1、 ETSI TR 102 300-3 V1.3.3 (2009-06)Technical Report Terrestrial Trunked Radio (TETRA);Voice plus Data (V+D);Designers guide;Part 3: Direct Mode Operation (DMO)ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 2 Reference RTR/TETRA-01187-3 Keywords MS, radio, TETRA ETSI 650 Route des Lucioles F-06921 Sophia An
2、tipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The pre
3、sent document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printer
4、s of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/s
5、tatus/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restric
6、tion extend to reproduction in all media. European Telecommunications Standards Institute 2009. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered f
7、or the benefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 102 300
8、-3 V1.3.3 (2009-06) 3 Content Intellectual Property Rights9 Foreword.9 1 Scope 10 2 References 10 2.1 Normative references .11 2.2 Informative references11 3 Definitions, symbols and abbreviations .12 3.1 Definitions12 3.2 Symbols14 3.3 Abbreviations .15 4 What is direct mode and why do we need it?.
9、16 4.1 General .16 4.2 Frequency of operation.17 4.3 Managed Direct Mode18 5 Direct mode services and facilities.19 5.1 Service definitions19 5.1.1 Teleservice19 5.1.2 Bearer service .19 5.1.3 Intrinsic service.19 5.1.4 Summary of tele/bearer services offered in TETRA DMO 20 5.1.5 Service Access 20
10、5.2 Direct mode teleservices 21 5.2.1 Individual call .21 5.2.2 Group call .21 5.2.3 SDS based teleservices .21 5.3 Direct mode bearer services .21 5.3.1 Circuit mode unprotected bearer services.22 5.3.2 Circuit mode protected bearer services.22 5.3.3 Short Data Service (SDS) .22 5.3.4 SDS-TL servic
11、e 23 5.4 Intrinsic services.23 5.4.1 DM late entry23 5.4.2 Transmitting party identification 24 5.4.3 Emergency calls24 6 Description of direct mode equipment types24 6.1 General .24 6.2 Direct mode mobile station (DM-MS) .25 6.3 Dual watch mobile station (DW-MS).26 6.4 Direct mode repeater (DM-REP)
12、27 6.5 Direct mode gateway (DM-GATE)27 6.6 Direct mode repeater/gateway combination (DM-REP/GATE).28 6.7 Direct mode power classes .28 6.8 Limitations imposed by the physical layer for direct mode type equipment 29 7 Direct mode operational examples .29 7.1 General .29 7.2 MS to MS communication wit
13、h full Dual Watching30 7.3 DMO communication via a repeater with full Dual Watching.31 7.4 Gateway operation31 7.5 Direct mode repeater/gateway operation33 8 Outline of direct mode protocols34 8.1 OSI reference model.34 8.2 TDMA frame and slot structure for direct mode operation34 ETSI ETSI TR 102 3
14、00-3 V1.3.3 (2009-06) 4 8.2.1 Frame structure .35 8.2.2 Timeslots and bursts .35 8.3 Physical layer functionality 36 8.4 Single call protocols .37 8.4.1 MS-MS Normal Mode37 8.4.2 Repeater type 1A 37 8.4.3 Repeater type 1B.38 8.4.4 Gateway 38 8.4.5 Repeater/Gateway types 1A and 1B .38 8.5 Two call pr
15、otocols39 8.5.1 MS-MS frequency efficient mode 39 8.5.2 Repeater type 2 .40 8.6 Choosing the repeater type .40 8.6.1 Background.40 8.6.2 Mobile trunked mode base station 40 8.6.2.1 Advantages of using a stand-alone mobile trunked mode base station for repeater operation41 8.6.2.2 Disadvantages of us
16、ing a stand-alone mobile trunked mode base station for repeater operation .41 8.7 Co-existence with trunked mode41 8.7.1 General41 8.7.2 Type 1A DM-REP in TM-BS transmit band 42 8.7.3 Type 1A DM-REP in TM-BS receive band43 8.7.4 Type 1B or type 2 DM-REP transmitter in TM-BS transmit band .44 8.7.5 T
