`
`ZTE Corporation and ZTE (USA) Inc.
`
`
`
`TS 101 351 v6.1.0 (1998-07)
`
`Technical Specification
`
`Digital cellular telecommunications system (Phase 2+);
`General Packet Radio Service (GPRS);
`Mobile Station - Serving GPRS Support Node (MS-SGSN)
`Logical Link Control (LLC) layer specification
`(GSM 04.64 version 6.1.0 Release 1997)
`
`GSEITIQ
`
`GLOBAL SYSTEM FOR
`MOBILE COMMUNICATIONS
`
`$'\<(%>>
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00001
`
`
`
`GSM 04.64 version 6.1.0 Release 1997
`
`2
`
`TS 101 351 V6.1.0 (1998-07)
`
`Reference
`
`DTS/SMG-O30464Q6 (CiCO3OC3.PDF)
`
`Keywords
`Digital cellular telecommunications system,
`Global System for Mobile communications (GSM)
`GPRS
`
`ETSI
`
`Postal address
`
`F-06921 Sophia Antipolis Cedex - FRANCE
`
`Office address
`
`650 Route des Lucioles - Sophia Antipolis
`Valbonne - FRANCE
`Te|.: +33 4 92 94 42 00 Fax: +33 4 93 65 4716
`Siret N° 348 623 562 00017 — NAF 742 C
`Association a but non lucratif enregistrée a la
`Sous—Préfecture de Grasse (06) N° 7803/88
`
`Internet
`
`secretariat@etsi.fr
`http://www.etsi.fr
`http://www.etsi.org
`
`Copyright Notification
`
`No part may be reproduced except as authorized by Written permission.
`The copyright and the foregoing restriction extend to reproduction in all media.
`
`© European Telecommunications Standards institute 1998.
`All rights reserved.
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00002
`
`
`
`GSM 04.64 version 6.1.0 Release 1997
`
`3
`
`TS 101 351 V6.1.0 (1998-07)
`
`Contents
`
`Intellectual Property Rights .............................................................................................................................. ..7
`
`Foreword .......................................................................................................................................................... ..7
`
`Scope ...................................................................................................................................................... ..8
`
`Normative references ............................................................................................................................. ..8
`
`Definitions and abbreviations .............................................................................................................. .. 10
`Definitions ..................................................................................................................................................... .. 10
`Abbreviations ................................................................................................................................................. .. 10
`
`Overview description of LLC functions and procedures ..................................................................... .. 11
`Reference model ............................................................................................................................................ .. 12
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 12
`General description of the LLC protocol . . . . . . . . . . . .
`
`Services required by the lower layers ....................................................................................................... .. 13
`Unacknowledged operation ............................................................................................................................ .. 13
`Acknowledged operation ............................................................................................................................... .. 13
`Establishment of information transfer modes ................................................................................................. .. 13
`Data link connection identification ............................... ..
`........................ .. 13
`
`Logical link states ..................................................................................................................................... .. 14
`TLLI assignment ...................................................................................................................................... .. 14
`Establishment of ABM operation . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 14
`Data confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 14
`LLC layer structure . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 15
`Logical Link Entity .................................................................................................................................. .. 15
`Multiplex procedure ................................................................................................................................. .. 16
`Logical Link Management. . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 16
`
`GPRS Mobility Management ......................................................................................................................... .. 16
`Short Message Service ................................................................................................................................... .. 16
`
`
`
`Frame structure .................................................................................................................................... .. 16
`General ........................................................................................................................................................... .. 16
`Address field .................................................................................................................................................. .. 17
`Control field . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 17
`Information field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 17
`
`
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 17
`Frame Check Sequence (FCS) field . . . . . . . . . .
`Transparency .................................................................................................................................................. .. 18
`Bit transparency ....................................................................................................................................... .. 18
`. . . . . . . . . . . . . . . . . . . . . . . . .. 18
`Information protection . . . . . . . . . . . . . . . . . . . . . . . . .
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 18
`. . . . . . . . . . .
`Octet alignment . . . . . . . . . . . . . .
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 18
`Format convention . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . .
`Numbering convention ............................................................................................................................. .. 18
`Order of transmission ............................................................................................................................... .. 18
`
`Field mapping convention . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 19
`
`Invalid frames ................................................................................................................................................ .. 19
`
`Elements of procedures and formats of fields ...................................................................................... .. 19
`. . . . . . . . . . . . . . . . . . . . . . . . .. 19
`General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`Address field format and variables ................................................................................................................ .. 20
`
`Protocol Discriminator bit (PD) ............................................................................................................... .. 20
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 20
`Command/Response bit (C/R) . . . . . . . . . . . . . . . . . . . . . . .
`Service Access Point Identifier (SAPI) . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 20
`Control field formats, parameters, and variables
`........................ .. 21
`Information transfer format - I .................................................................................................................. .. 22
`
`
`
`Supervisory format — S ............................................................................................................................. .. 23
`Unconfirmed Information format — UI . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 23
`Unnumbcrcd format - U . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 23
`
`
`
`Control field parameters and associated state variables ........................................................................... .. 23
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00003
`
`1
`
`2
`
`3
`3.1
`3.2
`
`4
`4.1
`
`4.2
`4.2.1
`4.3
`4.4
`4.5
`4.5.1
`
`4.5.2
`4.5.3
`4.5.4
`4.6
`4.7
`4.7.1
`4.7.2
`4.7.3
`4.8
`4.9
`
`5
`5.1
`5.2
`5.3
`5.4
`
`5.5
`5.6
`5.6.1
`5.6.2
`5.6.3
`5.7
`
`5.7.1
`5.7.2
`
`5.7.3
`5.8
`
`6
`6.1
`6.2
`
`6.2.1
`6.2.2
`6.2.3
`6.3
`6.3.1
`
`6.3.2
`6.3.3
`6.3.4
`
`6.3.5
`
`
`
`GSM 04.64 version 6.1.0 Release 1997
`
`4
`
`TS 101 351 V6.1.0 (1998-07)
`
`Poll/Final bit (P/F) .............................................................................................................................. .. 23
`Acknowledgement request bit (A) ............... ..
`Modulus .............................................................................................................................................. .. 23
`
`
`
`ABM Variables and sequence numbers .............................................................................................. .. 24
`Send state variable V(S) . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`
`Acknowledge state variable V(A) ................................................................................................. .. 24
`Send sequence number N(S) ......................................................................................................... .. 24
`Receive state variable V(R) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`Receive sequence number N(R) . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`SACK bitmap R(n) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 24
`I frame buffer variable B ............................................................................................................... .. 25
`
`
`
`
`
`
`
`Other parameters and variables ..................................................................................................... .. 25
`Unacknowledged operation variables and parameters . . . . . . . . . . . . . .
`. . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 25
`Encryption mode bit (E) .......................................................................................... .. 25
`Protected mode bit (PM) ......................... ..
`................................... .. 25
`Unconfirmed send state variable V(U) .......................................................................................... .. 25
`Unconfirmed sequence number N(U) ........................................................................................... .. 25
`Unconfirmed receive state variable V(UR) . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 25
`Other parameters and variables ..................................................................................................... .. 25
`Commands and responses .............................................................................................................................. .. 26
`Unnumbered (U) frames ..................................................................................................... .. 26
`
`Set asynchronous balanced mode (SABM) command ................. ..
`Disconnect (DISC) command ............................................................ ..
`Unnumbered Acknowledgement (UA) response ................................................................................ .. 27
`Disconnected Mode (DM) response ................................................................................................... .. 27
`. . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 27
`Frame Reject (FRMR) Response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`
`Exchange Identification (XID) command/response ..................... ..
`Unconfirmed Information (UI) frame ................................................ ..
`Unconfirmed Information (UI) command ........................................................................................... .. 29
`Combined Information (I) and Supervisory (S) frames ............................................................................ .. 29
`.............. .. 30
`Receive Ready (RR) command / response ........................ ..
