Академический Документы
Профессиональный Документы
Культура Документы
The BSS signalling procedures are mainly related to actions and events triggered
by or for the MS. This document describes the signalling procedures, the signalling
flow and the messages used for the various services.
In this part the different phases of the signalling procedures are explained.
Location Update
In the case of a Location Update Request, the MSC will check the MS identity
based on IMSI or TMSI and perform authentication. If this is successful, ciphering
is activated, after which the MS equipment identity can be checked. With the
Location Update Accepted message the MSC will allow the MS to access the
network and a new TMSI is allocated.
Call Setup
After the authentication, ciphering and TMSI reallocation procedures as described
above have been completed, the system has to assign a traffic channel (TCH) to the
MS. All of these procedures may vary, depending on the network settings.
The setup of the call is divided into two parts, traffic channel assignment and
connection of the call. The traffic channel is taken into use during the assignment
procedure. The procedure starts with an Assignment Request and can be split into
three phases. The first phase consists of A-interface TCH allocation and of Air
interface TCH activation. The MSC will inform the BSC which speech circuit will
be used on the A-I/F and the BSC will activate a TCH in the BTS for the MS.
The second phase is to assign the channel to the MS. When the MS switches to the
assigned TCH it will use FACCH mode (stealing mode) to send signalling. The
third phase is to start the signalling connection with SABM. After this, the MS will
use the assigned signalling connection, FACCH, to send an Assignment Complete
message to the MSC.
Once the channels have been successfully allocated between the subscribers, the
second part of call setup takes place. This involves alerting the called party (the
phone rings) and connection (if the phone is answered).
1.4 Conversation part
The conversation part can start when the Connect Acknowledgement message is
received. During the conversation there will be measurement signalling between
the MS, BTS and BSC. If required the BTS can change the Timing Advance of the
MS and the BSC can make decisions on power level modifications or handovers. It
is also possible to send SMS messages on the SACCH.
12 Authenticate
13 DT1Authentication Request
14 Authentication Request ( SDCCH )
DT1 Setup 32
Setup ( SDCCH )
31
Send Info for O.G. Call 33
Complete Call 34
35 DT1 Call Proceeding
37DT1 Assignment Request 36 Call Proceeding ( SDCCH )
48 RF Channel Release
RF Channel Release Ack .
49
50 DT1 Alerting
DT1 Connect
51 Alerting ( FACCH )
52
53 Connect ( FACCH )
Disconnect ( FACCH ) 58
DT1 ( Disconnect )
59
60 DT1 ( Release )
61 Release ( FACCH )
66 Deactivate SACCH
DISC ( FACCH ) 67
68 UA ( FACCH )
Release Indication 69
RF Channel Release
70
RF Channel Release Ack .
71
DT1 ( Clear Complete )
72
RLSD ( SCCP Released )
73
RLC ( SCCP Released Ack .)
74
`
1. Channel Request (MS to BTS;RACH)
The MS requests a channel by sending a random access burst on a RACH channel
to a BTS. The Channel request message contains the establishment cause (3 bits)
which can be response to paging, emergency call or 'other services' e.g. Mobile
Originated Call, Short Message Service or Location Update. Additionally, this
message contains a Random Reference, which consists of 5 bits randomly
selected by the MS. This random reference is used to separate two MSs that are
attempting to access the network at exactly the same time.
2. Channel Request (BTS to BSC;BTSM)
Upon receiving the Channel Request message from the MS, the BTS sends a
Channel-Required message to the BSC, which contains the information contained
in the channel request. To this, the BTS adds the TDMA frame number and the
Access Delay, which is the first timing advance estimate made by the BTS.
9. Complete L3 Information
(BSC to MSC;BSSMAP)
CM Service Request ( L3 )
The CM Service Request message is forwarded to the MSC
This element is used to identify a previously calculated and stored ciphering key
(Kc) in the mobile. The mobile stores this sequence number it received from the
network with the corresponding Kc.
15. Authentication Response
(MS to BTS; SDCCH L3)
(BTS to BSC; BTSM L3)
The MS responds to the Authentication Request with the Signed Response SRES.
There are two algorithms used in the Authentication procedure, A3 and A8. In the
MS, these algorithms are stored on the SIM card, along with a 32-digit key called
Ki. The same information can be found in the Authentication Centre (AuC). When
the network requests MS Authentication, the AuC/VLR sends a 32 digit RANDom
Number to the MS. The MS calculates the Signed Response (SRES) and sends it
to the VLR. The VLR then compares the MSs SRES with the AuCs SRES and if
they are the same, the call set-up can continue.
Note
The first 8 digits of the Ki are used for Authentication and SRES calculation;
the other 24 are reserved for Ciphering Key (Kc) calculation.
DATA IND (RLL) T=1
Channel Nr
- SDCCH/8 subchannel 1
- timeslot : 1
Link Id
- main DCCH (FACCH or SDCCH)
- SAPI : 0
L3 Info
AUTHENTICATION RSP (MM)
Auth. Parameter SRES : 741C0B11
------------------------------------------------------------------------------------------------
Layer 3 Header Information
This element is used to supply the BSS with the necessary information in order to
carry the layer 3 messages to the mobile over the radio interface.