17、ype 1B or type 2 DM-REP transmitter in TM-BS receive band.45 8.7.6 DM-REP and DM-MSs far from TM-BS and TM-MSs.46 8.7.7 DM-REP and DM-MSs far from TM-BS, close to TM-MSs .46 8.7.8 DM-REP and DM-MSs close to TM-BS, far from TM-MSs .47 8.7.9 DM-REP and DM-MSs close to TM-BS and TM-MSs47 8.8 Co-existen
18、ce with direct mode MS-MS operation .48 8.8.1 General48 8.8.2 MS-MS call in type 1B DM-REP uplink band .48 8.8.3 MS-MS call in type 1B DM-REP downlink band 49 8.9 Direct mode frequency re-use 50 8.9.1 General50 8.9.2 MS-MS call on type 1B DM-REP uplink frequency 51 8.9.3 MS-MS call on type 1B DM-REP
19、 downlink frequency .52 8.10 Implementation and operation issues affecting dual watch 53 8.10.1 General53 8.10.2 Basis for dual watch operation53 8.10.3 Implementation of dual watch operation 53 8.10.3.1 Switching from idle to active 54 8.10.3.2 Switching from active to active.55 8.11 Channel survei
20、llance 56 8.12 Battery economy 56 8.13 Testable boundaries56 9 Security features.57 9.1 General .57 9.2 Authentication 57 9.2.1 Mobile to mobile operation.57 9.2.2 Dual Watch Operation 57 9.2.3 Gateway mode operation 57 9.3 Confidentiality57 9.3.1 Air Interface (AI) encryption57 9.3.1.1 Cipher Key 5
21、8 9.3.1.2 The Time Variant Parameter (TVP)59 9.3.2 End-to-end encryption 59 9.4 Key Management .59 9.4.1 Air Interface Encryption keys.59 9.4.2 End to End Encryption keys .59 10 Radio Aspects.59 10.1 DMO deployment constraints.59 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 5 10.2 Transmitter noise60 10.
22、3 Blocking .61 10.4 Effects of transmitter noise and blocking .62 10.5 Methodology 62 10.5.1 Assumptions .63 10.5.2 Calculating the effect of transmitter noise 63 10.5.3 Calculating the effect of blocking.64 10.5.4 Allowing for a noise floor uplift .64 10.5.5 Translating path losses into distances .
23、64 10.6 Example 1 - wanted signal at extremity of range, unwanted interferer close by65 10.6.1 Step 1 - Calculate allowable noise 65 10.6.2 Step 2 - Translate allowable noise into path loss and stay-away distance 66 10.6.3 Step 3 - Calculate path loss and stay-away distance for blocking.66 10.7 Exam
24、ple 2 - wanted signal at close range, unwanted interferer close by .66 10.7.1 Step 1 - Calculate noise floor uplift 66 10.7.2 Step 2 - Calculate allowable noise 67 10.7.3 Step 3 - Translate allowable noise into path loss and stay-away distance 67 10.7.4 Step 4 - Calculate path loss and stay-away dis
25、tance for blocking.67 10.8 Unwanted transmission noise versus blocking.67 10.9 Variation of stay-away distance with transmitter power and frequency separation .68 10.10 Effect of assumptions .69 10.11 Implementation issues 70 10.12 Recommended frequency separation for DMO MS-MSs.73 11 Operational sc
26、enarios .73 11.1 Range extension scenario using type 1A repeater 73 11.2 Range extension scenarios using a gateway .75 11.3 DMO range extension scenario with link into TMO Dispatcher using a type 1B repeater/gateway76 11.4 DMO range extension scenario with link into TMO Dispatcher using a gateway .7
27、8 11.5 Range extension inside buildings using a type 2 repeater 79 Annex A: Teleservices, bearer and supplementary services supported by TMO/DMO81 Annex B: Short range propagation models used in the co-existence studies82 B.1 Introduction 82 B.2 Free space propagation.82 B.3 Bacon model.83 B.4 CEPT
