1 Definitions . 8 3.2 Symbols and abbreviations . 17 4 Structure . 23 4.1 Part 1: Overview . 23 4.2 Part 2: Physical Layer (PHL) . 24 4.3 Part 3: Medium Access Control (MAC) layer . 24 4.4 Part 4: Data Link Control (DLC) layer . 24 4.5 Part 5: Network (NWK) layer . 24 4.6 Part 6: Identities and addressing . 24 4.7 Part 7: Security features . 24 4.8 Part 8: Speech and audio coding and transmission . 25 5 The objectives of the CI standard . 25 6 General description of the system . 26 7 Description of the protocol architecture . 28 7.1 General . 28 7.2 The DECT layered structure . 28 7.3 Physical Layer (PHL) . 28 7.4 MAC layer . 29 7.5 DLC layer . 29 7.6 Network (NWK) layer . 29 7.7 Lower Layer Management Entity (LLME) . 29 7.8 Interworking Units (IWU) . 30 8 Proprietary escapes within the CI . 30 8.1 Primary escape routes . 30 8.2 Secondary escape routes . 31 9 Levels of conformance . 31 10 Further development of the DECT standard . 31 10.1 IMT-2000 . 31 10.2 The DECT Packet Radio Service (DPRS) . 31 10.3 DECT in international markets . 32 10.3.1 United States of America . 32 10.4 The New Generation DECT (NG-DECT) . 32 10.5 DECT Ultra Low Energy (ULE) . 33 Annex A (informative): Bibliography . 35 Annex B (informative): Change history . 36 History . 37
ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This European Standard (EN) has been produced by ETSI Technical Committee Digital Enhanced Cordless Telecommunications (DECT). The present document is part 1 of a multi-part deliverable covering the Common Interface (CI) for the Digital Enhanced Cordless Telecommunications (DECT), as identified below: Part 1: "Overview"; Part 2: "Physical Layer (PHL)"; Part 3: "Medium Access Control (MAC) layer"; Part 4: "Data Link Control (DLC) layer"; Part 5: "Network (NWK) layer"; Part 6: "Identities and addressing"; Part 7: "Security features"; Part 8: "Speech and audio coding and transmission". The following aspects of the present document are subject to controlled distribution: a) DECT identities, as defined in EN 300 175-6 [6]; b) Some DECT cryptographic algorithms. The cryptographic algorithms subjected to controlled distribution specify the details of the DECT Standard Authentication Algorithm (DSAA) and the DECT Standard Cipher (DSC). The cryptographic algorithms DECT Standard Authentication Algorithm #2 (DSAA2) and DECT Standard Cipher #2 (DSC2) are not subjected to controlled distribution. These aspects are distributed on an individual basis. Further information and details of the current distribution procedures can be obtained from the ETSI Secretariat at the address on the second page of the present document. Further details of the DECT system may be found in TR 101 178 [i.4], ETR 043 [i.5] and TR 102 185 [i.6].
ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 5 National transposition dates Date of adoption of this EN: 20 August 2013 Date of latest announcement of this EN (doa): 30 November 2013 Date of latest publication of new National Standard or endorsement of this EN (dop/e):
31 May 2014 Date of withdrawal of any conflicting National Standard (dow): 31 May 2014
ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 6 1 Scope The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document contains an abstract of the other parts of the DECT standard together with a general description of: • the objectives of the present document; • the DECT Common Interface; • the protocol architecture of DECT. The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the technical terms used in different parts of the present document. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. [1] Void. [2] ETSI EN 300 175-2: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 2: Physical Layer (PHL)". [3] ETSI EN 300 175-3: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer". [4] ETSI EN 300 175-4: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 4: Data Link Control (DLC) layer". [5] ETSI EN 300 175-5: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer". [6] ETSI EN 300 175-6: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 6: Identities and addressing". [7] ETSI EN 300 175-7: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features". [8] ETSI EN 300 175-8: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 8: Speech and audio coding and transmission". SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 7 [9] ETSI EN 300 176 (all parts): "Digital Enhanced Cordless Telecommunications (DECT); Test specification". [10] Recommendation ITU-R M.1457-10: "Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications-2000 (IMT-2000)". [11] ETSI EN 301 649: "Digital Enhanced Cordless Telecommunications (DECT); DECT Packet Radio Service (DPRS)". [12] ETSI TS 102 497: "Digital Enhanced Cordless Telecommunications (DECT); DECT in the 1 920 MHz to 1 930 MHz Unlicensed Personal Communications Services (UPCS) frequency band; Specific requirements". 2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] ETSI EN 300 403-1: "Integrated Services Digital Network (ISDN); Digital Subscriber Signalling System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call control; Part 1: Protocol specification [ITU-T Recommendation Q.931 (1993), modified]". [i.2] Recommendation ITU-R SM.1046-2: "Definition of spectrum use and efficiency of a radio system". [i.3] Recommendation ITU-R M.816-1: "Framework for services supported on International Mobile Telecommunications-2000 (IMT-2000)". [i.4] ETSI TR 101 178: "Digital Enhanced Cordless Telecommunications (DECT); A High Level Guide to the DECT Standardization". [i.5] ETSI ETR 043: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Services and facilities requirements specification". [i.6] ETSI TR 102 185: "Digital Enhanced Cordless Telecommunications (DECT); Data Services Profile (DSP); Profile overview". [i.7] ETSI ETR 310: "Digital Enhanced Cordless Telecommunications (DECT); Traffic capacity and spectrum requirements for multi-system and multi-service DECT applications co-existing in a common frequency band". [i.8] ETSI TS 102 265: "Digital Enhanced Cordless Telecommunications (DECT); DECT access to IP networks". [i.9] Recommendation ITU-T P.311: "Transmission characteristics for wideband (150-7000 Hz) digital handset telephones". [i.10] ETSI TR 102 570: "Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Overview and Requirements". [i.11] ETSI TS 102 527-1: "Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Part 1: Wideband Speech". [i.12] ETSI TS 102 527-2: "Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Part 2: Support of transparent IP packet data". [i.13] ETSI TS 102 527-3: "Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Part 3: Extended wideband speech services". [i.14] ETSI TS 102 527-4: "Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Part 4: Light Data Services; Software Update Over The Air (SUOTA), content downloading and HTTP based applications". [i.15] ETSI TS 102 527-5: " Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Part 5: Additional feature set nr. 1 for extended wideband speech services". SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 8 [i.16] Recommendation ITU-T V.42: "Error-correcting procedures for DCEs using asynchronous-to-synchronous conversion". [i.17] Recommendation ITU-T V.24: "List of definitions for interchange circuits between Data Terminal Equipment (DTE) and data circuit-terminating equipment (DCE)". [i.18] ETSI TS 102 939-1: "Digital Enhanced Cordless Telecommunications (DECT); Ultra
