throbber
Exhibit 1005.07
`
`ZTE Corporation and ZTE (USA) Inc.
`
`

`
`TS 101 351 v6.1.0 (1998-07)
`
`Technical Specification
`
`Digital cellular telecommunications system (Phase 2+);
`General Packet Radio Service (GPRS);
`Mobile Station - Serving GPRS Support Node (MS-SGSN)
`Logical Link Control (LLC) layer specification
`(GSM 04.64 version 6.1.0 Release 1997)
`
`GSEITIQ
`
`GLOBAL SYSTEM FOR
`MOBILE COMMUNICATIONS
`
`$'\<(%>>
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00001
`
`

`
`GSM 04.64 version 6.1.0 Release 1997
`
`2
`
`TS 101 351 V6.1.0 (1998-07)
`
`Reference
`
`DTS/SMG-O30464Q6 (CiCO3OC3.PDF)
`
`Keywords
`Digital cellular telecommunications system,
`Global System for Mobile communications (GSM)
`GPRS
`
`ETSI
`
`Postal address
`
`F-06921 Sophia Antipolis Cedex - FRANCE
`
`Office address
`
`650 Route des Lucioles - Sophia Antipolis
`Valbonne - FRANCE
`Te|.: +33 4 92 94 42 00 Fax: +33 4 93 65 4716
`Siret N° 348 623 562 00017 — NAF 742 C
`Association a but non lucratif enregistrée a la
`Sous—Préfecture de Grasse (06) N° 7803/88
`
`Internet
`
`secretariat@etsi.fr
`http://www.etsi.fr
`http://www.etsi.org
`
`Copyright Notification
`
`No part may be reproduced except as authorized by Written permission.
`The copyright and the foregoing restriction extend to reproduction in all media.
`
`© European Telecommunications Standards institute 1998.
`All rights reserved.
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00002
`
`

`
`GSM 04.64 version 6.1.0 Release 1997
`
`3
`
`TS 101 351 V6.1.0 (1998-07)
`
`Contents
`
`Intellectual Property Rights .............................................................................................................................. ..7
`
`Foreword .......................................................................................................................................................... ..7
`
`Scope ...................................................................................................................................................... ..8
`
`Normative references ............................................................................................................................. ..8
`
`Definitions and abbreviations .............................................................................................................. .. 10
`Definitions ..................................................................................................................................................... .. 10
`Abbreviations ................................................................................................................................................. .. 10
`
`Overview description of LLC functions and procedures ..................................................................... .. 11
`Reference model ............................................................................................................................................ .. 12
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 12
`General description of the LLC protocol . . . . . . . . . . . .
`
`Services required by the lower layers ....................................................................................................... .. 13
`Unacknowledged operation ............................................................................................................................ .. 13
`Acknowledged operation ............................................................................................................................... .. 13
`Establishment of information transfer modes ................................................................................................. .. 13
`Data link connection identification ............................... ..
`........................ .. 13
`
`Logical link states ..................................................................................................................................... .. 14
`TLLI assignment ...................................................................................................................................... .. 14
`Establishment of ABM operation . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 14
`Data confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 14
`LLC layer structure . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 15
`Logical Link Entity .................................................................................................................................. .. 15