28、SE21 model .84 B.5 Discussion 86 Annex C: Trial results for short range propagation model and comparison between theoretical and measured stay-away distances.89 C.1 Introduction 89 C.2 Results of the trials.89 C.3 Assumptions of the theoretical calculations.90 C.4 Propagation model92 C.5 Losses betw
29、een receiver and transmitters 92 C.6 Reduction in voice quality94 C.7 Measured transmitter losses at the Newbury Racecourse trials and the decreased margin95 C.8 The assumption of linearity96 C.9 Conclusions and discussion98 C.10 Quantitative assessment .99 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 6
30、Annex D: RF channel selection, numbering and addressing100 D.1 Background 100 D.2 Numbering100 D.3 Addressing in repeater and gateway direct mode operation.101 D.4 Summary 101 Annex E: Detailed direct mode protocols 102 E.1 General .102 E.2 MS-MS direct mode normal operation.102 E.2.1 DM protocol la
31、yering .102 E.2.2 MS-MS direct mode functionality103 E.2.3 MS-MS physical resources.103 E.2.4 Slot timing diagrams 103 E.2.4.1 Constraints on the frame structure (including synchronization) .104 E.2.4.2 Direct mode operation 104 E.2.5 MS-MS call set-up protocol .105 E.2.5.1 MS-MS call set-up without
32、 presence check105 E.2.5.2 MS-MS call set-up time (fundamental constraints) 106 E.2.5.3 MS-MS call set-up with presence check.106 E.2.6 Late entry106 E.2.7 Channel reservation and changeover in a call 107 E.2.8 Pre-emption of a DM call.108 E.2.9 Terminating a call.109 E.2.10 DM short data call 109 E
33、.2.10.1 Unacknowledged short data message .109 E.2.10.2 Acknowledged short data message .109 E.2.11 Implementation issues 110 E.2.11.1 Configuration110 E.2.11.2 Calling/dialling procedures.110 E.3 Repeater Type 1A.111 E.3.1 DM protocol layering .111 E.3.2 Direct mode functionality.111 E.3.3 Physical
34、 resources 111 E.3.4 Slot timing diagrams 111 E.3.4.1 Constraints on the frame structure (including synchronization) .111 E.3.4.2 Direct mode operation 111 E.3.5 Call set-up protocol 112 E.3.5.1 Call set-up without presence check.112 E.3.5.2 Call set-up time (fundamental constraints) .113 E.3.5.3 Ca
35、ll set-up with presence check113 E.3.6 Late entry114 E.3.7 Channel reservation and changeover in a call 114 E.3.8 Pre-emption of a DM call.115 E.3.9 Terminating a call.116 E.3.10 DM short data call 116 E.3.10.1 Unacknowledged short data message .116 E.3.10.2 Acknowledged short data message .117 E.3.
36、11 Implementation Issues118 E.3.11.1 Configuration118 E.3.11.2 Calling/dialling procedures.119 E.3.11.3 Operational procedures.119 E.3.11.4 Constraints 119 E.4 Repeater Type 1B.120 E.4.1 DM protocol layering .120 E.4.2 Direct mode functionality.120 E.4.3 Physical resources 120 E.4.4 Slot timing diag
37、rams 120 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 7 E.4.4.1 Constraints on the frame structure (including synchronization) .120 E.4.4.2 Direct mode operation 120 E.4.5 Call set-up protocol 120 E.4.5.1 Call set-up without presence check.120 E.4.5.2 Call set-up time (fundamental constraints) .120 E.4.5
38、.3 Call set-up with presence check121 E.4.6 Late entry121 E.4.7 Channel reservation and changeover in a call 121 E.4.8 Pre-emption of a DM call.121 E.4.9 Terminating a call.121 E.4.10 DM short data call 121 E.4.10.1 Unacknowledged short data message .121 E.4.10.2 Acknowledged short data message .121
