ETSI TS 102 000-2004 Broadband Radio Access Networks (BRAN) HIPERACCESS DLC Protocol Specification (v1 4 1 Includes Diskette)《宽带无线接入网(BRAN) HIPERACCESS DLC协议规范(版本1 4 1) 包括磁盘》.pdf

上传人:tireattitude366 文档编号:738645 上传时间:2019-01-12 格式:PDF 页数:282 大小:1.68MB
下载 相关 举报
ETSI TS 102 000-2004 Broadband Radio Access Networks (BRAN) HIPERACCESS DLC Protocol Specification (v1 4 1 Includes Diskette)《宽带无线接入网(BRAN) HIPERACCESS DLC协议规范(版本1 4 1) 包括磁盘》.pdf_第1页
第1页 / 共282页
ETSI TS 102 000-2004 Broadband Radio Access Networks (BRAN) HIPERACCESS DLC Protocol Specification (v1 4 1 Includes Diskette)《宽带无线接入网(BRAN) HIPERACCESS DLC协议规范(版本1 4 1) 包括磁盘》.pdf_第2页
第2页 / 共282页
ETSI TS 102 000-2004 Broadband Radio Access Networks (BRAN) HIPERACCESS DLC Protocol Specification (v1 4 1 Includes Diskette)《宽带无线接入网(BRAN) HIPERACCESS DLC协议规范(版本1 4 1) 包括磁盘》.pdf_第3页
第3页 / 共282页
ETSI TS 102 000-2004 Broadband Radio Access Networks (BRAN) HIPERACCESS DLC Protocol Specification (v1 4 1 Includes Diskette)《宽带无线接入网(BRAN) HIPERACCESS DLC协议规范(版本1 4 1) 包括磁盘》.pdf_第4页
第4页 / 共282页
ETSI TS 102 000-2004 Broadband Radio Access Networks (BRAN) HIPERACCESS DLC Protocol Specification (v1 4 1 Includes Diskette)《宽带无线接入网(BRAN) HIPERACCESS DLC协议规范(版本1 4 1) 包括磁盘》.pdf_第5页
第5页 / 共282页
点击查看更多>>
资源描述

1、 ETSI TS 102 000 V1.4.1 (2004-07)Technical Specification Broadband Radio Access Networks (BRAN);HIPERACCESS;DLC protocol specificationfloppy3 ETSI ETSI TS 102 000 V1.4.1 (2004-07) 2 Reference RTS/BRAN-0030002-R3 Keywords access, broadband, HIPERACCESS, radio ETSI 650 Route des Lucioles F-06921 Sophi

2、a Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The

3、 present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI pri

4、nters of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/

5、tb/status/status.asp If you find errors in the present document, send your comment to: editoretsi.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunicati

6、ons Standards Institute 2004. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registere

7、d for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 102 000 V1.4.1 (2004-07) 3 Contents Intellectual Property Rights8 Foreword.8 Introduction 8 1 Scope 10 2 References 10 3 Definitions, symbols and abbreviations .11 3.1 Definitions11 3.2 Symbols11 3.3 Abbreviations

8、 .17 4 Overview 20 4.1 Applications and services.20 4.2 Point-to-Multipoint (PMP) architecture .20 4.2.1 General20 4.2.2 Interoperability aspects .21 4.2.3 Duplex Schemes (FDD, TDD) and H-FDD operation22 4.2.4 Multiplexing techniques and frame structure22 4.3 Basic Arrangement of HA networks 23 4.3.

9、1 System and reference configuration23 4.3.2 External and internal interfaces, interworking functions 25 4.3.3 Layer architecture and functional entities.25 4.4 Convergence Layers .27 4.4.1 Cell-based Convergence Layer.27 4.4.2 Packet-based Convergence Layer .27 4.4.3 Handling of DLC QoS classes 28

10、4.5 Data Link Control (DLC) Layer.29 4.5.1 Overview and basic features .29 4.5.2 Radio Link Control (RLC) sublayer .30 4.5.3 Medium Access Control (MAC) sublayer 30 4.5.4 Error control (ARQ) within the MAC sublayer 30 4.5.5 Security control within the RLC sublayer.31 4.5.6 Multicast connections .31

