欢迎来到三一文库! | 帮助中心 三一文库31doc.com 一个上传文档投稿赚钱的网站
三一文库
全部分类
  • 研究报告>
  • 工作总结>
  • 合同范本>
  • 心得体会>
  • 工作报告>
  • 党团相关>
  • 幼儿/小学教育>
  • 高等教育>
  • 经济/贸易/财会>
  • 建筑/环境>
  • 金融/证券>
  • 医学/心理学>
  • ImageVerifierCode 换一换
    首页 三一文库 > 资源分类 > PDF文档下载
     

    EN-300-175-1-V-2.1.1-2007.pdf

    • 资源ID:3755859       资源大小:153.86KB        全文页数:28页
    • 资源格式: PDF        下载积分:6
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录   微博登录  
    二维码
    微信扫一扫登录
    下载资源需要6
    邮箱/手机:
    温馨提示:
    用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP免费专享
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    EN-300-175-1-V-2.1.1-2007.pdf

    ETSI EN 300 175-1 V2.1.1 (2007-08) European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 2 Reference REN/DECT-000241-1 Keywords DECT, IMT-2000, mobility, radio, TDD, TDMA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2007. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 3 Contents Intellectual Property Rights4 Foreword.4 1 Scope5 2 References5 3 Definitions and abbreviations.6 3.1 Definitions6 3.2 Abbreviations.13 4 Structure.18 4.1 Part 1: Overview.18 4.2 Part 2: Physical Layer (PHL) .18 4.3 Part 3: Medium Access Control (MAC) layer18 4.4 Part 4: Data Link Control (DLC) layer.18 4.5 Part 5: Network (NWK) layer 18 4.6 Part 6: Identities and addressing.19 4.7 Part 7: Security features .19 4.8 Part 8: Speech coding and transmission.19 5 The objectives of the CI standard.19 6 General description of the system20 7 Description of the protocol architecture.22 7.1 General.22 7.2 The DECT layered structure.22 7.3 Physical Layer (PHL).22 7.4 MAC layer23 7.5 DLC layer.23 7.6 Network (NWK) layer23 7.7 Lower Layer Management Entity (LLME)23 7.8 Interworking Units (IWU)24 8 Proprietary escapes within the CI.24 8.1 Primary escape routes.24 8.2 Secondary escape routes.25 9 Levels of conformance.25 Annex A (informative): Bibliography.26 Annex B (informative): Change history.27 History28 ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 4 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This European Standard (Telecommunications series) has been produced by ETSI Project Digital Enhanced Cordless Telecommunications (DECT). The present document is part 1 of a multi-part deliverable covering the Common Interface (CI) for the Digital Enhanced Cordless Telecommunications (DECT), as identified below: Part 1: “Overview“; Part 2: “Physical Layer (PHL)“; Part 3: “Medium Access Control (MAC) layer“; Part 4: “Data Link Control (DLC) layer“; Part 5: “Network (NWK) layer“; Part 6: “Identities and addressing“; Part 7: “Security features“; Part 8: “Speech coding and transmission“. The following aspects of the present document are subject to controlled distribution: a) DECT identities, as defined in EN 300 175-6 5; b) DECT cryptographic algorithms. The cryptographic algorithms specify the details of the DECT standard authentication algorithm and the DECT standard cipher. These aspects are distributed on an individual basis. Further information and details of the current distribution procedures can be obtained from the ETSI Secretariat at the address on the second page of the present document. Further details of the DECT system may be found in TR 101 178, ETR 043 and TR 102 185. National transposition dates Date of adoption of this EN: 27 July 2007 Date of latest announcement of this EN (doa): 31 October 2007 Date of latest publication of new National Standard or endorsement of this EN (dop/e): 30 April 2008 Date of withdrawal of any conflicting National Standard (dow): 30 April 2008 ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 5 1 Scope The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document contains an abstract of the other parts of the DECT standard together with a general description of: the objectives of the present document; the DECT Common Interface; the protocol architecture of DECT. The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the technical terms used in different parts of the present document. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 1 ETSI EN 300 175-2: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 2: Physical Layer (PHL)“. 2 ETSI EN 300 175-3: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer“. 3 ETSI EN 300 175-4: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 4: Data Link Control (DLC) layer“. 4 ETSI EN 300 175-5: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 5: Network (NWK) layer“. 5 ETSI EN 300 175-6: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 6: Identities and addressing“. 6 ETSI EN 300 175-7: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features“. 7 ETSI EN 300 175-8: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 8: Speech coding and transmission“. 8 ETSI EN 300 176 (all parts): “Digital Enhanced Cordless Telecommunications (DECT); Test specification“. ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 6 9 ETSI EN 300 403-1: “Integrated Services Digital Network (ISDN); Digital Subscriber Signalling System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call control; Part 1: Protocol specification ITU-T Recommendation Q.931 (1993), modified“. 10 ITU-R Recommendation SM.1046-2: “Definition of spectrum use and efficiency of a radio system“. 11 ITU-R Recommendation M.816-1: “Framework for services supported on International Mobile Telecommunications-2000 (IMT-2000)“. 12 ITU-R Recommendation M.1457-6: “Detailed specifications of the radio interfaces of International Mobile Telecommunications-2000 (IMT-2000)“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: Access Rights Class (ARC): type of access to a DECT network, such as public, residential or private Access Rights Details (ARD): unique number within one ARC Access Rights Identity (ARI): globally unique identity that shows the access rights related to a service provider NOTE: PARI = Primary ARI; SARI = Secondary ARI; TARI = Tertiary ARI. algorithm: mathematical process or function that transforms an input into an output algorithm identifier: designator to show which algorithm is in use, so that the correct one may be chosen antenna diversity: diversity implies that the Radio Fixed Part (RFP) for each bearer independently can select different antenna properties such as gain, polarization, coverage patterns and other features that may effect the practical coverage NOTE: A typical example is space diversity, provided by two vertically polarized antennas separated by 10 cm to 20 cm. asymmetric algorithm: See public key algorithm. attach: process whereby a Portable Part (PP) within the coverage area of a Fixed Part (FP) to which it has access rights, notifies the FP that it is operative authentication: corroboration that an entity is the one that is claimed authentication of Fixed radio Termination (FT): process whereby the identity of an FT is verified to a DECT PT authentication of Portable radio Termination (PT): process whereby a DECT PT is positively verified to be a legitimate user of a particular FP authentication (of a subscriber): process whereby a DECT subscriber is positively verified to be a legitimate user of a particular FP authentication of user: process whereby a DECT user is positively verified to be a legitimate user of a particular FP bearer: See Medium Access Control (MAC) bearer or bearer service. bearer handover: internal handover process provided by the MAC layer, whereby one MAC connection can modify its underlying bearers while maintaining the service provided to the Data Link Control (DLC) layer bearer service: type of telecommunication service that provides a defined capability for the transmission of signals between user-network interfaces ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 7 broadcast: simplex point-to-multipoint mode of transmission C-plane: control plane of the DECT protocol stacks, which contains all of the internal DECT protocol control, but may also include some external user information call: all of the Network (NWK) layer processes involved in one NWK layer peer-to-peer association cell: domain served by a single antenna(e) system (including a leaky feeder) of one FP Central Control Fixed Part (CCFP): physical grouping that contains the central elements of a FP centrex: implementation of a private telecommunication network exchange that is not located on the premises of the private network operator Cipher Key (CK): value that is used to determine the transformation of plaintext to ciphertext in a cryptographic algorithm Cipher Key (CK) generation: process for generating cryptographic keys ciphertext: output of a cryptographic algorithm channel: See physical channel. cluster: logical grouping of one or more cells between which bearer handover is possible confidentiality: rendering information secret as ciphertext unless the capability is possessed to recover the plaintext from ciphertext connection: See MAC connection. connection handover: internal handover process provided by the DLC layer, whereby one set of DLC entities (C-plane and U-plane) can re-route data from one MAC connection to a second new MAC connection, while maintaining the service provided to the NWK layer Connectionless mode (C/L): transmission mode that transfers one packet (one self contained unit) of data from one source point to one (or more) destination points in a single phase Connection Oriented mode (C/O): transmission mode that transfers data from one source point to one or more destination points using a protocol based on three phases: “Set-up“; “Data transfer“; and “Release“. Cordless Radio Fixed Part (CRFP): Wireless Relay Station (WRS) that provides independent bearer control to a PT and FT for relayed connections countermeasure: device, instrument or procedure used to counteract or defend against a threat coverage area: area over which reliable communication can be established and maintained cryptography: secret writing Data Encryption Standard (DES): United States Federal data encryption standard Data Link Control (DLC): layer 2b of the DECT protocol stack decipherment: rendering of ciphertext into plaintext DECT Network (DNW): network that uses the DECT air interface to interconnect a local network to one or more portable applications DECT Standard Authentication Algorithm (DSAA): algorithm used for authentication in DECT DECT Standard Cipher (DSC): algorithm used for data encryption in DECT ETSI ETSI EN 300 175-1 V2.1.1 (2007-08) 8 distributed communication: the ability of a DECT terminal to provide means for or assist direct communication between any two terminals, members of a “closed“ local DECT network DLC broadband data link: link that can be associated with a logical MAC connection comprising a number of MAC (physical) connections DLC broadcast: simplex “connectionless“ mode of transmission from the DLC broadcast entity of one FT to the DLC broadcast entities in one or more PT DLC data link (DLC link): association between two DLC layer entities DLC frame: format used to structure all messages that are exchanged between DLC layer peer entities double duplex bearer: use of two duplex bearers (see duplex bearer) which refer to the same MAC connection, sharing their simplex bearers (see simplex bearer) for the information flow double-simplex bearer: use of two simplex bearers operating in the same direction on two physical channels double slot: one 12th of a TDMA frame which is used to support one high capacity physical channel down-link: transmission in the direction FT to PT duplex bearer: use of two simplex bearers operating in opposite directions on two physical channels encipherment: rendering of plaintext into ciphertext End System (ES): logical grouping that contains application processes and supports telecom

    注意事项

    本文(EN-300-175-1-V-2.1.1-2007.pdf)为本站会员(哈尼dd)主动上传,三一文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三一文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    经营许可证编号:宁ICP备18001539号-1

    三一文库
    收起
    展开