DEN/DECT-00359-2

  • Standard
    76 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    76 pages
    English language
    sale 15% off
  • Standard
    76 pages
    English language
    sale 15% off
  • Draft
    76 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document specifies tests applicable to all Digital Enhanced Cordless Telecommunications (DECT)
equipment accessing the DECT frequency band 1 880 MHz to 1 900 MHz and including provisions for testing other or
extended frequency bands as described in ETSI EN 300 175-1 [i.11] and ETSI EN 300 175-2 [1]. Part 2 of the present
multi-part deliverable [i.15] specifies tests applicable to DECT speech and audio transmission using a collection of
speech codecs, including Recommendation ITU-T G.726 [i.7] ADPCM codec, Recommendation ITU-T G.722 [i.8]
"7 kHz codec", "MPEG-4 codec" [i.10], LC3plus [i.24] and others.
The aims of the present document are to ensure:
• efficient use of frequency spectrum;
• no harm done to any connected network and its services;
• no harm done to other radio networks and services;
• no harm done to other DECT equipment or its services;
• interworking of terminal equipment via the public network.
The tests of ETSI EN 300 176 are split into two parts:
• the present document (part 1) covers testing of radio frequency parameters, security elements and those DECT
protocols that facilitate the radio frequency tests and efficient use of frequency spectrum;
• part 2 [i.15] describes testing of speech and audio requirements between network interface and DECT PT, or
between a DECT CI air interface and alternatively a DECT PT or FT. Part 2 is not applicable to terminal
equipment specially designed for the disabled (e.g. with amplification of received speech as an aid for the
hard-of-hearing).
DECT terminal equipment consists of the following elements:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Station (WRS) (FP and PP combined);
e) Hybrid Part (HyP) (a PP with capability to act as a FP to provide PP to PP communication).
Details of the DECT Common Interface may be found in ETSI EN 300 175-1 [i.11], ETSI EN 300 175 parts 2 to 3 [1]
to [2], ETSI EN 300 175-4 [i.12], ETSI EN 300 175 parts 5 to 6 [3] to [4], and ETSI EN 300 175 parts 7 to 8 [i.13] to
[i.14]. Further details of the DECT system may be found in the ETSI Technical Report ETSI TR 101 178 [i.1].
Information about ULE may be found in the ETSI Technical Specifications ETSI TS 102 939-1 [i.20] and ETSI
TS 102 939-2 [i.21].

  • Standard
    135 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    135 pages
    English language
    sale 15% off
  • Standard
    136 pages
    English language
    sale 15% off
  • Draft
    136 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document specifies technical characteristics and methods of measurements for equipment implementing the
Digital Enhanced Cordless Telecommunications (DECT) common interface, as specified in the multi-part technical
specification ETSI EN 300 175 including the variants DECT Evolution and DECT ULE (see ETSI EN 300 175-1 [i.3]
for an overview).
The present document applies to the following equipment types:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Station (WRS) (FP and PP combined);
e) Hybrid Part (HyP) (a PP with capability to act as a FP to provide PP to PP communication).
These radio equipment types are capable of operating in all or any part of the frequency bands given in table 1.
The DECT service frequency band for transmitting and receiving for all elements is 1 880 MHz to 1 900 MHz.
Details of the DECT Common Interface may be found in ETSI EN 300 175-1 [i.3], ETSI EN 300 175 parts 2 [1] to
3 [2], ETSI EN 300 175-4 [i.4], ETSI EN 300 175 parts 5 [3] to 6 [4], and ETSI EN 300 175 parts 7 [i.5] to 8 [i.6].
Further details of the DECT system may be found in the ETSI TR 101 178 [i.1].
DECT ULE implements, in addition to the DECT Common Interface, the multi-part ETSI TS 102 939 (see ETSI TS 102 939-1 [i.7] and ETSI TS 102 939-2 [i.8]).
The present document contains requirements to demonstrate that radio equipment both effectively uses and supports the
efficient use of radio spectrum in order to avoid harmful interference.
NOTE: The relationship between the present document and essential requirements of article 3.2 of Directive 2014/53/EU [i.10] is given in annex A.

  • Standard
    106 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    106 pages
    English language
    sale 15% off
  • Standard
    107 pages
    English language
    sale 15% off
  • Draft
    107 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document specifies the tests applicable to all Digital Enhanced Cordless Telecommunications (DECT)
equipment accessing any DECT frequency band (including applicable IMT-2000 frequency bands) and the tests
applicable to DECT speech and audio transmission using any of the codecs and any of the audio specifications
described in ETSI EN 300 175-8 [8].
The aims of the present document are to ensure:
• efficient use of frequency spectrum;
• no harm done to any connected network and its services;
• no harm done to other radio networks and services;
• no harm done to other DECT equipment or its services;
• interworking of terminal equipment via any public telecommunications network, including the ISDN/PSTN
network and the Internet,
through testing those provisions of ETSI EN 300 175-1 [1] to ETSI EN 300 175-8 [8] which are relevant to these aims.
The tests of ETSI EN 300 176 are split into two parts:
• part 1 [9] covers testing of radio frequency parameters, security elements and those DECT protocols that
facilitate the radio frequency tests and efficient use of frequency spectrum;
• part 2 (the present document) describes testing of speech and audio requirements between network interface
and DECT PT, or between a DECT CI air interface and alternatively a DECT PT or FT.
The present document is not applicable to terminal equipment specially designed for the disabled (e.g. with
amplification of received speech as an aid for the hard of hearing).
DECT terminal equipment consists of the following elements:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Stations (WRS) (FP and PP combined).
The present document is structured to allow tests of either:
a) the FP and PP together; or
b) the FP and PP as separate items.
Where the DECT FP is connected to a PSTN, and there are any peculiarities in the requirements for voice telephony,
these will be accommodated within the FP.

  • Standard
    345 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    345 pages
    English language
    sale 15% off
  • Standard
    346 pages
    English language
    sale 15% off
  • Draft
    346 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
This part of the DECT CI specifies the speech and audio coding and transmission requirements.
In order to ensure satisfactory interworking of different portable and fixed units, it is necessary to specify the
transmission performance of the analog information over the digital link. This requires not only use of a common
speech algorithm, but also standardization of frequency responses, reference speech levels (or loudness) at the air
interface and various other parameters.
The present document applies to DECT equipment which includes all the necessary functions to provide real-time
two-way speech conversation and stereo audio transmission. Several speech services are defined in the present
document, including conventional 3,1 kHz telephony, wideband 7 kHz voice transmission, super-wideband 14 kHz and
fullband 20 kHz service. DECT Fixed part providing such services may be connected to the public circuit switched
(PSTN/ISDN) network, to private networks or to the Voice over Internet Protocol (VoIP) network.
Tethered fixed point local loop applications are not required to comply with the requirements of the present document.
For the DECT systems which connect to the Public Switched Telephone Network (PSTN) via an analog interface, the
additional requirements, which are implemented in the FP, have as much as possible been aligned with ETSI
TBR 038 [29].
A summary of the control and the use of the DECT echo control functions, to guide on need for options to
manufacturers and installers, is found in annex A.
Information concerning test methods can be found in ETSI EN 300 176-1 [9] and ETSI EN 300 176-2 [10] (previously
covered by ETSI TBR 010 [i.5]). The test methods take into account that DECT is a digital system.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
In addition, the present document includes DECT Evolution, providing SWB and FB speech and audio capabilities and
a new speech coding algorithm for NB and WB allowing to increase the audio quality of the NB and WB speech service
and improve bandwidth efficiency.
The latest update for DECT Evolution includes the support of ultra-band, high resolution, low-latency speech and audio
coding, and additional PP types supported with LC3plus coding. An application profile using these new PP types can be
found in ETSI TS 103 706 [i.28].