11、4.6 Physical (PHY) layer32 4.6.1 Adaptive coding and modulation32 4.6.2 Automatic Transmit Power Control (ATPC)33 5 Interface to PHY layer33 5.1 Definition of MAC PDU 33 5.1.1 Layer overview and general definitions (CL PDU and MAC PDU) 33 5.1.2 Long MAC PDUs .35 5.1.3 Short MAC PDU.36 5.2 Interface

12、DLC-PHY .36 5.2.1 Informal description in terms of detailed parameter lists36 5.2.2 Data units in transmitter and receiver chain39 5.2.3 Downlink with FDD mode .40 5.2.4 Uplink with FDD mode 42 5.2.5 TDD mode 43 5.2.6 Structure of RS codewords and preambles in UL bursts 44 6 DLC addressing and ident

13、ities .44 6.1 General .44 6.2 APC Identity (APC-ID)45 6.3 Access Terminal (AT) Identities 45 6.3.1 AT MAC address (equipment ID based on MAC-48) 45 6.3.2 Terminal Identity (TID)45 ETSI ETSI TS 102 000 V1.4.1 (2004-07) 4 6.4 Connection IDentity (CID).46 6.5 Connection aggregate identity (CAID).47 7 M

14、AC management messages: mapping to MAC management connections, transport and list of all messages.47 7.1 Overview of connection types 47 7.2 Transport of MAC management messages with MAC Signalling PDUs.48 7.2.1 Some general rules48 7.2.2 The use of long MAC signalling PDUs 49 7.2.3 The use of short

15、 MAC signalling PDUs .49 7.3 Transport of MAC management messages (packing, encoding, segmentation)51 7.3.1 Overview of message formats.51 7.3.2 Overview of packing, encoding and segmentation .52 7.3.3 Encoding rule53 7.3.4 Packing of MAC management messages53 7.3.5 Segmentation and Reassembly (SAR)

16、 53 7.4 List of protocol primitives and mapping of messages to connections (normative) 54 7.4.1 List of all MAC management messages .54 7.4.2 Messages for packing56 7.4.3 Messages for multiple-TID.56 7.4.4 Overview of Connections .57 7.5 List of service primitives (informative)58 8 Multiplexing and

17、MAC frame structure.59 8.1 MAC PDU format 60 8.1.1 Overview 60 8.1.2 MAC PDU header.60 8.1.3 MAC data PDU.62 8.1.4 Long MAC signalling PDU 62 8.1.5 Short MAC signalling PDU63 8.1.6 Long and short MAC dummy PDU63 8.2 Frame structure.63 8.2.1 Frame structure for downlink64 8.2.2 Frame structure for up

18、link 65 8.3 Support of FDD, H-FDD and TDD in DLC layer 67 8.3.1 FDD mode 67 8.3.2 H-FDD operation67 8.3.3 TDD Mode68 8.4 Entries for downlink and uplink maps69 8.4.1 Downlink map entries.69 8.4.2 Uplink map entries71 8.4.3 More details on DL and UL map use72 8.5 Automatic Repeat Request (ARQ) .73 8.

19、5.1 Operational conditions for ARQ.73 8.5.2 Frame structure for ARQ 73 8.5.3 ARQ map entries 74 8.5.4 Rules for re-transmissions 75 8.5.5 Impact of ARQ on delay and overhead (informal) .79 8.6 Structure of the control zone 79 8.6.1 Overview of main fields .79 8.6.2 Further details of all fields 81 8

20、.6.3 FEC scheme for fast decoding 83 8.7 Time Relevance of Starting Symbols (SS) and maps.83 8.7.1 Starting Symbols for UL bursts 84 8.7.2 Time relevance of maps for FDD mode85 8.7.3 Time relevance of maps for TDD mode .86 8.7.4 Timing rule for some specific short grants .87 8.8 General Broadcast In

21、formation (GBI) message .88 8.9 AT reaction to undefined parameters .90 9 Resource-Grant Control (RGC) and contention resolution 90 9.1 General .90 9.2 Grants .90 ETSI ETSI TS 102 000 V1.4.1 (2004-07) 5 9.3 Requests .91 9.3.1 General request strategy91 9.3.2 Requests per MAC PDU header .92 9.3.3 Req