L3 Header Information
• length : d (xh)
• protocol discriminator pd text
• transaction identifier : d (xh)
• message sent dir text originating side
Protocol discriminator
value pd text
3h Call Control
5h Mobility Management
6h Radio Resources
9h SMS with call
Bh SMS with out call
Fh GSM test procedures
others Unknown protocol discriminator : d (xh)
The dir text is replaced with "to", if the TI flag is set to one. Otherwise "from" is
displayed.
Encryption information
This element carries the user data encryption information necessary to control the
encryption equipment in the BSS.
------------------------------------------------------------------------------------------------
Encryption information
• length : d (xh)
• algorithm id text
• ciphering key, length : d (xh)
xx xx xx xx xx xx xx xx
Algorithm idetifier
Phase 1:
Value algorithm id text
1 no encryption required
2 GSM encryption version 1
others Unknown algorithm id : d (xh)
Phase 2:
Bit No algorithm id text
1 no encryption required
2 GSM user data encryption version 1 (A%/1)
3 GSM A5/2
4 GSM A5/3
5 GSM A5/4
6 GSM A5/5
7 GSM A5/6
8 GSM A5/7
The chipering key bytes shall be displayed in hex in the order they apper in the
information element
20. Ciphering Mode Command (BSC to BTS;L3)
Establishment Command (BTSM)
The BSC stores the Encryption information and forwards the command to the BTS.
If the BTS software contains the algorithm specified by the MSC it can start
ciphering, otherwise it sends a reject message back to the MSC.
0 no identity
1 IMSI
2 IMEI
3 IMEISV
4 TIMSI
other Unknown identity type : d (xh)
If the number of digits is even, the upper nibble of the last octet is then interpreted
as spare bits. In IMSI, they must be set to one.
28. TMSI Reallocation Complete
(MT to BTS to BSC;SDCCH BTSM L3)
DATA IND (RLL) T=1
Channel Nr
- SDCCH/8 subchannel 1
- timeslot : 1
Link Id
- main DCCH (FACCH or SDCCH)
- SAPI : 0
L3 Info
TIMSI REALLOC COMP. (mm)
When the MS receives the TMSI Reallocation Command message, it stores the
LAI in the SIM. If the received identity is the IMSI of the MS, it deletes any
previously stored TMSI. If the received identity is a TMSI, the MS stores it in the
SIM. In both cases the MS send a TMSI Reallocation Complete message to the
network.
29. TMSI Reallocation Complete
(BSC to MSC ; L3)
TMSI Reallocation Complete message is forwarded to the MSC.
SETUP (CC)
Bearer Capability
- length : 1 (1h)
- info xfer cap : speech
- xfer mode : circuit
- coding std : GSM standardized
- radio ch req: full rate ch required
Called Party BCD Nr
- nr type : 0
- nr plan : 1
- nr : 01772000001
------------------------------------------------------------------------------------------------
Called Party BCD number
This element contains the called party BCD number. In a normal call, this
element contains the dialled digits.
Called Party Number
• nr type : d
• nr plan : d
• nr ddddddddddddddd
The meaning of different values for type of number is:
value type of number
0 Unknown
1 international
2 national
3 network specific
4 dedicate PAD access
Other values are reserved.
The meaning of different values for numbering plan is:
value numpering plan
0 Unknown
1 ISDN/telephony
3 data (X.121)
4 telex (F.69)
8 national
9 private
Other values are reserved.
The digits of the party number are displayed in the order as they apper in the
message. Digits from 0 to 9 are displayed as themselves. For other digits the
following interpretation shall be used:
Ah ':'
Bh ';'
Ch '<'
Dh '='
Eh '>'
Fh '?', endmark.
33. Send information for Originated call
(MSC to VLR;CCS7)
VLR requests for retrieval of call data.
34. Complete call (VLR to MSC ;CCS7)
Call completion acknowledged by VLR for MOC.
35. Call Proceeding (MSC to BSC ; L3)
This message starts the TCH allocation. In the A- interface, MSC is the master and
it hunts the circuit used for this call through the A- interface. This message can
contain some optional information according to GSM-recommendations. This
optional information is: Priority of the call, Downlink Discontinuous
Transmission (DTX), Radio channel identity and Interference band to use.
38. Physical Context Request(BSC to BTS ;BTSM)
By using this message, the BSC interrogates the actual timing advance from the
BTS in order to start TCH allocation through the Abis -interface.
Conversation
58. Disconnect
( MS to BTS to BSC;BTSM FACCH L3)
This request is sent by MS. Contents: clear end-to-end connection. This message
stops the charging concerning this call connection.
RLSD - RELEASED
Routing Label
- DPC : 432 (01B0h) OPC : 12600 (3138h)
- SLC : 11 (0Bh)
Destination Local Reference
- 0D8056h
Source Local Reference
- 4B814Ch
Release Cause
- SCCP user originated