没有合适的资源?快使用搜索试试~ 我知道了~
首页DMR Trunking标准 TS102 361-4
资源详情
资源评论
资源推荐
ETSI TS 102 361-4 V1.3.1 (2010-06
)
Technical Specification
Electromagnetic compatibility
and Radio spectrum Matters (ERM);
Digital Mobile Radio (DMR
) Systems;
Part 4: DMR
trunking protocol
ETSI
ETSI TS 102 361
-
4 V1.3.1 (2010
-
06)
2
Reference
RTS/ERM-TGDMR-278-4
Keywords
data, digital, MS, radio, signalling, trunking
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org
The present document may be made available in more than one electronic version or in print. In any case of existing or
perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).
In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specif
ic network drive
within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, please send your comment to one of the following services:
http://portal.etsi.org/chaircor/ETSI_support.asp
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2010.
All rights reserved.
DECT
TM
, PLUGTESTS
TM
, UMTS
TM
, TIPHON
TM
, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered
for the benefit of its Members.
3GPP
TM
is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
LTE™ is a Trade Mark of ETSI currently being registered
for the benefit of its Members and of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
ETSI TS 102 361
-
4 V1.3.1 (2010
-
06)
3
Contents
Intellectual Property Rights .............................................................................................................................. 10
Foreword ........................................................................................................................................................... 10
1 Scope ...................................................................................................................................................... 11
2 References .............................................................................................................................................. 11
2.1 Normative references ....................................................................................................................................... 11
2.2 Informative references ...................................................................................................................................... 12
3 Definitions, symbols and abbreviations ................................................................................................. 12
3.1 Definitions ........................................................................................................................................................ 12
3.2 Symbols ............................................................................................................................................................ 16
3.3 Abbreviations ................................................................................................................................................... 16
4 Overview ................................................................................................................................................ 17
4.1 Protocol architecture......................................................................................................................................... 18
4.1.1 Air Interface Physical Layer (layer 1)......................................................................................................... 19
4.1.2 Air Interface Data Link Layer (layer 2) ...................................................................................................... 19
4.1.3 Air Interface Call Control Layer (layer 3) .................................................................................................. 20
4.2 Services and Facilities ...................................................................................................................................... 21
4.3 Device Addresses ............................................................................................................................................. 22
4.3.1 MS Addresses ............................................................................................................................................. 22
4.3.2 Services and Gateway Addresses ................................................................................................................ 22
4.4 Conventional/Trunked Systems ........................................................................................................................ 22
4.5 MS Location ..................................................................................................................................................... 23
4.6 Tier III Services ................................................................................................................................................ 23
4.6.1 MS initiating calls ....................................................................................................................................... 23
4.6.2 MS receiving calls ...................................................................................................................................... 24
4.6.2.1 MS receiving individual calls ................................................................................................................ 24
4.6.2.1.1 Off Air Call Set-Up (OACSU) ........................................................................................................ 24
4.6.2.1.2 Full Off Air Call Set-Up (FOACSU)............................................................................................... 24
4.6.2.2 MS receiving calls to talkgroups ........................................................................................................... 24
4.6.2.3 MS receiving calls to All_MS ............................................................................................................... 24
4.7 Physical Link Organization .............................................................................................................................. 24
4.7.1 Radio Frequency Allocation ....................................................................................................................... 25
4.7.2 Colour Code (CC) ....................................................................................................................................... 25
4.8 DMR TDMA burst and channel structure ........................................................................................................ 25
4.9 Introduction to the TS Structure ....................................................................................................................... 26
4.9.1 An individual voice call example ............................................................................................................... 27
4.9.1.1 Individual Call using OACSU............................................................................................................... 27
4.9.1.2 Individual Call using FOACSU ............................................................................................................ 28
4.9.2 A talkgroup call example ............................................................................................................................ 28
4.10 Network architecture ........................................................................................................................................ 29
4.10.1 Network functions ...................................................................................................................................... 29
4.10.1.1 Establishing service ............................................................................................................................... 30
4.10.1.2 Network Identifier ................................................................................................................................. 30
4.10.2 MS Location by Registration ...................................................................................................................... 30
4.11 Trunking methods............................................................................................................................................. 30
4.11.1 Message trunking ........................................................................................................................................ 30
4.11.2 Transmission trunking ................................................................................................................................ 31
4.11.3 Quasi-Transmission trunking ...................................................................................................................... 31
5 Trunking Control Channel Formats ....................................................................................................... 31
5.1 The use of the CACH ....................................................................................................................................... 32
5.1.1 SYS_Parms - System Identity Code Subset ................................................................................................ 32
5.1.2 SYS_Parms - Reg ....................................................................................................................................... 32