  • Standard
    236 pages
    English language
    sale 15% off
  • Standard
    236 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    237 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the physical channel arrangements. DECT physical channels are radio communication
paths between two radio end points. A radio end point is either part of the fixed infrastructure, a privately owned Fixed
Part (FP), typically a base station, or a Portable Part (PP), typically a handset. The assignment of one or more particular
physical channels to a call is the task of higher layers.
The Physical Layer (PHL) interfaces with the Medium Access Control (MAC) layer, and with the Lower Layer
Management Entity (LLME). On the other side of the PHL is the radio transmission medium which has to be shared
extensively with other DECT users and a wide variety of other radio services. The tasks of the PHL can be grouped into
five categories:
a) to modulate and demodulate radio carriers with a bit stream of a defined rate to create a radio frequency
channel;
b) to acquire and maintain bit and slot synchronization between transmitters and receivers;
c) to transmit or receive a defined number of bits at a requested time and on a particular frequency;
d) to add and remove the synchronization field and the Z-field used for rear end collision detection;
e) to observe the radio environment to report signal strengths.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    68 pages
    English language
    sale 15% off
  • Standard
    68 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    68 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Data Link Control (DLC) layer. The DLC layer is part 4 of the DECT CI standard
and layer 2b of the DECT protocol stack.
Two planes of operation are specified for this DLC (sub)layer. These planes are called the Control plane (C-plane) and
the User plane (U-plane).
The C-plane is mostly concerned with the DECT signalling aspects. It provides a reliable point-to-point service that
uses a link access protocol to offer error protected transmission of Network (NWK) layer messages. The C-plane also
provides a separate point-to-multipoint (broadcast) service (Lb).
The U-plane is only concerned with end-to-end user information. This plane contains most of the application dependent
procedures of DECT. Several alternative services (both circuit-mode and packet-mode) are defined as a family of
independent entities. Each service provides one or more point-to-point U-plane data links, where the detailed
characteristics of those links are determined by the particular needs of each service. The defined services cover a wide
range of performance, from "unprotected with low delay" for speech applications to "highly protected with variable
delay", for local area network applications.
NOTE: The performance of the DLC services need not be tight to any particular application. For example the
"unprotected with low delay" service could also be used for data applications, e.g. if some data protection
is provided outside the DECT protocol.
The present document uses the layered model principles and terminology as described in Recommendations ITU-T
X.200 [14] and X.210 [15].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    182 pages
    English language
    sale 15% off
  • Standard
    182 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    182 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Medium Access Control (MAC) layer. The MAC layer is part 3 of the DECT
Common Interface standard and layer 2a of the DECT protocol stack.
It specifies three groups of MAC services:
• the broadcast message control service;
• the connectionless message control service; and
• the multi-bearer control service.
It also specifies the logical channels that are used by the above mentioned services, and how they are multiplexed and
mapped into the Service Data Units (SDUs) that are exchanged with the Physical Layer (PHL).

  • Standard
    373 pages
    English language
    sale 15% off
  • Standard
    373 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    373 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the identities and addressing structure of the Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
There are four categories of identities to be used for identification and addressing in a general DECT environment.
These four categories are:
• Fixed Part (FP) identities;
• Portable Part (PP) identities;
• connection-related identities;
• equipment-related identities.
Fixed part identities and portable part identities are used for:
• access information from fixed parts to portable parts;
• access requests from portable parts;
• identification of portable parts;
• identification of fixed parts and radio fixed parts;
• paging;
• billing.
These identities support:
• different environments, such as residential, public or private;
• supply to manufacturers, installers, and operators of globally unique identity elements with a minimum of
central administration;
• multiple access rights for the same portable;
• large freedom for manufacturers, installers, and operators to structure the fixed part identities, e.g. to facilitate
provision of access rights to groups of DECT systems;
• roaming agreements between DECT networks run by the same or different owners/operators;
• indication of handover domains;
• indication of location areas, i.e. paging area;
• indication of subscription areas of a public service.
The present document also provides for length indicators and other messages that can override the default location
and/or paging area and domain indications given by the structure of the identities.
Connection related identities are used to identify the protocol instances associated with a call and are used for
peer-to-peer communication.
Equipment related identities are used to identify a stolen PP and to derive a default identity coding for PP emergency
call set-up.
Coding of identity information elements for higher layer messages is found in ETSI EN 300 175-5 [5], clause 7.7.
User authentication and ciphering need additional key information and is outside the scope of the present document, but
is covered in other parts of ETSI EN 300 175 [1] to [8], e.g. ETSI EN 300 175-7 [7].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    42 pages
    English language
    sale 15% off
  • Standard
    42 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    42 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the security architecture, the types of cryptographic algorithms required, the way in
which they are to be used, and the requirements for integrating the security features provided by the architecture into the
DECT CI. It also describes how the features can be managed and how they relate to certain DECT fixed systems and
local network configurations.
The security architecture is defined in terms of the security services which are to be supported at the CI, the
mechanisms which are to be used to provide the services, and the cryptographic parameters, keys and processes which
are associated with these mechanisms.
The security processes specified in the present document are each based on one of three cryptographic algorithms:
• an authentication algorithm;
• a key stream generator for MAC layer encryption; and
• a key stream generator plus a Message Authentication Code generator for CCM authenticated encryption.
The architecture is, however, algorithm independent, and either the DECT standard algorithms, or appropriate
proprietary algorithms, or indeed a combination of both can, in principle, be employed. The use of the employed
algorithm is specified in the present document.
Integration of the security features is specified in terms of the protocol elements and processes required at the Network
(NWK) and Medium Access Control (MAC) layers of the CI.
The relationship between the security features and various network elements is described in terms of where the security
processes and management functions may be provided.
The present document does not address implementation issues. For instance, no attempt is made to specify whether the
DSAA or DSAA2 should be implemented in the PP at manufacture, or whether the DSAA, DSAA2 or a proprietary
authentication algorithm should be implemented in a detachable module. Similarly, the present document does not
specify whether the DSC or DSC2 should be implemented in hardware in all PPs at manufacture, or whether special
PPs should be manufactured with the DSC, DSC2 or proprietary ciphers built into them. The security architecture
supports all these options, although the use of proprietary algorithms may limit roaming and the concurrent use of PPs
in different environments.
Within the standard authentication algorithms, DSAA2, DSC2 and CCM are stronger than DSAA and DSC and provide
superior protection. DSAA2 and DSC2 are based on AES [10] and were created in 2011. CCM is also based on
AES [10] and was added to the standard in 2012.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
The present document also includes DECT Ultra Low Energy (ULE), a low rate data technology based on DECT
intended for M2M applications with ultra low power consumption.

  • Standard
    179 pages
    English language
    sale 15% off
  • Standard
    179 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    179 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document gives an introduction and overview of the complete Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
The present document contains an abstract of the other parts of the DECT standard together with a general
description of:
• the objectives of the present document;
• the DECT Common Interface;
• the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the
technical terms used in different parts of the present document.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
The present document includes DECT Evolution.

  • Standard
    41 pages
    English language
    sale 15% off
  • Standard
    41 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    41 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and
layer 3 of the DECT protocol stack.
The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification
for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer.
The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the
following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendation ITU-T
X.200 [i.3] and Recommendation ITU-T X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements. The present document also
includes super-wideband and fullband speech and audio services.

