EN-300-444-V1.4.2-2003.pdf

上传人:哈尼dd 文档编号:3754052 上传时间:2019-09-22 格式:PDF 页数:117 大小:637.90KB
返回 下载 相关 举报
EN-300-444-V1.4.2-2003.pdf_第1页
第1页 / 共117页
EN-300-444-V1.4.2-2003.pdf_第2页
第2页 / 共117页
EN-300-444-V1.4.2-2003.pdf_第3页
第3页 / 共117页
EN-300-444-V1.4.2-2003.pdf_第4页
第4页 / 共117页
EN-300-444-V1.4.2-2003.pdf_第5页
第5页 / 共117页
亲,该文档总共117页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《EN-300-444-V1.4.2-2003.pdf》由会员分享,可在线阅读,更多相关《EN-300-444-V1.4.2-2003.pdf(117页珍藏版)》请在三一文库上搜索。

1、 ETSI EN 300 444 V1.4.2 (2003-02) European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT); Generic Access Profile (GAP) ETSI ETSI EN 300 444 V1.4.2 (2003-02) 2 Reference REN/DECT-000219 Keywords access, DECT, generic, profile, radio, synchronization ETSI 650

2、 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downlo

3、aded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference

4、shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is av

5、ailable at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: editoretsi.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in al

6、l media. European Telecommunications Standards Institute 2003. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM

7、 is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EN 300 444 V1.4.2 (2003-02) 3 Contents Intellectual Property Rights9 Foreword.9 1 Scope10 2 References10 3 Definitions, symbols and abbreviations .11 3.1 Definitions11 3.2 Symbols13

8、3.3 Abbreviations.14 4 Feature definitions15 4.1 Network (NWK) features.15 4.2 Application features .16 5 Service definitions17 5.1 DLC service definitions17 5.2 MAC service definitions 17 6 Inter-operability requirements18 6.1 General.18 6.2 NWK features.19 6.3 DLC services20 6.4 MAC services.20 6.

9、5 Physical layer (PHL) services 20 6.6 Application features .21 6.7 NWK feature to procedure mapping 21 6.8 Service to procedure mapping23 6.8.1 DLC service to procedure mapping23 6.8.2 MAC service to procedure mapping.24 6.8.3 Application feature to procedure mapping25 6.9 General requirements .25

10、6.9.1 NWK layer message contents.25 6.9.2 Transaction identifier25 6.9.3 Length of a NWK layer message25 6.9.4 Handling of error and exception conditions25 6.9.5 GAP default setup attributes.26 6.9.6 Coexistence of MM and CC procedures.26 6.9.7 Coding rules for information elements .26 7 Procedure d

11、escription.26 8 NWK layer procedures.27 8.1 Summary of outgoing call messages, normal cases27 8.2 Outgoing call request28 8.2.1 Associated procedures 29 8.2.1.1 Timer P- management29 8.2.2 Exceptional cases30 8.2.2.1 Timer P- expiry 30 8.2.2.2 PT releases the outgoing call request30 8.2.2.3 FT rejec

12、ts the outgoing call request 31 8.3 Overlap sending31 8.3.1 Associated procedure32 8.3.1.1 Timer F- management32 8.3.2 Exceptional cases32 8.3.2.1 PT releases the outgoing call request32 8.3.2.2 FT rejects the outgoing call request 32 8.3.2.3 Timer F- expiry 33 ETSI ETSI EN 300 444 V1.4.2 (2003-02)

13、4 8.3.2.4 FT releases the outgoing call request33 8.4 Outgoing call proceeding .34 8.4.1 Exceptional cases34 8.4.1.1 PT releases the outgoing call request34 8.4.1.2 FT releases the outgoing call request35 8.5 Outgoing call confirmation.35 8.5.1 Exceptional cases36 8.5.1.1 PT releases the outgoing ca

14、ll request36 8.5.1.2 FT releases the outgoing call request36 8.6 Outgoing call connection37 8.7 Normal call release.37 8.7.1 Associated procedures 38 8.7.1.1 Timer P- management38 8.7.1.2 Timer F- management38 8.7.2 Exceptional cases39 8.7.2.1 Release collisions39 8.7.2.2 Timer F- expiry 39 8.7.2.3

