ImageVerifierCode 换一换
格式:PDF , 页数:155 ,大小:1.78MB ,
资源ID:735787      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735787.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 300-3-2009 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Designers- guide Part 3 Direct Mode Operation (DMO) (V1 3 3)《陆地集群无线电(TETRA) 语音加数据(V+D) 设计员指南 第3部分 直接模.pdf)为本站会员(priceawful190)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 300-3-2009 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Designers- guide Part 3 Direct Mode Operation (DMO) (V1 3 3)《陆地集群无线电(TETRA) 语音加数据(V+D) 设计员指南 第3部分 直接模.pdf

1、 ETSI TR 102 300-3 V1.3.3 (2009-06)Technical Report Terrestrial Trunked Radio (TETRA);Voice plus Data (V+D);Designers guide;Part 3: Direct Mode Operation (DMO)ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 2 Reference RTR/TETRA-01187-3 Keywords MS, radio, TETRA ETSI 650 Route des Lucioles F-06921 Sophia An

2、tipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The pre

3、sent document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printer

4、s of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/s

5、tatus/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restric

6、tion extend to reproduction in all media. European Telecommunications Standards Institute 2009. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered f

7、or the benefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 102 300

8、-3 V1.3.3 (2009-06) 3 Content Intellectual Property Rights9 Foreword.9 1 Scope 10 2 References 10 2.1 Normative references .11 2.2 Informative references11 3 Definitions, symbols and abbreviations .12 3.1 Definitions12 3.2 Symbols14 3.3 Abbreviations .15 4 What is direct mode and why do we need it?.

9、16 4.1 General .16 4.2 Frequency of operation.17 4.3 Managed Direct Mode18 5 Direct mode services and facilities.19 5.1 Service definitions19 5.1.1 Teleservice19 5.1.2 Bearer service .19 5.1.3 Intrinsic service.19 5.1.4 Summary of tele/bearer services offered in TETRA DMO 20 5.1.5 Service Access 20

10、5.2 Direct mode teleservices 21 5.2.1 Individual call .21 5.2.2 Group call .21 5.2.3 SDS based teleservices .21 5.3 Direct mode bearer services .21 5.3.1 Circuit mode unprotected bearer services.22 5.3.2 Circuit mode protected bearer services.22 5.3.3 Short Data Service (SDS) .22 5.3.4 SDS-TL servic

11、e 23 5.4 Intrinsic services.23 5.4.1 DM late entry23 5.4.2 Transmitting party identification 24 5.4.3 Emergency calls24 6 Description of direct mode equipment types24 6.1 General .24 6.2 Direct mode mobile station (DM-MS) .25 6.3 Dual watch mobile station (DW-MS).26 6.4 Direct mode repeater (DM-REP)

12、27 6.5 Direct mode gateway (DM-GATE)27 6.6 Direct mode repeater/gateway combination (DM-REP/GATE).28 6.7 Direct mode power classes .28 6.8 Limitations imposed by the physical layer for direct mode type equipment 29 7 Direct mode operational examples .29 7.1 General .29 7.2 MS to MS communication wit

13、h full Dual Watching30 7.3 DMO communication via a repeater with full Dual Watching.31 7.4 Gateway operation31 7.5 Direct mode repeater/gateway operation33 8 Outline of direct mode protocols34 8.1 OSI reference model.34 8.2 TDMA frame and slot structure for direct mode operation34 ETSI ETSI TR 102 3

14、00-3 V1.3.3 (2009-06) 4 8.2.1 Frame structure .35 8.2.2 Timeslots and bursts .35 8.3 Physical layer functionality 36 8.4 Single call protocols .37 8.4.1 MS-MS Normal Mode37 8.4.2 Repeater type 1A 37 8.4.3 Repeater type 1B.38 8.4.4 Gateway 38 8.4.5 Repeater/Gateway types 1A and 1B .38 8.5 Two call pr

15、otocols39 8.5.1 MS-MS frequency efficient mode 39 8.5.2 Repeater type 2 .40 8.6 Choosing the repeater type .40 8.6.1 Background.40 8.6.2 Mobile trunked mode base station 40 8.6.2.1 Advantages of using a stand-alone mobile trunked mode base station for repeater operation41 8.6.2.2 Disadvantages of us

