EN-300-175-6-V-2.1.1-2007.pdf

上传人:哈尼dd 文档编号:3754399 上传时间:2019-09-22 格式:PDF 页数:41 大小:221.03KB
返回 下载 相关 举报
EN-300-175-6-V-2.1.1-2007.pdf_第1页
第1页 / 共41页
EN-300-175-6-V-2.1.1-2007.pdf_第2页
第2页 / 共41页
EN-300-175-6-V-2.1.1-2007.pdf_第3页
第3页 / 共41页
EN-300-175-6-V-2.1.1-2007.pdf_第4页
第4页 / 共41页
EN-300-175-6-V-2.1.1-2007.pdf_第5页
第5页 / 共41页
亲,该文档总共41页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《EN-300-175-6-V-2.1.1-2007.pdf》由会员分享,可在线阅读,更多相关《EN-300-175-6-V-2.1.1-2007.pdf(41页珍藏版)》请在三一文库上搜索。

1、 ETSI EN 300 175-6 V2.1.1 (2007-08) European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 6: Identities and addressing ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 2 Reference REN/DECT-000241-6 Keywords DECT, IMT-2000, mobility, rad

2、io, TDD, TDMA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present

3、document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of d

4、ispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and othe

5、r ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by

6、written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2007. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON lo

7、go are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 3 Contents Intellectual Property Rights5 Foreword.5 1 Scope6

8、 2 References7 3 Definitions and abbreviations.8 3.1 Definitions8 3.2 Abbreviations.8 4 General description of FP and PP identities.9 4.1 Combinations of ARIs, PARKs and IPUIs.10 5 FP identities10 5.1 ARI class A 13 5.2 ARI class B.13 5.3 ARI class C.14 5.4 ARI class D 15 5.5 ARl class E.16 5.6 SARI

9、 list structure17 5.6.1 ARI list length.17 5.6.2 TARIs .17 5.6.3 Black.17 5.6.4 ARI .18 5.6.5 Black-ARI.18 5.6.6 TARI messages.18 5.6.6.1 Request message from the PP .18 5.6.6.2 Response message from the FP.19 6 PP identities20 6.1 PARK.21 6.1.1 PARK A21 6.1.2 PARK B21 6.1.3 PARK C21 6.1.4 PARK D21

10、6.1.5 PARK E22 6.2 IPUI22 6.2.1 Portable user identity type N (residential/default)22 6.2.2 Portable user identity type S (PSTN/ISDN) .22 6.2.3 Portable user identity type O (private)23 6.2.4 Portable user identity type T (private extended).23 6.2.5 Portable user identity type P (public/public acces

11、s service).23 6.2.6 Portable user identity type Q (public/general)24 6.2.7 Portable user identity type U (public/general)24 6.2.8 Portable user identity type R (public/IMSI)24 6.3 Individual and group TPUIs.24 6.3.1 General24 6.3.2 Individual TPUI26 6.3.3 Group TPUIs.26 7 Coding of identities27 7.1

12、RFPI E-bit 27 7.2 Access rights codes 27 7.3 Portable user identity types 27 7.4 EMC, EIC and POC .28 8 Rules for the usage of FP and PP identities28 8.1 General principles.28 ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 4 8.2 PARI, SARI and TARI usage.28 9 Connection related identities30 9.1 MAC identit

13、ies.30 9.1.1 FMID30 9.1.2 PMID30 9.2 DLC identities31 9.3 NWK identities.31 10 Equipment related identities.31 11 Subscription and registration procedures.31 Annex A (informative): Examples of usage of FP and PP identities32 A.1 Residential ID usage.32 A.2 Public ID usage 32 A.2.1 Primary.32 A.2.2 S

14、econdary.33 A.2.3 Tertiary.33 A.3 Private ID usage.34 A.3.1 Primary.34 A.3.2 Secondary.34 A.4 Mixed private and public ID usage 34 A.4.1 Public in private environments.34 A.4.2 Private in public environments.35 A.5 PARI and SARI use for CTM roaming35 Annex B (normative): Identities and addressing ti