5.1.3 SYS_Parms - Common_Slot_Counter ........................................................................................................ 32
5.2 Tier III signalling.............................................................................................................................................. 33
ETSI
ETSI TS 102 361
-
4 V1.3.1 (2010
-
06)
4
5.3 Modes of control channel ................................................................................................................................. 33
5.3.1 Dedicated TSCC ......................................................................................................................................... 33
5.3.2 Non-Dedicated TSCC ................................................................................................................................. 33
5.3.3 Operation in shared spectrum ..................................................................................................................... 33
5.4 CSBK/MBC/UDT Block Structure .................................................................................................................. 34
5.4.1 CSBK/MBC/UDT PDUs on the TSCC outbound channel ......................................................................... 34
5.4.2 CSBK/MBC/UDT PDUs on the TSCC inbound channel ........................................................................... 35
5.4.3 CSBK/MBC PDUs on the Payload Channel Outbound channel ................................................................ 36
5.4.4 CSBK PDUs on the Payload Channel Inbound channel ............................................................................. 37
6 Trunking Procedures .............................................................................................................................. 37
6.1 Basic Structure ................................................................................................................................................. 37
6.1.1 Channel Structure ....................................................................................................................................... 37
6.1.1.1 Fully Regulated Structure ..................................................................................................................... 37
6.1.1.2 Shared Channel Unregulated Structure ................................................................................................. 38
6.1.2 Physical Channel Addressing ..................................................................................................................... 38
6.1.3 Sub-Division of the MS population ............................................................................................................ 38
6.2 Random Access Procedures ............................................................................................................................. 40
6.2.1 The Random Access Principle .................................................................................................................... 40
6.2.1.1 Random Access Control ........................................................................................................................ 40
6.2.1.1.1 Sub dividing the MS population ...................................................................................................... 40
6.2.1.1.2 Checking the Service-Function ....................................................................................................... 41
6.2.1.1.3 Withdrawing slots from Random-Access ........................................................................................ 41
6.2.1.1.4 TSCC responses to Random Access attempts ................................................................................. 42
6.2.1.1.5 Noting the response delay................................................................................................................ 42
6.2.1.1.6 Random Backoff .............................................................................................................................. 43
6.2.1.1.7 Retry decision and time-outs ........................................................................................................... 44
6.2.1.1.8 Random Access (non-emergency) SDL for a MS as defined in clause 6.2 ..................................... 45
6.2.1.1.9 Random Access (emergency) SDL for a MS as defined in clause 6.2 ............................................ 48
6.2.1.2 Action after receiving an acknowledgement ......................................................................................... 50
6.2.1.3 MS Arriving on a Control Channel ....................................................................................................... 51
6.3 Control Channel Acquisition and Retention ..................................................................................................... 51
6.3.1 MS Parameter Volatility ............................................................................................................................. 52
6.3.2 Control Channel Acquisition Procedures .................................................................................................... 52
6.3.2.1 Entry into TSCC Acquisition Procedures ............................................................................................. 53
6.3.2.2 Identifying a Candidate Control Channel .............................................................................................. 53
6.3.2.2.1 Checking the System Identity Code ................................................................................................ 54
6.3.2.2.2 TSCC Authorization Procedure ....................................................................................................... 56
6.3.2.2.3 Checking the SYS_AREA information element ............................................................................. 57
6.3.2.3 Confirmation - Monitoring the TSCC outbound channel signal quality ............................................... 58
6.3.3 MS Leaving a Control Channel .................................................................................................................. 59
6.3.3.1 Reasons for Leaving a Control Channel when active but idle .............................................................. 59
6.3.3.2 Leaving a Control Channel Whilst Waiting for Signalling ................................................................... 59
6.4 Registration, Power Save, and Authentication Procedures ............................................................................... 59
6.4.1 Registration ................................................................................................................................................. 60
6.4.1.1 Introduction ........................................................................................................................................... 60
6.4.1.2 The Principle ......................................................................................................................................... 61
6.4.2 MS Parameter Volatility ............................................................................................................................. 62
6.4.3 Action on confirmation of a TSCC ............................................................................................................. 62
6.4.4 Registration Procedures .............................................................................................................................. 62
6.4.4.1 Registration by Random Access ........................................................................................................... 62
6.4.4.1.1 Intermediate Acknowledgement ...................................................................................................... 63
6.4.4.1.2 Registration accepted ....................................................................................................................... 63
6.4.4.1.3 Registration Refused ....................................................................................................................... 64
6.4.4.1.4 Registration Denied ......................................................................................................................... 64
6.4.4.1.5 Challenge and Response Authentication ......................................................................................... 64
6.4.4.1.6 Registration Attempt Times Out ...................................................................................................... 64
6.4.4.1.7 Registration Demand Received During Random Access Registration ............................................ 64
6.4.4.1.8 No answer response Received after the maximum number of random access attempts .................. 65
6.4.4.1.9 Registration Action on Switch-on or equivalent .............................................................................. 65
6.4.4.1.10 Registration scenario MSC .............................................................................................................. 65
6.4.4.1.11 Registration with MS authentication ............................................................................................... 66