15、Timer P- expiry 40 8.8 Abnormal call release.40 8.9 Partial release .41 8.10 Sending keypad information.42 8.11 Summary of incoming call related messages, normal cases.43 8.12 Incoming call request .43 8.12.1 Associated procedure44 8.12.1.1 Timer F- management44 8.12.2 Exceptional cases45 8.12.2.1 F

16、T releases the incoming call request .45 8.12.2.2 PT rejects the incoming call request .45 8.12.2.3 Timer F- expiry 46 8.12.3 Collective and group ringing 46 8.13 Incoming call confirmation46 8.13.1 Exceptional cases47 8.13.1.1 FT releases the incoming call transaction .47 8.13.1.2 PT releases the i

17、ncoming call transaction .47 8.14 PT alerting48 8.15 Incoming call connection .48 8.15.1 Associated procedure49 8.15.1.1 Timer P- management49 8.15.2 Exceptional cases49 8.15.2.1 FT releases the incoming call transaction .49 8.15.2.2 PT releases the incoming call transaction .50 8.15.2.3 Timer P- ex

18、piry 50 8.16 Display .50 8.17 Terminal capability indication51 8.18 Internal call setup .52 8.19 Internal call keypad52 8.20 Service call setup53 8.21 Service call keypad.53 8.22 Identification of PP.53 8.22.1 Associated procedure54 8.22.1.1 Timer F- management.54 8.22.2 Exceptional cases54 8.22.2.1

19、 Identity not existing in the PT.54 8.22.2.2 Timer F- expiry.54 8.23 Authentication of FT55 8.23.1 Associated procedure55 8.23.1.1 Timer P- management55 8.23.2 Exceptional cases56 8.23.2.1 Authentication algorithm/key not supported.56 8.23.2.2 Authentication challenge RES has wrong value .56 8.23.2.

20、3 Timer P- expiry56 8.24 Authentication of PP 57 ETSI ETSI EN 300 444 V1.4.2 (2003-02) 5 8.24.1 Associated procedure58 8.24.1.1 Timer F- management58 8.24.2 Exceptional cases58 8.24.2.1 Authentication algorithm/key not supported.58 8.24.2.2 Timer F- expiry58 8.25 Authentication of user58 8.25.1 Asso

21、ciated procedure59 8.25.1.1 Timer F- management59 8.25.2 Exceptional cases59 8.25.2.1 Authentication algorithm/key not supported.59 8.25.2.2 Timer F- expiry59 8.26 Incrementing the ZAP value.59 8.27 Storing the DCK.60 8.28 Location registration.60 8.28.1 Associated procedures 62 8.28.1.1 Timer P- ma

22、nagement.62 8.28.1.2 Timer F- management.62 8.28.2 Exceptional cases62 8.28.2.1 FT rejects the location registration procedure.62 8.28.2.2 Failure of location registration procedure.63 8.28.2.3 PT rejects the identity assignment.63 8.28.2.4 Timer F- expiry.63 8.29 Location update64 8.30 Obtaining ac

23、cess rights.65 8.30.1 Associated procedure67 8.30.1.1 Timer P- management 67 8.30.2 Exceptional cases67 8.30.2.1 FT rejects the access rights .67 8.30.2.2 Timer P- expiry.67 8.31 FT terminating access rights.68 8.31.1 Associated procedure69 8.31.1.1 Timer F- management 69 8.31.2 Exceptional cases69

24、8.31.2.1 PT rejects the termination request.69 8.31.2.2 Timer F- expiry.69 8.32 Key allocation 69 8.32.1 Associated procedures 71 8.32.1.1 Timer F- management.71 8.32.1.2 Timer P- management71 8.32.2 Exceptional cases71 8.32.2.1 Timer F- expiry.71 8.32.2.2 Timer P- expiry71 8.32.2.3 Allocation-type

25、element is unacceptable.71 8.32.2.4 Authentication of PT fails.72 8.32.2.5 Authentication of FT fails.72 8.33 Cipher-switching initiated by FT72 8.33.1 Associated procedure73 8.33.1.1 Timer F- management.73 8.33.2 Exceptional cases74 8.33.2.1 PT rejects the cipher request .74 8.33.2.2 Timer F- expir

26、y.74 8.34 Cipher-switching initiated by PT75 8.34.1 Associated procedure76 8.34.1.1 Timer P- management.76 8.34.2 Exceptional cases76 8.34.2.1 FT rejects the cipher request .76 8.34.2.2 Timer P- expiry.76 8.35 Indirect FT initiated link establishment76 8.35.1 Associated procedure77 8.35.1.1 Timer F-

27、 management77 8.35.2 Exceptional cases78 8.35.2.1 The IPUI received in the LCE-PAGE-RESPONSE does not match.78 ETSI ETSI EN 300 444 V1.4.2 (2003-02) 6 8.35.2.2 Timer expiry78 8.35.2.3 Release from the higher entity 79 8.36 Direct PT initiated link establishment79 8.36.1 Exceptional case .80 8.36.1.1

28、 Link establishment failure.80 8.37 Link release “normal“.80 8.37.1 Associated procedure82 8.37.1.1 Timer management82 8.37.2 Exceptional cases82 8.37.2.1 Timer expiry82 8.37.2.2 Outstanding data has been discarded.82 8.38 Link release “abnormal“.83 8.39 Link release “maintain“83 8.39.1 Associated p

29、rocedure83 8.39.1.1 Timer management83 8.40 Enhanced FT initiated U- plane connection.84 9 DLC layer procedures 84 9.1 Class A link establishment .84 9.1.1 Associated procedures 86 9.1.1.1 Timer P management86 9.1.1.2 Re-transmission counter management.86 9.1.1.3 Multiple frame operation variables m

30、anagement86 9.1.1.4 Lower Layer Management Entity (LLME) establishment of a MAC connection.86 9.1.2 Exceptional cases87 9.1.2.1 Timer P expiry87 9.1.2.2 Receipt of a request for link release88 9.1.2.3 Receipt of an indication for a connection release88 9.2 Class A Acknowledged Information transfer.8

31、8 9.2.1 Acknowledgement with an I_frame88 9.2.2 Acknowledgement with a RR_frame89 9.2.3 Class A acknowledged information transfer with segment reassemble90 9.2.4 Associated procedures 90 9.2.4.1 Timer management90 9.2.4.2 Re-transmission counter management.90 9.2.4.3 Multiple frame operation variabl

32、es management90 9.2.5 Exceptional cases91 9.2.5.1 Timer expiry91 9.2.5.2 Receipt of a request for link release91 9.2.5.3 Receipt of an indication for a connection release91 9.2.5.4 DLC wants to make a connection handover91 9.3 Class A link release91 9.3.1 Associated procedures 92 9.3.1.1 LLME U-plan

33、e release92 9.3.1.2 LLME release a MAC connection 92 9.4 Class A link re-establishment.92 9.5 CS channel fragmentation and recombination 92 9.6 Normal broadcast .92 9.7 Class A basic connection handover93 9.7.1 Voluntary handover 94 9.7.2 Associated procedure94 9.7.2.1 LLME connection handover manag

34、ement94 9.7.3 Exceptional case .94 9.7.3.1 Receipt of a request for link release94 9.8 Encryption switching94 9.8.1 Associated procedure95 9.8.1.1 Providing Encryption key to the MAC layer.95 9.8.2 Exceptional cases95 9.8.2.1 Encryption fails.95 9.8.2.2 Connection handover of ciphered connections95

35、9.9 U-plane class 0/min delay 95 9.9.1 Associated procedure95 ETSI ETSI EN 300 444 V1.4.2 (2003-02) 7 9.9.1.1 LLME U-plane establishment.95 9.10 FU1 frame operation 96 10 MAC layer procedures.96 10.1 General.96 10.2 Downlink broadcast97 10.2.1 NT message .97 10.2.2 QT - static system information97 1