22、uests per bandwidth request message .93 9.3.4 AP-requested queue status report94 9.4 Allocation mechanisms 95 9.4.1 Continuous grant.95 9.4.2 Polling.95 9.4.3 Piggyback .96 9.4.4 Poll-me bit 96 9.4.5 Contention reservation97 9.5 Contention resolution .98 9.5.1 Contention resolution algorithm .98 9.5

23、.2 Bandwidth request contention window.98 9.5.3 Contention opportunities acknowledgments.99 10 Initialization control (IC)100 10.1 Overview 100 10.2 Process of initialization 100 10.3 Steps from frequency scanning to downlink synchronization 103 10.3.1 Frequency scanning 103 10.3.2 Synchronization a

24、cquisition103 10.3.3 APC identification 104 10.3.4 UL and DL parameters acquisition .105 10.3.5 Summary.106 10.4 Ranging 107 10.4.1 Overview 107 10.4.2 Ranging described with MSC diagrams109 10.4.3 Timing advance for ranging (and normal operation) 110 10.4.4 Ranging described with state diagrams.112

25、 10.4.5 Ranging described in terms of the frame structure .114 10.5 Capabilities negotiation and authentication116 10.5.1 Physical capabilities negotiation.116 10.5.2 Authentication.117 10.5.3 Other capabilities negotiation .118 10.6 Serial and parallel processes during initialization 119 11 Radio R

26、esource Control (RRC)121 11.1 Overview 121 11.2 Link supervision.121 11.2.1 Detection of link loss 121 11.2.2 Reaction on link loss.122 11.2.3 Reaction on AT malfunction.125 11.2.4 Performance monitoring .126 11.3 Change of PHY mode, ATPC and ATTC 126 11.3.1 Overview 126 11.3.2 Measurement of uplink

27、 RF carrier at AP 128 11.3.3 Measurement of downlink RF carrier at AT and measurement reports to AP129 11.3.4 Change of downlink PHY mode.131 11.3.5 Automatic Uplink Transmit Power Control (UL ATPC) and Automatic Uplink Transmit Time Control (UL ATTC)136 11.3.6 Automatic Downlink Transmit Power Cont

28、rol (DL ATPC).137 11.4 Change of PHY Mode Set 138 11.5 Change of UL structure 139 11.6 Load levelling (inter-carrier handover) 140 12 Security control 141 12.1 Overview 142 12.1.1 Overview in terms of HMSC 142 12.1.2 Overview of all security messages143 12.1.3 Key structure and operational issues.14

29、5 12.2 Phased Security 146 12.2.1 Overview of phase 1, phase 2 and phase 3 security146 ETSI ETSI TS 102 000 V1.4.1 (2004-07) 6 12.2.2 Negotiation of phased security146 12.3 Authentication 147 12.3.1 Overview 147 12.3.2 First Authentication during first or re-initialization148 12.3.3 Re-authenticatio

30、n during normal operation 149 12.3.4 X.509 Certificates .150 12.3.5 Certificate chains 154 12.4 TEK exchange 154 12.4.1 Overview 154 12.4.2 Algorithm for TEK encryption with AK.155 12.4.3 TEK refresh allocation156 12.4.4 First TEK allocation158 12.4.5 Global view on TEK exchange.160 12.4.6 Changing

31、TEKs for phase 1 security 160 12.4.7 Changing TEKs for phase 3 security 161 12.5 Privacy (encryption of payload with TEK) 162 12.6 Cryptographic standards.163 12.6.1 Certificate .163 12.6.2 Asymmetric keys for AT 163 12.6.3 Message digest HMAC.163 12.6.4 Data encryption standard DES164 12.6.5 Random

32、 numbers 164 13 Connection Control (CC) .164 13.1 Common part layer primitives (informative only)164 13.1.1 Use of primitives.166 13.1.2 DlcConnectionAdditionInitReq 166 13.1.3 DlcConnectionAdditionReq167 13.1.4 DlcConnectionAdditionInitInd .167 13.1.5 DlcConnectionAdditionInd.167 13.1.6 DlcConnecti