`Multiplex procedure ................................................................................................................................. .. 16
`Logical Link Management. . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 16
`
`GPRS Mobility Management ......................................................................................................................... .. 16
`Short Message Service ................................................................................................................................... .. 16
`
`
`
`Frame structure .................................................................................................................................... .. 16
`General ........................................................................................................................................................... .. 16
`Address field .................................................................................................................................................. .. 17
`Control field . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 17
`Information field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 17
`
`
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 17
`Frame Check Sequence (FCS) field . . . . . . . . . .
`Transparency .................................................................................................................................................. .. 18
`Bit transparency ....................................................................................................................................... .. 18
`. . . . . . . . . . . . . . . . . . . . . . . . .. 18
`Information protection . . . . . . . . . . . . . . . . . . . . . . . . .
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 18
`. . . . . . . . . . .
`Octet alignment . . . . . . . . . . . . . .
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 18
`Format convention . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . .
`Numbering convention ............................................................................................................................. .. 18
`Order of transmission ............................................................................................................................... .. 18
`
`Field mapping convention . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 19
`
`Invalid frames ................................................................................................................................................ .. 19
`
`Elements of procedures and formats of fields ...................................................................................... .. 19
`. . . . . . . . . . . . . . . . . . . . . . . . .. 19
`General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`Address field format and variables ................................................................................................................ .. 20
`
`Protocol Discriminator bit (PD) ............................................................................................................... .. 20
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 20
`Command/Response bit (C/R) . . . . . . . . . . . . . . . . . . . . . . .
`Service Access Point Identifier (SAPI) . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 20
`Control field formats, parameters, and variables
`........................ .. 21
`Information transfer format - I .................................................................................................................. .. 22
`
`
`
`Supervisory format — S ............................................................................................................................. .. 23
`Unconfirmed Information format — UI . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 23
`Unnumbcrcd format - U . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 23
`
`
`
`Control field parameters and associated state variables ........................................................................... .. 23
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00003
`
`1
`
`2
`
`3
`3.1
`3.2
`
`4
`4.1
`
`4.2
`4.2.1
`4.3
`4.4
`4.5
`4.5.1
`
`4.5.2
`4.5.3
`4.5.4
`4.6
`4.7
`4.7.1
`4.7.2
`4.7.3
`4.8
`4.9
`
`5
`5.1
`5.2
`5.3
`5.4
`
`5.5
`5.6
`5.6.1
`5.6.2
`5.6.3
`5.7
`
`5.7.1
`5.7.2
`
`5.7.3
`5.8
`
`6
`6.1
`6.2
`
`6.2.1
`6.2.2
`6.2.3
`6.3
`6.3.1
`
`6.3.2
`6.3.3
`6.3.4
`
`6.3.5
`
`