15、mers.37 Annex C (normative): Representation of IPEI as printed text38 Annex D (informative): Bibliography.39 Annex E (informative): Change history.40 History41 ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may h

16、ave been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI stan

17、dards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of ot

18、her IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This European Standard (Telecommunications series) has been produced by ETSI Project Digital Enhanced Cordless Telecommunications (DECT)

19、. The present document is part 6 of a multi-part deliverable. Full details of the entire series can be found in part 1 1. Further details of the DECT system may be found in TR 101 178 and ETR 043 (see bibliography). National transposition dates Date of adoption of this EN: 27 July 2007 Date of lates

20、t announcement of this EN (doa): 31 October 2007 Date of latest publication of new National Standard or endorsement of this EN (dop/e): 30 April 2008 Date of withdrawal of any conflicting National Standard (dow): 30 April 2008 ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 6 1 Scope The present document is

21、 one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). This part specifies the identities and addressing structure of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). There are four categories of identiti

22、es to be used for identification and addressing in a general DECT environment. These four categories are: Fixed Part (FP) identities; Portable Part (PP) identities; connection-related identities; equipment-related identities. Fixed part identities and portable part identities are used for: access in

23、formation from fixed parts to portable parts; access requests from portable parts; identification of portable parts; identification of fixed parts and radio fixed parts; paging; billing. These identities support: different environments, such as residential, public or private; supply to manufacturers

24、, installers, and operators of globally unique identity elements with a minimum of central administration; multiple access rights for the same portable; large freedom for manufacturers, installers, and operators to structure the fixed part identities, e.g. to facilitate provision of access rights to

25、 groups of DECT systems; roaming agreements between DECT networks run by the same or different owners/operators; indication of handover domains; indication of location areas, i.e. paging area; indication of subscription areas of a public service. The present document also provides for length indicat

26、ors and other messages that can override the default location and/or paging area and domain indications given by the structure of the identities. Connection related identities are used to identify the protocol instances associated with a call and are used for peer-to-peer communication. Equipment re

27、lated identities are used to identify a stolen PP and to derive a default identity coding for PP emergency call set-up. Coding of identity information elements for higher layer messages is found in EN 300 175-5 5, clause 7.7. ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 7 User authentication and cipherin

28、g need additional key information and is outside the scope of the present document, but is covered in other parts of EN 300 175 1 to 7, e.g. EN 300 175-7 6. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data servic

29、es, new slot types and other technical enhancements. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number

30、) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hype

31、rlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 1 ETSI EN 300 175-1: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview“. 2 Void. 3 ETSI EN 300 175-3: “Digital Enhanced Cordless Telecommun

32、ications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer“. 4 ETSI EN 300 175-4: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 4: Data Link Control (DLC) layer“. 5 ETSI EN 300 175-5: “Digital Enhanced Cordless Telecommunications (DECT); Com

33、mon Interface (CI); Part 5: Network (NWK) layer“. 6 ETSI EN 300 175-7: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features“. 7 ETSI EN 300 175-8: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 8: Speech coding and

34、transmission“. 8 ITU-T Recommendation E.164: “The international public telecommunication numbering plan“. 9 Void. 10 ITU-T Recommendation E.212: “The international identification plan for mobile terminals and mobile users“. ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 8 3 Definitions and abbreviations 3.