33、onAdditionRsp167 13.1.7 DlcConnectionAdditionCnf 168 13.1.8 Changing an existing connection168 13.1.9 DlcConnectionDeletionReq 168 13.1.10 DlcConnectionDeletionInd .168 13.1.11 DlcConnectionDeletionRsp 169 13.1.12 DlcConnectionDeletionCnf 169 13.1.13 DlcDataReq.169 13.1.14 DlcDataInd169 13.2 MSC dia

34、grams (informative only)169 13.3 DLC service categories 172 13.4 Connection control procedures.173 13.4.1 Overview of protocol primitives.174 13.4.1.1 HMSC of procedures.174 13.4.1.2 Parameters.175 13.4.2 Connection establishment procedure 176 13.4.2.1 AT initiated connection establishment procedure

35、 .177 13.4.2.2 AP initiated connection establishment procedure .178 13.4.3 Change of established connection procedure179 13.4.4 Connection deletion procedure .181 13.5 Multicast connections.183 Annex A (normative): Parameters and constants .184 A.1 List of optional/mandatory features .184 A.2 Detail

36、ed specification of PHY parameters in protocol primitives185 A.3 Timers.186 Annex B (normative): Formats of protocol primitives .188 Annex C (informative): Formats of service primitives198 ETSI ETSI TS 102 000 V1.4.1 (2004-07) 7 Annex D (informative): MSC interpretation guidelines199 Annex E (normat

37、ive): SDL specification of DLC protocol 202 E.1 The HIPERACCESS SDL model.202 E.2 Radio Resource Control SDL model202 E.2.1 RRC AP203 E.2.2 RRC AT .208 E.3 Initialization control SDL model212 E.3.1 IC AP212 E.3.2 IC AT .223 E.4 Connection control SDL model232 E.4.1 CC AP 232 E.4.2 CC AT 237 E.5 Secu

38、rity control SDL model.242 E.5.1 AP_SC242 E.5.2 AT_SC249 E.5.3 AP_TEK.255 E.5.4 AT_TEK.264 Annex F (informative): ASN.1 interpretation guidelines .273 Annex G (informative): List of all PHY parameters .274 Annex H (informative): Bibliography.276 History 282 ETSI ETSI TS 102 000 V1.4.1 (2004-07) 8 In

39、tellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property R

40、ights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including

41、 IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has be

42、en produced by ETSI Project Broadband Radio Access Networks (BRAN). The present document describes the basic data transport functions of the Data Link Control (DLC) layer for fixed wireless access systems above 11 GHz according to the High Performance Radio Access (HIPERACCESS) project. Separate ETS

43、I documents provide details of the system overview, the PHYsical (PHY) layer, the Convergence Layer (CL) and the conformance test requirements defined for HIPERACCESS. For the purpose of the present document, a “system“ constitutes the PHY and DLC layers, which are independent of the core network, a

44、nd the core network specific convergence layers. It should be noted that to specify a complete system, other specifications, e.g. for the network layer and higher layers are required. These specifications are assumed to be available or to be developed by other bodies. Introduction The main field of

45、application of HIPERACCESS systems is to provide access to a broad range of core networks including ATM, IP, PSTN, PDN, etc. By means of a Point-to-Multipoint (PMP) architecture the network service area may cover scattered subscriber locations. The systems may be applied to build new access networks

46、 by means of a multi-cellular architecture, covering both suburban, urban and regional areas. Subscribers are offered the full range of services by the particular public or private network. Subscribers will have access to these services by means of the various standardized user network interfaces. H

47、IPERACCESS systems provide standard network interfaces and transparently connect subscribers to the appropriate network node. These systems allow a service to be connected to a number of subscribers ranging from a few to several thousand, and over a wide range of distances, e.g. up to 2 km to 5 km.

48、The essential features of a HIPERACCESS system are: efficient use of the radio spectrum; high multiplex gain; maintaining QoS. Radio is often the ideal way of obtaining communications at low cost and difficult topography. Moreover, a small number of sites are required for these installations, thus f

49、acilitating rapid implementation and minimizing maintenance requirements of the systems. Multiplexing means that m subscribers can share n radio channels (m being larger than n), allowing a better use to be made of the available frequency spectrum and at a lower equipment cost. The term “multi-access“ derives from the fact that every subscriber has access to every channel (instead of a fixed assignment as in most multiplex systems). When a call or service is initiated the required resource is allocated to it. When the call or service is terminated, the resource is released

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1