16、ing a stand-alone mobile trunked mode base station for repeater operation .41 8.7 Co-existence with trunked mode41 8.7.1 General41 8.7.2 Type 1A DM-REP in TM-BS transmit band 42 8.7.3 Type 1A DM-REP in TM-BS receive band43 8.7.4 Type 1B or type 2 DM-REP transmitter in TM-BS transmit band .44 8.7.5 T

17、ype 1B or type 2 DM-REP transmitter in TM-BS receive band.45 8.7.6 DM-REP and DM-MSs far from TM-BS and TM-MSs.46 8.7.7 DM-REP and DM-MSs far from TM-BS, close to TM-MSs .46 8.7.8 DM-REP and DM-MSs close to TM-BS, far from TM-MSs .47 8.7.9 DM-REP and DM-MSs close to TM-BS and TM-MSs47 8.8 Co-existen

18、ce with direct mode MS-MS operation .48 8.8.1 General48 8.8.2 MS-MS call in type 1B DM-REP uplink band .48 8.8.3 MS-MS call in type 1B DM-REP downlink band 49 8.9 Direct mode frequency re-use 50 8.9.1 General50 8.9.2 MS-MS call on type 1B DM-REP uplink frequency 51 8.9.3 MS-MS call on type 1B DM-REP

19、 downlink frequency .52 8.10 Implementation and operation issues affecting dual watch 53 8.10.1 General53 8.10.2 Basis for dual watch operation53 8.10.3 Implementation of dual watch operation 53 8.10.3.1 Switching from idle to active 54 8.10.3.2 Switching from active to active.55 8.11 Channel survei

20、llance 56 8.12 Battery economy 56 8.13 Testable boundaries56 9 Security features.57 9.1 General .57 9.2 Authentication 57 9.2.1 Mobile to mobile operation.57 9.2.2 Dual Watch Operation 57 9.2.3 Gateway mode operation 57 9.3 Confidentiality57 9.3.1 Air Interface (AI) encryption57 9.3.1.1 Cipher Key 5

21、8 9.3.1.2 The Time Variant Parameter (TVP)59 9.3.2 End-to-end encryption 59 9.4 Key Management .59 9.4.1 Air Interface Encryption keys.59 9.4.2 End to End Encryption keys .59 10 Radio Aspects.59 10.1 DMO deployment constraints.59 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 5 10.2 Transmitter noise60 10.

22、3 Blocking .61 10.4 Effects of transmitter noise and blocking .62 10.5 Methodology 62 10.5.1 Assumptions .63 10.5.2 Calculating the effect of transmitter noise 63 10.5.3 Calculating the effect of blocking.64 10.5.4 Allowing for a noise floor uplift .64 10.5.5 Translating path losses into distances .

23、64 10.6 Example 1 - wanted signal at extremity of range, unwanted interferer close by65 10.6.1 Step 1 - Calculate allowable noise 65 10.6.2 Step 2 - Translate allowable noise into path loss and stay-away distance 66 10.6.3 Step 3 - Calculate path loss and stay-away distance for blocking.66 10.7 Exam

24、ple 2 - wanted signal at close range, unwanted interferer close by .66 10.7.1 Step 1 - Calculate noise floor uplift 66 10.7.2 Step 2 - Calculate allowable noise 67 10.7.3 Step 3 - Translate allowable noise into path loss and stay-away distance 67 10.7.4 Step 4 - Calculate path loss and stay-away dis

25、tance for blocking.67 10.8 Unwanted transmission noise versus blocking.67 10.9 Variation of stay-away distance with transmitter power and frequency separation .68 10.10 Effect of assumptions .69 10.11 Implementation issues 70 10.12 Recommended frequency separation for DMO MS-MSs.73 11 Operational sc

26、enarios .73 11.1 Range extension scenario using type 1A repeater 73 11.2 Range extension scenarios using a gateway .75 11.3 DMO range extension scenario with link into TMO Dispatcher using a type 1B repeater/gateway76 11.4 DMO range extension scenario with link into TMO Dispatcher using a gateway .7

27、8 11.5 Range extension inside buildings using a type 2 repeater 79 Annex A: Teleservices, bearer and supplementary services supported by TMO/DMO81 Annex B: Short range propagation models used in the co-existence studies82 B.1 Introduction 82 B.2 Free space propagation.82 B.3 Bacon model.83 B.4 CEPT