  • Standard
    377 pages
    English language
    sale 15% off
  • Standard
    377 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Draft
    377 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the identities and addressing structure of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). There are four categories of identities to be used for identification and addressing in a general DECT environment. These four categories are:
• Fixed Part (FP) identities;
• Portable Part (PP) identities;
• connection-related identities;
• equipment-related identities.
Fixed part identities and portable part identities are used for:
• access information from fixed parts to portable parts;
• access requests from portable parts;
• identification of portable parts;
• identification of fixed parts and radio fixed parts;
• paging;
• billing.
These identities support:
• different environments, such as residential, public or private;
• supply to manufacturers, installers, and operators of globally unique identity elements with a minimum of central administration;
• multiple access rights for the same portable;
• large freedom for manufacturers, installers, and operators to structure the fixed part identities, e.g. to facilitate
provision of access rights to groups of DECT systems;
• roaming agreements between DECT networks run by the same or different owners/operators;
• indication of handover domains;
• indication of location areas, i.e. paging area;
• indication of subscription areas of a public service.
The present document also provides for length indicators and other messages that can override the default location and/or paging area and domain indications given by the structure of the identities. Connection related identities are used to identify the protocol instances associated with a call and are used for peer-to-peer communication. Equipment related identities are used to identify a stolen PP and to derive a default identity coding for PP emergency call set-up. Coding of identity information elements for higher layer messages is found in ETSI EN 300 175-5 [5], clause 7.7. User authentication and ciphering need additional key information and is outside the scope of the present document, but is covered in other parts of ETSI EN 300 175 [1] to [8], e.g. ETSI EN 300 175-7 [7]. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    42 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    42 pages
    English language
    sale 15% off
  • Standard
    42 pages
    English language
    sale 15% off
  • Draft
    42 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the security architecture, the types of cryptographic algorithms required, the way in which they are to be used, and the requirements for integrating the security features provided by the architecture into the DECT CI. It also describes how the features can be managed and how they relate to certain DECT fixed systems and local network configurations. The security architecture is defined in terms of the security services which are to be supported at the CI, the mechanisms which are to be used to provide the services, and the cryptographic parameters, keys and processes which are associated with these mechanisms.
The security processes specified in the present document are each based on one of three cryptographic algorithms:
• an authentication algorithm;
• a key stream generator for MAC layer encryption; and
• a key stream generator plus a Message Authentication Code generator for CCM authenticated encryption.
The architecture is, however, algorithm independent, and either the DECT standard algorithms, or appropriate proprietary algorithms, or indeed a combination of both can, in principle, be employed. The use of the employed algorithm is specified in the present document. Integration of the security features is specified in terms of the protocol elements and processes required at the Network (NWK) and Medium Access Control (MAC) layers of the CI. The relationship between the security features and various network elements is described in terms of where the security processes and management functions may be provided. The present document does not address implementation issues. For instance, no attempt is made to specify whether the DSAA or DSAA2 should be implemented in the PP at manufacture, or whether the DSAA, DSAA2 or a proprietary authentication algorithm should be implemented in a detachable module. Similarly, the present document does not specify whether the DSC or DSC2 should be implemented in hardware in all PPs at manufacture, or whether special PPs should be manufactured with the DSC, DSC2 or proprietary ciphers built into them. The security architecture supports all these options, although the use of proprietary algorithms may limit roaming and the concurrent use of PPs in different environments. Within the standard authentication algorithms, DSAA2, DSC2 and CCM are stronger than DSAA and DSC and provide superior protection. DSAA2 and DSC2 are based on AES [10] and were created in 2011. CCM is also based on AES [10] and was added to the standard in 2012. The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements. The present document also includes DECT Ultra Low Energy (ULE), a low rate data technology based on DECT intended for M2M applications with ultra low power consumption.

  • Standard
    179 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    179 pages
    English language
    sale 15% off
  • Standard
    179 pages
    English language
    sale 15% off
  • Draft
    179 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document specifies the tests applicable to all Digital Enhanced Cordless Telecommunications (DECT) equipment accessing any DECT frequency band (including applicable IMT-2000 frequency bands) and the tests applicable to DECT speech and audio transmission using any of the codecs and any of the audio specifications described in ETSI EN 300 175-8 [8]. The aims of the present document are to ensure:
• efficient use of frequency spectrum;
• no harm done to any connected network and its services;
• no harm done to other radio networks and services;
• no harm done to other DECT equipment or its services;
• interworking of terminal equipment via any public telecommunications network, including the ISDN/PSTN network and the Internet.
Through testing those provisions of ETSI EN 300 175-1 [1] to ETSI EN 300 175-8 [8] which are relevant to these aims. The tests of ETSI EN 300 176 are split into two parts:
• part 1 [9] covers testing of radio frequency parameters, security elements and those DECT protocols that facilitate the radio frequency tests and efficient use of frequency spectrum;
• part 2 (the present document) describes testing of speech and audio requirements between network interface and DECT PT, or between a DECT CI air interface and alternatively a DECT PT or FT. The present document is not applicable to terminal equipment specially designed for the disabled (e.g. with amplification of received speech as an aid for the hard of hearing). DECT terminal equipment consists of the following elements:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Station (WRS) (FP and PP combined).
The present document is structured to allow tests of either:
a) the FP and PP together; or
b) the FP and PP as separate items.
Where the DECT FP is connected to a PSTN, and there are any peculiarities in the requirements for voice telephony, these will be accommodated within the FP.

  • Standard
    337 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    337 pages
    English language
    sale 15% off
  • Standard
    338 pages
    English language
    sale 15% off
  • Draft
    338 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and layer 3 of the DECT protocol stack. The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendation ITU-T X.200 [i.3] and Recommendation ITU-T X.210 [i.4]. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. The present document also includes super-wideband and fullband speech and audio services.

  • Standard
    378 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    378 pages
    English language
    sale 15% off
  • Standard
    377 pages
    English language
    sale 15% off
  • Draft
    377 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
This part of the DECT CI specifies the speech and audio coding and transmission requirements. In order to ensure satisfactory interworking of different portable and fixed units, it is necessary to specify the transmission performance of the analog information over the digital link. This requires not only use of a common speech algorithm, but also standardization of frequency responses, reference speech levels (or loudness) at the air
interface and various other parameters. The present document applies to DECT equipment which includes all the necessary functions to provide real-time two-way speech conversation and stereo audio transmission. Several speech services are defined in the present document, including conventional 3,1 kHz telephony, wideband 7 kHz voice transmission, super-wideband 14 kHz and fullband 20 kHz service. DECT Fixed part providing such services may be connected to the public circuit switched (PSTN/ISDN) network, to private networks or to the Voice over Internet Protocol (VoIP) network. Tethered fixed point local loop applications are not required to comply with the requirements of the present document. For the DECT systems which connect to the Public Switched Telephone Network (PSTN) via an analog interface, the additional requirements, which are implemented in the FP, have as much as possible been aligned with ETSI TBR 038 [29]. A summary of the control and the use of the DECT echo control functions, to guide on need for options to manufacturers and installers, is found in annex A. Information concerning test methods can be found in ETSI EN 300 176-1 [9] and ETSI EN 300 176-2 [10] (previously covered by ETSI TBR 010 [i.5]). The test methods take into account that DECT is a digital system. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. In addition, the present document includes DECT Evolution, providing SWB and FB speech and audio capabilities and a new speech coding algorithm for NB and WB allowing to increase the audio quality of the NB and WB speech service and improve bandwidth efficiency.

