Difference between revisions of "DECT"
From Teknologisk videncenter
m (→Abbreviations) |
m (→Abbreviations) |
||
(21 intermediate revisions by 3 users not shown) | |||
Line 18: | Line 18: | ||
|- | |- | ||
|DECT-DSAA || DECT Standard Authentication Algorithm || A handset authenticate with the system | |DECT-DSAA || DECT Standard Authentication Algorithm || A handset authenticate with the system | ||
+ | |- | ||
+ | |DECT-DSCA || DECT Standard Ciphering Algorithm || Encrypt Voice and Signaling | ||
+ | |- | ||
+ | |DECT-CAP || Cordless Terminal Mobility Profile || | ||
|- | |- | ||
|DECT-GAP || DECT Generic Access Profile || - | |DECT-GAP || DECT Generic Access Profile || - | ||
Line 35: | Line 39: | ||
|DECT-PT || DECT Portable radio Terminations || The handset | |DECT-PT || DECT Portable radio Terminations || The handset | ||
|- | |- | ||
− | |LCE || Link Control Entity | + | |LCE || Link Control Entity || |
+ | |- | ||
+ | |IPBS || IP DECT Base Station || | ||
+ | |- | ||
+ | |IPBL || IP DECT Gateway || | ||
+ | |- | ||
+ | |PARI || Primary Access Rights Identifier || Common identifier for all base stations in a DECT system | ||
|- | |- | ||
+ | |SARI || Secondary Access Rights Identifier || If PARI between base station and handset doesn't match SARI is checked. (Multisystem) | ||
|} | |} | ||
+ | ==DECT Hacking== | ||
+ | Kismet support DECT sniffing by using [https://dedected.org/trac/wiki/COM-ON-AIR-Kismet this] plugin.<br/> | ||
+ | The GNU Radio project utilizes the Universal Software Radio Peripheral (USRP) by Matt Ettus.<br/> | ||
+ | The [https://dedected.org/trac/wiki/COM-ON-AIR COM-ON-AIR] Dect PCMCIA card comes with windows drivers and allow a computer to function as a Dect Base Station(FP) and relay calls to a SIP IP PBX.<br/> | ||
+ | DECT support on wireshark is possible with the wireshark-1.0.5_dect.patch in Wireshark 1.0.5 | ||
+ | ===Articles=== | ||
+ | *http://marienfeldt.wordpress.com/2010/04/15/dect-phone-interception-made-easy/ | ||
+ | *[https://dedected.org/trac/attachment/wiki/DSC-Analysis/FSE2010-166.pdf Cryptanalysis of the DECT Standard Cipher] | ||
=Links= | =Links= | ||
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx ETSI DECT Standard] | *[http://www.etsi.org/WebSite/Technologies/DECT.aspx ETSI DECT Standard] | ||
*[http://www.dectweb.com/DECTForum/publicdocs/TechnicalDocument.PDF DECT Explained] | *[http://www.dectweb.com/DECTForum/publicdocs/TechnicalDocument.PDF DECT Explained] | ||
*[http://www.dect.org/documents.aspx www.dect.org/documents] | *[http://www.dect.org/documents.aspx www.dect.org/documents] | ||
+ | *[ftp://aux.detewe.ru/support/ascom/doc/ip-dect_ipbs_ds_92370gb.pdf Ascom IP-DECT Base Station] | ||
*[http://www2.rohde-schwarz.com/en/technologies/Wireless_Connectivity/DECT/information/ Rohde & Schwarz DECT] | *[http://www2.rohde-schwarz.com/en/technologies/Wireless_Connectivity/DECT/information/ Rohde & Schwarz DECT] | ||
+ | *[http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&sqi=2&ved=0CFYQFjAH&url=http%3A%2F%2Fkpnservice.nl%2Fpages%2FPhilips%2Fhandleiding.php%3Fci%3DDECT%2520manuals%26manual%3Ddectmanager%2520manual.pdf&ei=M5nxTv2KHIXO4QSjxa2hAQ&usg=AFQjCNGUqIQZjTZkizqZNVEVgVofaDeHTQ&sig2=nCTspIe5wSlK3NHLkMnHxQ DECT Manager mannual] good intro to DECT terminology | ||
+ | *[ftp://aux.detewe.ru/support/ascom/doc/ip-dect_sp_92422gb.pdf Ascom IP-DECT System - Planning] | ||
+ | *[http://www.compugraf.com.br/docs/tel_corp/dect_vs_voWLAN.pdf DECT vs WiFi] | ||
+ | *[ftp://aux.detewe.ru/support/ascom/doc Ascom FTP PDF Doc] | ||
+ | *[ftp://aux.detewe.ru/support/ascom/doc/ip-dect_sd_92375gb.pdf Ascom IP-DECT System Description] | ||
[[Category:Wireless]][[Category:VoIP]] | [[Category:Wireless]][[Category:VoIP]] |
Latest revision as of 12:51, 26 December 2011
Contents
Digital Enhanced Cordless Telecommunications (DECT™)
Applications
DECT is suitable for voice, data, and networking applications with a range up to 500 meters.
Abbreviations
Abr. | Meaning | Explanation |
CC | Call Control | Signaling |
CISS | Call Independent Supplementary Service | - |
DECT | Digital Enhanced Cordless Telecommunications | The standard |
DECT-TS | DECT Technical Specification | As RFC's in IP |
DECT-CI | DECT Common Specification | - |
DECT-DSAA | DECT Standard Authentication Algorithm | A handset authenticate with the system |
DECT-DSCA | DECT Standard Ciphering Algorithm | Encrypt Voice and Signaling |
DECT-CAP | Cordless Terminal Mobility Profile | |
DECT-GAP | DECT Generic Access Profile | - |
DECT-DRPS | DECT Packet Radio Service | Data over DECT |
DECT-IP | DECT Internet Protocol | IP over DECT |
DECT-FR | DECT Base Station | - |
DECT-FP | DECT Fixed Part | The base station |
DECT-PP | DECT Protable Part | The handset |
DECT-FT | DECT Fixed radio Terminations | The base station |
DECT-PT | DECT Portable radio Terminations | The handset |
LCE | Link Control Entity | |
IPBS | IP DECT Base Station | |
IPBL | IP DECT Gateway | |
PARI | Primary Access Rights Identifier | Common identifier for all base stations in a DECT system |
SARI | Secondary Access Rights Identifier | If PARI between base station and handset doesn't match SARI is checked. (Multisystem) |
DECT Hacking
Kismet support DECT sniffing by using this plugin.
The GNU Radio project utilizes the Universal Software Radio Peripheral (USRP) by Matt Ettus.
The COM-ON-AIR Dect PCMCIA card comes with windows drivers and allow a computer to function as a Dect Base Station(FP) and relay calls to a SIP IP PBX.
DECT support on wireshark is possible with the wireshark-1.0.5_dect.patch in Wireshark 1.0.5
Articles
- http://marienfeldt.wordpress.com/2010/04/15/dect-phone-interception-made-easy/
- Cryptanalysis of the DECT Standard Cipher