28、SE21 model .84 B.5 Discussion 86 Annex C: Trial results for short range propagation model and comparison between theoretical and measured stay-away distances.89 C.1 Introduction 89 C.2 Results of the trials.89 C.3 Assumptions of the theoretical calculations.90 C.4 Propagation model92 C.5 Losses betw

29、een receiver and transmitters 92 C.6 Reduction in voice quality94 C.7 Measured transmitter losses at the Newbury Racecourse trials and the decreased margin95 C.8 The assumption of linearity96 C.9 Conclusions and discussion98 C.10 Quantitative assessment .99 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 6

30、Annex D: RF channel selection, numbering and addressing100 D.1 Background 100 D.2 Numbering100 D.3 Addressing in repeater and gateway direct mode operation.101 D.4 Summary 101 Annex E: Detailed direct mode protocols 102 E.1 General .102 E.2 MS-MS direct mode normal operation.102 E.2.1 DM protocol la

31、yering .102 E.2.2 MS-MS direct mode functionality103 E.2.3 MS-MS physical resources.103 E.2.4 Slot timing diagrams 103 E.2.4.1 Constraints on the frame structure (including synchronization) .104 E.2.4.2 Direct mode operation 104 E.2.5 MS-MS call set-up protocol .105 E.2.5.1 MS-MS call set-up without

32、 presence check105 E.2.5.2 MS-MS call set-up time (fundamental constraints) 106 E.2.5.3 MS-MS call set-up with presence check.106 E.2.6 Late entry106 E.2.7 Channel reservation and changeover in a call 107 E.2.8 Pre-emption of a DM call.108 E.2.9 Terminating a call.109 E.2.10 DM short data call 109 E

33、.2.10.1 Unacknowledged short data message .109 E.2.10.2 Acknowledged short data message .109 E.2.11 Implementation issues 110 E.2.11.1 Configuration110 E.2.11.2 Calling/dialling procedures.110 E.3 Repeater Type 1A.111 E.3.1 DM protocol layering .111 E.3.2 Direct mode functionality.111 E.3.3 Physical

34、 resources 111 E.3.4 Slot timing diagrams 111 E.3.4.1 Constraints on the frame structure (including synchronization) .111 E.3.4.2 Direct mode operation 111 E.3.5 Call set-up protocol 112 E.3.5.1 Call set-up without presence check.112 E.3.5.2 Call set-up time (fundamental constraints) .113 E.3.5.3 Ca

35、ll set-up with presence check113 E.3.6 Late entry114 E.3.7 Channel reservation and changeover in a call 114 E.3.8 Pre-emption of a DM call.115 E.3.9 Terminating a call.116 E.3.10 DM short data call 116 E.3.10.1 Unacknowledged short data message .116 E.3.10.2 Acknowledged short data message .117 E.3.

36、11 Implementation Issues118 E.3.11.1 Configuration118 E.3.11.2 Calling/dialling procedures.119 E.3.11.3 Operational procedures.119 E.3.11.4 Constraints 119 E.4 Repeater Type 1B.120 E.4.1 DM protocol layering .120 E.4.2 Direct mode functionality.120 E.4.3 Physical resources 120 E.4.4 Slot timing diag

37、rams 120 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 7 E.4.4.1 Constraints on the frame structure (including synchronization) .120 E.4.4.2 Direct mode operation 120 E.4.5 Call set-up protocol 120 E.4.5.1 Call set-up without presence check.120 E.4.5.2 Call set-up time (fundamental constraints) .120 E.4.5

38、.3 Call set-up with presence check121 E.4.6 Late entry121 E.4.7 Channel reservation and changeover in a call 121 E.4.8 Pre-emption of a DM call.121 E.4.9 Terminating a call.121 E.4.10 DM short data call 121 E.4.10.1 Unacknowledged short data message .121 E.4.10.2 Acknowledged short data message .121

39、 E.4.11 Implementation Issues121 E.4.11.1 Configuration121 E.4.11.2 Calling/dialling procedures.121 E.4.11.3 Operational procedures.121 E.4.11.4 Constraints 121 E.5 Gateway122 E.5.1 DM protocol layering .122 E.5.2 Direct mode functionality.122 E.5.3 Physical resources 122 E.5.4 Slot timing diagrams

