《EN-300-175-6-V-2.1.1-2007.pdf》由会员分享,可在线阅读,更多相关《EN-300-175-6-V-2.1.1-2007.pdf(41页珍藏版)》请在三一文库上搜索。
1、 ETSI EN 300 175-6 V2.1.1 (2007-08) European Standard (Telecommunications series) Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 6: Identities and addressing ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 2 Reference REN/DECT-000241-6 Keywords DECT, IMT-2000, mobility, rad
2、io, TDD, TDMA ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present
3、document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of d
4、ispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and othe
5、r ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by
6、written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2007. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON lo
7、go are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 3 Contents Intellectual Property Rights5 Foreword.5 1 Scope6
8、 2 References7 3 Definitions and abbreviations.8 3.1 Definitions8 3.2 Abbreviations.8 4 General description of FP and PP identities.9 4.1 Combinations of ARIs, PARKs and IPUIs.10 5 FP identities10 5.1 ARI class A 13 5.2 ARI class B.13 5.3 ARI class C.14 5.4 ARI class D 15 5.5 ARl class E.16 5.6 SARI
9、 list structure17 5.6.1 ARI list length.17 5.6.2 TARIs .17 5.6.3 Black.17 5.6.4 ARI .18 5.6.5 Black-ARI.18 5.6.6 TARI messages.18 5.6.6.1 Request message from the PP .18 5.6.6.2 Response message from the FP.19 6 PP identities20 6.1 PARK.21 6.1.1 PARK A21 6.1.2 PARK B21 6.1.3 PARK C21 6.1.4 PARK D21
10、6.1.5 PARK E22 6.2 IPUI22 6.2.1 Portable user identity type N (residential/default)22 6.2.2 Portable user identity type S (PSTN/ISDN) .22 6.2.3 Portable user identity type O (private)23 6.2.4 Portable user identity type T (private extended).23 6.2.5 Portable user identity type P (public/public acces
11、s service).23 6.2.6 Portable user identity type Q (public/general)24 6.2.7 Portable user identity type U (public/general)24 6.2.8 Portable user identity type R (public/IMSI)24 6.3 Individual and group TPUIs.24 6.3.1 General24 6.3.2 Individual TPUI26 6.3.3 Group TPUIs.26 7 Coding of identities27 7.1
12、RFPI E-bit 27 7.2 Access rights codes 27 7.3 Portable user identity types 27 7.4 EMC, EIC and POC .28 8 Rules for the usage of FP and PP identities28 8.1 General principles.28 ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 4 8.2 PARI, SARI and TARI usage.28 9 Connection related identities30 9.1 MAC identit
13、ies.30 9.1.1 FMID30 9.1.2 PMID30 9.2 DLC identities31 9.3 NWK identities.31 10 Equipment related identities.31 11 Subscription and registration procedures.31 Annex A (informative): Examples of usage of FP and PP identities32 A.1 Residential ID usage.32 A.2 Public ID usage 32 A.2.1 Primary.32 A.2.2 S
14、econdary.33 A.2.3 Tertiary.33 A.3 Private ID usage.34 A.3.1 Primary.34 A.3.2 Secondary.34 A.4 Mixed private and public ID usage 34 A.4.1 Public in private environments.34 A.4.2 Private in public environments.35 A.5 PARI and SARI use for CTM roaming35 Annex B (normative): Identities and addressing ti
15、mers.37 Annex C (normative): Representation of IPEI as printed text38 Annex D (informative): Bibliography.39 Annex E (informative): Change history.40 History41 ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may h
16、ave been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI stan
17、dards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of ot
18、her IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This European Standard (Telecommunications series) has been produced by ETSI Project Digital Enhanced Cordless Telecommunications (DECT)
19、. The present document is part 6 of a multi-part deliverable. Full details of the entire series can be found in part 1 1. Further details of the DECT system may be found in TR 101 178 and ETR 043 (see bibliography). National transposition dates Date of adoption of this EN: 27 July 2007 Date of lates
20、t announcement of this EN (doa): 31 October 2007 Date of latest publication of new National Standard or endorsement of this EN (dop/e): 30 April 2008 Date of withdrawal of any conflicting National Standard (dow): 30 April 2008 ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 6 1 Scope The present document is
21、 one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). This part specifies the identities and addressing structure of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). There are four categories of identiti
22、es to be used for identification and addressing in a general DECT environment. These four categories are: Fixed Part (FP) identities; Portable Part (PP) identities; connection-related identities; equipment-related identities. Fixed part identities and portable part identities are used for: access in
23、formation from fixed parts to portable parts; access requests from portable parts; identification of portable parts; identification of fixed parts and radio fixed parts; paging; billing. These identities support: different environments, such as residential, public or private; supply to manufacturers
24、, installers, and operators of globally unique identity elements with a minimum of central administration; multiple access rights for the same portable; large freedom for manufacturers, installers, and operators to structure the fixed part identities, e.g. to facilitate provision of access rights to
25、 groups of DECT systems; roaming agreements between DECT networks run by the same or different owners/operators; indication of handover domains; indication of location areas, i.e. paging area; indication of subscription areas of a public service. The present document also provides for length indicat
26、ors and other messages that can override the default location and/or paging area and domain indications given by the structure of the identities. Connection related identities are used to identify the protocol instances associated with a call and are used for peer-to-peer communication. Equipment re
27、lated identities are used to identify a stolen PP and to derive a default identity coding for PP emergency call set-up. Coding of identity information elements for higher layer messages is found in EN 300 175-5 5, clause 7.7. ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 7 User authentication and cipherin
28、g need additional key information and is outside the scope of the present document, but is covered in other parts of EN 300 175 1 to 7, e.g. EN 300 175-7 6. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data servic
29、es, new slot types and other technical enhancements. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number
30、) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org/Reference. NOTE: While any hype
31、rlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 1 ETSI EN 300 175-1: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 1: Overview“. 2 Void. 3 ETSI EN 300 175-3: “Digital Enhanced Cordless Telecommun
32、ications (DECT); Common Interface (CI); Part 3: Medium Access Control (MAC) layer“. 4 ETSI EN 300 175-4: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 4: Data Link Control (DLC) layer“. 5 ETSI EN 300 175-5: “Digital Enhanced Cordless Telecommunications (DECT); Com
33、mon Interface (CI); Part 5: Network (NWK) layer“. 6 ETSI EN 300 175-7: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features“. 7 ETSI EN 300 175-8: “Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 8: Speech coding and
34、transmission“. 8 ITU-T Recommendation E.164: “The international public telecommunication numbering plan“. 9 Void. 10 ITU-T Recommendation E.212: “The international identification plan for mobile terminals and mobile users“. ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 8 3 Definitions and abbreviations 3.
