Digital Enhanced Cordless Telecommunications

The base unit and handset of a British Telecom DECT cordless telephone

Digital Enhanced Cordless Telecommunications (Digital European Cordless Telecommunications), usually known by the acronym DECT, is a standard primarily used for creating cordless telephone systems. It originated in Europe, where it is the universal standard, replacing earlier cordless phone standards, such as 900 MHz CT1 and CT2.[1]

Beyond Europe, it has been adopted by Australia, and most countries in Asia and South America. North American adoption was delayed by United States radio frequency regulations. This forced development of a variation of DECT, called DECT 6.0, using a slightly different frequency range which makes these units incompatible with systems intended for use in other areas, even from the same manufacturer. DECT has almost universally replaced other standards in most countries where it is used, with the exception of North America.

DECT was originally intended for fast roaming between networked base stations and the first DECT product was Net3 wireless LAN. However its most popular application is single-cell cordless phones connected to traditional analog telephone, primarily in home and small office systems, though gateways with multi-cell DECT and/or DECT repeaters are also available in many private branch exchange (PBX) systems for medium and large businesses. DECT can also be used for purposes other than cordless phones, such as baby monitors and industrial sensors. DECT ULE is a variant tailored for home security and automation.

The DECT standard includes a common interoperability profile for simple telephone capabilities, called GAP, which most manufacturers implement. GAP-conformance enables DECT handsets and bases from different manufacturers to interoperate at the most basic level of functionality, that of making and receiving calls.

New Generation DECT (NG-DECT) standard, marketed as CAT-iq by the DECT Forum, provides a common set of advanced capabilities for handsets and base stations. CAT-iq allows interchangeability across base stations and handsets from different manufacturers, while maintaining backward-compatibility with GAP equipment. It also requires mandatory support for wideband audio.

Standards history

The DECT standard was developed by ETSI in several phases, the first of that took place between 1988 and 1992 when the first round of standards were published. These were the ETS 300-175 series in 9 parts defining the air interface, and ETS 300-176 defining how the units should be type approved. A technical report, ETR-178, was also published to explain the standard.[2] Subsequent standards were developed and published by ETSI to cover interoperability profiles and standards for testing.

Initially named "Digital European Cordless Telephone" at its launch by CEPT in November 1987, following a suggestion by Enrico Tosato of Italy, its name was soon changed to "Digital European Cordless Telecommunications" to reflect its broader range of application, including data services. In 1995, due to its more global usage, the name was changed from "European" to "Enhanced". DECT is recognized by the ITU as fulfilling the IMT-2000 requirements and thus qualifies as a 3G system. Within the IMT-2000 group of technologies, DECT is referred to as 'IMT-2000 Frequency Time' (IMT-FT).

DECT was developed by ETSI but has since been adopted by many countries all over the World. The original DECT frequency band (1880 MHz–1900 MHz) is used in all countries in Europe. Outside Europe, it is used in most of Asia, Australia and South America. In the United States, the Federal Communications Commission in 2005 changed channelization and licensing costs in a nearby band (1920 MHz–1930 MHz, or 1.9 GHz), known as Unlicensed Personal Communications Services (UPCS), allowing DECT devices to be sold in the U.S. with only minimal changes. These channels are reserved exclusively for voice communication applications and therefore are less likely to experience interference from other wireless devices such as baby monitors and wireless networks.

New Generation DECT (NG-DECT) standard was first published in 2007;[3] it was developed by ETSI with guidance from the Home Gateway Initiative through the DECT Forum.[4] The ETSI TS 102 527 series come in 5 parts and cover wideband audio and mandatory interoperability features. They were preceded by an explanatory technical report ETSI TR 102 570 [5] The DECT Forum maintains the CAT-iq trademark and certification program; CAT-iq wideband voice profiles 1.0 and 2.0/2.1 are based on relevant parts of ETSI TS 102 527.

DECT Ultra Low Energy (DECT ULE) standard was announced in January 2011 and the first commercial products were launched later that year by Dialog Semiconductor. The standard has been created to enable home automation, security, healthcare and energy monitoring applications that are battery powered. Like DECT, DECT ULE standard uses the 1.9 GHz band, and so suffers less interference than Zigbee, Bluetooth, Wi-Fi, from microwave ovens, which all operate in the ISM unlicensed 2.4 GHz band. DECT ULE uses a simple star network topology, so many devices in the home are connected to a single control unit.

