SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide                                                                         9 TMSI Reallocation




                                                            9          TMSI Reallocation


About This Chapter

                    The TMSI reallocation takes place in ciphering mode. It is generally related to another procedure,
                    such as location update or call establishment.

                    9.1 TMSI Reallocation Procedure
                    The purpose of the TMSI reallocation procedure is to provide identity confidentiality, that is, to
                    protect a user against being identified and located by an intruder. Usually, the TMSI reallocation
                    is performed at least at each change of a location area. It can be initiated at any time by the
                    network if an RR connection exists between the network and an MS.
                    9.2 Internal BSC Signaling Procedure of TMSI Reallocation
                    This topic describes the internal BSC signaling procedure of TMSI reallocation.
                    9.3 Abnormal TMSI Reallocation Cases
                    This topic describes the abnormal TMSI reallocation cases.




Issue 01 (2007-09-05)                              Huawei Technologies Proprietary                                9-1
HUAWEI BSC6000 Base Station Subsystem
9 TMSI Reallocation                                                                     Signaling Analysis Guide




9.1 TMSI Reallocation Procedure
                      The purpose of the TMSI reallocation procedure is to provide identity confidentiality, that is, to
                      protect a user against being identified and located by an intruder. Usually, the TMSI reallocation
                      is performed at least at each change of a location area. It can be initiated at any time by the
                      network if an RR connection exists between the network and an MS.
                      Figure 9-1 shows the TMSI reallocation procedure.

                      Figure 9-1 TMSI reallocation procedure

                           MS                    BTS                         BSC                  MSC

                                                               TMSI
                                                     Reallocation Command(1)
                                         SDCCH

                                                                                               Start T3250
                                                               TMSI
                                                     Reallocation Complete(2)
                                SDCCH

                                                                                               StopT3250




                      The TMSI reallocation procedure is as follows:
                      l    The network initiates the TMSI reallocation procedure by sending a TMSI Reallocation
                           Command message to the MS and starts timer T3250. The TMSI Reallocation Command
                           message carries a new combination of TMSI and LAI allocated by the network or an LAI
                           and the IMSI if the used TMSI is deleted. Usually, the TMSI Reallocation Command
                           message is sent to the MS using an RR connection in ciphering mode.
                      l    Upon receiving the TMSI Reallocation Command message, the MS stores the LAI in the
                           SIM. If the received identity is the IMSI of the relevant MS, the MS deletes any TMSI. If
                           the received identity is a TMSI, the MS stores the TMSI in the SIM. In both cases, the MS
                           sends a TMSI Reallocation Complete message to the network.
                           Upon receiving the TMSI Reallocation Complete message, the network stops timer T3250.
                           If a TMSI is sent to the MS, the network considers the new TMSI as valid. If an IMSI is
                           sent to the MS, the network considers the old TMSI as deleted.


9.2 Internal BSC Signaling Procedure of TMSI Reallocation
                      This topic describes the internal BSC signaling procedure of TMSI reallocation.
                      The network initiates and controls the TMSI reallocation procedure and the BSC does no special
                      processing.




9-2                               Huawei Technologies Proprietary                                 Issue 01 (2007-09-05)
HUAWEI BSC6000 Base Station Subsystem
Signaling Analysis Guide                                                                         9 TMSI Reallocation




9.3 Abnormal TMSI Reallocation Cases
                    This topic describes the abnormal TMSI reallocation cases.

                    9.3.1 TMSI Reallocation Caused by RR Connection Failure on the Network Side
                    This topic describes the fault, probable causes, and handling suggestions.
                    9.3.2 TMSI Reallocation Caused by T3250 Expiry
                    This topic describes the fault, probable causes, and handling suggestions.

9.3.1 TMSI Reallocation Caused by RR Connection Failure on the
Network Side
                    This topic describes the fault, probable causes, and handling suggestions.

Fault
                    The TMSI is reallocated due to RR connection failure on the network side.

Probable Causes
                    If the RR connection fails before the TMSI Reallocation Complete message is received, all MM
                    connections should be released and both the old and the new TMSIs should be considered as
                    occupied for a certain recovery time.

                    During this period the network may:
                    l    Use the IMSI for paging if the MS is the called party. Upon response from the MS, the
                         TMSI reallocation is restarted.
                    l    Consider the new TMSI as valid if the MS is the calling party.
                    Initiate an identification procedure followed by a new TMSI reallocation if the MS uses the old
                    TMSI.

Handling Suggestions
                    No handling is required.

9.3.2 TMSI Reallocation Caused by T3250 Expiry
                    This topic describes the fault, probable causes, and handling suggestions.

Fault
                    The network releases the RR connection.

Probable Causes
                    The TMSI reallocation is supervised by the timer T3250 in the network. At the first expiry of
                    timer T3250, the network releases the RR connection. In this case, the network aborts the
                    reallocation procedure, releases all MM connections, and follows the rules for RR connection
                    failure.

Issue 01 (2007-09-05)                             Huawei Technologies Proprietary                               9-3
HUAWEI BSC6000 Base Station Subsystem
9 TMSI Reallocation                                                             Signaling Analysis Guide


Handling Suggestions
                      The BSC does no special processing.




9-4                              Huawei Technologies Proprietary                     Issue 01 (2007-09-05)

Contenu connexe

Tendances

Ericsson SDCCH establishment Issue
Ericsson SDCCH establishment IssueEricsson SDCCH establishment Issue
Ericsson SDCCH establishment IssueHoussein Abou Chacra
 
GSM capacity planning
GSM capacity planningGSM capacity planning
GSM capacity planningDeepak Joshi
 
Huawei case analysis call drop
Huawei case analysis call dropHuawei case analysis call drop
Huawei case analysis call dropMuffat Itoro
 
LTE KPI and PI Formula_NOKIA.pdf
LTE KPI and PI Formula_NOKIA.pdfLTE KPI and PI Formula_NOKIA.pdf
LTE KPI and PI Formula_NOKIA.pdfVahidZibakalam3
 
UMTS Drive Test Analysis and Examples
UMTS Drive Test Analysis and ExamplesUMTS Drive Test Analysis and Examples
UMTS Drive Test Analysis and ExamplesAssim Mubder
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to ltebahar
 
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flowsemyl97
 
04 umts traffic managementnew
04 umts traffic managementnew04 umts traffic managementnew
04 umts traffic managementnewsivakumar D
 
Basic dt gsm ok
Basic dt gsm okBasic dt gsm ok
Basic dt gsm okbonaruce
 
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...tharinduwije
 
Layer 3 messages
Layer 3 messagesLayer 3 messages
Layer 3 messagesJohn Samir
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flowMohd Nazir Shakeel
 

Tendances (20)

Sdcch
SdcchSdcch
Sdcch
 
Ericsson SDCCH establishment Issue
Ericsson SDCCH establishment IssueEricsson SDCCH establishment Issue
Ericsson SDCCH establishment Issue
 
GSM capacity planning
GSM capacity planningGSM capacity planning
GSM capacity planning
 
Huawei case analysis call drop
Huawei case analysis call dropHuawei case analysis call drop
Huawei case analysis call drop
 
Cs c n overview
Cs c n overviewCs c n overview
Cs c n overview
 
2 g dt and mapinfo
2 g dt and mapinfo2 g dt and mapinfo
2 g dt and mapinfo
 
GSM Traffic Cases
GSM Traffic CasesGSM Traffic Cases
GSM Traffic Cases
 
3 g call flow
3 g call flow3 g call flow
3 g call flow
 
LTE KPI and PI Formula_NOKIA.pdf
LTE KPI and PI Formula_NOKIA.pdfLTE KPI and PI Formula_NOKIA.pdf
LTE KPI and PI Formula_NOKIA.pdf
 
UMTS Drive Test Analysis and Examples
UMTS Drive Test Analysis and ExamplesUMTS Drive Test Analysis and Examples
UMTS Drive Test Analysis and Examples
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to lte
 
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
 
Call flows
Call flowsCall flows
Call flows
 
Basic GSM Call Flows
Basic GSM Call FlowsBasic GSM Call Flows
Basic GSM Call Flows
 
04 umts traffic managementnew
04 umts traffic managementnew04 umts traffic managementnew
04 umts traffic managementnew
 
Basic dt gsm ok
Basic dt gsm okBasic dt gsm ok
Basic dt gsm ok
 
2G Handover Details (Huawei)
2G Handover Details (Huawei)2G Handover Details (Huawei)
2G Handover Details (Huawei)
 
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
53 gsm bss network ps kpi (success rate of uplink tbf establishments) optimiz...
 
Layer 3 messages
Layer 3 messagesLayer 3 messages
Layer 3 messages
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 

En vedette

3g counter & timer
3g counter & timer3g counter & timer
3g counter & timerTABREZ KHAN
 
14 gsm bss network kpi (call setup time) optimization manual[1].doc
14 gsm bss network kpi (call setup time) optimization manual[1].doc14 gsm bss network kpi (call setup time) optimization manual[1].doc
14 gsm bss network kpi (call setup time) optimization manual[1].doctharinduwije
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st decKetut Widya
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopnavaidkhan
 
3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimizationshagahod
 

En vedette (7)

3g counter & timer
3g counter & timer3g counter & timer
3g counter & timer
 
Gsm signaling
Gsm signalingGsm signaling
Gsm signaling
 
14 gsm bss network kpi (call setup time) optimization manual[1].doc
14 gsm bss network kpi (call setup time) optimization manual[1].doc14 gsm bss network kpi (call setup time) optimization manual[1].doc
14 gsm bss network kpi (call setup time) optimization manual[1].doc
 
Gsm
GsmGsm
Gsm
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st dec
 
Huawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shopHuawei - Access failures troubleshooting work shop
Huawei - Access failures troubleshooting work shop
 
3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization3 g huawei-wcdma-rno-parameters-optimization
3 g huawei-wcdma-rno-parameters-optimization
 

Plus de Ericsson Saudi

01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 
01 10 speech channel assignment
01 10 speech channel assignment01 10 speech channel assignment
01 10 speech channel assignmentEricsson Saudi
 
Corporate presentation(041025)
Corporate presentation(041025)Corporate presentation(041025)
Corporate presentation(041025)Ericsson Saudi
 
In network diagram 010210
In network diagram 010210In network diagram 010210
In network diagram 010210Ericsson Saudi
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowEricsson Saudi
 
1 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword20031 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword2003Ericsson Saudi
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamentalEricsson Saudi
 

Plus de Ericsson Saudi (8)

01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 
01 10 speech channel assignment
01 10 speech channel assignment01 10 speech channel assignment
01 10 speech channel assignment
 
01 08 ciphering
01 08 ciphering01 08 ciphering
01 08 ciphering
 
Corporate presentation(041025)
Corporate presentation(041025)Corporate presentation(041025)
Corporate presentation(041025)
 
In network diagram 010210
In network diagram 010210In network diagram 010210
In network diagram 010210
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
1 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword20031 10260 faf10296-en_a_msword2003
1 10260 faf10296-en_a_msword2003
 
01 01 bss signaling fundamental
01 01 bss signaling fundamental01 01 bss signaling fundamental
01 01 bss signaling fundamental
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