40、122 E.5.4.1 Constraints on the frame structure (including synchronization) .124 E.5.4.2 Direct mode operation 124 E.5.5 Call set-up protocol 124 E.5.5.1 Group call from V+D to DM-MS via a DM-GATE .124 E.5.5.2 Group call from DM-MS via a DM-GATE 126 E.5.5.3 Call set-up time (fundamental constraints)

41、.128 E.5.5.4 Individual call from V+D MS to DM-MS via a DM-GATE 129 E.5.5.5 Individual call from DM-MS to V+D MS via a DM-GATE 131 E.5.6 Late entry132 E.5.7 Channel reservation and changeover in a call 132 E.5.8 Pre-emption of a DM call.134 E.5.9 Terminating a DM-GATE call .136 E.5.10 DM short data

42、call 136 E.5.11 Implementation Issues137 E.5.11.1 Configuration137 E.5.11.2 Calling/dialling procedures.137 E.5.11.3 Operational procedures.138 E.5.11.4 Constraints 138 E.6 Repeater/Gateway Type 1A .138 E.6.1 DM protocol layering .138 E.6.2 Direct mode functionality.138 E.6.3 Physical resources 139

43、E.6.4 Slot timing diagrams 139 E.6.4.1 Constraints on the frame structure (including synchronization) .139 E.6.4.2 Direct mode operation 139 E.6.5 Group call from DM-MS via DM-REP/GATE 139 E.6.6 Implementation Issues140 E.6.6.1 Configuration140 E.6.6.2 Calling/dialling procedures.141 E.6.6.3 Operati

44、onal procedures.142 E.6.6.4 Constraints 142 E.7 Repeater/Gateway Type 1B142 E.7.1 DM protocol layering .142 E.7.2 Direct mode functionality.142 E.7.3 Physical resources 142 E.7.4 Implementation Issues142 E.7.4.1 Configuration142 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 8 E.7.4.2 Calling/dialling proc

45、edures.143 E.7.4.3 Operational procedures.143 E.7.4.4 Constraints 143 E.8 MS-MS frequency efficient operation143 E.8.1 DM protocol layering .143 E.8.2 Direct mode functionality.143 E.8.3 Physical resources 143 E.8.4 Slot timing diagrams 143 E.8.4.1 Constraints on the frame structure (including synch

46、ronization) .143 E.8.4.2 Direct mode operation 143 E.8.5 Call set-up protocol 144 E.8.5.1 Call set-up without presence check.144 E.8.5.2 Call set-up time (fundamental constraints) .144 E.8.5.3 Call set-up with presence check144 E.8.6 Late entry144 E.8.7 Channel reservation and changeover in a call 1

47、45 E.8.8 Pre-emption of a DM call.145 E.8.9 Terminating a call.145 E.8.10 DM short data call 145 E.8.10.1 Unacknowledged short data message .145 E.8.10.2 Acknowledged short data message .145 E.8.11 Implementation Issues145 E.8.11.1 Configuration145 E.8.11.2 Calling/dialling procedures.145 E.9 Repeat

48、er Type 2 .145 E.9.1 DM protocol layering .145 E.9.2 Direct mode functionality.145 E.9.3 Physical resources 146 E.9.4 Slot timing diagrams 146 E.9.4.1 Constraints on the frame structure (including synchronization) .146 E.9.4.2 Direct mode operation 146 E.9.5 Call set-up protocol 146 E.9.5.1 Call set

49、-up without presence check.147 E.9.5.2 Call set-up time (fundamental constraints) .148 E.9.5.3 Call set-up with presence check148 E.9.6 Late entry149 E.9.7 Channel reservation and changeover in a call 149 E.9.8 Pre-emption of a DM call.150 E.9.9 Terminating a call.151 E.9.10 DM short data call 151 E.9.10.1 Unacknowledged short data message .151 E.9.10.2 Acknowledged short data message .152 E.9.11 Implementation Issues153 E.9.11.1 Configuration153 E.9.11.2 Calling/dialling procedures.153 E.9.11.3 Operational procedures.153 E.9.11.4 Constraints 153 Annex F: Support of security f

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1