Application

The DECT standard originally envisaged three major areas of application:[2]

Of these, the domestic application (cordless home telephones) has been extremely successful. The enterprise PABX market had some success, and all the major PABX vendors have offered DECT access options. The public access application did not succeed, since public cellular networks rapidly out-competed DECT by coupling their ubiquitous coverage with large increases in capacity and continuously falling costs. There has been only one major installation of DECT for public access: in early 1998 Telecom Italia launched a wide-area DECT network known as "Fido" after much regulatory delay, covering major cities in Italy.[6] The service was promoted for only a few months and, having peaked at 142,000 subscribers, was shut down in 2001.[7]

DECT has also been used for wireless local loop as a substitute for copper pairs in the "last mile" in countries such as India and South Africa. By using directional antennas and sacrificing some traffic capacity, cell coverage could extend to over 10 kilometres (6.2 mi). One example is the corDECT standard.

Data applications such as electronic cash terminals, traffic lights, and remote door openers[8] also exist, but have been eclipsed by Wi-Fi, 3G and 4G which compete with DECT for both voice and data.

DECT 6.0

DECT 6.0 is a North American variation of DECT, operating at 1.9 GHz. The DECT and DECT 6.0 technologies are essentially identical, except for operating frequency.

The "6.0" does not equate to a spectrum band, but is a marketing term coined by Rick Krupka while at Siemens for DECT devices manufactured for use in the United States and Canada. It was decided the term DECT 1.9 might have confused customers who equate larger numbers (such as the 2.4 and 5.8 in existing 2.4 GHz and 5.8 GHz cordless telephones) with later products.

In North America, DECT suffers from major deficits, especially in comparison to DECT elsewhere, since the UPCS band (1920–1930 MHz) used for DECT in North America is not free from heavy interference and only half as wide as that used in Europe (1880–1900 MHz), the 4 mW average transmission power limits the range to far less than the 10 mW permitted in Europe, and the commonplace lack of GAP compatibility among US vendors binds companies to a single vendor.

North-American DECT 6.0 products may not be used in Europe, Sri Lanka[9] and Africa, as they cause and suffer from interference with the European, Sri Lankan and South African cellular networks. Use of such products is prohibited by European Telecommunications Authorities, Telecommunications Regulatory Commission of Sri Lanka[10] and the Independent Communication Authority of South Africa. European DECT products may not be used in the United States and Canada, as they likewise cause and suffer from interference with American and Canadian cellular networks, and use is prohibited by the Federal Communication Commission and Industry Canada.

NG-DECT/CAT-iq

Cordless Advanced Technology—internet and quality (CAT-iq) is a certification program maintained by the DECT Forum. It is based on New Generation DECT (NG-DECT) series of standards from ETSI.

NG-DECT/CAT-iq contains features that expand the generic GAP profile with mandatory support for high quality wideband voice, enhanced security, calling party identification, multiple lines, parallel calls, and similar functions to facilitate VoIP calls through SIP and H.323 protocols.

There are several CAT-iq profiles which define supported voice features:

CAT-iq allows any DECT handset to communicate with a DECT base from a different vendor, providing full interoperability. CAT-iq 2.0/2.1 feature set is designed to support IP-DECT base stations found in office IP-PBX and home gateways.

Technical features

The DECT standard specifies a means for a portable phone or "Portable Part" to access a fixed telephone network via radio. Base station or "Fixed Part" is used to terminate the radio link and provide access to a fixed line. gateway is then used to connect calls to the fixed network, such as public switched telephone network (telephone jack), office PBX, ISDN, or VoIP over Ethernet connection.

Typical abilities of a domestic DECT Generic Access Profile (GAP) system include multiple handsets to one base station and one phone line socket. This allows several cordless telephones to be placed around the house, all operating from the same telephone jack. Additional handsets have a battery charger station that does not plug into the telephone system. Handsets can in many cases be used as intercoms, communicating between each other, and sometimes as walkie-talkies, intercommunicating without telephone line connection.

DECT operates in the 1880–1900 MHz band and defines ten frequency channels from 1881.792 MHz to 1897.344 MHz with a band gap of 1728 kHz.

