没有合适的资源?快使用搜索试试~ 我知道了~
首页3GPP TS 24.008 V15.4.0 (2018-09)
3GPP TS 24.008 V15.4.0 (2018-09)
需积分: 44 28 下载量 162 浏览量
更新于2023-03-16
评论 1
收藏 12.89MB DOC 举报
3GPP TS 24.008 V15.4.0 (2018-09) 目前的最新版本,相比之前变化较大,极具参考价值
资源详情
资源评论
资源推荐
3GPP TS 24.008 V15.4.0
(2018-09)
Technical Specification
3rd Generation Partnership Project;
Technical Specification Group Core Network and Terminals;
Mobile radio interface Layer 3 specification;
Core network protocols; Stage 3
(Release 15)
The present document has been developed within the 3
rd
Generation Partnership Project (3GPP
TM
) and may be further elaborated for the purposes of 3GPP.
The present document has not been subject to any approval process by the 3GPP
Organisational Partners and shall not be implemented.
This Specification is provided for future development work within 3GPP
only. The Organisational Partners accept no liability for any use of this Specification.
Specifications and reports for implementation of the 3GPP
TM
system should be obtained via the 3GPP Organisational Partners' Publications Offices.
3GPP
Keywords
UMTS, GSM, radio, layer3, stage3, network,
LTE
3GPP
Postal address
3GPP support office address
650 Route des Lucioles - Sophia Antipolis
Valbonne - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Internet
http://www.3gpp.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© 2018, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).
All rights reserved.
UMTS™ is a Trade Mark of ETSI registered for the benefit of its members
3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
LTE™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners
GSM® and the GSM logo are registered and owned by the GSM Association
3GPP TS 24.008 V15.4.0 (2018-09)Release 15 2
Contents
Foreword.................................................................................................................................................29
Introduction.............................................................................................................................................29
1 Scope....................................................................................................................................................30
1.1 Scope of the Technical Specification...................................................................................................................30
1.2 Application to the interface structures.................................................................................................................30
1.3 Structure of layer 3 procedures............................................................................................................................30
1.4 Test procedures....................................................................................................................................................31
1.5 Use of logical channels in A/Gb mode................................................................................................................31
1.6 Overview of control procedures...........................................................................................................................31
1.6.1 List of procedures..............................................................................................................................................31
1.7 Applicability of implementations.........................................................................................................................33
1.7.1 Voice Group Call Service (VGCS) and Voice Broadcast Service (VBS)........................................................33
1.7.2 General Packet Radio Service (GPRS).............................................................................................................33
1.7.2.1 Packet services in GSM (A/Gb mode only)...................................................................................................33
1.7.2.2 Packet services in Iu mode (Iu mode only)....................................................................................................34
1.8 Handling of NAS signalling low priority indication............................................................................................34
1.9 Restrictions...........................................................................................................................................................35
2 References............................................................................................................................................35
2.1 Definitions and abbreviations..............................................................................................................................42
2.1.1 Random values..................................................................................................................................................42
2.1.2 Vocabulary........................................................................................................................................................42
NarrowBand-IoT.....................................................................................................................................46
EHPLMN................................................................................................................................................46
HPLMN..................................................................................................................................................46
VPLMN..................................................................................................................................................46
3 Radio Resource management procedures.............................................................................................47
4 Elementary procedures for Mobility Management...............................................................................48
4.1 General.................................................................................................................................................................48
4.1.1 MM and GMM procedures...............................................................................................................................48
4.1.1.1 Types of MM and GMM procedures.............................................................................................................48
4.1.1.1.1 Integrity Checking of Signalling Messages in the Mobile Station (Iu mode only)....................................50
4.1.1.1.1a Integrity protection for emergency call (Iu mode only)............................................................................52
4.1.1.2 MM-GMM co-ordination for GPRS MS's.....................................................................................................52
4.1.1.2.1 GPRS MS operating in mode A or B in a network that operates in mode I...............................................52
4.1.1.2.2 GPRS MS operating in mode A or B in a network that operates in mode II..............................................53
4.1.1.2A Coordination between GMM and EMM.....................................................................................................54
4.1.1.3 Core Network System Information for MM (Iu mode only).........................................................................54
4.1.1.4 Core Network System Information for GMM (Iu mode only)......................................................................54
4.1.1.4.1 General 54
4.1.1.4.2 Control of Network Mode of Operation I...................................................................................................54
4.1.1.5 Access class control.......................................................................................................................................55
4.1.1.6 Specific requirements for MS configured to use timer T3245.......................................................................55
4.1.1.6A Specific requirements for the MS when receiving non-integrity protected reject messages......................56
4.1.1.7 Handling of NAS level mobility management congestion control................................................................61
4.1.1.8 Handling of security related parameters at switch on and switch off............................................................62
4.1.1.9 Equivalent PLMNs list...................................................................................................................................63
4.1.1.10 Dedicated core network................................................................................................................................63
4.1.2 MM sublayer states...........................................................................................................................................63
