Table of Contents
Preface
1Scope
2Functionalaspects
2.1Dial-inanddial-outconsiderations
2.2Identification
2.3Serviceaspects
2.4DTEidentificationmethods
2.5DCEidentificationmethods
2.6Dial-in-by-the-DTEanddial-out-by-the-PSPDN
operation
2.7DTEservicerequirement
2.8Duplexandhalf-duplexoperation
2.9Identificationprotocol
2.10Negotiationofvalues
3DTEservicedescriptions
3.1DTEserviceattributes
3.2SummaryofDTEservices
3.3Non-identifiedDTEservice
3.4IdentifiedDTEservice
3.5CustomizedDTEservice
4Interfacecharacteristics(physicallayer)
4.1X.21interface
4.2X.21bisinterface
4.3V-Seriesinterface
5LinkaccessprocedureacrosstheDTE/DCEinterface
5.1Introduction
5.2Datalinklayeraddressassignment
5.3Useofexchangeidentification(XID)frames
5.4Linkset-updisconnection
5.5Multilink
5.6Half-duplexoperation
6Packetlayer
6.1Scopeandfieldofapplication
6.2IdentificationandauthenticationoftheDTEusing
theNUIselectionfacilityincallset-uppackets
7X.32procedures,formatsandfacilities
7.1Identificationprotocol
7.2ProceduresforX.32optionaluserfacilities
7.3Codingoftheidentificationprotocolelements
7.4Securitygrade2method
7.5DCEtimersT14andT14bis
7.6DCEtimerT15
AnnexA-ActionstakenbytheDCEintherolesof
questioningandchallengedpartiesforsecuritygrade1
andsecuritygrade2identifications
A.1Introduction
A.2Securitygrade1identification
A.3Securitygrade2identification
AnnexB-Abbreviations
AppendixI-ImplementationofLAPX
I.IIntroduction
I.2Controlandstatusfunctions
I.3Tableoftransitionsbetweenstates
I.4HDTM/physicallayercontrolandstatusfunctions
expressedintermsapplicabletoamodem
interface
AppendixIITSApublickeyalgorithm
AppendixIIIRelationshipoftimersT14andT14bistothe
differentmethodsofDTEidentification