39、 E.4.11 Implementation Issues121 E.4.11.1 Configuration121 E.4.11.2 Calling/dialling procedures.121 E.4.11.3 Operational procedures.121 E.4.11.4 Constraints 121 E.5 Gateway122 E.5.1 DM protocol layering .122 E.5.2 Direct mode functionality.122 E.5.3 Physical resources 122 E.5.4 Slot timing diagrams
40、122 E.5.4.1 Constraints on the frame structure (including synchronization) .124 E.5.4.2 Direct mode operation 124 E.5.5 Call set-up protocol 124 E.5.5.1 Group call from V+D to DM-MS via a DM-GATE .124 E.5.5.2 Group call from DM-MS via a DM-GATE 126 E.5.5.3 Call set-up time (fundamental constraints)
41、.128 E.5.5.4 Individual call from V+D MS to DM-MS via a DM-GATE 129 E.5.5.5 Individual call from DM-MS to V+D MS via a DM-GATE 131 E.5.6 Late entry132 E.5.7 Channel reservation and changeover in a call 132 E.5.8 Pre-emption of a DM call.134 E.5.9 Terminating a DM-GATE call .136 E.5.10 DM short data
42、call 136 E.5.11 Implementation Issues137 E.5.11.1 Configuration137 E.5.11.2 Calling/dialling procedures.137 E.5.11.3 Operational procedures.138 E.5.11.4 Constraints 138 E.6 Repeater/Gateway Type 1A .138 E.6.1 DM protocol layering .138 E.6.2 Direct mode functionality.138 E.6.3 Physical resources 139
43、E.6.4 Slot timing diagrams 139 E.6.4.1 Constraints on the frame structure (including synchronization) .139 E.6.4.2 Direct mode operation 139 E.6.5 Group call from DM-MS via DM-REP/GATE 139 E.6.6 Implementation Issues140 E.6.6.1 Configuration140 E.6.6.2 Calling/dialling procedures.141 E.6.6.3 Operati
44、onal procedures.142 E.6.6.4 Constraints 142 E.7 Repeater/Gateway Type 1B142 E.7.1 DM protocol layering .142 E.7.2 Direct mode functionality.142 E.7.3 Physical resources 142 E.7.4 Implementation Issues142 E.7.4.1 Configuration142 ETSI ETSI TR 102 300-3 V1.3.3 (2009-06) 8 E.7.4.2 Calling/dialling proc
45、edures.143 E.7.4.3 Operational procedures.143 E.7.4.4 Constraints 143 E.8 MS-MS frequency efficient operation143 E.8.1 DM protocol layering .143 E.8.2 Direct mode functionality.143 E.8.3 Physical resources 143 E.8.4 Slot timing diagrams 143 E.8.4.1 Constraints on the frame structure (including synch
46、ronization) .143 E.8.4.2 Direct mode operation 143 E.8.5 Call set-up protocol 144 E.8.5.1 Call set-up without presence check.144 E.8.5.2 Call set-up time (fundamental constraints) .144 E.8.5.3 Call set-up with presence check144 E.8.6 Late entry144 E.8.7 Channel reservation and changeover in a call 1
47、45 E.8.8 Pre-emption of a DM call.145 E.8.9 Terminating a call.145 E.8.10 DM short data call 145 E.8.10.1 Unacknowledged short data message .145 E.8.10.2 Acknowledged short data message .145 E.8.11 Implementation Issues145 E.8.11.1 Configuration145 E.8.11.2 Calling/dialling procedures.145 E.9 Repeat
48、er Type 2 .145 E.9.1 DM protocol layering .145 E.9.2 Direct mode functionality.145 E.9.3 Physical resources 146 E.9.4 Slot timing diagrams 146 E.9.4.1 Constraints on the frame structure (including synchronization) .146 E.9.4.2 Direct mode operation 146 E.9.5 Call set-up protocol 146 E.9.5.1 Call set
49、-up without presence check.147 E.9.5.2 Call set-up time (fundamental constraints) .148 E.9.5.3 Call set-up with presence check148 E.9.6 Late entry149 E.9.7 Channel reservation and changeover in a call 149 E.9.8 Pre-emption of a DM call.150 E.9.9 Terminating a call.151 E.9.10 DM short data call 151 E.9.10.1 Unacknowledged short data message .151 E.9.10.2 Acknowledged short data message .152 E.9.11 Implementation Issues153 E.9.11.1 Configuration153 E.9.11.2 Calling/dialling procedures.153 E.9.11.3 Operational procedures.153 E.9.11.4 Constraints 153 Annex F: Support of security f