4.1.2.1 MM sublayer states in the mobile station......................................................................................................63
4.1.2.1.1 Main states 64
4.1.2.1.2 Substates of the MM IDLE state.................................................................................................................67
3GPP
3GPP TS 24.008 V15.4.0 (2018-09)Release 15 3
4.1.2.2 The update Status...........................................................................................................................................69
4.1.2.3 MM sublayer states on the network side........................................................................................................70
4.1.3 GPRS mobility management (GMM) sublayer states.......................................................................................71
4.1.3.1 GMM states in the MS...................................................................................................................................71
4.1.3.1.1 Main states 71
4.1.3.1.2 Substates of state GMM-DEREGISTERED...............................................................................................72
4.1.3.1.3 Substates of state GMM-REGISTERED....................................................................................................72
4.1.3.2 GPRS update status........................................................................................................................................75
4.1.3.3 GMM mobility management states on the network side...............................................................................75
4.1.3.3.1 Main States76
4.1.3.3.2 Substates of state GMM-REGISTERED....................................................................................................76
4.2 Behaviour of the MS in MM Idle state, GMM-DEREGISTERED state and GMM-REGISTERED state.........77
4.2.1 Primary Service State selection.........................................................................................................................77
4.2.1.1 Selection of the Service State after Power On...............................................................................................77
4.2.1.2 Other Cases....................................................................................................................................................78
4.2.2 Detailed Description of the MS behaviour in MM IDLE State........................................................................78
4.2.2.1 Service State, NORMAL SERVICE..............................................................................................................78
4.2.2.2 Service State, ATTEMPTING TO UPDATE................................................................................................79
4.2.2.3 Service State, LIMITED SERVICE...............................................................................................................79
4.2.2.4 Service State, NO IMSI..................................................................................................................................80
4.2.2.5 Service State, SEARCH FOR PLMN, NORMAL SERVICE.......................................................................80
4.2.2.6 Service State, SEARCH FOR PLMN............................................................................................................81
4.2.2.7 Service State, RECEIVING GROUP CALL (NORMAL SERVICE)...........................................................81
4.2.2.8 Service State, RECEIVING GROUP CALL (LIMITED SERVICE)...........................................................81
4.2.2.9 Service State, eCALL INACTIVE.................................................................................................................82
4.2.3 Service state when back to state MM IDLE from another state.......................................................................82
4.2.4 Behaviour in state GMM-DEREGISTERED....................................................................................................83
4.2.4.1 Primary substate selection..............................................................................................................................83
4.2.4.1.1 Selection of the substate after power on or enabling the MS's GPRS capability........................................83
4.2.4.1.2 Other Cases.................................................................................................................................................84
4.2.4.2 Detailed description of the MS behaviour in state GMM-DEREGISTERED...............................................84
4.2.4.2.1 Substate, NORMAL-SERVICE..................................................................................................................84
4.2.4.2.2 Substate, ATTEMPTING-TO-ATTACH...................................................................................................84
4.2.4.2.3 Substate, LIMITED-SERVICE...................................................................................................................85
4.2.4.2.4 Substate, NO-IMSI......................................................................................................................................85
4.2.4.2.5 Substate, NO-CELL....................................................................................................................................85
4.2.4.2.6 Substate, PLMN-SEARCH.........................................................................................................................85
4.2.4.2.7 Substate, ATTACH-NEEDED....................................................................................................................85
4.2.4.2.8 Substate, SUSPENDED (A/Gb mode only)................................................................................................85
4.2.4.3 Substate when back to state GMM-DEREGISTERED from another GMM state........................................85
4.2.5 Behaviour in state GMM-REGISTERED.........................................................................................................86
4.2.5.1 Detailed description of the MS behaviour in state GMM-REGISTERED....................................................86
4.2.5.1.1 Substate, NORMAL-SERVICE..................................................................................................................86
4.2.5.1.2 Substate, SUSPENDED (A/Gb mode only)................................................................................................86
4.2.5.1.3 Substate, UPDATE-NEEDED....................................................................................................................87
4.2.5.1.4 Substate, ATTEMPTING-TO-UPDATE....................................................................................................87
4.2.5.1.5 Substate, NO-CELL-AVAILABLE............................................................................................................87
4.2.5.1.6 Substate, LIMITED-SERVICE...................................................................................................................88
4.2.5.1.7 Substate, ATTEMPTING-TO-UPDATE-MM...........................................................................................88
4.2.5.1.8 Substate, PLMN-SEARCH.........................................................................................................................88
4.3 MM common procedures.....................................................................................................................................88
4.3.1 TMSI reallocation procedure............................................................................................................................88
4.3.1.0 General 88
4.3.1.1 TMSI reallocation initiation by the network..................................................................................................89
4.3.1.2 TMSI reallocation completion by the mobile station.....................................................................................89
4.3.1.3 TMSI reallocation completion in the network...............................................................................................89
4.3.1.4 Abnormal cases in the mobile station............................................................................................................89
4.3.1.5 Abnormal cases on the network side..............................................................................................................89
4.3.2 Authentication procedure..................................................................................................................................90
4.3.2a Authentication procedure used for a UMTS authentication challenge...........................................................90
4.3.2b Authentication Procedure used for a GSM authentication challenge.............................................................90
3GPP
3GPP TS 24.008 V15.4.0 (2018-09)Release 15 4
4.3.2.1 Authentication request by the network..........................................................................................................91
4.3.2.2 Authentication response by the mobile station..............................................................................................91
4.3.2.3 Authentication processing in the network......................................................................................................92
4.3.2.3a 128-bit circuit-switched GSM ciphering key...............................................................................................92
4.3.2.4 Ciphering key sequence number....................................................................................................................92
4.3.2.5 Authentication not accepted by the network..................................................................................................93
4.3.2.5.1 Authentication not accepted by the MS......................................................................................................94
4.3.2.6 Abnormal cases..............................................................................................................................................94
4.3.2.6.1 MS behaviour towards a network that has failed the authentication procedure.........................................97
4.3.2.7 Handling of keys at intersystem change from Iu mode to A/Gb mode..........................................................97
4.3.2.7a Use of established security contexts.............................................................................................................98
4.3.2.8 Handling of keys at intersystem change from A/Gb mode to Iu mode..........................................................99
4.3.2.9 Void 100
4.3.2.10 Derivation of keys at SRVCC or vSRVCC handover from S1 mode........................................................100
4.3.2.10.0 General 100
4.3.2.10.1 PDN connection with integrity protection..............................................................................................100
4.3.2.10.2 PDN connection without integrity protection.........................................................................................100
4.3.2.11 Derivation of keys at SRVCC handover from Iu mode to Iu mode...........................................................100
4.3.2.11.1 PDN connection with integrity protection..............................................................................................100
4.3.2.11.2 PDN connection without integrity protection.........................................................................................101
4.3.2.12 Derivation of keys at SRVCC handover from Iu mode to A/Gb mode.....................................................102
4.3.2.12.1 PDN connection with integrity protection..............................................................................................102
4.3.2.12.2 PDN connection without integrity protection.........................................................................................103
4.3.2.13 Derivation of keys at CS to PS SRVCC handover from A/Gb mode to Iu mode......................................103
4.3.3 Identification procedure..................................................................................................................................105
4.3.3.0 General 105
4.3.3.1 Identity request by the network....................................................................................................................105
4.3.3.2 Identification response by the mobile station...............................................................................................105
4.3.3.3 Abnormal cases in the mobile station..........................................................................................................105
4.3.3.4 Abnormal cases on the network side............................................................................................................105
4.3.4 IMSI detach procedure....................................................................................................................................106
4.3.4.0 General 106
4.3.4.1 IMSI detach initiation by the mobile station................................................................................................106
4.3.4.2 IMSI detach procedure in the network.........................................................................................................107
4.3.4.3 IMSI detach completion by the mobile station............................................................................................107
4.3.4.4 Abnormal cases............................................................................................................................................107
4.3.5 Abort procedure..............................................................................................................................................107
4.3.5.1 Abort procedure initiation by the network...................................................................................................107
4.3.5.2 Abort procedure in the mobile station..........................................................................................................108
4.3.6 MM information procedure.............................................................................................................................108
4.3.6.1 MM information procedure initiation by the network.................................................................................108
4.3.6.2 MM information procedure in the mobile station........................................................................................108
4.4 MM specific procedures.....................................................................................................................................108
4.4.1 Location updating procedure...........................................................................................................................109
4.4.2 Periodic updating............................................................................................................................................110
4.4.3 IMSI attach procedure.....................................................................................................................................111
4.4.4 Generic Location Updating procedure............................................................................................................112
4.4.4.1 Location updating initiation by the mobile station......................................................................................112
4.4.4.1a Network Request for Additional mobile station Capability Information...................................................112
4.4.4.2 Identification request from the network.......................................................................................................112
4.4.4.3 Authentication by the network.....................................................................................................................112
4.4.4.4 Security mode setting by the network..........................................................................................................112
4.4.4.5 Location Update Attempt Counter...............................................................................................................112
4.4.4.6 Location updating accepted by the network.................................................................................................113
4.4.4.7 Location updating not accepted by the network..........................................................................................115
4.4.4.8 Release of RR connection after location updating.......................................................................................117
4.4.4.9 Abnormal cases on the mobile station side..................................................................................................117
4.4.4.10 Abnormal cases on the network side..........................................................................................................119
4.4.5 Void 120
4.4.6 Void 120
4.4.7 eCall inactivity procedure...............................................................................................................................120
3GPP
3GPP TS 24.008 V15.4.0 (2018-09)Release 15 5
剩余63页未读,继续阅读
withing6
- 粉丝: 0
- 资源: 11
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
- MW全能培训汽轮机调节保安系统PPT教学课件.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0