Low Energy (ULE); Machine to Machine Communications; Part 1: Home Automation Network (phase 1)". 3 Definitions, symbols and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: Access Rights Class (ARC): type of access to a DECT network, such as public, residential or private Access Rights Details (ARD): unique number within one ARC Access Rights Identity (ARI): globally unique identity that shows the access rights related to a service provider NOTE: PARI = Primary ARI; SARI = Secondary ARI; TARI = Tertiary ARI. algorithm: mathematical process or function that transforms an input into an output algorithm identifier: designator to show which algorithm is in use, so that the correct one may be chosen antenna diversity: diversity implies that the Radio Fixed Part (RFP) for each bearer independently can select different antenna properties such as gain, polarization, coverage patterns and other features that may affect the practical coverage NOTE: A typical example is space diversity, provided by two vertically polarized antennas separated by 10 cm to 20 cm. asymmetric algorithm: See public key algorithm. attach: process whereby a Portable Part (PP) within the coverage area of a Fixed Part (FP) to which it has access rights, notifies the FP that it is operative authentication: corroboration that an entity is the one that is claimed authentication of Fixed radio Termination (FT): process whereby the identity of an FT is verified to a DECT PT authentication of Portable radio Termination (PT): process whereby a DECT PT is positively verified to be a legitimate user of a particular FP authentication (of a subscriber): process whereby a DECT subscriber is positively verified to be a legitimate user of a particular FP authentication of user: process whereby a DECT user is positively verified to be a legitimate user of a particular FP bearer: See Medium Access Control (MAC) bearer or bearer service. bearer handover: internal handover process provided by the MAC layer, whereby one MAC connection can modify its underlying bearers while maintaining the service provided to the Data Link Control (DLC) layer bearer service: type of telecommunication service that provides a defined capability for the transmission of signals between user-network interfaces broadcast: simplex point-to-multipoint mode of transmission SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 9 C-plane: control plane of the DECT protocol stacks, which contains all of the internal DECT protocol control, but may also include some external user information call: all of the Network (NWK) layer processes involved in one NWK layer peer-to-peer association cell: domain served by a single antenna(e) system (including a leaky feeder) of one FP Central Control Fixed Part (CCFP): physical grouping that contains the central elements of a FP centrex: implementation of a private telecommunication network exchange that is not located on the premises of the private network operator Cipher Block Chaining Message Authentication Code (CBC-MAC): cryptographic technique for constructing a message authentication code from a block cipher Cipher Key (CK): value that is used to determine the transformation of plaintext to ciphertext in a cryptographic algorithm Cipher Key (CK) generation: process for generating cryptographic keys ciphertext: output of a cryptographic algorithm channel: See physical channel. cluster: logical grouping of one or more cells between which bearer handover is possible confidentiality: rendering information secret as ciphertext unless the capability is possessed to recover the plaintext from ciphertext connection: See MAC connection. connection handover: internal handover process provided by the DLC layer, whereby one set of DLC entities (C-plane and U-plane) can re-route data from one MAC connection to a second new MAC connection, while maintaining the service provided to the NWK layer ConnectionLess mode (C/L): transmission mode that transfers one packet (one self contained unit) of data from one source point to one (or more) destination points in a single phase Connection Oriented mode (C/O): transmission mode that transfers data from one source point to one or more destination points using a protocol based on three phases: • "Set-up"; • "Data transfer"; and • "Release". Cordless Radio Fixed Part (CRFP): Wireless Relay Station (WRS) that provides independent bearer control to a PT and FT for relayed connections Counter with CBC-MAC (CCM): authenticated encryption algorithm designed to provide both authentication and confidentiality countermeasure: device, instrument or procedure used to counteract or defend against a threat coverage area: area over which reliable communication can be established and maintained cryptography: secret writing Data Encryption Standard (DES): United States Federal data encryption standard Data Link Control (DLC): layer 2b of the DECT protocol stack decipherment: rendering of ciphertext into plaintext DECT NetWork (DNW): network that uses the DECT air interface to interconnect a local network to one or more portable applications SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 10 DECT Standard Authentication Algorithm (DSAA): algorithm used for authentication in DECT DECT Standard Authentication Algorithm #2 (DSAA2): algorithm used for authentication in DECT DECT Standard Cipher (DSC): algorithm used for data encryption in DECT DECT Standard Cipher #2 (DSC2): algorithm used for data encryption in DECT Default Cipher Key (DefCK): Derived Cipher Key (DCK) that is stored in both FP and PP to be used later by MAC to immediately encrypt with connection