  • Standard
    214 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    214 pages
    English language
    sale 15% off
  • Standard
    214 pages
    English language
    sale 15% off
  • Draft
    214 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the Data Link Control (DLC) layer. The DLC layer is part 4 of the DECT CI standard and layer 2b of the DECT protocol stack. Two planes of operation are specified for this DLC (sub)layer. These planes are called the Control plane (C-plane) and the User plane (U-plane). The C-plane is mostly concerned with the DECT signalling aspects. It provides a reliable point-to-point service that uses a link access protocol to offer error protected transmission of Network (NWK) layer messages. The C-plane also provides a separate point-to-multipoint (broadcast) service (Lb). The U-plane is only concerned with end-to-end user information. This plane contains most of the application dependent
procedures of DECT. Several alternative services (both circuit-mode and packet-mode) are defined as a family of independent entities. Each service provides one or more point-to-point U-plane data links, where the detailed characteristics of those links are determined by the particular needs of each service. The defined services cover a wide range of performance, from "unprotected with low delay" for speech applications to "highly protected with variable delay", for local area network applications. NOTE: The performance of the DLC services need not be tight to any particular application. For example the "unprotected with low delay" service could also be used for data applications, e.g. if some data protection is provided outside the DECT protocol. The present document uses the layered model principles and terminology as described in Recommendations ITU-T X.200 [14] and X.210 [15]. The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    183 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    183 pages
    English language
    sale 15% off
  • Standard
    183 pages
    English language
    sale 15% off
  • Draft
    183 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the physical channel arrangements. DECT physical channels are radio communication paths between two radio end points. A radio end point is either part of the fixed infrastructure, a privately owned Fixed Part (FP), typically a base station, or a Portable Part (PP), typically a handset. The assignment of one or more particular physical channels to a call is the task of higher layers. The Physical Layer (PHL) interfaces with the Medium Access Control (MAC) layer, and with the Lower Layer Management Entity (LLME). On the other side of the PHL is the radio transmission medium which has to be shared extensively with other DECT users and a wide variety of other radio services. The tasks of the PHL can be grouped into five categories:
a) to modulate and demodulate radio carriers with a bit stream of a defined rate to create a radio frequency channel;
b) to acquire and maintain bit and slot synchronization between transmitters and receivers;
c) to transmit or receive a defined number of bits at a requested time and on a particular frequency;
d) to add and remove the synchronization field and the Z-field used for rear end collision detection;
e) to observe the radio environment to report signal strengths.
The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    66 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    66 pages
    English language
    sale 15% off
  • Standard
    66 pages
    English language
    sale 15% off
  • Draft
    66 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Medium Access Control (MAC) layer. The MAC layer is part 3 of the DECT Common Interface standard and layer 2a of the DECT protocol stack. It specifies three groups of MAC services:
• the broadcast message control service;
• the connectionless message control service; and
• the multi-bearer control service.
It also specifies the logical channels that are used by the above mentioned services, and how they are multiplexed and mapped into the Service Data Units (SDUs) that are exchanged with the Physical Layer (PHL). The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    372 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    372 pages
    English language
    sale 15% off
  • Standard
    372 pages
    English language
    sale 15% off
  • Draft
    372 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document contains an abstract of the other parts of the DECT standard together with a general
description of:
• the objectives of the present document;
• the DECT Common Interface;
• the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the technical terms used in different parts of the present document. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. The present document includes DECT Evolution.

  • Standard
    39 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    39 pages
    English language
    sale 15% off
  • Standard
    39 pages
    English language
    sale 15% off
  • Draft
    39 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document specifies technical characteristics and methods of measurements for Digital Enhanced Cordless
Telecommunications (DECT) equipment, and associated ancillary equipment.
The present document covers the essential requirements of article 3.1(b) of Directive 2014/53/EU [i.1] under the
conditions identified in annex A.
Technical specifications related to the antenna port and emissions from the enclosure port of the radio equipment are
not included in the present document.
NOTE: Such technical specifications are found in the relevant product standards for the effective use of the radio
spectrum.
In case of differences (for instance concerning special conditions, definitions, abbreviations) between the present
document and ETSI EN 301 489-1 [1], the provisions of the present document take precedence.
The environmental classification and the emission and immunity requirements used in the present document are as
stated in ETSI EN 301 489-1 [1], except for any special conditions included in the present document.

  • Standard
    21 pages
    English language
    sale 15% off
  • Standard
    21 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    21 pages
    English language
    sale 15% off

The present document defines the Digital Enhanced Cordless Telecommunications (DECT) Wireless Relay Station
(WRS). A WRS is an additional building block for the DECT fixed network.
The present document defines provisions needed for a controlled and reliable application of the DECT WRS
infrastructure building block.
The DECT WRS defined by the present document supports the DECT New Generation (NG-DECT) and DECT Ultra
Low Energy (ULE) profiles.

  • Standard
    103 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    103 pages
    English language
    sale 15% off
  • Standard
    103 pages
    English language
    sale 15% off
  • Draft
    103 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document specifies tests applicable to all Digital Enhanced Cordless Telecommunications (DECT)
equipment accessing the DECT frequency band 1 880 MHz to 1 900 MHz (including provisions for testing other or
extended frequency bands as described in ETSI EN 300 175-1 [i.11] and ETSI EN 300 175-2 [1]). Part 2 of the present
multi-part deliverable [i.15] specifies tests applicable to DECT speech and audio transmission using a collection of
speech codecs, including Recommendation ITU-T G.726 [i.7] ADPCM codec, Recommendation ITU-T G.722 [i.8]
"7 kHz codec", "MPEG-4 codec" [i.10] and others.
The aims of the present document are to ensure:
• efficient use of frequency spectrum;
• no harm done to any connected network and its services;
• no harm done to other radio networks and services;
• no harm done to other DECT equipment or its services;
• interworking of terminal equipment via the public network.
The tests of ETSI EN 300 176 are split into two parts:
• the present document (part 1) covers testing of radio frequency parameters, security elements and those DECT
protocols that facilitate the radio frequency tests and efficient use of frequency spectrum;
• part 2 [i.15] describes testing of speech and audio requirements between network interface and DECT PT, or
between a DECT CI air interface and alternatively a DECT PT or FT. Part 2 is not applicable to terminal
equipment specially designed for the disabled (e.g. with amplification of received speech as an aid for the
hard-of-hearing).
DECT terminal equipment consists of the following elements:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Station (WRS) (FP and PP combined);
e) Hybrid Part (HyP) (a PP with capability to act as a FP to provide PP to PP communication).
Details of the DECT Common Interface may be found in ETSI EN 300 175-1 [i.11], ETSI EN 300 175 parts 2 to 3 [1]
to [2], ETSI EN 300 175-4 [i.12], ETSI EN 300 175 parts 5 to 6 [3] to [4], and ETSI EN 300 175 parts 7 to 8 [i.13] to
[i.14]. Further details of the DECT system may be found in the ETSI Technical Reports, ETSI TR 101 178 [i.1] and
ETSI ETR 043 [i.2]. Information about ULE may be found in the ETSI Technical Specifications ETSI
TS 102 939-1 [i.20] and ETSI TS 102 939-2 [i.21].