`
`Acknowledgement (ACK) command / response ................................................................................. .. 30
`Selective Acknowledgement (SACK) command / response ............................................................... .. 30
`Receive not ready (RNR) command / response .................................................................................. .. 30
`
`
`
`
`
`6.3.5.1
`6.3.5.2
`6.3.5.3
`
`6.3.5.4
`6.3.5.4.l
`6.3.5.4.2
`6.3.5.4.3
`6.3.5.4.4
`6.3.5.4.5
`6.3.5.4.6
`6.3.5.4.7
`
`6.3.5.4.8
`6.3.5.5
`6.3.5.5.1
`6.3.5.5.2
`6.3.5.5.3
`6.3.5.5.4
`6.3.5.5.5
`6.3 .5.5.6
`6.4
`6.4.1
`6.4.1.1
`6.4.1.2
`6.4.1.3
`6.4.1.4
`6.4.1.5
`6.4.1.6
`6.4.2
`6.4.2.1
`6.4.3
`6.4.3.1
`6.4.3.2
`6.4.3.3
`6.4.3.4
`
`
`
`Elements for layer-to-layer communication ......................................................................................... ..31
`Definition of service primitives and parameters ............................................................................................ .. 31
`Primitives types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 31
`
`. . . . . . . . . . . . . . . . . . . . . . . . ..3l
`Request . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 31
`Indication . . . . .
`
`Response ............................................................................................................................................. ..31
`Confirm............................................................................................................................................... ..31
`Generic names . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 32
`
`
`Primitive procedures ...................................................................................................................................... .. 32
`GMM - LLC primitives ............................................................................................................................ .. 32
`LLGMM-ASSIGN .............................................................................................................................. .. 32
`LLGMM—TRIGGER ........................................................................................................................... .. 33
`LLGMM-SUSPEND . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 33
`
`LLGMM—RESUME ............................................................................................................................ .. 34
`LLGMM—PAGE .................................................................................................................................. .. 34
`LLGMM—WINDOW . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`LLGMM-IOV . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`LLGMM—STATUS . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`
`
`
`Layer 3 - LL primitives ............................................................................................................................ .. 34
`LL—ESTABLISH ................................................................................................................................ .. 34
`LL-RELEASE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 34
`
`LL-XID ............................................................................................................................................... .. 35
`LL—DATA ........................................................................................................................................... .. 35
`LL—DATASENT ................................................................................................................................. .. 35
`LL-UNITDATA ................................................................................................................................. .. 35
`
`LL — RLC/MAC primitives ....................................................................................................................... .. 35
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00004
`
`7
`7.1
`7.1.1
`7.1.1.1
`7.1.1.2
`
`7.1.1.3
`7.1.1.4
`7.1.2
`
`7.2
`7.2.1
`7.2.1.1
`7.2.1.2
`7.2.1.3
`7.2.1.4
`7.2.1.5
`7.2.1.6
`7.2.1.7
`7.2.1.8
`
`7.2.2
`7.2.2.1
`7.2.2.2
`7.2.2.3
`7.2.2.4
`7.2.2.5
`7.2.2.6
`
`7.2.3
`
`
`
`
`
`GSM 04.64 version 6.1.0 Release 1997
`
`5
`
`TS 101 351 V6.1.0 (1998-07)
`
`
`
`7.2.3.1
`7.2.3.2
`7.2.3.3
`
`7.2.4
`7.2.4.1
`7.2.4.2
`
`7.2.5
`
`8
`8.1
`8.2
`
`8.3
`8.3.1
`8.3.2
`8.3.3
`8.4
`8.4.1
`8.4.2
`8.5
`8.5.1
`8.5.1.1
`
`8.5.1.2
`8.5.1.3
`8.5.2
`8.5.2.1
`
`8.5.2.2
`8.5.2.3
`8.5.3
`8.5.3.1
`8.5.3.2
`8.5.3.3
`8.5.4
`8.5.5
`8.5.5.1
`8.5.5.2
`
`8.5.6
`8.6
`8.6.1
`8.6.2
`8.6.3
`8.6.3.1
`8.6.3.2
`8.6.3.3
`8.6.4
`8.6.4.1
`8.6.5
`8.6.6
`8.7
`8.7.1
`8.7.2
`
`8.8
`8.8.1
`
`GRR—DATA ........................................................................................................................................ .. 3 5
`GRR-UNITDATA ............. ..
`
`GRR-STATUS ................................................................................................................................... .. 36
`
`LL — BSSGP primitives ............................................................................................................................ .. 36
`BSSGP-UNITDATA ......... ..
`.............. .. 36
`
`BSSGP—STATUS ............................................................................................................................... .. 36
`
`LLM - LL primitives ................................................................................................................................ .. 36
`
`Definition of the LLC peer—to—peer protocol ........................................................................................ ..36
`General ........................................................................................................................................................... .. 36
`Procedure for the use of the P/F bit ............................................................................................................... .. 37
`
`. . . . . . . . . . . . . . .. 37
`TLLI assignment procedures . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 37
`. . . . . . . . . . .