36、0.2.3 QT - FP capabilities.98 10.2.4 QT - SARI list contents98 10.3 Paging broadcast 98 10.3.1 Short page, normal/extended paging.99 10.3.2 Zero page normal/extended paging.99 10.3.3 Blind slot information.99 10.3.4 Bearer handover information100 10.4 Setup of basic connection, basic bearer setup (A

37、-field) .100 10.4.1 MT message.101 10.4.2 Associated procedures 101 10.4.2.1 Timer T200 management101 10.4.2.2 Counter N200 management.101 10.4.3 Exceptional cases102 10.4.3.1 Bearer setup attempt fails N200+1 times102 10.4.3.2 Timer T200 expiry103 10.5 Connection/bearer release 103 10.5.1 MT messag

38、e.104 10.6 Bearer handover request.104 10.6.1 MT message.104 10.7 Connection handover request.104 10.7.1 MT message.105 10.8 CS channel data.105 10.9 Q2 bit setting105 10.10 RFPI handshake105 10.11 Antenna diversity .105 10.12 Sliding collision105 10.13 Encryption process - initialization and synchr

39、onization.105 10.14 Encryption mode control106 10.14.1 MT message.106 10.15 Handover encryption process.106 10.16 Extended frequency allocation.106 11 PHL layer requirements107 11.1 General.107 11.2 Minimum Normal Transmit Power (NTP).107 11.3 Radio receiver sensitivity.107 11.4 Z-field.107 11.5 Sli

40、ding collision detection107 11.6 Physical channel availability107 11.7 Synchronization window107 12 Requirements regarding the speech transmission.108 12.1 General.108 12.2 User controlled volume control108 13 Management procedures.108 13.1 Management of MM procedures108 13.2 Location registration i

41、nitiation.108 13.3 Assigned individual TPUI management.108 13.4 PMID management.109 13.5 DCK management109 13.6 Broadcast attributes management.109 13.7 Storage of subscription related data .109 14 Application procedures.110 14.1 Subscription control .110 ETSI ETSI EN 300 444 V1.4.2 (2003-02) 8 14.2

42、 AC to bitstring mapping.110 14.3 Manual entry of the PARK.111 Annex A (informative): PP locking procedure for on-air subscription.112 Annex B (informative): Tones, progress indicator and U-plane connection.114 B.1 General.114 B.2 Connection of U-plane and provision of tones.114 B.3 Provision of ton

43、es before connection of the U-plane.114 B.4 Provision of tones and information element114 B.5 Summary 115 Annex C (normative): Synchronization requirements for fixed parts116 Annex D (informative): Bibliography.117 History118 ETSI ETSI EN 300 444 V1.4.2 (2003-02) 9 Intellectual Property Rights IPRs

44、essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or pote

45、ntially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). All published ETSI deliverables shall include information which directs the reader to the ab

46、ove source of information. Foreword This European Standard (Telecommunications series) has been produced by ETSI Project Digital Enhanced Cordless Telecommunications (DECT). The present document is based on EN 300 175, parts 1 1 to 8 8. General attachment requirements and speech attachment requireme

47、nts are based on EN 301 406 11 (replacing TBR 006) and EN 300 176-2 10 (previously covered by TBR 010). The present document has been developed in accordance to the rules of documenting a profile specification as described in ISO/IEC 9646-6 12. National transposition dates Date of latest announcemen

48、t of this EN (doa): May 2003 Date of latest publication of new National Standard or endorsement of this EN (dop/e): August 2003 Date of withdrawal of any conflicting National Standard (dow): August 2003 ETSI ETSI EN 300 444 V1.4.2 (2003-02) 10 1 Scope The present document specifies that set of techn

49、ical requirements for Digital Enhanced Cordless Telecommunications (DECT) Fixed Part (FP) and DECT Portable Part (PP) necessary for the support of the Generic Access Profile (GAP). The GAP is applicable to all DECT Portable radio Terminations (PT) and Fixed radio Terminations (FT) which under the scope of EN 300 176-2 10 (i.e. 3,1 kHz telephony teleservice) and specifies the minimum functionality that is supported by all other 3,1 kHz voice profiles. The objective of the present document is to ensure the Air Interface (AI) inter-operability of DECT equipmen

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1