  • Standard
    116 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    116 pages
    English language
    sale 15% off
  • Standard
    116 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and layer 3 of the DECT protocol stack.
The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer.
The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendations ITU-T X.200 [i.3] and ITU-T X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    372 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    372 pages
    English language
    sale 15% off
  • Standard
    372 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Medium Access Control (MAC) layer. The MAC layer is part 3 of the DECT
Common Interface standard and layer 2a of the DECT protocol stack.
It specifies three groups of MAC services:
• the broadcast message control service;
• the connectionless message control service; and
• the multi-bearer control service.
It also specifies the logical channels that are used by the above mentioned services, and how they are multiplexed and
mapped into the Service Data Units (SDUs) that are exchanged with the Physical Layer (PHL).
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    348 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    348 pages
    English language
    sale 15% off
  • Standard
    348 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the identities and addressing structure of the Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
There are four categories of identities to be used for identification and addressing in a general DECT environment.
These four categories are:
• Fixed Part (FP) identities;
• Portable Part (PP) identities;
• connection-related identities;
• equipment-related identities.
Fixed part identities and portable part identities are used for:
• access information from fixed parts to portable parts;
• access requests from portable parts;
• identification of portable parts;
• identification of fixed parts and radio fixed parts;
• paging;
• billing.
These identities support:
• different environments, such as residential, public or private;
• supply to manufacturers, installers, and operators of globally unique identity elements with a minimum of
central administration;
• multiple access rights for the same portable;
• large freedom for manufacturers, installers, and operators to structure the fixed part identities, e.g. to facilitate
provision of access rights to groups of DECT systems;
• roaming agreements between DECT networks run by the same or different owners/operators;
• indication of handover domains;
• indication of location areas, i.e. paging area;
• indication of subscription areas of a public service.
The present document also provides for length indicators and other messages that can override the default location
and/or paging area and domain indications given by the structure of the identities.
Connection related identities are used to identify the protocol instances associated with a call and are used for
peer-to-peer communication.
Equipment related identities are used to identify a stolen PP and to derive a default identity coding for PP emergency
call set-up.

  • Standard
    42 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    42 pages
    English language
    sale 15% off
  • Standard
    42 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the physical channel arrangements. DECT physical channels are radio communication
paths between two radio end points. A radio end point is either part of the fixed infrastructure, a privately owned Fixed
Part (FP), typically a base station, or a Portable Part (PP), typically a handset. The assignment of one or more particular
physical channels to a call is the task of higher layers.
The Physical Layer (PHL) interfaces with the Medium Access Control (MAC) layer, and with the Lower Layer
Management Entity (LLME). On the other side of the PHL is the radio transmission medium which has to be shared
extensively with other DECT users and a wide variety of other radio services. The tasks of the PHL can be grouped into
five categories:
a) to modulate and demodulate radio carriers with a bit stream of a defined rate to create a radio frequency
channel;
b) to acquire and maintain bit and slot synchronization between transmitters and receivers;
c) to transmit or receive a defined number of bits at a requested time and on a particular frequency;
d) to add and remove the synchronization field and the Z-field used for rear end collision detection;
e) to observe the radio environment to report signal strengths.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    183 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    183 pages
    English language
    sale 15% off
  • Standard
    183 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the physical channel arrangements. DECT physical channels are radio communication
paths between two radio end points. A radio end point is either part of the fixed infrastructure, a privately owned Fixed
Part (FP), typically a base station, or a Portable Part (PP), typically a handset. The assignment of one or more particular
physical channels to a call is the task of higher layers.
The Physical Layer (PHL) interfaces with the Medium Access Control (MAC) layer, and with the Lower Layer
Management Entity (LLME). On the other side of the PHL is the radio transmission medium which has to be shared
extensively with other DECT users and a wide variety of other radio services. The tasks of the PHL can be grouped into
five categories:
a) to modulate and demodulate radio carriers with a bit stream of a defined rate to create a radio frequency
channel;
b) to acquire and maintain bit and slot synchronization between transmitters and receivers;
c) to transmit or receive a defined number of bits at a requested time and on a particular frequency;
d) to add and remove the synchronization field and the Z-field used for rear end collision detection;
e) to observe the radio environment to report signal strengths.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    67 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    67 pages
    English language
    sale 15% off
  • Standard
    67 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the security architecture, the types of cryptographic algorithms required, the way in
which they are to be used, and the requirements for integrating the security features provided by the architecture into the
DECT CI. It also describes how the features can be managed and how they relate to certain DECT fixed systems and
local network configurations.
The security architecture is defined in terms of the security services which are to be supported at the CI, the
mechanisms which are to be used to provide the services, and the cryptographic parameters, keys and processes which
are associated with these mechanisms.
The security processes specified in the present document are each based on one of three cryptographic algorithms:
• an authentication algorithm;
• a key stream generator for MAC layer encryption; and
• a key stream generator plus a Message Authentication Code generator for CCM authenticated encryption.
The architecture is, however, algorithm independent, and either the DECT standard algorithms, or appropriate
proprietary algorithms, or indeed a combination of both can, in principle, be employed. The use of the employed
algorithm is specified in the present document.
Integration of the security features is specified in terms of the protocol elements and processes required at the Network
(NWK) and Medium Access Control (MAC) layers of the CI.
The relationship between the security features and various network elements is described in terms of where the security
processes and management functions may be provided.
The present document does not address implementation issues. For instance, no attempt is made to specify whether the
DSAA or DSAA2 should be implemented in the PP at manufacture, or whether the DSAA, DSAA2 or a proprietary
authentication algorithm should be implemented in a detachable module. Similarly, the present document does not
specify whether the DSC or DSC2 should be implemented in hardware in all PPs at manufacture, or whether special
PPs should be manufactured with the DSC, DSC2 or proprietary ciphers built into them. The security architecture
supports all these options, although the use of proprietary algorithms may limit roaming and the concurrent use of PPs
in different environments.
Within the standard authentication algorithms, DSAA2, DSC2 and CCM are stronger than DSAA and DSC and provide
superior protection. DSAA2 and DSC2 are based on AES [10] and were created in 2011. CCM is also based on
AES [10] and was added to the standard in 2012.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
The present document also includes DECT Ultra Low Energy (ULE), a low rate data technology based on DECT
intended for M2M applications with ultra low power consumption.

  • Standard
    179 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    179 pages
    English language
    sale 15% off
  • Standard
    179 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
This part of the DECT CI specifies the speech and audio coding and transmission requirements.
In order to ensure satisfactory interworking of different portable and fixed units, it is necessary to specify the
transmission performance of the analog information over the digital link. This requires not only use of a common
speech algorithm, but also standardization of frequency responses, reference speech levels (or loudness) at the air
interface and various other parameters.
The present document applies to DECT equipment which includes all the necessary functions to provide real-time
two-way speech conversation. Several speech services are defined in the present document, including conventional
3,1 kHz telephony, wideband 7 kHz voice transmission and super-wideband 14 kHz service. DECT Fixed part
providing such services may be connected to the public circuit switched (PSTN/ISDN) network, to private networks or
to the Internet.
Tethered fixed point local loop applications are not required to comply with the requirements of the present document.
For the DECT systems which connect to the Public Switched Telephone Network (PSTN) via an analog interface, the
additional requirements, which are implemented in the FP, have as much as possible been aligned with ETSI
TBR 038 [29].
A summary of the control and the use of the DECT echo control functions, to guide on need for options to
manufacturers and installers, is found in annex A.
Information concerning test methods can be found in ETSI EN 300 176-1 [9] and ETSI EN 300 176-2 [10] (previously
covered by ETSI TBR 010 [i.5]). The test methods take into account that DECT is a digital system.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    152 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    152 pages
    English language
    sale 15% off
  • Standard
    152 pages
    English language
    sale 15% off

The present document gives an introduction and overview of the complete Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
The present document contains an abstract of the other parts of the DECT standard together with a general
description of:
• the objectives of the present document;
• the DECT Common Interface;
• the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the
technical terms used in different parts of the present document.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    38 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    38 pages
    English language
    sale 15% off
  • Standard
    38 pages
    English language
    sale 15% off

The present document specifies that set of technical requirements for Digital Enhanced Cordless Telecommunications
(DECT) Fixed Part (FP) and DECT Portable Part (PP) necessary for the support of the Generic Access Profile (GAP).
The GAP is applicable to all DECT Portable radio Terminations (PT) and Fixed radio Terminations (FT) which under
the scope of ETSI EN 300 176-2 [10] (i.e. 3,1 kHz telephony teleservice) and specifies the minimum functionality that
is supported by all other 3,1 kHz voice profiles.
The objective of the present document is to ensure the Air Interface (AI) inter-operability of DECT equipment capable
of 3,1 kHz telephony applications, in such a way that any DECT PT conforming to the procedures described in the
present document is inter-operable with any DECT FT conforming to the procedures described in the present document.
The profile consists of the minimum mandatory requirements that allow a 3,1 kHz teleservice connection to be
established, maintained and released between a FT and a PT with the appropriate access rights, irrespective of whether
the FP provides residential, business or public access services.
In addition, the present document defines the features, services, procedures etc. for both the FT and the PT, which are
provision mandatory either in the PT or in the FT, as well as some elements that are provision optional but still process
mandatory.
Mobility Management (MM) procedures at the DECT AI to support incoming calls and outgoing calls are included.
Inter-working between the FT and the attached network is outside the scope of the present document.

