TIA TIA-102.BACA-A-1 PDF

TIA TIA-102.BACA-A-1 PDF

Name:
TIA TIA-102.BACA-A-1 PDF

Published Date:
08/01/2009

Status:
[ Revised ]

Description:

Project 25 Inter-RF Subsystem Interface Messages and Procedures for Voice and Mobility Management Services - Addendum 1 - Packet Data

Publisher:
Telecommunications Industry Association

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$63.6
Need Help?

[Revise the text in this section of TIA-102.BACA-A (January 2009), as shown below.]

This document provides a detailed specification of the messages and procedures required between RFSSs within a given P25 system, and across P25 systems, in order to provide mandatory voice services and SU mobility management.

This document focuses on protocol and message support requirements for the upper layers of the ISSI Internet Protocol Suite (the Network Layer and above), and does not address the lower layers (corresponding to the Physical and Data Link Layers of the OSI Protocol Reference Model).

This document describes the architecture, protocol suite, messages, parameters, state models, and procedures to support the following services among RFSSs over the ISSI:

Voice services:

• Group voice service for both confirmed and unconfirmed group call,

• SU-to-SU voice service for both direct calls and calls requiring prior RF availability check.

Mobility management functions:

• Mobile SU and console registration,

• Mobile SU and console tracking,

• Group affiliation by mobile SUs and consoles,

• Group tracking,

• Authentication credential distribution1,

• SNDCP Context registration.

Note that mobility management provides functionality to support voice, supplementary data, and packet data services.

In certain scenarios, the Serving RFSS must determine an SU's Home RFSS ID and unique IP address. This is done based on the WACN ID and System ID of the SUID as sent by the SU in the Unit Registration Request (U REG REQ in [102AABC]) during registration. The process by which the Serving RFSS obtains this information is implementation-dependent, and therefore not documented in this or other ISSI standards.

Conceptual models that define primitives and states may be utilized to describe TIA-102 interface protocols. The primitive exchanges and state transitions described by these models are to illustrate a conceptual design for a stack that implements the protocol and are informative. The boundaries defined by conceptual models are internal protocol stack layer boundaries defined to clarify the protocol description and are not testable boundaries.

Trunked and conventional operational details for these services and functions might differ [102A].

This document specifies ISSI for trunked, not conventional, P25 systems. Conventional ISSI will be part of future ISSI work.

This document specifies ISSI which enables mobile SU and wireline console participation in voice services.

Other separate documents describe other services offered across the ISSI in more detail. In particular, [102BACD]describes Supplementary Data Services, and[102BACF] describes Packet Data Services. Additional documents for other services (Conventional, etc.) may also be added in the future.

This document defines the Messages and Procedures associated with the current scope of the ISSI standard. The current scope of the ISSI will be fully defined when the following suite of ISSI related documents is completed:

• ISSI Conformance Tests for Voice Services

• ISSI Methods of Measurements for Voice Services

• ISSI Performance Recommendations for Voice Services

• ISSI Interoperability Test Methods for Voice Services

Network configuration, network engineering, and manufacturer-dependent implementation details are beyond the scope of this document.

1 Until such time as ISSI security services are standardized, the protection of the Authentication credentials while traversing the ISSI is outside the scope of the ISSI. It is left up to the System owners to coordinate a method for the protected transfer of authentication credentials (as well as any other information) between their systems on the ISSI.


Edition : A
File Size : 1 file , 5.7 MB
Number of Pages : 106
Published : 08/01/2009

History


Related products

TIA TIA-102.CACD-D
Published Date: 11/01/2018
Project 25 Inter-RF Subsystem Interface Interoperability Test Procedures for Trunked Voice Operation Involving the ISSI
$96.6
TIA TIA-329-C
Published Date: 08/01/2003
Minimum Standards for Communications Antennas, Base Station Antennas
$32.7
TIA ANSI/TIA-102.AABF-A
Published Date: 12/16/2004
PROJECT 25 LINK CONTROL WORD FORMATS AND MESSAGES NEW TECHNOLOGY STANDARDS PROJECT - DIGITAL RADIO TECHNICAL STANDARDS
$108.3
TIA J-STD-019
Published Date: 01/01/1996
Telecommunications - Recommended Minimum Performance Requirements for Base Stations Supporting 1.8 to 2.0 GHz Code Division Multiple Access (CDMA) Personal Stations
$46.5

Best-Selling Products

2013 Passenger Car Yearbook
Published Date: 10/07/2013
2014 Passenger Car Yearbook
Published Date: 12/10/2013
Alternative Fuels Guidebook
Published Date: 10/10/1997
Cleaner Cars
Published Date: 01/28/2000