《EN-300-175-1-V-2.1.1-2007.pdf》由会员分享,可在线阅读,更多相关《EN-300-175-1-V-2.1.1-2007.pdf(28页珍藏版)》请在三一文库上搜索。
1、 ETSI EN 300 175-1 V2.1.1 (2007-08) European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 2 Reference REN/DECT-000241-1 Keywords DECT, IMT-2000, mobility, radio, TDD, TDMA ETS
2、I 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be d
3、ownloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the refer
4、ence shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents
5、is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permissio
6、n. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2007. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Mark
7、s currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 3 Contents Intellectual Property Rights4 Foreword.4 1 Scope5 2 References5 3
8、Definitions and abbreviations.6 3.1 Definitions6 3.2 Abbreviations.13 4 Structure.18 4.1 Part 1: Overview.18 4.2 Part 2: Physical Layer (PHL) .18 4.3 Part 3: Medium Access Control (MAC) layer18 4.4 Part 4: Data Link Control (DLC) layer.18 4.5 Part 5: Network (NWK) layer 18 4.6 Part 6: Identities and
9、 addressing.19 4.7 Part 7: Security features .19 4.8 Part 8: Speech coding and transmission.19 5 The objectives of the CI standard.19 6 General description of the system20 7 Description of the protocol architecture.22 7.1 General.22 7.2 The DECT layered structure.22 7.3 Physical Layer (PHL).22 7.4 M
10、AC layer23 7.5 DLC layer.23 7.6 Network (NWK) layer23 7.7 Lower Layer Management Entity (LLME)23 7.8 Interworking Units (IWU)24 8 Proprietary escapes within the CI.24 8.1 Primary escape routes.24 8.2 Secondary escape routes.25 9 Levels of conformance.25 Annex A (informative): Bibliography.26 Annex B
11、 (informative): Change history.27 History28 ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETS
12、I members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/web
13、app.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may beco
14、me, essential to the present document. Foreword This European Standard (Telecommunications series) has been produced by ETSI Project Digital Enhanced Cordless Telecommunications (DECT). The present document is part 1 of a multi-part deliverable covering the Common Interface (CI) for the Digital Enha
15、nced Cordless Telecommunications (DECT), as identified below: Part 1: “Overview“; Part 2: “Physical Layer (PHL)“; Part 3: “Medium Access Control (MAC) layer“; Part 4: “Data Link Control (DLC) layer“; Part 5: “Network (NWK) layer“; Part 6: “Identities and addressing“; Part 7: “Security features“; Par
16、t 8: “Speech coding and transmission“. The following aspects of the present document are subject to controlled distribution: a) DECT identities, as defined in EN 300 175-6 5; b) DECT cryptographic algorithms. The cryptographic algorithms specify the details of the DECT standard authentication algori
17、thm and the DECT standard cipher. These aspects are distributed on an individual basis. Further information and details of the current distribution procedures can be obtained from the ETSI Secretariat at the address on the second page of the present document. Further details of the DECT system may b
18、e found in TR 101 178, ETR 043 and TR 102 185. National transposition dates Date of adoption of this EN: 27 July 2007 Date of latest announcement of this EN (doa): 31 October 2007 Date of latest publication of new National Standard or endorsement of this EN (dop/e): 30 April 2008 Date of withdrawal
19、of any conflicting National Standard (dow): 30 April 2008 ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 5 1 Scope The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document contains an abstract of
20、the other parts of the DECT standard together with a general description of: the objectives of the present document; the DECT Common Interface; the protocol architecture of DECT. The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the t
21、echnical terms used in different parts of the present document. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. 2 References The following documents con
22、tain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-spe
23、cific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee th
24、eir long term validity. 1 ETSI EN 300 175-2: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 2: Physical Layer (PHL)“. 2 ETSI EN 300 175-3: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer“. 3 ETS
25、I EN 300 175-4: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 4: Data Link Control (DLC) layer“. 4 ETSI EN 300 175-5: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer“. 5 ETSI EN 300 175-6: “Digital Enhanced
26、Cordless Telecommunications (DECT); Common Interface (CI); Part 6: Identities and addressing“. 6 ETSI EN 300 175-7: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features“. 7 ETSI EN 300 175-8: “Digital Enhanced Cordless Telecommunications (DECT); Comm
27、on Interface (CI); Part 8: Speech coding and transmission“. 8 ETSI EN 300 176 (all parts): “Digital Enhanced Cordless Telecommunications (DECT); Test specification“. ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 6 9 ETSI EN 300 403-1: “Integrated Services Digital Network (ISDN); Digital Subscriber Signall
28、ing System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call control; Part 1: Protocol specification ITU-T Recommendation Q.931 (1993), modified“. 10 ITU-R Recommendation SM.1046-2: “Definition of spectrum use and efficiency of a radio system“. 11 ITU-R Recommendation M.8
29、16-1: “Framework for services supported on International Mobile Telecommunications-2000 (IMT-2000)“. 12 ITU-R Recommendation M.1457-6: “Detailed specifications of the radio interfaces of International Mobile Telecommunications-2000 (IMT-2000)“. 3 Definitions and abbreviations 3.1 Definitions For the
30、 purposes of the present document, the following terms and definitions apply: Access Rights Class (ARC): type of access to a DECT network, such as public, residential or private Access Rights Details (ARD): unique number within one ARC Access Rights Identity (ARI): globally unique identity that show