  • Standard
    159 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    159 pages
    English language
    sale 15% off
  • Standard
    159 pages
    English language
    sale 15% off

The present document, together with ETSI EN 301 489-1 [1], covers the assessment of Digital Enhanced Cordless
Telecommunications (DECT) equipment, and associated ancillary equipment, in respect of ElectroMagnetic
Compatibility (EMC).
Technical specifications related to the antenna port and emissions from the enclosure port of the radio equipment are
not included in the present document. Such technical specifications are found in the relevant product standards for the
effective use of the radio spectrum.
The present document specifies the applicable test conditions, performance assessment and performance criteria for
Digital Enhanced Cordless Telecommunications (DECT) equipment, and associated ancillary equipment.
Definitions of types of cordless telecommunications equipment covered by the present document are given in annex B.
In case of differences (for instance concerning special conditions, definitions, abbreviations) between the present
document and ETSI EN 301 489-1 [1], the provisions of the present document take precedence.
The environmental classification and the emission and immunity requirements used in the present document are as
stated in ETSI EN 301 489-1 [1], except for any special conditions included in the present document.

  • Standard
    20 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    20 pages
    English language
    sale 15% off
  • Standard
    20 pages
    English language
    sale 15% off

The present document defines the Digital Enhanced Cordless Telecommunications (DECT) Wireless Relay Station
(WRS). A WRS is an additional building block for the DECT fixed network.
The present document defines provisions needed for a controlled and reliable application of the DECT WRS
infrastructure building block.
The DECT WRS defined by the present document supports the DECT New Generation (NG-DECT) and DECT Ultra
Low Energy (ULE) profiles.

  • Standard
    99 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    99 pages
    English language
    sale 15% off
  • Standard
    99 pages
    English language
    sale 15% off

The present document applies to the following equipment types for the Digital Enhanced Cordless Telecommunications
(DECT) common interface:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Station (WRS) (FP and PP combined);
e) Hybrid Part (HyP) (a PP with capability to act as a FP to provide PP to PP communication).
The DECT service frequency band for transmitting and receiving for all elements is 1 880 MHz to 1 900 MHz.
Details of the DECT Common Interface may be found in ETSI EN 300 175-1 [i.10], ETSI EN 300 175 parts 2 to 3 [1]
to [2], ETSI EN 300 175-4 [i.11], ETSI EN 300 175 parts 5 to 6 [3] to [4], and ETSI EN 300 175 parts 7 to 8 [i.12] to
[i.13]. Further details of the DECT system may be found in the ETSI Technical Reports, ETSI TR 101 178 [i.1] and
ETSI ETR 043 [i.2]. Information about ULE may be found in the ETSI Technical Specifications ETSI
TS 102 939-1 [i.14] and ETSI TS 102 939-2 [i.15].
The present document contains requirements to demonstrate that radio equipment both effectively uses and supports the
efficient use of radio spectrum in order to avoid harmful interference.

  • Standard
    95 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    95 pages
    English language
    sale 15% off

The present document (part 1) specifies tests applicable to all Digital Enhanced Cordless Telecommunications (DECT)
equipment accessing the DECT frequency band 1 880 MHz to 1 900 MHz (including provisions for testing other or
extended frequency bands as described in ETSI EN 300 175-1 [i.11] and ETSI EN 300 175-2 [1]). Part 2 of the present
multi-part deliverable [i.15] specifies tests applicable to DECT speech and audio transmission using a collection of
speech codecs, including Recommendation ITU-T G.726 [i.7] ADPCM codec, Recommendation ITU-T G.722 [i.8]
"7 kHz codec", "MPEG-4 codec" [i.10] and others.
The aims of the present document are to ensure:
• efficient use of frequency spectrum;
• no harm done to any connected network and its services;
• no harm done to other radio networks and services;
• no harm done to other DECT equipment or its services;
• interworking of terminal equipment via the public network.
The tests of ETSI EN 300 176 are split into two parts:
• the present document (part 1) covers testing of radio frequency parameters, security elements and those DECT
protocols that facilitate the radio frequency tests and efficient use of frequency spectrum;
• part 2 [i.15] describes testing of speech and audio requirements between network interface and DECT PT, or
between a DECT CI air interface and alternatively a DECT PT or FT. Part 2 is not applicable to terminal
equipment specially designed for the disabled (e.g. with amplification of received speech as an aid for the
hard-of-hearing).
DECT terminal equipment consists of the following elements:
a) Fixed Part (FP);
b) Portable Part (PP);
c) Cordless Terminal Adapter (CTA);
d) Wireless Relay Station (WRS) (FP and PP combined);
e) Hybrid Part (HyP) (a PP with capability to act as a FP to provide PP to PP communication

  • Standard
    111 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    111 pages
    English language
    sale 15% off
  • Standard
    111 pages
    English language
    sale 15% off

The present document, together with ETSI EN 301 489-1 [1], covers the assessment of Digital Enhanced Cordless
Telecommunications (DECT) equipment, and associated ancillary equipment, in respect of ElectroMagnetic
Compatibility (EMC).
Technical specifications related to the antenna port and emissions from the enclosure port of the radio equipment are
not included in the present document. Such technical specifications are found in the relevant product standards for the
effective use of the radio spectrum.
The present document specifies the applicable test conditions, performance assessment and performance criteria for
Digital Enhanced Cordless Telecommunications (DECT) equipment, and associated ancillary equipment.
Definitions of types of cordless telecommunications equipment covered by the present document are given in annex A.
In case of differences (for instance concerning special conditions, definitions, abbreviations) between the present
document and ETSI EN 301 489-1 [1], the provisions of the present document take precedence.
The environmental classification and the emission and immunity requirements used in the present document are as
stated in ETSI EN 301 489-1 [1], except for any special conditions included in the present document.