DECT operates as a multicarrier Frequency division multiple access (FDMA) / Time division multiple access (TDMA) system. This means that the radio spectrum is divided into physical carriers in two dimensions: frequency and time. FDMA access provides up to 10 frequency channels, and TDMA access provides 24 time slots per every frame of 10 ms. DECT uses Time division duplex (TDD), which means that down- and uplink use the same frequency but different time slots. Thus a base station provides 12 duplex speech channels in each frame, with each time slot occupying any available channel - thus 10 x 12 = 120 carriers are available, each carrying 32 kbit/s.

DECT also provides Frequency-hopping spread spectrum over TDMA/TDD structure for ISM band applications. If frequency-hopping is avoided, each base station can provide up to 120 channels in the DECT spectrum before frequency reuse. Each timeslot can be assigned to a different channel in order to exploit advantages of frequency hopping and to avoid interference from other users in asynchronous fashion.

DECT allows interference-free wireless operation to around 100 metres (110 yd) outdoors, much less indoors when separated by walls. Operates clearly in common congested domestic radio traffic situations, for instance, generally immune to interference from other DECT systems, Wi-Fi networks, video senders, Bluetooth technology, baby monitors and other wireless devices.

Technical properties

DECT pulse duration measurement (100Hz / 10mS) on channel 8

ETSI standards documentation ETSI EN 300 175 parts 1-8 (DECT), ETSI EN 300 444 (GAP) and ETSI TS 102 527 parts 1-5 (NG-DECT) prescribe the following technical properties:

Physical layer

The DECT physical layer uses FDMA/TDMA access with TDD.

Gaussian Frequency Shift Keying (GFSK) modulation is used: the binary one is coded with a frequency increase by 288 kHz, and the binary zero with frequency decrease of 288 kHz. With high quality connections, 2-, 4- or 8-level Differential BPSK modulation (DBPSK, DQPSK or D8PSK), which is similar to QAM-2, QAM-4 and QAM-8, can be used to transmit 1, 2 or 3 bits per each symbol. QAM-16 and QAM-64 modulations with 4 and 8 bits per symbol can be used for user data (B-field) only, with resulting transmission speeds of up to 5,068 Mbit/s.

DECT provides dynamic channel selection and assignment; the choice of transmission frequency and time slot is always made by the mobile terminal. In case of interference in the selected frequency channel, the mobile terminal (possibly from suggestion by the base station) can initiate either intracell handover, selecting another channel/transmitter on the same base, or intercell handover, selecting a different base station altogether. For this purpose, DECT devices scan all idle channels at regular 30 s intervals to generate a RSSI (Received Signal Strength Indication) list. When a new channel is required, the mobile terminal (PP) or base station (FP) selects a channel with the minimum interference from the RSSI list.

The maximum allowed power for portable equipment as well as base stations is 250 mW. A portable device radiates an average of about 10 mW during a call as it is only using one of 24 time slots to transmit. In Europe the power limit was expressed as effective radiated power (ERP), rather than the more commonly used equivalent isotropically radiated power (EIRP), permitting the use of high-gain directional antennas to produce much higher EIRP and hence long ranges.

The DECT media access control layer controls the physical layer and provides connection oriented, connectionless and broadcast services to the higher layers.

The DECT data link layer uses Link Access Protocol Control (LAPC), a specially designed variant of the ISDN data link protocol called LAPD. They are based on HDLC.

GFSK modulation uses a bit rate of 1152 Mbit/s, with a frame of 10 ms (11520 bits) which contains 24 time slots. Each slots contains 480 bits, some of which are reserved for physical packets and the rest is guard space. Slots 0-11 are always used for downlink (FP to PP) and slots 12-23 are used for uplink (PP to FP).

There are several combinations of slots and corresponding types of physical packets with GFSK modulation:

The 420/424 bits of a GFSK basic packet (P32) contain the following fields:

The resulting full data rate is 32 kbit/s, available in both directions.

Network layer

The DECT network layer always contains the following protocol entities:

Optionally it may also contain others:

All these communicate through a Link Control Entity (LCE).

The call control protocol is derived from ISDN DSS1, which is a Q.931-derived protocol. Many DECT-specific changes have been made.

The mobility management protocol includes the management of identities, authentication, location updating, on-air subscription and key allocation. It includes many elements similar to the GSM protocol, but also includes elements unique to DECT.