35、1 Definitions For the purposes of the present document, the terms and definitions given in EN 300 175-1 1 apply. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: ARC Access Rights Class ARD Access Rights Details ARI Access Rights Identity BACN Bank ACcou
36、nt Number BCD Binary Coded Decimal CBI Collective Broadcast Identifier CI Common Interface CMD CoMmanD bit CTM Cordless Terminal Mobility DECT Digital Enhanced Cordless Telecommunications DLC Data Link Control EIC Equipment Installers Code EMC Equipment Manufacturers Code FIL FILl bits FMID Fixed pa
37、rt MAC Identity FP Fixed Part FPN Fixed Part Number FPS Fixed Part Sub-number FT Fixed radio Termination GOP GSM OPerator code GSM Global System for Mobile ID Identification IMSI International Mobile Subscriber Identity IPEI International Portable Equipment Identity IPUI International Portable User
38、Identity ISDN Integrated Services Digital Network LA Location Area LAI Location Area Identification LAL Location Area Level LAN Local Area Network lsb least significant bit LSIG Link SIGnature MAC Medium Access Control MCC Mobile Country Code msb most significant bit NT Identities information, one N
39、-channel message NWK NetWorK PABX Private Automatic Branch eXchange PARI Primary Access Rights Identity PARK Portable Access Rights Key PARKy PARK with value y for its park length indicator PBX Private Branch eXchange PHL PHysical Layer PLI Park Length Indicator PLMN-Id Public Land Mobile Network Id
40、entification PMID Portable part MAC IDentity POC Public Operator Code PP Portable Part PSN Portable equipment Serial Number ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 9 PSTN Public Switched Telephone Network PT Portable radio Termination PUN Portable User Number PUT Portable User Type QH Q field header
41、 QT System information and multiframe marker RFP Radio Fixed Part RFPI Radio Fixed Part Identity RPN Radio fixed Part Number SARI Secondary Access Rights Identity SP-id Service Provider identity TARI Tertiary Access Rights Identity TPUI Temporary Portable User Identity UMTS Universal Mobile Telecomm
42、unication Systems WRS Wireless Relay Station 4 General description of FP and PP identities Every radio FP broadcasts for its purpose a unique identity which contains a globally unique (to a service provider) Access Rights Identity (ARI). Every PP has both a Portable Access Rights Key (PARK) and an I
43、nternational Portable User Identity (IPUI). These operate as a pair. A PP is allowed to access any radio FP which broadcasts an ARI that can be identified by any of the portable access rights keys of that PP. The IPUI is used to identify the portable in the domain defined by its related ARI. The IPU
44、I can either be locally unique or globally unique. Figure 4.1 illustrates the identity structure. Primary PARI Secondary PARI Tertiary PARI Radio Fixed Part Number RPN Access Rights Identity ARI Access Rights Class ARC Access Rights Details ARD Radio Fixed Part Identity RFPI Portable Access Rights K
45、ey PARK International Portable User Identity IPUI Portable User Type PUT Portable User Number PUN FP Identities PP Identities Figure 4.1: General identity structure The common base for the DECT identity structure is the Access Rights Class (ARC) and Access Rights Details (ARD). These need to be know
46、n by both the FP and the PPs. In the FP the ARC and ARD are called Access Rights Identity (ARI), and in the PP they are called Portable Access Rights Key (PARK). The distinction between PARK and ARI is that each PARK can have a group of ARDs allocated, PARKy. “y“ is the value of the PARK length indi
47、cator given in the PP subscription process. ARC ARD y bits “dont care“ bits Figure 4.2: Structure of PARKy ETSI ETSI EN 300 175-6 V2.1.1 (2007-08) 10 If the ARI is a primary ARI, i.e. PARI, it will form, together with a RFP number, the broadcast identity RFPI. ARIs can also be less frequently broadc
48、ast as Secondary Access Rights Identities (SARIs) and may also be available as Tertiary Access Rights Identities (TARIs), which are not broadcast, but are accessible upon request. The PUT and PUN form the PP users identity, IPUI. This identity can either be globally unique or locally unique. In addi
49、tion to IPUIs, shorter temporary identities, TPUIs, may be used for paging. A PP is identified by its pairs of PARKy and IPUI. A PP is only allowed to access a FP if one of its PARKs includes one of the ARIs of the FP, i.e. the PARI, a SARI or a TARI. 4.1 Combinations of ARIs, PARKs and IPUIs DECT provides a flexible radio access technology for a large variety of private and public networks or systems. This leads to different requirements on e.g. sub-system grouping, distribution and