  • Standard
    18 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    18 pages
    English language
    sale 15% off
  • Standard
    18 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the physical channel arrangements. DECT physical channels are radio communication
paths between two radio end points. A radio end point is either part of the fixed infrastructure, a privately owned Fixed
Part (FP), typically a base station, or a Portable Part (PP), typically a handset. The assignment of one or more particular
physical channels to a call is the task of higher layers.
The Physical Layer (PHL) interfaces with the Medium Access Control (MAC) layer, and with the Lower Layer
Management Entity (LLME). On the other side of the PHL is the radio transmission medium which has to be shared
extensively with other DECT users and a wide variety of other radio services. The tasks of the PHL can be grouped into
five categories:
a) to modulate and demodulate radio carriers with a bit stream of a defined rate to create a radio frequency
channel;
b) to acquire and maintain bit and slot synchronization between transmitters and receivers;
c) to transmit or receive a defined number of bits at a requested time and on a particular frequency;
d) to add and remove the synchronization field and the Z-field used for rear end collision detection;
e) to observe the radio environment to report signal strengths.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    64 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    64 pages
    English language
    sale 15% off
  • Standard
    64 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI).
The present document specifies the Network (NWK) layer. The NWK layer is part 5 of the ETSI EN 300 175 and layer 3 of the DECT protocol stack. The present document only specifies the C-plane (control plane) of the DECT NWK layer. It contains no specification for the U-plane (user plane) because the U-plane is null for all services at the DECT NWK layer. The C-plane contains all of the internal signalling information, and the NWK layer protocols are grouped into the following families of procedures:
• Call Control (CC);
• Supplementary Services (SS);
• Connection Oriented Message Service (COMS);
• ConnectionLess Message Service (CLMS);
• Mobility Management (MM);
• Link Control Entity (LCE).
The present document uses the layered model principles and terminology as described in Recommendations ITU-T X.200 [i.3] and X.210 [i.4].
The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    357 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    357 pages
    English language
    sale 15% off
  • Standard
    362 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Medium Access Control (MAC) layer. The MAC layer is part 3 of the DECT
Common Interface standard and layer 2a of the DECT protocol stack.
It specifies three groups of MAC services:
• the broadcast message control service;
• the connectionless message control service; and
• the multi-bearer control service.
It also specifies the logical channels that are used by the above mentioned services, and how they are multiplexed and
mapped into the Service Data Units (SDUs) that are exchanged with the Physical Layer (PHL).
Figure 1.1: The DECT protocol stack
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    335 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    335 pages
    English language
    sale 15% off
  • Standard
    336 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
This part of the DECT CI specifies the speech and audio coding and transmission requirements.
In order to ensure satisfactory interworking of different portable and fixed units, it is necessary to specify the
transmission performance of the analog information over the digital link. This requires not only use of a common
speech algorithm, but also standardization of frequency responses, reference speech levels (or loudness) at the air
interface and various other parameters.
The present document applies to DECT equipment which includes all the necessary functions to provide real-time
two-way speech conversation. Several speech services are defined in the present document, including conventional
3,1 kHz telephony, wideband 7 kHz voice transmission and super-wideband 14 kHz service. DECT Fixed part
providing such services may be connected to the public circuit switched (PSTN/ISDN) network, to private networks or
to the Internet.
Tethered fixed point local loop applications are not required to comply with the requirements of the present document.
For the DECT systems which connect to the Public Switched Telephone Network (PSTN) via an analog interface, the
additional requirements, which are implemented in the FP, have as much as possible been aligned with ETSI
TBR 038 [29].
A summary of the control and the use of the DECT echo control functions, to guide on need for options to
manufacturers and installers, is found in annex A.
Information concerning test methods can be found in ETSI EN 300 176-1 [9] and ETSI EN 300 176-2 [10] (previously
covered by ETSI TBR 010 [i.5]). The test methods take into account that DECT is a digital system.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    149 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    149 pages
    English language
    sale 15% off
  • Standard
    149 pages
    English language
    sale 15% off

The present document gives an introduction and overview of the complete Digital Enhanced Cordless
Telecommunications (DECT) Common Interface (CI).
The present document contains an abstract of the other parts of the DECT standard together with a general
description of:
• the objectives of the present document;
• the DECT Common Interface;
• the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the
technical terms used in different parts of the present document.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    38 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    38 pages
    English language
    sale 15% off
  • Standard
    38 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the security architecture, the types of cryptographic algorithms required, the way in
which they are to be used, and the requirements for integrating the security features provided by the architecture into the
DECT CI. It also describes how the features can be managed and how they relate to certain DECT fixed systems and
local network configurations.
The security architecture is defined in terms of the security services which are to be supported at the CI, the
mechanisms which are to be used to provide the services, and the cryptographic parameters, keys and processes which
are associated with these mechanisms.
The security processes specified in the present document are each based on one of three cryptographic algorithms:
• an authentication algorithm;
• a key stream generator for MAC layer encryption; and
• a key stream generator plus a Message Authentication Code generator for CCM authenticated encryption.
The architecture is, however, algorithm independent, and either the DECT standard algorithms, or appropriate
proprietary algorithms, or indeed a combination of both can, in principle, be employed. The use of the employed
algorithm is specified in the present document.
Integration of the security features is specified in terms of the protocol elements and processes required at the Network
(NWK) and Medium Access Control (MAC) layers of the CI.
The relationship between the security features and various network elements is described in terms of where the security
processes and management functions may be provided.
The present document does not address implementation issues. For instance, no attempt is made to specify whether the
DSAA or DSAA2 should be implemented in the PP at manufacture, or whether the DSAA, DSAA2 or a proprietary
authentication algorithm should be implemented in a detachable module. Similarly, the present document does not
specify whether the DSC or DSC2 should be implemented in hardware in all PPs at manufacture, or whether special
PPs should be manufactured with the DSC, DSC2 or proprietary ciphers built into them. The security architecture
supports all these options, although the use of proprietary algorithms may limit roaming and the concurrent use of PPs
in different environments.
Within the standard authentication algorithms, DSAA2, DSC2 and CCM are stronger than DSAA and DSC and provide
superior protection. DSAA2 and DSC2 are based on AES [10] and were created in 2011. CCM is also based on
AES [10] and was added to the standard in 2012.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.
The present document also includes DECT Ultra Low Energy (ULE), a low rate data technology based on DECT
intended for M2M applications with ultra low power consumption.

  • Standard
    161 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    161 pages
    English language
    sale 15% off
  • Standard
    161 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
The present document specifies the Data Link Control (DLC) layer. The DLC layer is part 4 of the DECT CI standard
and layer 2b of the DECT protocol stack.
Network layer Network layer
C-plane (3) U-plane
DLC layer DLC layer
C-plane (2b) U-plane
MAC layer
(2a)
Physical layer
(1)
Figure 1.1
Two planes of operation are specified for this DLC (sub)layer. These planes are called the Control plane (C-plane) and
the User plane (U-plane).
The C-plane is mostly concerned with the DECT signalling aspects. It provides a reliable point-to-point service that
uses a link access protocol to offer error protected transmission of Network (NWK) layer messages. The C-plane also
provides a separate point-to-multipoint (broadcast) service (Lb).
The U-plane is only concerned with end-to-end user information. This plane contains most of the application dependent
procedures of DECT. Several alternative services (both circuit-mode and packet-mode) are defined as a family of
independent entities. Each service provides one or more point-to-point U-plane data links, where the detailed
characteristics of those links are determined by the particular needs of each service. The defined services cover a wide
range of performance, from "unprotected with low delay" for speech applications to "highly protected with variable
delay", for local area network applications.
NOTE: The performance of the DLC services need not be tight to any particular application. For example the
"unprotected with low delay" service could also be used for data applications, e.g. if some data protection
is provided outside the DECT protocol.
The present document uses the layered model principles and terminology as described in Recommendations ITU-T
X.200 [14] and X.210 [15].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    178 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    178 pages
    English language
    sale 15% off
  • Standard
    179 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
This part specifies the identities and addressing structure of the Digital Enhanced Cordless Telecommunications
(DECT) Common Interface (CI).
There are four categories of identities to be used for identification and addressing in a general DECT environment.
These four categories are:
• Fixed Part (FP) identities;
• Portable Part (PP) identities;
• connection-related identities;
• equipment-related identities.
Fixed part identities and portable part identities are used for:
• access information from fixed parts to portable parts;
• access requests from portable parts;
• identification of portable parts;
• identification of fixed parts and radio fixed parts;
• paging;
• billing.
These identities support:
• different environments, such as residential, public or private;
• supply to manufacturers, installers, and operators of globally unique identity elements with a minimum of
central administration;
• multiple access rights for the same portable;
• large freedom for manufacturers, installers, and operators to structure the fixed part identities, e.g. to facilitate
provision of access rights to groups of DECT systems;
• roaming agreements between DECT networks run by the same or different owners/operators;
• indication of handover domains;
• indication of location areas, i.e. paging area;
• indication of subscription areas of a public service.
The present document also provides for length indicators and other messages that can override the default location
and/or paging area and domain indications given by the structure of the identities.
Connection related identities are used to identify the protocol instances associated with a call and are used for
peer-to-peer communication.
Equipment related identities are used to identify a stolen PP and to derive a default identity coding for PP emergency
call set-up.
Coding of identity information elements for higher layer messages is found in ETSI EN 300 175-5 [5], clause 7.7.User authentication and ciphering need additional key information and is outside the scope of the present document, but
is covered in other parts of ETSI EN 300 175 [1] to [8], e.g. ETSI EN 300 175-7 [7].
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    41 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    41 pages
    English language
    sale 15% off
  • Standard
    41 pages
    English language
    sale 15% off

The present document defines the standard for packet radio services for Digital Enhanced Cordless
Telecommunications (DECT) systems conforming to ETSI EN 300 175-1 [1] to ETSI EN 300 175-8 [8]. It is the basis
of profiles, which define more specific applications (Application Specific Access Profiles ASAPs), aimed at the
connection of terminals supporting packet data services to a fixed infrastructure, both private and public.
DECT Packet Radio Service defines several operation modes, named Classes, and several transported services and
protocols, that may be frame relay or character oriented.
• Class 1 does not use a network layer C-plane and provides a service similar to a Wireless Local Area Network.
• Class 2 implements full DPRS capabilities, including complete C-plane with call control and mobility
management, and provides all capabilities of the packet service of public cellular networks (i.e. GPRS). Both
services Class 1 and Class 2 support multiberaer and asymmetric connections, and implement Management
Entity procedures intended to achieve maximum performance, optimal efficiency and minimal access times.
• Class 3 and Class 4 are simplified modes intended for auxiliary data services in voice terminals or other
moderate rate data services.
The annexes to the present document contain the conventions for interworking of the frame-relay and character oriented
services, as well as, other relevant information. The following services are defined in the present document:
Frame relay services:
• LAN IEEE 802.3 [13] (also known as ISO/IEC 8802-3), (clause B.4).
• LAN IEEE 802.5 [14] (also known as ISO/IEC 8802-5), (clause B.5).
• Internet Protocol (IP) [15], (clause B.6).
• Point to Point Protocol (PPP) [16], (clause B.7).
• Generic interworking (clause B.8) that allows the direct transport of other protocols.
Character Oriented Services:
• V.24 asynchronous interface, including a Packet Assembler and Disasembler (PAD) module (annex C).
The present document defines the additional requirements on the Physical Layer (PHL), Medium Access Control
(MAC) layer, Data Link Control (DLC) layer and Network (NWK) layer of DECT. The standard also specifies
Management Entity (ME) requirements, which ensure the efficient use of the DECT spectrum.
The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    287 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    287 pages
    English language
    sale 15% off
  • Standard
    294 pages
    English language
    sale 15% off

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document specifies the security architecture, the types of cryptographic algorithms required, the way in which they are to be used, and the requirements for integrating the security features provided by the architecture into the DECT CI. It also describes how the features can be managed and how they relate to certain DECT fixed systems and local network configurations. The security architecture is defined in terms of the security services which are to be supported at the CI, the mechanisms which are to be used to provide the services, and the cryptographic parameters, keys and processes which are associated with these mechanisms. The security processes specified in the present document are each based on one of three cryptographic algorithms:
- an authentication algorithm;
- a key stream generator for MAC layer encryption; and
- a key stream generator plus a Message Authentication Code generator for CCM authenticated encryption. The architecture is, however, algorithm independent, and either the DECT standard algorithms, or appropriate proprietary algorithms, or indeed a combination of both can, in principle, be employed. The use of the employed algorithm is specified in the present document. Integration of the security features is specified in terms of the protocol elements and processes required at the Network (NWK) and Medium Access Control (MAC) layers of the CI. The relationship between the security features and various network elements is described in terms of where the security processes and management functions may be provided. The present document does not address implementation issues. For instance, no attempt is made to specify whether the DSAA or DSAA2 should be implemented in the PP at manufacture, or whether the DSAA, DSAA2 or a proprietary authentication algorithm should be implemented in a detachable module. Similarly, the present document does not specify whether the DSC or DSC2 should be implemented in hardware in all PPs at manufacture, or whether special PPs should be manufactured with the DSC, DSC2 or proprietary ciphers built into them. The security architecture supports all these options, although the use of proprietary algorithms may limit roaming and the concurrent use of PPs in different environments. Within the standard authentication algorithms, DSAA2, DSC2 and CCM are stronger than DSAA and DSC and provide superior protection. DSAA2 and DSC2 are based on AES [10] and were created in 2011. CCM is also based on AES [10] and was added to the standard in 2012. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements. The present document also includes DECT Ultra Low Energy (ULE), a low rate data technology based on DECT intended for M2M applications with ultra low power consumption.

  • Standard
    158 pages
    English language
    sale 10% off
    e-Library read for
    1 day

The present document is one of the parts of the specification of the Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI) [1] to [7]. This part of the DECT CI specifies the speech and audio coding and transmission requirements. In order to ensure satisfactory interworking of different portable and fixed units, it is necessary to specify the transmission performance of the analog information over the digital link. This requires not only use of a common speech algorithm, but also standardization of frequency responses, reference speech levels (or loudness) at the air interface and various other parameters. The present document applies to DECT equipment which includes all the necessary functions to provide real-time two-way speech conversation. Several speech services are defined in the present document, including conventional 3,1 kHz telephony, wideband 7 kHz voice transmission and super-wideband 14 kHz service. DECT Fixed part providing such services may be connected to the public circuit switched (PSTN/ISDN) network, to private networks or to the Internet. Tethered fixed point local loop applications are not required to comply with the requirements of the present document. For the DECT systems which connect to the Public Switched Telephone Network (PSTN) via an analog interface, the additional requirements, which are implemented in the FP, have as much as possible been aligned with TBR 038 [29]. A summary of the control and the use of the DECT echo control functions, to guide on need for options to manufacturers and installers, is found in annex A. Information concerning test methods can be found in EN 300 176-1 [9] and EN 300 176-2 [10] (previously covered by TBR 010 [i.5]). The test methods take into account that DECT is a digital system. The present document includes New Generation DECT, a further development of the DECT standard introducing
wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    151 pages
    English language
    sale 10% off
    e-Library read for
    1 day
  • Standard
    151 pages
    English language
    sale 15% off

The present document gives an introduction and overview of the complete Digital Enhanced Cordless Telecommunications (DECT) Common Interface (CI). The present document contains an abstract of the other parts of the DECT standard together with a general description of:
- the objectives of the present document;
- the DECT Common Interface;
- the protocol architecture of DECT.
The present document also provides an extensive vocabulary; in particular it contains the common definitions of all the technical terms used in different parts of the present document. The present document includes New Generation DECT, a further development of the DECT standard introducing wideband speech, improved data services, new slot types and other technical enhancements.

  • Standard
    37 pages
    English language
    sale 10% off
    e-Library read for
    1 day