`
`GSM 04.64 version 6.1.0 Release 1997
`
`4
`
`TS 101 351 V6.1.0 (1998-07)
`
`Poll/Final bit (P/F) .............................................................................................................................. .. 23
`Acknowledgement request bit (A) ............... ..
`Modulus .............................................................................................................................................. .. 23
`
`
`
`ABM Variables and sequence numbers .............................................................................................. .. 24
`Send state variable V(S) . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`
`Acknowledge state variable V(A) ................................................................................................. .. 24
`Send sequence number N(S) ......................................................................................................... .. 24
`Receive state variable V(R) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`Receive sequence number N(R) . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`SACK bitmap R(n) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`I frame buffer variable B ............................................................................................................... .. 25
`
`
`
`
`
`
`
`Other parameters and variables ..................................................................................................... .. 25
`Unacknowledged operation variables and parameters . . . . . . . . . . . . . .
`. . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 25
`Encryption mode bit (E) .......................................................................................... .. 25
`Protected mode bit (PM) ......................... ..
`................................... .. 25
`Unconfirmed send state variable V(U) .......................................................................................... .. 25
`Unconfirmed sequence number N(U) ........................................................................................... .. 25
`Unconfirmed receive state variable V(UR) . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 25
`Other parameters and variables ..................................................................................................... .. 25
`Commands and responses .............................................................................................................................. .. 26
`Unnumbered (U) frames ..................................................................................................... .. 26
`
`Set asynchronous balanced mode (SABM) command ................. ..
`Disconnect (DISC) command ............................................................ ..
`Unnumbered Acknowledgement (UA) response ................................................................................ .. 27
`Disconnected Mode (DM) response ................................................................................................... .. 27
`. . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 27
`Frame Reject (FRMR) Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`Exchange Identification (XID) command/response ..................... ..
`Unconfirmed Information (UI) frame ................................................ ..
`Unconfirmed Information (UI) command ........................................................................................... .. 29
`Combined Information (I) and Supervisory (S) frames ............................................................................ .. 29
`.............. .. 30
`Receive Ready (RR) command / response ........................ ..
`
`Acknowledgement (ACK) command / response ................................................................................. .. 30
`Selective Acknowledgement (SACK) command / response ............................................................... .. 30
`Receive not ready (RNR) command / response .................................................................................. .. 30
`
`
`
`
`
`6.3.5.1
`6.3.5.2
`6.3.5.3
`
`6.3.5.4
`6.3.5.4.l
`6.3.5.4.2
`6.3.5.4.3
`6.3.5.4.4
`6.3.5.4.5
`6.3.5.4.6
`6.3.5.4.7
`
`6.3.5.4.8
`6.3.5.5
`6.3.5.5.1
`6.3.5.5.2
`6.3.5.5.3
`6.3.5.5.4
`6.3.5.5.5
`6.3 .5.5.6
`6.4
`6.4.1
`6.4.1.1
`6.4.1.2
`6.4.1.3
`6.4.1.4
`6.4.1.5
`6.4.1.6
`6.4.2
`6.4.2.1
`6.4.3
`6.4.3.1
`6.4.3.2
`6.4.3.3
`6.4.3.4
`
`
`
`Elements for layer-to-layer communication ......................................................................................... ..31
`Definition of service primitives and parameters ............................................................................................ .. 31
`Primitives types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 31
`
`. . . . . . . . . . . . . . . . . . . . . . . . ..3l
`Request . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 31
`Indication . . . . .
`
`Response ............................................................................................................................................. ..31
`Confirm............................................................................................................................................... ..31
`Generic names . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 32
`
`
`Primitive procedures ...................................................................................................................................... .. 32
`GMM - LLC primitives ............................................................................................................................ .. 32
`LLGMM-ASSIGN .............................................................................................................................. .. 32
`LLGMM—TRIGGER ........................................................................................................................... .. 33
`LLGMM-SUSPEND . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 33
`
`LLGMM—RESUME ............................................................................................................................ .. 34
`LLGMM—PAGE .................................................................................................................................. .. 34
`LLGMM—WINDOW . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`LLGMM-IOV . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`LLGMM—STATUS . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`
`
`
`Layer 3 - LL primitives ............................................................................................................................ .. 34
`LL—ESTABLISH ................................................................................................................................ .. 34
`LL-RELEASE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`
`LL-XID ............................................................................................................................................... .. 35
`LL—DATA ........................................................................................................................................... .. 35
`LL—DATASENT ................................................................................................................................. .. 35
`LL-UNITDATA ................................................................................................................................. .. 35
`
`LL — RLC/MAC primitives ....................................................................................................................... .. 35
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00004
`
`7
`7.1
`7.1.1
`7.1.1.1
`7.1.1.2
`
`7.1.1.3
`7.1.1.4
`7.1.2
`
`7.2
`7.2.1
`7.2.1.1
`7.2.1.2
`7.2.1.3
`7.2.1.4
`7.2.1.5
`7.2.1.6
`7.2.1.7
`7.2.1.8
`
`7.2.2
`7.2.2.1
`7.2.2.2
`7.2.2.3
`7.2.2.4
`7.2.2.5
`7.2.2.6
`
`7.2.3
`
`
`
`