Unlike the GSM protocol, the DECT network specifications do not define cross-linkages between the operation of the entities (for example, Mobility Management and Call Control). The architecture presumes that such linkages will be designed into the interworking unit that connects the DECT access network to whatever mobility-enabled fixed network is involved. By keeping the entities separate, the handset is capable of responding to any combination of entity traffic, and this creates great flexibility in fixed network design without breaking full interoperability.

DECT GAP is an interoperability profile for DECT. The intent is that two different products from different manufacturers that both conform not only to the DECT standard, but also to the GAP profile defined within the DECT standard, are able to interoperate for basic calling. The DECT standard includes full testing suites for GAP, and GAP products on the market from different manufacturers are in practice interoperable for the basic functions.

Security

The DECT media access control layer includes authentication of handsets to the base station using the DECT Standard Authentication Algorithm (DSAA). When registering the handset on the base, both record a shared 128-bit Unique Authentication Key (UAK). The base can request authentication by sending two random numbers to the handset, which calculates the response using the shared 128-bit key. The handset can also request authentication by sending a 64-bit random number to the base, which chooses a second random number, calculates the response using the shared key, and sends it back with the second random number.

The standard also provides encryption services with the DECT Standard Cipher (DSC). The encryption is fairly weak, using a 35-bit initialization vector and encrypting the voice stream with 64-bit encryption. While most of the DECT standard is publicly available, the part describing the DECT Standard Cipher was only available under a non-disclosure agreement to the phones' manufacturers from ETSI.

The properties of the DECT protocol make it hard to intercept a frame, modify it and send it later again, as DECT frames are based on time-division multiplexing and need to be transmitted at a specific point in time.[12] Unfortunately very few DECT devices on the market implemented authentication and encryption procedures [12][13] - and even when encryption was used by the phone, it was possible to implement a man-in-the-middle attack impersonating an DECT base station and revert to unencrypted mode - which allows calls to be listened to, recorded, and re-routed to a different destination.[13][14][15]

After an unverified report of a successful attack in 2002,[16][17] members of the deDECTed.org project actually did reverse engineer the DECT Standard Cipher in 2008,[13] and as of 2010 there has been a viable attack on it that can recover the key.[18]

In 2012, an improved authentication algorithm, the DECT Standard Authentication Algorithm 2 (DSAA2), and improved version of the encryption algorithm, the DECT Standard Cypher 2 (DSC2), both based on AES 128-bit encryption, were included as optional in the NG-DECT/CAT-iq suite.

DECT Forum also launched the DECT Security certification program which mandates the use of previously optional security features in the GAP profile, such as early encryption and base authentication.

Profiles

Various access profiles have been defined in the DECT standard:

DECT for data networks

Other interoperability profiles exist in the DECT suite of standards, and in particular the DPRS (DECT Packet Radio Services) bring together a number of prior interoperability profiles for the use of DECT as a wireless LAN and wireless internet access service. With good range (up to 200 metres (660 ft) indoors and 6 kilometres (3.7 mi) using directional antennae outdoors), dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s, DECT appeared at one time to be a superior alternative to Wi-Fi.[19] The protocol capabilities built into the DECT networking protocol standards were particularly good at supporting fast roaming in the public space, between hotspots operated by competing but connected providers. The first DECT product to reach the market, Olivetti's Net3, was a wireless LAN, and German firms Dosch & Amand and Hoeft & Wessel built niche businesses on the supply of data transmission systems based on DECT.

However, the timing of the availability of DECT, in the mid-1990s, was too early to find wide application for wireless data outside niche industrial applications. Whilst contemporary providers of Wi-Fi struggled with the same issues, providers of DECT retreated to the more immediately lucrative market for cordless telephones.[20] A key weakness was also the inaccessibility of the U.S. market, due to FCC spectrum restrictions at that time. By the time mass applications for wireless Internet had emerged, and the U.S. had opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a technically competitive wireless data transport had passed.