establishment Derived Cipher Key (DCK): Cipher Key (CK) that is established as part of the procedure used to authenticate the PT distributed communication: ability of a DECT terminal to provide means for or assist direct communication between any two terminals, members of a "closed" local DECT network DLC broadband data link: link that can be associated with a logical MAC connection comprising a number of MAC (physical) connections DLC broadcast: simplex "connectionless" mode of transmission from the DLC broadcast entity of one FT to the DLC broadcast entities in one or more PT DLC data link (DLC link): association between two DLC layer entities DLC frame: format used to structure all messages that are exchanged between DLC layer peer entities double duplex bearer: use of two duplex bearers (see duplex bearer) which refer to the same MAC connection, sharing their simplex bearers (see simplex bearer) for the information flow double-simplex bearer: use of two simplex bearers operating in the same direction on two physical channels double slot: one 12th of a TDMA frame which is used to support one high capacity physical channel down-link: transmission in the direction FT to PT duplex bearer: use of two simplex bearers operating in opposite directions on two physical channels encipherment: rendering of plaintext into ciphertext End System (ES): logical grouping that contains application processes and supports telecommunication services expedited (messages, procedures, operations): MAC C/O operations (messages, procedures, operations) intended for ultra fast setup and release of bearers, allowing in most cases reduction in the number of messages and early or late U-plane transmission compared to regular procedures expedited connections: advanced connections able to use the expedited messages of the advanced connection control part 2 set and their associate procedures for bearer setup and release extended MAC control messages: MAC messages of the B-field connection control set external handover: process of switching a call in progress from one FP to another FP Fast Encryption Algorithm (FEAL algorithm): particular encryption algorithm in the public domain field: continuous region of data (i.e. adjacent bits) that jointly convey information fixed geometry Portable Part (PP): PP in which the electro-acoustic transducers and their associated acoustic components are held in fixed relative positions and/or orientations during all on-line conditions and test conditions of the PP Fixed Part (DECT Fixed Part) (FP): physical grouping that contains all of the elements in the DECT network between the local network and the DECT air interface Fixed radio Termination (FT): logical group of functions that contains all of the DECT processes and procedures on the fixed side of the DECT air interface flow control: mechanism that is used to regulate the flow of data between two peer entities SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 11 fragment: one of the Service Data Units (SDUs) that is produced by the process of fragmentation fragmentation: process of dividing a Protocol Data Unit (PDU) into more than one SDU for delivery to a lower layer frame: See TDMA frame or DLC frame. full slot (slot): one 24th of a TDMA frame which is used to support one physical channel generic: generalized set or general purpose set, often in the sense of basic or ordinary Generic Access Profile (GAP): standard in addition to the DECT CI that ensures interoperability between FPs and PPs from different manufacturers geographically unique: two FPs with the same PARI, or respectively two RFPs with the same RFPI, cannot be reached or listened to at the same geographical position Global NetWork (GNW): telecommunication network capable of offering a long distance telecommunication service globally unique identity: identity is unique within DECT (without geographical or other restrictions) guard space: nominal interval between the end of a radio transmission in a given slot and the start of a radio transmission in the next successive slot half slot: one 48th of a TDMA frame which is used to support one physical channel handover: process of switching a call in progress from one physical channel to another physical channel handset echo: echo, perceptible by the far-end user, resulting from the coupling between the receiving and sending directions of the handset, mostly due to acoustic coupling between transducers Headset PP (HPP): headset PP is a wireless headset telephone using the DECT air interface NOTE: A HPP usually has only one speaker and one microphone combined with a limited set of keys (e.g. call button, volume plus, and volume minus). Headsets provide the equivalent functionality of a PP with hands-free operation. Home Automation Network: network that connects all sensors and actors in a house or apartment, providing interoperability for devices of different vendors and typically has a connection to the Internet. The Home Automation Network is used for various applications, from Home Automation and Security to Climate Control and Energy Management. Hybrid Part (HyP): DECT terminal that provides FT as well as PT capabilities impersonation: where one