`
`GSM 04.64 version 6.1.0 Release 1997
`
`5
`
`TS 101 351 V6.1.0 (1998-07)
`
`
`
`7.2.3.1
`7.2.3.2
`7.2.3.3
`
`7.2.4
`7.2.4.1
`7.2.4.2
`
`7.2.5
`
`8
`8.1
`8.2
`
`8.3
`8.3.1
`8.3.2
`8.3.3
`8.4
`8.4.1
`8.4.2
`8.5
`8.5.1
`8.5.1.1
`
`8.5.1.2
`8.5.1.3
`8.5.2
`8.5.2.1
`
`8.5.2.2
`8.5.2.3
`8.5.3
`8.5.3.1
`8.5.3.2
`8.5.3.3
`8.5.4
`8.5.5
`8.5.5.1
`8.5.5.2
`
`8.5.6
`8.6
`8.6.1
`8.6.2
`8.6.3
`8.6.3.1
`8.6.3.2
`8.6.3.3
`8.6.4
`8.6.4.1
`8.6.5
`8.6.6
`8.7
`8.7.1
`8.7.2
`
`8.8
`8.8.1
`
`GRR—DATA ........................................................................................................................................ .. 3 5
`GRR-UNITDATA ............. ..
`
`GRR-STATUS ................................................................................................................................... .. 36
`
`LL — BSSGP primitives ............................................................................................................................ .. 36
`BSSGP-UNITDATA ......... ..
`.............. .. 36
`
`BSSGP—STATUS ............................................................................................................................... .. 36
`
`LLM - LL primitives ................................................................................................................................ .. 36
`
`Definition of the LLC peer—to—peer protocol ........................................................................................ ..36
`General ........................................................................................................................................................... .. 36
`Procedure for the use of the P/F bit ............................................................................................................... .. 37
`
`. . . . . . . . . . . . . . .. 37
`TLLI assignment procedures . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 37
`. . . . . . . . . . .
`TLLI assignment . . . . . . . . . . . . . . . .
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 38
`TLLI change . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . .
`TLLI unassignment .................................................................................................................................. .. 38
`Procedures for unacknowledged information transfer.................................................................................... .. 38
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 38
`Transmission of unacknowledged infonnation . . . . . . . .
`Receipt of unacknowledged information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 38
`Procedures for establishment and release of ABM operation . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 39
`Establishment of ABM operation ............................................................................................................. .. 39
`General ............................................................................................................................................... ..39
`
`
`
`
`
`Establishment procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 39
`
`Procedure on expiry oftimer T200 ..................................................................................................... .. 40
`Termination of ABM operation ................................................................................................................ .. 40
`General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 40
`
`
`
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 41
`. . . . . . . . . . .
`Release procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`Procedure on expiry oftimer T200 ............................................................................... .. 41
`Automatic negotiation of LLC layer and layer-3 parameters ................................................................... .. 41
`Negotiation of parameter In ................................................................................................................ .. 42
`Unsuccessful XID negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 43
`Procedure on expiry oftimer T200 . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 43
`TLLI Assigned / ADM state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 43
`Collision of unnumbered commands and responses ................................................................................. .. 44
`Identical transmitted and received commands .................................................................................... .. 44
`Different transmitted and received commands . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 44
`
`Unsolicited DM response and SABM or DISC command ....................................................................... .. 44
`Procedures for information transfer in ABM operation ................................................................................. .. 44
`Transmitting I frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 45
`Receiving I frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 46
`Scnding and rccciving acknowlcdgcmcnts ................... ..
`........................ .. 46
`Sending acknowledgements ................................................................................................................ .. 46
`Receiving acknowledgements ............................................................................................................. .. 46
`Requesting acknowledgements . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 47
`
`Peer receiver busy condition .................................................................................................................... .. 47
`Supervisory frame selection ................................................................................................................ .. 48
`Own receiver busy condition .................................................................................................................... .. 48
`Waiting for acknowledgement .................................................................................................................. .. 48
`. . . . . . . . . . . . . . . . . . . . . . . . .. 48
`Re-establishment of ABM operation . . . . .
`
`Criteria for re—establishment ..................................................................................................................... .. 48
`Procedures ................................................................................................................................................ .. 49
`
`
`
`Exception condition reporting and recovery . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 49
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 49
`. . . . . . . . . . . . . . . . . . . . .
`Invalid frame condition . . . . . . . . .
`
`Frame rejection condition . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 49
`Receipt ofa FRMR response frame ......................................................................................................... .. 49
`Unsolicited response frames ..................................................................................................................... .. 49
`Multiple assignment of TLLI value . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 50
`
`List of LLC layer parameters ......................................................................................................................... .. 50
`LLC version number (Version) ................................................................................................................ .. 50
`Input Offset Value (IOV) ......................................................................................................................... .. 50
`Retransmission timer (T200) .................................................................................................................... .. 50
`Maximum number of retransmissions (N200) .......................................................................................... .. 50
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00005
`
`8.8.2
`8.8.3
`8.8.4
`8.8.5
`8.9
`8.9.1
`8.9.2
`8.9.3
`8.9.4
`
`
`
`
`