ETSI
ETSI TS 102 361
-
4 V1.3.1 (2010
-
06)
5
6.4.4.1.12 Acceptance of user initiated service requests .................................................................................. 67
6.4.5 Mass re-registration .................................................................................................................................... 67
6.4.5.1 Procedure for MS on receipt of Mass Re-registration Broadcast .......................................................... 68
6.4.6 De-registration ............................................................................................................................................ 68
6.4.7 Power Save ................................................................................................................................................. 69
6.4.7.1 Overview ............................................................................................................................................... 69
6.4.7.2 Power Save Procedures ......................................................................................................................... 70
6.4.7.2.1 Basic Power Save Procedures .......................................................................................................... 70
6.4.8 Authentication Procedures .......................................................................................................................... 71
6.4.8.1 Key Management .................................................................................................................................. 71
6.4.8.2 Authentication Procedures for the TSCC to authenticate a MS ............................................................ 71
6.4.8.3 Authentication Procedures for the MS .................................................................................................. 72
6.4.9 MS Stun/Revive .......................................................................................................................................... 72
6.4.9.1 MS Stun/Revive without authentication................................................................................................ 72
6.4.9.1.1 Stun / Revive procedures for the TSCC .......................................................................................... 73
6.4.9.1.2 Stun / Revive procedures for the MS ............................................................................................... 73
6.4.9.2 MS Stun/Revive with authentication ..................................................................................................... 73
6.4.9.2.1 Stun / Revive procedures with authentication for the TSCC ........................................................... 74
6.4.9.2.2 Stun / Revive procedures with authentication for the MS ............................................................... 74
6.4.10 MS Kill ....................................................................................................................................................... 75
6.4.10.1 Kill procedures with authentication for the TSCC ................................................................................ 76
6.4.10.2 Kill procedures with authentication for the MS .................................................................................... 76
6.4.11 IP Connection Advice ................................................................................................................................. 77
6.4.11.1 IP Connection Advice procedures for the MS ....................................................................................... 78
6.4.11.1.1 Registration Attempt Times Out ...................................................................................................... 78
6.4.11.1.2 No answer response received after the maximum number of random access attempts ................... 78
6.4.11.1.3 MS response to C_AHOY inviting the MS to send an IP address ................................................... 78
6.4.11.1.4 Final acknowledgment to IP connection advice received by the calling MS .................................. 78
6.4.11.2 IP Connection Advice procedures for the TSCC .................................................................................. 78
6.4.12 MS Radio Check ......................................................................................................................................... 79
6.4.13 Supplementary_User Data Service ............................................................................................................. 79
6.4.14 MS Power Control and Transmitter Pre-emption Control .......................................................................... 80
6.4.14.1 Reverse Channel ................................................................................................................................... 80
6.4.14.2 Procedures for Power Control ............................................................................................................... 81
6.4.14.3 Procedures for Transmission Pre-emption Control ............................................................................... 81
6.5 Unified Data Transport Mechanism ................................................................................................................. 81
6.5.1 Format of the appended data ....................................................................................................................... 84
6.5.1.1 UDT Block Structure ............................................................................................................................ 84
6.5.1.2 UDT Content for Services Carried on the Outbound channel ............................................................... 84
6.5.1.3 UDT Mechanism for the Inbound channel ............................................................................................ 86
6.6 Call procedures ................................................................................................................................................. 87
6.6.1 Procedures common to Voice calls and Packet Data Calls ......................................................................... 89
6.6.1.1 MS Availability Checks ........................................................................................................................ 89
6.6.1.1.1 Availability of calling MS ............................................................................................................... 89
6.6.1.1.2 Availability of called party as part of a call ..................................................................................... 89
6.6.1.1.3 General MS radio check .................................................................................................................. 89
6.6.1.2 Call Cancellation ................................................................................................................................... 89
6.6.1.3 Acknowledgements sent to calling MS ................................................................................................. 89
6.6.1.4 Called Party Answering Mechanism ..................................................................................................... 90
6.6.1.4.1 TSCC response to the Call Answer Random Access....................................................................... 90
6.6.1.4.2 Call Party Answer behaviour for the MS......................................................................................... 91
6.6.1.5 Maintenance of call progress waiting timers ......................................................................................... 91
6.6.1.5.1 Call waiting timer for the calling MS .............................................................................................. 91
6.6.1.5.2 Call waiting timer for the called MS ............................................................................................... 92
6.6.1.6 Payload Channel Assignment................................................................................................................ 92
6.6.2 Voice Call Procedures ................................................................................................................................ 93
6.6.2.1 Voice Call Procedures for the TSCC .................................................................................................... 93
6.6.2.1.1 TSCC Response to single-part voice call set-up .............................................................................. 94
6.6.2.1.2 TSCC Response to multi-part voice call set-up ............................................................................... 94
6.6.2.1.3 Acknowledgements sent by the TSCC to the calling MS (voice).................................................... 95
6.6.2.1.4 Voice Radio Check .......................................................................................................................... 95
6.6.2.1.5 Availability Check for Voice Calls connected through Gateways .................................................. 96
剩余215页未读,继续阅读
travelhop
- 粉丝: 6
- 资源: 64
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- RTL8188FU-Linux-v5.7.4.2-36687.20200602.tar(20765).gz
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0