Tech-
invite
3GPP
space
IETF
RFCs
SIP
index
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 44.064
Word version: 16.0.0
1…
4…
8…
8
Definition of the LLC peer-to-peer protocol
A
Ciphering
B
Tunnelling of Messages (TOM)
C
LLC layer states for peer-to-peer operation
$
Change History
8
Definition of the LLC peer-to-peer protocol
8.1
General
8.2
Procedure for the use of the P/F bit
Word‑p. 43
8.3
TLLI assignment procedures
8.3.0
General
|R13|
8.3.1
TLLI assignment
8.3.2
TLLI change
8.3.3
TLLI unassignment
Word‑p. 44
8.4
Procedures for unacknowledged information transfer
8.4.0
General
|R13|
8.4.1
Transmission of unacknowledged information
8.4.2
Receipt of unacknowledged information
8.5
Procedures for establishment and release of ABM operation
Word‑p. 45
8.5.1
Establishment of ABM operation
8.5.1.1
General
8.5.1.2
Establishment procedures
8.5.1.3
Procedure on expiry of timer T200
Word‑p. 46
8.5.2
Termination of ABM operation
8.5.2.1
General
8.5.2.2
Release procedure
Word‑p. 47
8.5.2.3
Procedure on expiry of timer T200
8.5.3
Automatic negotiation of LLC layer and layer 3 parameters
8.5.3.0
General
|R13|
8.5.3.1
Negotiation of parameter Reset
Word‑p. 48
8.5.3.2
Negotiation of parameter m
Word‑p. 49
8.5.3.3
Unsuccessful XID negotiation
8.5.3.4
Procedure on expiry of timer T200
Word‑p. 50
8.5.4
TLLI Assigned / ADM state
8.5.5
Collision of unnumbered commands
Word‑p. 51
8.5.5.0
General
|R13|
8.5.5.1
Identical transmitted and received commands
8.5.5.2
Different transmitted and received commands
Word‑p. 52
8.5.6
Unsolicited DM response and SABM or DISC command
8.6
Procedures for information transfer in ABM operation
8.6.0
General
|R13|
8.6.1
Transmitting I frames
Word‑p. 53
8.6.2
Receiving I frames
8.6.3
Sending and receiving acknowledgements
Word‑p. 54
8.6.3.0
General
|R13|
8.6.3.1
Sending acknowledgements
8.6.3.2
Receiving acknowledgements
8.6.3.3
Requesting acknowledgements
Word‑p. 55
8.6.4
Peer receiver busy condition
8.6.4.1
Supervisory frame selection
Word‑p. 56
8.6.5
Own receiver busy condition
8.6.6
Waiting for acknowledgement
8.7
Re-establishment of ABM operation
8.7.1
Criteria for re-establishment
8.7.2
Procedures
Word‑p. 57
8.8
Exception condition reporting and recovery
8.8.0
General
|R13|
8.8.1
Invalid frame condition
8.8.2
Frame rejection condition
8.8.3
Receipt of a FRMR response frame
8.8.4
Unsolicited response frames
Word‑p. 58
8.9
List of LLC layer parameters
8.9.0
General
|R13|
8.9.1
LLC version number (Version)
8.9.2
Input Offset Values (IOV)
8.9.3
Retransmission timers (T200 and T201)
Word‑p. 59
8.9.4
Maximum number of retransmissions (N200)
8.9.5
Maximum number of octets in an information field (N201)
8.9.6
Maximum number of octets in the layer 3 header (N202)
Word‑p. 60
8.9.7
Maximum I frame buffer size (m)
8.9.8
Maximum number of outstanding I frames (k)
8.9.9
LLC layer parameter default values
Word‑p. 61
A
(Normative) Ciphering
Word‑p. 62
A.1
General
A.2
Ciphering algorithm interface
A.2.0
General
|R13|
A.2.1
Generation of Input
Word‑p. 63
B
(Normative) Tunnelling of Messages (TOM)
Word‑p. 64
B.1
TOM Protocol Envelope structure
B.1.0
TOM Protocol Envelope format
|R13|
B.1.1
TOM Protocol Discriminator
Word‑p. 65
B.1.2
Remaining Length of TOM Protocol Header
B.1.3
Remaining Octets of TOM Protocol Header
B.1.4
Message Capsule
C
LLC layer states for peer-to-peer operation
Word‑p. 66
C.1
General
C.2
An overview of the peer-to-peer LLC layer states
$
Change History
Word‑p. 68