35、1 Definitions For the purposes of the present document, the terms and definitions given in EN 300 175-1 1 apply. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: ARC Access Rights Class ARD Access Rights Details ARI Access Rights Identity BACN Bank ACcou

36、nt Number BCD Binary Coded Decimal CBI Collective Broadcast Identifier CI Common Interface CMD CoMmanD bit CTM Cordless Terminal Mobility DECT Digital Enhanced Cordless Telecommunications DLC Data Link Control EIC Equipment Installers Code EMC Equipment Manufacturers Code FIL FILl bits FMID Fixed pa

37、rt MAC Identity FP Fixed Part FPN Fixed Part Number FPS Fixed Part Sub-number FT Fixed radio Termination GOP GSM OPerator code GSM Global System for Mobile ID Identification IMSI International Mobile Subscriber Identity IPEI International Portable Equipment Identity IPUI International Portable User

38、Identity ISDN Integrated Services Digital Network LA Location Area LAI Location Area Identification LAL Location Area Level LAN Local Area Network lsb least significant bit LSIG Link SIGnature MAC Medium Access Control MCC Mobile Country Code msb most significant bit NT Identities information, one N

39、-channel message NWK NetWorK PABX Private Automatic Branch eXchange PARI Primary Access Rights Identity PARK Portable Access Rights Key PARKy PARK with value y for its park length indicator PBX Private Branch eXchange PHL PHysical Layer PLI Park Length Indicator PLMN-Id Public Land Mobile Network Id

40、entification PMID Portable part MAC IDentity POC Public Operator Code PP Portable Part PSN Portable equipment Serial Number ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 9 PSTN Public Switched Telephone Network PT Portable radio Termination PUN Portable User Number PUT Portable User Type QH Q field header

41、 QT System information and multiframe marker RFP Radio Fixed Part RFPI Radio Fixed Part Identity RPN Radio fixed Part Number SARI Secondary Access Rights Identity SP-id Service Provider identity TARI Tertiary Access Rights Identity TPUI Temporary Portable User Identity UMTS Universal Mobile Telecomm

42、unication Systems WRS Wireless Relay Station 4 General description of FP and PP identities Every radio FP broadcasts for its purpose a unique identity which contains a globally unique (to a service provider) Access Rights Identity (ARI). Every PP has both a Portable Access Rights Key (PARK) and an I

43、nternational Portable User Identity (IPUI). These operate as a pair. A PP is allowed to access any radio FP which broadcasts an ARI that can be identified by any of the portable access rights keys of that PP. The IPUI is used to identify the portable in the domain defined by its related ARI. The IPU

44、I can either be locally unique or globally unique. Figure 4.1 illustrates the identity structure. Primary PARI Secondary PARI Tertiary PARI Radio Fixed Part Number RPN Access Rights Identity ARI Access Rights Class ARC Access Rights Details ARD Radio Fixed Part Identity RFPI Portable Access Rights K

45、ey PARK International Portable User Identity IPUI Portable User Type PUT Portable User Number PUN FP Identities PP Identities Figure 4.1: General identity structure The common base for the DECT identity structure is the Access Rights Class (ARC) and Access Rights Details (ARD). These need to be know

46、n by both the FP and the PPs. In the FP the ARC and ARD are called Access Rights Identity (ARI), and in the PP they are called Portable Access Rights Key (PARK). The distinction between PARK and ARI is that each PARK can have a group of ARDs allocated, PARKy. “y“ is the value of the PARK length indi

47、cator given in the PP subscription process. ARC ARD y bits “dont care“ bits Figure 4.2: Structure of PARKy ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 10 If the ARI is a primary ARI, i.e. PARI, it will form, together with a RFP number, the broadcast identity RFPI. ARIs can also be less frequently broadc

48、ast as Secondary Access Rights Identities (SARIs) and may also be available as Tertiary Access Rights Identities (TARIs), which are not broadcast, but are accessible upon request. The PUT and PUN form the PP users identity, IPUI. This identity can either be globally unique or locally unique. In addi

49、tion to IPUIs, shorter temporary identities, TPUIs, may be used for paging. A PP is identified by its pairs of PARKy and IPUI. A PP is only allowed to access a FP if one of its PARKs includes one of the ARIs of the FP, i.e. the PARI, a SARI or a TARI. 4.1 Combinations of ARIs, PARKs and IPUIs DECT provides a flexible radio access technology for a large variety of private and public networks or systems. This leads to different requirements on e.g. sub-system grouping, distribution and

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1