`TLLI assignment . . . . . . . . . . . . . . . .
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 38
`TLLI change . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . .
`TLLI unassignment .................................................................................................................................. .. 38
`Procedures for unacknowledged information transfer.................................................................................... .. 38
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 38
`Transmission of unacknowledged infonnation . . . . . . . .
`Receipt of unacknowledged information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 38
`Procedures for establishment and release of ABM operation . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 39
`Establishment of ABM operation ............................................................................................................. .. 39
`General ............................................................................................................................................... ..39
`
`
`
`
`
`Establishment procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 39
`
`Procedure on expiry oftimer T200 ..................................................................................................... .. 40
`Termination of ABM operation ................................................................................................................ .. 40
`General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 40
`
`
`
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 41
`. . . . . . . . . . .
`Release procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`Procedure on expiry oftimer T200 ............................................................................... .. 41
`Automatic negotiation of LLC layer and layer-3 parameters ................................................................... .. 41
`Negotiation of parameter In ................................................................................................................ .. 42
`Unsuccessful XID negotiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 43
`Procedure on expiry oftimer T200 . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 43
`TLLI Assigned / ADM state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 43
`Collision of unnumbered commands and responses ................................................................................. .. 44
`Identical transmitted and received commands .................................................................................... .. 44
`Different transmitted and received commands . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . .. 44
`
`Unsolicited DM response and SABM or DISC command ....................................................................... .. 44
`Procedures for information transfer in ABM operation ................................................................................. .. 44
`Transmitting I frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 45
`Receiving I frames . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 46
`Scnding and rccciving acknowlcdgcmcnts ................... ..
`........................ .. 46
`Sending acknowledgements ................................................................................................................ .. 46
`Receiving acknowledgements ............................................................................................................. .. 46
`Requesting acknowledgements . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 47
`
`Peer receiver busy condition .................................................................................................................... .. 47
`Supervisory frame selection ................................................................................................................ .. 48
`Own receiver busy condition .................................................................................................................... .. 48
`Waiting for acknowledgement .................................................................................................................. .. 48
`. . . . . . . . . . . . . . . . . . . . . . . . .. 48
`Re-establishment of ABM operation . . . . .
`
`Criteria for re—establishment ..................................................................................................................... .. 48
`Procedures ................................................................................................................................................ .. 49
`
`
`
`Exception condition reporting and recovery . . . . . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 49
`
`. . . . . . . . . . . . . . . . . . . . . . . . .. 49
`. . . . . . . . . . . . . . . . . . . . .
`Invalid frame condition . . . . . . . . .
`
`Frame rejection condition . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 49
`Receipt ofa FRMR response frame ......................................................................................................... .. 49
`Unsolicited response frames ..................................................................................................................... .. 49
`Multiple assignment of TLLI value . . . . . . . . . . . . . . .
`. . . . . . . . . . . . . . . . . . . . . . . . .. 50
`
`List of LLC layer parameters ......................................................................................................................... .. 50
`LLC version number (Version) ................................................................................................................ .. 50
`Input Offset Value (IOV) ......................................................................................................................... .. 50
`Retransmission timer (T200) .................................................................................................................... .. 50
`Maximum number of retransmissions (N200) .......................................................................................... .. 50
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00005
`
`8.8.2
`8.8.3
`8.8.4
`8.8.5
`8.9
`8.9.1
`8.9.2
`8.9.3
`8.9.4
`
`
`
`
`
`
`
`
`Annex B (informative):
`
`LLC layer states for peer-to-peer operation ............................................. ..54
`
`B. 1 General ................................................................................................................................................. .. 54
`
`B.2 An overview of the peer-to-peer LLC layer states ............................................................................... ..54
`
`Annex C (informative):
`
`Document history...........................................................................................56
`
`History ............................................................................................................................................................ ..57
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00006
`
`GSM 04.64 version 6.1.0 Release 1997
`
`6
`
`TS 101 351 V6.1.0 (1998-07)
`
`8.9.5
`8.9.6
`8.9.7
`
`Maximum number of octets in an information field (N201) ..................................................................... .. 50
`Maximum I frame buffer size (rn) ............................................................................................................ .. 51
`Maximum number of outstanding I frames (k) ......................................................................................... .. 51
`
`Annex A (normative):
`
`Ciphering ...................................................................................................... ..52
`
`A.1 General ................................................................................................................................................. ..52
`
`A.2 Ciphering algorithm interface .............................................................................................................. ..52
`A.2.1
`Generation of Input ........................................................................................................................................ .. 53
`
`
`
`GSM 04.64 version 6.1.0 Release 1997
`
`7
`
`TS 101 351 V6.1.0 (1998-07)
`
`Intellectual Property Rights
`
`IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
`pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
`in SR 000 314: "Intellectual Properzjv Rights (IPRs); Essential, or potentially Essential, IPRs notified to E TS] in respect
`0fETSI standards”, which is available free of charge from the ETSI Secretariat. Latest updates are available on the
`ETSI Web server (http://www.etsi.fr/ipr or http://www.etsi.org/ipr).