identity claims the part of another identity incoming call: call received at a PP Integrated Services Digital Network (ISDN): digital telecommunications infrastructure to the Consultative Committee on International Telegraphy and Telephony (CCITT) standards intercell handover: switching of a call in progress from one cell to another cell internal call: call between 2 users that does not make use of the local network resources internal handover: handover processes that are completely internal to one FT International Portable User Identity (IPUI): identity that uniquely defines one user within the domain defined by his access rights related to this IPUI interoperability: capability of FPs and PPs, that enable a PP to obtain access to teleservices in more than one location area and/or from more than one operator (more than one service provider) interoperator roaming: roaming between FP coverage areas of different operators (different service providers) InterWorking Unit (IWU): unit that is used to interconnect subnetworks SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 12 intracell handover: switching of a call in progress from one physical channel of one cell to another physical channel of the same cell intraoperator roaming: roaming between different FP coverage areas of the same operator (same service provider) isochronous: essential characteristic of a time-scale or a signal such that the time intervals between consecutive significant instants either have the same duration or durations that are integral multiples of the shortest duration key management: way in which cryptographic keys are generated, distributed and used Key Stream Generator (KSG): cryptographic algorithm which produces a stream of binary digits which can be used for encipherment and decipherment link: See DLC data link. Local Area Network (LAN): electronic systems which are interconnected and in physical proximity to each other Local Network (LNW): telecommunication network capable of offering local telecommunication services locally unique identity: identity is unique within one FP or location area, depending on application location area: domain in which a PP may receive (and/or make) calls as a result of a single location registration location registration: process whereby the position of a DECT portable termination is determined to the level of one location area, and this position is updated in one or more databases logical channel: generic term for any distinct data path logical connection: association between two instances of the MAC MBC that can be used by higher layers to exchange U-plane or C-plane data Lower Layer Management Entity (LLME): management entity that spans a number of lower layers, and is used to describe all control activities which do not follow the rules of layering Lower Tester (LT): logical grouping that contains the test equipment, a functionally equivalent DECT PT, a functionally equivalent DECT FT and a test controller MAC bearer (bearer): service element that is provided by each Cell Site Function (CSF) MAC connection (connection): association between one source MAC Multi-Bearer Control (MBC) entity and one destination MAC MBC entity Machine-to-Machine (M2M) solution: combination of devices, software and services that operate with little or no human interaction masquerading: where one identity plays the part of, or acts as, another identity Medium Access Control (MAC): layer 2a of the DECT protocol stack Message Authentication Code (CCM): short piece of information generated by a cryptographic function used to authenticate and to protect the data integrity of a message Message Integrity Code (CCM): alternative name for the Message Authentication Code minimal MMS-message attributes: message meta-information used in the request-to-send, etc. MMS-message attributes: message meta-information mobility class 1: local area applications, for which terminals are pre-registered off-air with one or more specific fixed parts, and establishment of service and user parameters is therefore implicit, according to a profile-defined list mobility class 2: private and public roaming applications for which terminals may move between FPs within a given domain and for which association of service parameters is explicit at the time of service request multiframe: repeating sequence of 16 successive TDMA frames, that allows low rate or sporadic information to be multiplexed (e.g. basic system information or paging) SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 13 Multimedia Messaging Service (MMS): generic set of commands, information elements and functionality for file/messaging service mutual authentication: where two entities corroborate the identity of each other network (telecommunication network): all the means of providing telecommunication services between a number of locations where the services are accessed via equipment attached to the network network echo: echo, perceptible by the DECT user, resulting from reflections in the network. It is mostly due to hybrid impairments at both ends of the communication New Generation DECT: further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements node: point at which