31、s the access rights related to a service provider NOTE: PARI = Primary ARI; SARI = Secondary ARI; TARI = Tertiary ARI. algorithm: mathematical process or function that transforms an input into an output algorithm identifier: designator to show which algorithm is in use, so that the correct one may b
32、e chosen antenna diversity: diversity implies that the Radio Fixed Part (RFP) for each bearer independently can select different antenna properties such as gain, polarization, coverage patterns and other features that may effect the practical coverage NOTE: A typical example is space diversity, prov
33、ided by two vertically polarized antennas separated by 10 cm to 20 cm. asymmetric algorithm: See public key algorithm. attach: process whereby a Portable Part (PP) within the coverage area of a Fixed Part (FP) to which it has access rights, notifies the FP that it is operative authentication: corrob
34、oration that an entity is the one that is claimed authentication of Fixed radio Termination (FT): process whereby the identity of an FT is verified to a DECT PT authentication of Portable radio Termination (PT): process whereby a DECT PT is positively verified to be a legitimate user of a particular
35、 FP authentication (of a subscriber): process whereby a DECT subscriber is positively verified to be a legitimate user of a particular FP authentication of user: process whereby a DECT user is positively verified to be a legitimate user of a particular FP bearer: See Medium Access Control (MAC) bear
36、er or bearer service. bearer handover: internal handover process provided by the MAC layer, whereby one MAC connection can modify its underlying bearers while maintaining the service provided to the Data Link Control (DLC) layer bearer service: type of telecommunication service that provides a defin
37、ed capability for the transmission of signals between user-network interfaces ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 7 broadcast: simplex point-to-multipoint mode of transmission C-plane: control plane of the DECT protocol stacks, which contains all of the internal DECT protocol control, but may al
38、so include some external user information call: all of the Network (NWK) layer processes involved in one NWK layer peer-to-peer association cell: domain served by a single antenna(e) system (including a leaky feeder) of one FP Central Control Fixed Part (CCFP): physical grouping that contains the ce
39、ntral elements of a FP centrex: implementation of a private telecommunication network exchange that is not located on the premises of the private network operator Cipher Key (CK): value that is used to determine the transformation of plaintext to ciphertext in a cryptographic algorithm Cipher Key (C
40、K) generation: process for generating cryptographic keys ciphertext: output of a cryptographic algorithm channel: See physical channel. cluster: logical grouping of one or more cells between which bearer handover is possible confidentiality: rendering information secret as ciphertext unless the capa
41、bility is possessed to recover the plaintext from ciphertext connection: See MAC connection. connection handover: internal handover process provided by the DLC layer, whereby one set of DLC entities (C-plane and U-plane) can re-route data from one MAC connection to a second new MAC connection, while
42、 maintaining the service provided to the NWK layer Connectionless mode (C/L): transmission mode that transfers one packet (one self contained unit) of data from one source point to one (or more) destination points in a single phase Connection Oriented mode (C/O): transmission mode that transfers dat
43、a from one source point to one or more destination points using a protocol based on three phases: “Set-up“; “Data transfer“; and “Release“. Cordless Radio Fixed Part (CRFP): Wireless Relay Station (WRS) that provides independent bearer control to a PT and FT for relayed connections countermeasure: d
44、evice, instrument or procedure used to counteract or defend against a threat coverage area: area over which reliable communication can be established and maintained cryptography: secret writing Data Encryption Standard (DES): United States Federal data encryption standard Data Link Control (DLC): la
45、yer 2b of the DECT protocol stack decipherment: rendering of ciphertext into plaintext DECT Network (DNW): network that uses the DECT air interface to interconnect a local network to one or more portable applications DECT Standard Authentication Algorithm (DSAA): algorithm used for authentication in
46、 DECT DECT Standard Cipher (DSC): algorithm used for data encryption in DECT ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 8 distributed communication: the ability of a DECT terminal to provide means for or assist direct communication between any two terminals, members of a “closed“ local DECT network DLC
47、 broadband data link: link that can be associated with a logical MAC connection comprising a number of MAC (physical) connections DLC broadcast: simplex “connectionless“ mode of transmission from the DLC broadcast entity of one FT to the DLC broadcast entities in one or more PT DLC data link (DLC li
48、nk): association between two DLC layer entities DLC frame: format used to structure all messages that are exchanged between DLC layer peer entities double duplex bearer: use of two duplex bearers (see duplex bearer) which refer to the same MAC connection, sharing their simplex bearers (see simplex b
49、earer) for the information flow double-simplex bearer: use of two simplex bearers operating in the same direction on two physical channels double slot: one 12th of a TDMA frame which is used to support one high capacity physical channel down-link: transmission in the direction FT to PT duplex bearer: use of two simplex bearers operating in opposite directions on two physical channels encipherment: rendering of plaintext into ciphertext End System (ES): logical grouping that contains application processes and supports telecom
链接地址:https://www.31doc.com/p-3755859.html