`
`Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
`can be given as to the existence of other IPRs not referenced in SR 000 314 (or the updates on the ETSI Web server)
`which are, or may be, or may become, essential to the present document.
`
`Foreword
`
`This ETSI Technical Specification (TS) has been produced by the Special Mobile Group (SMG) of the European
`Telecommunications Standards Institute (ETSI).
`
`This TS defines the logical link control layer protocol to be used for packet data transfer between the Mobile Station
`(MS) and Serving GPRS Support Node (SGSN) within the digital cellular telecommunications system.
`
`The contents of this TS is subject to continuing work within SMG and may change following formal SMG approval.
`Should SMG modify the contents of this TS, it will be re—released by SMG with an identifying change of release date
`and an incrcasc in version numbcr as follows:
`
`Version 6.x.y
`
`where:
`
`6
`
`X
`
`indicates GSM Phase 2+ Release 1997;
`
`the second digit is incremented for all other types of changes, i.e. technical enhancements, corrections,
`updates, etc.;
`
`y
`
`the third digit is incremented when editorial only changes have been incorporated in the specification.
`
`ETSI
`
`ZTE Corporation and ZTE (USA) Inc.
`Exhibit 1005.07-00007
`
`
`
`GSM 04.64 version 6.1.0 Release 1997
`
`8
`
`TS 101 351 V6.1.0 (1998-07)
`
`1
`
`Scope
`
`This specification defines the Logical Link Control (LLC) layer protocol to be used for packet data transfer between the
`Mobile Station (MS) and Serving GPRS Support Node (SGSN).
`
`It defines the frame structure, elements of procedure, format of fields, and procedures for the proper operation of the
`logical link control layer. It is based on ideas contained in IS-130 [21], ISO 3309 [16], ISO 4335 [17], and
`ISO 7809 [18, 19, 20] (HDLC ofISO), as well ITU-T Q.920 [13] and Q.921 [14] (LAPD). The concepts, the overview
`description of LLC layer functions and procedures, and the relationship with other Technical Specifications are
`described in general terms in GSM 03.60 [5].
`
`LLC spans from the Mobile Station (MS) to the Serving GPRS Support Node (SGSN). LLC is intended for use with
`both acknowledged and unacknowledged data transfer.
`
`The frame formats defined for LLC are based on those defined for LAPD and RLP. However, there are important
`differences between LLC and other protocols, in particular with regard to frame delimitation methods and transparency
`mechanisms. These differences are necessary for independence from the radio path.
`
`The LLC procedures are modelled upon the concepts of HDLC as outlined in ISO 4335. Data sequence integrity
`between the data source and data sink is effected by means of a cyclic numbering scheme. An independent numbering
`scheme is used for each logical data link, as identified by the a data link connection identifier. LLC supports two modes
`of operation:
`
`— Unacknowledged peer—to—peer operation:
`
`A logical link entity may initiate transmissions to a peer entity without prior establishment of a logical connection
`with the peer entity. LLC does not guarantee in—order delivery. LLC can detect errors in a received frame, and,
`depending on whether the frame is sent in protected mode or not, either discard or deliver the erroneous frame.
`No error recovery procedures are defined at the LLC layer. Higher—layer protocols can be used to provide
`reliability, if needed. This mode of operation