switching occurs operator (DECT operator): individual or entity who or which is responsible for operation of one or more DECT FPs outgoing call: call originating from a PP Packet Data Protocol (PDP): terminology used in GPRS and 3GPP that refers to any of the data protocols transported over the radio packet service (IP, X.25, etc.) paging: process of broadcasting a message from a DECT FP to one or more DECT PPs paging area: domain in which the PP will be paged as a part of incoming call establishment PARK Length Indicator (PLI): associates a group of FP ARIs to the PARK, by indicating how many of the first ARC + ARD bits are relevant PDP context: terminology used in GPRS and 3GPP to denote the context associated to a packet data connection. It is equivalent to "virtual circuit" Permanent Virtual Circuit (PVC): Virtual Circuit that can be established and cleared only by configuration Personal Identity Number (PIN): short sequence of numbers (usually 4 to 8 digits) which may be used in an authentication process to prove identity phase: one discrete part of a procedure, where the start and end of the part can be clearly identified (e.g. by the arrival or dispatch of a primitive) Physical (PHY): layer 1 of the DECT protocol stack physical channel (channel): simplex channel that is created by transmitting in one particular slot on one particular RF channel in successive TDMA frames plaintext: information or data which is intelligible to everyone Portable Access Rights Key (PARK): this states the access rights for a PP Portable Application (PA): logical grouping that contains all the elements that lie beyond the DECT network boundary on the portable side Portable HandSet (PHS): single physical grouping that contains all of the portable elements that are needed to provide a teleservice to the user Portable Part (DECT Portable Part) (PP): physical grouping that contains all elements between the user and the DECT air interface Portable radio Termination (PT): logical group of functions that contains all of the DECT processes and procedures on the portable side of the DECT air interface Portable User Number (PUN): globally or locally unique number within one PUT Portable User Type (PUT): this shows the numbering plan structure of a PUN Primary Access Rights Identity (PARI): most frequently transmitted ARI SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 14 primitive: distinct (but abstract) data element that is passed between adjacent protocol layers private: attribute indicating that the application of the so qualified term, e.g. a network, an equipment, a service, is offered to, or is in the interest of, a determined set of users proprietary algorithm: algorithm which is the intellectual property of a legal entity public: attribute indicating that the application of the so qualified term, e.g. a network, an equipment, a service, is offered to, or is in the interest of, the general public Public Access Profile (PAP): profile which ensures interoperability between FPs and PPs for public access services public access service: service that provides access to a public network for the general public public key algorithm: cryptographic algorithm in which a different key is used for encipherment and for decipherment radio channel: See RF channel or physical channel. radio end point: physical grouping that contains one radio transceiver (transmitter/receiver), fixed or portable Radio Fixed Part (RFP): one physical sub-group of a FP that contains all the radio end points (one or more) that are connected to a single system of antennas Radio Fixed Part Identity (RFPI): identity frequently transmitted by every RFP: • PARI; • the RFPs local identity within that FP; • domains for handover and location areas. random number: number generated by a non-deterministic process registration: See either location registration or subscription registration. REpeater Part (REP): WRS that relays information within the half frame time interval Resume: procedure to re-establish the physical connection for a logical connection in suspended state Resumed state: state of an established Logical connection, open at MB, DLC and NWK, with active TBCs and physical layer RF carrier (carrier): centre frequency occupied by one DECT transmission RF channel: nominal range of frequencies (RF spectrum) allocated to the DECT transmissions of a single RF carrier roaming: movement of a PP from one FP coverage area to another FP coverage area, where the capabilities of the FPs enable the PP to make or receive calls in both areas roaming service: service which can be used in more than one FP coverage area RS: a cryptographic parameter used for the calculation of authentication session keys RS128: 128 bit variant of RS RS128': the RS128 used for the generation of KS' RS1 / RS2: components of RS128 when RS128 is assembled from two parts Rivest, Shamir and Adleman (RSA) algorithm: public key algorithm Secondary Access Rights Identity (SARI): less frequently broadcast than the PARI security attribute: protocol element indicating security services, mechanisms, processes or algorithms that are supported segment: one of the pieces of data that is produced by the process of