Академический Документы
Профессиональный Документы
Культура Документы
Figure A.1 shows the procedure for the Mobile Originating Call Setup. The Procedure starts with RRC
Connection Request and ends with Connect Ack. MGW1 and MGW2 could be the same Media Gateway
and the flow would look exactly the same.
10. RRC: DCCH/ DCH (AM): Downlink Direct Transfer (Authentication Request)
11. RRC: DCCH/ DCH (AM): Uplink Direct Transfer (Authentication Response)
12. RANAP: Direct Transfer (Authentication Response)
13. RANAP: Security Mode Command
26. RRC: DCCH/ DCH (AM): Downlink Direct Transfer (Authentication Request)
27. RRC: DCCH/ DCH (AM): Uplink Direct Transfer (Authentication Response)
28. RANAP: Direct Transfer (Authentication Response)
MSC/
UE RNC1 GMSC HLR MGW RNC1 UE
1. RRC: RACH/CCCH: RRC Connection
6. SCCP: Con
7. MAP(Send Authentication
3. GCP: Accept T4
4. MAP: SRI Request
9. GCP: Accept T3
10. BICC: Initiation Address Massage( CIC1)
5. GCP: Accept T5
7. GCP: Accept T5
4. GCP: Accept T5
GMSC/
U RN MS SMS- HL
1. MAP ( Forward Short
2. RANAP: Paging
3. BICC: Release
4. ISUP: Release
6. GCP: Accept T3
6. GCP: Accept T3
10. RRC: DCCH/DCH(AM): Downlink Direct Transfer (Authentication and Ciphering Request)
Authentication
11. RRC: DCCH/DCH(AM): Uplink Direct Transfer (Authentication and Ciphering Response)
Cell Update
19. RRC: DCCH/RACH(AM): Radio Bearer Setup Complete
12. RRC: DCCH/ DCH(AM): Downlink Direct Transfer (Authentication and Ciphering Request)
Authentication
13. RRC: DCCH/ DCH(AM): Uplink Direct Transfer (Authentication and Ciphering Response)
Cell Update
21. RRC: DCCH/ RACH(AM): Radio Bearer Setup Complete
11. RRC: DCCH/DCH: Uplink Direct Transfer (Authentication and Ciphering Response)
18. RRC: DCCH/RACH: Uplink Direct Transfer (Deactivate PDP Context Request)
23. RRC: DCCH/FACH: Downlink Direct Transfer (Deactivate PDP Context Accept)
UE RNC SGSN G G SN H LR
1 . R R C : R AC H /C C C H : R R C C on n e ctio n R eq u es t
2 . R R C : FAC H /C CC H : R R C C o n ne ctio n Se tu p
3 . R RC : D C C H /D C H : R RC C on n e ctio n Se tu p C omp lete
1 2. R AN A P(ps ): D ire ct T ran sfe r (Au th en tica tio n an d Ciph erin g R esp o nse )
1 3. R AN A P( p s ): Se curity M od e C o mma n d
14 . R R C : D C C H /D C H (A M): Se cu rity Mo d e C om ma nd
1 5 . RR C : D C C H /D C H (AM ): S ecu rity M o de C o mp le te
1 6. R AN A P( p s ): Se curity M od e C o mple te
2 4. R AN A P( p s ): RA B ass ig nme n t R e q ue st
C ell Update
2 6. R R C : D C CH /R AC H (AM ): R a d io Be a rer S etup C o mp le te
UE RNC SG SN GG SN HLR
1 . R R C : R A C H /C C C H : R R C C o n n e ctio n R e q u e st
2 . R R C : F A C H /C C C H : R R C C o n n e ctio n S e tu p
3 . R R C : D C C H /D C H : R R C C o n n e ction S e tu p C om p le te
5. S C C P : C o n n e ct R e q u e st(C R ) /
R A N A P ( p s ): Initia l U E M e ssa g e ( S e rvice R e q u e st)
6. S C C P : C o n n e ct C o n f (C C )
7 . M A P (S e n d A u th e n ticatio n In fo )
8 . M A P (S e n d A u th e n ticatio n In fo A ck)
1 3 . R A N A P (p s) : S e cu rity M o d e C o m m a n d
1 4 . R R C : D C C H /D C H (A M ): S e c u rity M o d e C o m m a n d
1 5 . R R C : D C C H /D C H (A M ): S e cu r ity M o d e C o m p le te
16 . R A N A P ( p s ) : S e cu rity M o d e C o m p le te
1 7 . R A N A P (p s) : C o m m o n ID ( IM S I)
20 . R A N A P (p s ) : R A B a ssig n m e n t R e q u e st
2 1 . R R C : D C C H /D C H ( A M ): R a d io B e a re r S e tu p
C ell U p date
2 2 . R R C : D C C H /R A C H ( A M ): R a d io B e a r er S e tu p C o m p le te
23 . R A N A P (P S ) : R A B A s sig n m e n t R e sp o n se
2 4 . G T P _ C : C re a te P D P C o n te xt R e q u e st
2 5 . G T P _ C : C re a te P D P C o n te xt R e s po n s e
The UE resumes
30a. UL/DL 30b. BSSGP: UL/DL UNIDATA
normal
data transmission
GSM to UMTS Inter-SGSN Change [I]
The GSM to UMTS Inter-SGSN Change procedure is shown in figure A.20. The UE is
assumed to be in GPRS MM state READY and it has a PDP Context Activated.