`
`
`
`Annex B (informative):
`
`LLC layer states for peer-to-peer operation ............................................. ..54
`
`B. 1 General ................................................................................................................................................. .. 54
`
`B.2 An overview of the peer-to-peer LLC layer states ............................................................................... ..54
`
`Annex C (informative):
`
`Document history...........................................................................................56
`
`History ............................................................................................................................................................ ..57
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00006
`
`GSM 04.64 version 6.1.0 Release 1997
`
`6
`
`TS 101 351 V6.1.0 (1998-07)
`
`8.9.5
`8.9.6
`8.9.7
`
`Maximum number of octets in an information field (N201) ..................................................................... .. 50
`Maximum I frame buffer size (rn) ............................................................................................................ .. 51
`Maximum number of outstanding I frames (k) ......................................................................................... .. 51
`
`Annex A (normative):
`
`Ciphering ...................................................................................................... ..52
`
`A.1 General ................................................................................................................................................. ..52
`
`A.2 Ciphering algorithm interface .............................................................................................................. ..52
`A.2.1
`Generation of Input ........................................................................................................................................ .. 53
`
`

`
`GSM 04.64 version 6.1.0 Release 1997
`
`7
`
`TS 101 351 V6.1.0 (1998-07)
`
`Intellectual Property Rights
`
`IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
`pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
`in SR 000 314: "Intellectual Properzjv Rights (IPRs); Essential, or potentially Essential, IPRs notified to E TS] in respect
`0fETSI standards”, which is available free of charge from the ETSI Secretariat. Latest updates are available on the
`ETSI Web server (http://www.etsi.fr/ipr or http://www.etsi.org/ipr).
`
`Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
`can be given as to the existence of other IPRs not referenced in SR 000 314 (or the updates on the ETSI Web server)
`which are, or may be, or may become, essential to the present document.
`
`Foreword
`
`This ETSI Technical Specification (TS) has been produced by the Special Mobile Group (SMG) of the European
`Telecommunications Standards Institute (ETSI).
`
`This TS defines the logical link control layer protocol to be used for packet data transfer between the Mobile Station
`(MS) and Serving GPRS Support Node (SGSN) within the digital cellular telecommunications system.
`
`The contents of this TS is subject to continuing work within SMG and may change following formal SMG approval.
`Should SMG modify the contents of this TS, it will be re—released by SMG with an identifying change of release date
`and an incrcasc in version numbcr as follows:
`
`Version 6.x.y
`
`where:
`
`6
`
`X
`
`indicates GSM Phase 2+ Release 1997;
`
`the second digit is incremented for all other types of changes, i.e. technical enhancements, corrections,
`updates, etc.;
`
`y
`
`the third digit is incremented when editorial only changes have been incorporated in the specification.
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00007
`
`

`
`GSM 04.64 version 6.1.0 Release 1997
`
`8
`
`TS 101 351 V6.1.0 (1998-07)
`
`1
`
`Scope
`
`This specification defines the Logical Link Control (LLC) layer protocol to be used for packet data transfer between the
`Mobile Station (MS) and Serving GPRS Support Node (SGSN).
`
`It defines the frame structure, elements of procedure, format of fields, and procedures for the proper operation of the
`logical link control layer. It is based on ideas contained in IS-130 [21], ISO 3309 [16], ISO 4335 [17], and
`ISO 7809 [18, 19, 20] (HDLC ofISO), as well ITU-T Q.920 [13] and Q.921 [14] (LAPD). The concepts, the overview
`description of LLC layer functions and procedures, and the relationship with other Technical Specifications are
`described in general terms in GSM 03.60 [5].
`
`LLC spans from the Mobile Station (MS) to the Serving GPRS Support Node (SGSN). LLC is intended for use with
`both acknowledged and unacknowledged data transfer.
`
`The frame formats defined for LLC are based on those defined for LAPD and RLP. However, there are important
`differences between LLC and other protocols, in particular with regard to frame delimitation methods and transparency
`mechanisms. These differences are necessary for independence from the radio path.
`
`The LLC procedures are modelled upon the concepts of HDLC as outlined in ISO 4335. Data sequence integrity
`between the data source and data sink is effected by means of a cyclic numbering scheme. An independent numbering
`scheme is used for each logical data link, as identified by the a data link connection identifier. LLC supports two modes
`of operation:
`
`— Unacknowledged peer—to—peer operation:
`
`A logical link entity may initiate transmissions to a peer entity without prior establishment of a logical connection
`with the peer entity. LLC does not guarantee in—order delivery. LLC can detect errors in a received frame, and,
`depending on whether the frame is sent in protected mode or not, either discard or deliver the erroneous frame.
`No error recovery procedures are defined at the LLC layer. Higher—layer protocols can be used to provide
`reliability, if needed. This mode of operation

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket