Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 44.064
Word version: 18.0.0
1…
4…
8…
8
Definition of the LLC peer-to-peer protocol
A
Ciphering
B
Tunnelling of Messages (TOM)
C
LLC layer states for peer-to-peer operation
$
Change History
8
Definition of the LLC peer-to-peer protocol
p. 42
8.1
General
p. 42
8.2
Procedure for the use of the P/F bit
p. 43
8.3
TLLI assignment procedures
p. 43
8.3.0
General
|R13|
p. 43
8.3.1
TLLI assignment
p. 43
8.3.2
TLLI change
p. 43
8.3.3
TLLI unassignment
p. 44
8.4
Procedures for unacknowledged information transfer
p. 44
8.4.0
General
|R13|
p. 44
8.4.1
Transmission of unacknowledged information
p. 44
8.4.2
Receipt of unacknowledged information
p. 44
8.5
Procedures for establishment and release of ABM operation
p. 45
8.5.1
Establishment of ABM operation
p. 45
8.5.1.1
General
p. 45
8.5.1.2
Establishment procedures
p. 45
8.5.1.3
Procedure on expiry of timer T200
p. 46
8.5.2
Termination of ABM operation
p. 46
8.5.2.1
General
p. 46
8.5.2.2
Release procedure
p. 47
8.5.2.3
Procedure on expiry of timer T200
p. 47
8.5.3
Automatic negotiation of LLC layer and layer 3 parameters
p. 47
8.5.3.0
General
|R13|
p. 47
8.5.3.1
Negotiation of parameter Reset
p. 48
8.5.3.2
Negotiation of parameter m
p. 49
8.5.3.3
Unsuccessful XID negotiation
p. 49
8.5.3.4
Procedure on expiry of timer T200
p. 50
8.5.4
TLLI Assigned / ADM state
p. 50
8.5.5
Collision of unnumbered commands
p. 51
8.5.5.0
General
|R13|
p. 51
8.5.5.1
Identical transmitted and received commands
p. 51
8.5.5.2
Different transmitted and received commands
p. 52
8.5.6
Unsolicited DM response and SABM or DISC command
p. 52
8.6
Procedures for information transfer in ABM operation
p. 52
8.6.0
General
|R13|
p. 52
8.6.1
Transmitting I frames
p. 53
8.6.2
Receiving I frames
p. 53
8.6.3
Sending and receiving acknowledgements
p. 54
8.6.3.0
General
|R13|
p. 54
8.6.3.1
Sending acknowledgements
p. 54
8.6.3.2
Receiving acknowledgements
p. 54
8.6.3.3
Requesting acknowledgements
p. 55
8.6.4
Peer receiver busy condition
p. 55
8.6.4.1
Supervisory frame selection
p. 56
8.6.5
Own receiver busy condition
p. 56
8.6.6
Waiting for acknowledgement
p. 56
8.7
Re-establishment of ABM operation
p. 56
8.7.1
Criteria for re-establishment
p. 56
8.7.2
Procedures
p. 57
8.8
Exception condition reporting and recovery
p. 57
8.8.0
General
|R13|
p. 57
8.8.1
Invalid frame condition
p. 57
8.8.2
Frame rejection condition
p. 57
8.8.3
Receipt of a FRMR response frame
p. 57
8.8.4
Unsolicited response frames
p. 58
8.9
List of LLC layer parameters
p. 58
8.9.0
General
|R13|
p. 58
8.9.1
LLC version number (Version)
p. 58
8.9.2
Input Offset Values (IOV)
p. 58
8.9.3
Retransmission timers (T200 and T201)
p. 59
8.9.4
Maximum number of retransmissions (N200)
p. 59
8.9.5
Maximum number of octets in an information field (N201)
p. 59
8.9.6
Maximum number of octets in the layer 3 header (N202)
p. 60
8.9.7
Maximum I frame buffer size (m)
p. 60
8.9.8
Maximum number of outstanding I frames (k)
p. 60
8.9.9
LLC layer parameter default values
p. 61
A
(Normative) Ciphering
p. 62
A.1
General
p. 62
A.2
Ciphering algorithm interface
p. 62
A.2.0
General
|R13|
p. 62
A.2.1
Generation of Input
p. 63
B
(Normative) Tunnelling of Messages (TOM)
p. 64
B.1
TOM Protocol Envelope structure
p. 64
B.1.0
TOM Protocol Envelope format
|R13|
p. 64
B.1.1
TOM Protocol Discriminator
p. 65
B.1.2
Remaining Length of TOM Protocol Header
p. 65
B.1.3
Remaining Octets of TOM Protocol Header
p. 65
B.1.4
Message Capsule
p. 65
C
LLC layer states for peer-to-peer operation
p. 66
C.1
General
p. 66
C.2
An overview of the peer-to-peer LLC layer states
p. 66
$
Change History
p. 68