![Zte ZXSDR BS8800 Technical Manual Download Page 51](http://html1.mh-extra.com/html/zte/zxsdr-bs8800/zxsdr-bs8800_technical-manual_940275051.webp)
Chapter 6 Interfaces and Protocols
�
It provides the architecture of data packets over the con-
nection application layer by means of data stream authen-
tication.
�
It distinguishes priorities signals and user services accord-
ing to the data encapsulation protocol of the connection
layer.
�
It connects users to signal service.
�
It allocates independent data stream to applications of dif-
ferent QoSs.
�
Session layer
The session layer contains a series of protocols used for ses-
sion negotiation between the terminal and the network. In the
1xEV-DO system, a session indicates a state jointly maintained
between Access Terminal (
AT
) and Access Network (
AN
). It in-
cludes address UATI distributed to the terminal, protocol set
determined by the terminal and the network for air interface
communication, protocol configurations in the protocol set and
current terminal location. The session layer defines three pro-
tocols:
�
Session Management Protocol activates other protocols on
the layer, ensures session validity and closes sessions.
�
Address Management Protocol manages terminal address
(UATI) distribution.
�
Session Configuration Protocol (SCP) performs session flow
negotiation. In the 1xEV-DO system, SCP negotiates the
protocol used for communication between the terminal and
the network, and how to set protocol parameters.
�
Connection layer
The connection layer controls the air link state. In the 1xEV-DO
system, an enabled link between AT and AN means the AT is
allocated with RPC, RTC and FTC (FTC is the time division chan-
nel shared by all the subscribers with open connections in the
sector).
�
Security layer
The security layer delivers the following functions:
�
Key exchange. It provides a procedure for the terminal and
the network to exchange keys that are used for authenti-
cation and encryption.
�
Authentication. It provides a procedure for the terminal
and the network to authenticate over-the-air services.
�
Encryption. It provides a procedure for the terminal and
the network to encrypt over-the-air services.
The security layer covers four protocols, among which Key Ex-
change Protocol, Authentication Protocol and Encryption Pro-
tocol define the three functions mentioned above respectively
while Security Protocol provides public variables for Authenti-
cation Protocol and Encryption Protocol.
�
MAC layer
Confidential and Proprietary Information of ZTE CORPORATION
45