Health and safety

DECT uses UHF radio, similar to mobile phones, baby monitors, Wi-Fi, and other cordless telephone technologies. The UK Health Protection Agency (HPA) claims that due to a mobile phone's adaptive power ability, a DECT cordless phone's radiation could actually exceed the radiation of a mobile phone. A DECT cordless phone's radiation has an average output power of 10 mW but is in the form of 100 bursts per second of 250 mW, a strength comparable to some mobile phones.[21] Most studies have been unable to demonstrate any link to health effects, or have been inconclusive. Electromagnetic fields may have an effect on protein expression in laboratory settings[22] but have not yet been demonstrated to have clinically significant effects in real-world settings. The World Health Organization has issued a statement on medical effects of mobile phones which acknowledges that the longer term effects (over several decades) require further research.[23]

See also

References

  1. "DECT Information".
  2. 1 2 ETSI TR 101 178 V1.5.1 (2005-02). Digital Enhanced Cordless Telecommunications (DECT): A high level guide to the DECT standardization
  3. DECT reaches a New Generation
  4. http://www.dect.org/magazine/DECT_FLIPBOOK6/DECT_Issue_006_October2016.html#p=10
  5. ETSI TR 102 570 V1.1.1 (2007-03). Digital Enhanced Cordless Telecommunications (DECT); New Generation DECT; Overview and Requirements
  6. DECT for Cordless Terminal Mobility. DECT Forum Newsletter. 6 March 1998
  7. "LA TELECOM SPEGNE "FIDO"" Il Messaggero 5 April 2000.
  8. Schuler, Andreas; Tews, Erik; Weinmann, Ralf-Philipp (29 December 2008). "What is DECT?" (PDF). deDECTed.org. Archived from the original on 15 September 2016. Retrieved 15 September 2016.
  9. Daily Mirror. "TRC Seizes Wireless Phones". Daily Mirror. Retrieved 8 July 2017.
  10. TRCSL. "The Use of DECT 6.0 Phones is illegal in Sri Lanka". TRCSL. TRCSL. Retrieved 8 July 2017.
  11. "Beware of Buying Radiocommunications Equipment not Meeting Prescribed Specifications". Office of the Communications Authority.
  12. 1 2 Dr. DECT Secturity: Present, Past, Future. DECT World 2016 Presentations. Erik Tews, University of Birmingham. 31 May 2016.
  13. 1 2 3 "Serious security vulnerabilities in DECT wireless telephony". Heise Online. 29 December 2008.
  14. Lucks, Stefan; Schuler, Andreas; Tews, Erik; Weinmann, Ralf-Philipp; Wenzel, Matthias. Attacks on the DECT Authentication Mechanisms. Fischlin, Marc (Ed.): Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20–24, 2009.
  15. Erik Tews. DECT Security Analysis (Ph.D. Thesis). Technische Universität Darmstadt
  16. "Do you like ice cream?". Newsgroup: alt.anonymous.messages. Usenet: adsq2u$p00$1@wanadoo.fr.
  17. Weinmann, Ralf-Philipp (26 January 2009). "DSC - Reverse Engineering of the Samsung DECT SP-R6150". Archived from the original on 26 February 2012.
  18. Nohl, Karsten; Tews, Erik; Weinmann, Ralf-Philipp (4 April 2010). "Cryptanalysis of the DECT Standard Cipher" (PDF). Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea.
  19. "Wireless LANs: developments in technology and standards". IEE Journal of Computing and Control Engineering. October 1994.
  20. "What is DECT used for, and why do we need a DECT homephone?".
  21. Independent Advisory Group on Non-ionising Radiation (April 2012). "Health Effects from Radiofrequency Electromagnetic Fields". (UK) Health Protection Agency. Retrieved 10 September 2013.
  22. Vitreous State Laboratory, Catholic University of America, Washington, DC 20064, USA. "Chronic electromagnetic field exposure decreases HSP70 levels and lowers cytoprotection". (US) Wiley-Liss, Inc.
  23. "What are the health risks associated with mobile phones and their base stations?". Online Q&A. World Health Organization. 5 December 2005. Retrieved 19 January 2008.

Standards

ETSI EN 300 175 V2.6.1 (2015-07). Digital Enhanced Cordless Telecommunications (DECT) - Common Interface (CI)
ETSI TS 102 939 (2015-03). Digital Enhanced Cordless Telecommunications (DECT) - Ultra Low Energy (ULE) - Machine to Machine Communications
ETSI TS 102 527. Digital Enhanced Cordless Telecommunications (DECT) - New Generation DECT
Digital Enhanced Cordless Telecommunications (DECT)
Digital Enhanced Cordless Telecommunications (DECT) - New Generation DECT

Further reading

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.