segmentation SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 15 segmentation: process of partitioning one SDU from a higher layer into more than one PDU Session Key (KS): key which is used only for a single session service call: call initiated by a DECT PT for entering of FT related service and adjustment procedures in a transparent way service provider (telecommunications service provider): individual, or entity, who, or which, interfaces to the customer in providing telecommunications service service type A: low speed frame relay, with a net sustainable throughput of up to 24 kbit/s, optimized for burst data, low power consumption and low complexity applications such as hand-portable equipment service type B: high performance frame relay, with a net sustainable throughput of up to 552 kbit/s, optimized for high speed and low latency with burst data service type C: non-transparent connection of data streams requiring Link Access Protocol (LAP) services, optimized for high reliability and low additional complexity service type D: non-transparent service that supports Isochronous Data Bearer Services and is suitable for transparent transfer of isochronous data streams service type E: short message transfer or paging service which may be unacknowledged or acknowledged, optimized for small SDUs, low PP complexity and ultra-low power consumption service type F: application profile specifically supporting teleservices such as fax, building upon the services offered by the type A/B and C profiles, optimized for terminal simplicity, spectrum efficiency and network flexibility sequencing (sequence numbering): process of adding a sequence number to a set of data packets so that the packets can be reassembled in the correct order, regardless of the order they are received simplex bearer: simplex bearer is the MAC layer service that is created using one physical channel Single Radio Fixed Part (SRFP): radio FP that contains only one radio end point stream cipher: algorithm in which the output is combined bit by bit with plaintext to produce the ciphertext Subscriber Interface Module (SIM): smart card used for authentication in GSM subscriber (customer): natural person or juristic person who has subscribed to telecommunication services, and is, therefore, responsible for payment subscription registration: infrequent process whereby a subscriber obtains access rights to one or more FPs super-wideband speech: voice service with enhanced quality compared to ADPCM G.726 and allowing the transmission of a maximum vocal frequency of at least 14 kHz Supplementary Service (SS): service that modifies or supplements a basic telecommunication service: 1) DECT TRANSPARENT supplementary services: - the service elements are unspecified within EN 300 175; 2) DECT STANDARD supplementary services: - the service elements are specified within EN 300 175 by reference to other standards; 3) DECT SPECIFIC supplementary services: - the service elements are fully specified within EN 300 175. suspend: procedure to release the physical connection without releasing the logical connection suspended state: state of an established logical connection open at MBC, DLC and NWK but with no associated TBCs and physical layer resources SIST EN 300 175-1 V2.5.1:2013

ETSI ETSI EN 300 175-1 V2.5.1 (2013-08) 16 switching: process of interconnecting functional units, transmission channels or telecommunication circuits for as long as required to convey signals symmetric algorithm: cryptographic algorithm in which the same key is used for both encipherment and decipherment synchronization: methods used to ensure that time correspondence exists between processes to ensure that data is not repeated or lost synchronous: essential characteristics of time-scales or signals such that their corresponding significant instants occur at precisely the same average rate synchronous transmission: transmission using isochronous signals in which the sending and receiving instruments are operating continuously in a constant time difference between corresponding significant instants TDMA frame: time-division multiplex of 10 ms duration containing 24 successive full slots telecommunication: any transmission and/or emission and/or reception of signals representing signs, writings, images, and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic systems teleservice: type of telecommunication service that provides the complete capability, including terminal equipment functions, for communication between users, according to protocols that are established by agreement Tertiary Access Rights Identity (TARI): available as a Yes/No answer upon a request including the wanted ARI, not broadcast at all threat: indication of coming evil TPUI domain: domain over which every TPUI is (locally) unique U-plane: user plane of the DECT protocol stacks Ultra Low Energy (ULE): packet data technology based on DECT intended for M2M communications and optimized for ultra low power consumption under low or moderate data rate and traffic conditions up link: transmission in the direction PT to FT User Authentication Key (UAK): cryptographic key hel
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...