01 09 tmsi reallocation

  • 1. HUAWEI BSC6000 Base Station Subsystem Signaling Analysis Guide 9 TMSI Reallocation 9 TMSI Reallocation About This Chapter The TMSI reallocation takes place in ciphering mode. It is generally related to another procedure, such as location update or call establishment. 9.1 TMSI Reallocation Procedure The purpose of the TMSI reallocation procedure is to provide identity confidentiality, that is, to protect a user against being identified and located by an intruder. Usually, the TMSI reallocation is performed at least at each change of a location area. It can be initiated at any time by the network if an RR connection exists between the network and an MS. 9.2 Internal BSC Signaling Procedure of TMSI Reallocation This topic describes the internal BSC signaling procedure of TMSI reallocation. 9.3 Abnormal TMSI Reallocation Cases This topic describes the abnormal TMSI reallocation cases. Issue 01 (2007-09-05) Huawei Technologies Proprietary 9-1
  • 2. HUAWEI BSC6000 Base Station Subsystem 9 TMSI Reallocation Signaling Analysis Guide 9.1 TMSI Reallocation Procedure The purpose of the TMSI reallocation procedure is to provide identity confidentiality, that is, to protect a user against being identified and located by an intruder. Usually, the TMSI reallocation is performed at least at each change of a location area. It can be initiated at any time by the network if an RR connection exists between the network and an MS. Figure 9-1 shows the TMSI reallocation procedure. Figure 9-1 TMSI reallocation procedure MS BTS BSC MSC TMSI Reallocation Command(1) SDCCH Start T3250 TMSI Reallocation Complete(2) SDCCH StopT3250 The TMSI reallocation procedure is as follows: l The network initiates the TMSI reallocation procedure by sending a TMSI Reallocation Command message to the MS and starts timer T3250. The TMSI Reallocation Command message carries a new combination of TMSI and LAI allocated by the network or an LAI and the IMSI if the used TMSI is deleted. Usually, the TMSI Reallocation Command message is sent to the MS using an RR connection in ciphering mode. l Upon receiving the TMSI Reallocation Command message, the MS stores the LAI in the SIM. If the received identity is the IMSI of the relevant MS, the MS deletes any TMSI. If the received identity is a TMSI, the MS stores the TMSI in the SIM. In both cases, the MS sends a TMSI Reallocation Complete message to the network. Upon receiving the TMSI Reallocation Complete message, the network stops timer T3250. If a TMSI is sent to the MS, the network considers the new TMSI as valid. If an IMSI is sent to the MS, the network considers the old TMSI as deleted. 9.2 Internal BSC Signaling Procedure of TMSI Reallocation This topic describes the internal BSC signaling procedure of TMSI reallocation. The network initiates and controls the TMSI reallocation procedure and the BSC does no special processing. 9-2 Huawei Technologies Proprietary Issue 01 (2007-09-05)
  • 3. HUAWEI BSC6000 Base Station Subsystem Signaling Analysis Guide 9 TMSI Reallocation 9.3 Abnormal TMSI Reallocation Cases This topic describes the abnormal TMSI reallocation cases. 9.3.1 TMSI Reallocation Caused by RR Connection Failure on the Network Side This topic describes the fault, probable causes, and handling suggestions. 9.3.2 TMSI Reallocation Caused by T3250 Expiry This topic describes the fault, probable causes, and handling suggestions. 9.3.1 TMSI Reallocation Caused by RR Connection Failure on the Network Side This topic describes the fault, probable causes, and handling suggestions. Fault The TMSI is reallocated due to RR connection failure on the network side. Probable Causes If the RR connection fails before the TMSI Reallocation Complete message is received, all MM connections should be released and both the old and the new TMSIs should be considered as occupied for a certain recovery time. During this period the network may: l Use the IMSI for paging if the MS is the called party. Upon response from the MS, the TMSI reallocation is restarted. l Consider the new TMSI as valid if the MS is the calling party. Initiate an identification procedure followed by a new TMSI reallocation if the MS uses the old TMSI. Handling Suggestions No handling is required. 9.3.2 TMSI Reallocation Caused by T3250 Expiry This topic describes the fault, probable causes, and handling suggestions. Fault The network releases the RR connection. Probable Causes The TMSI reallocation is supervised by the timer T3250 in the network. At the first expiry of timer T3250, the network releases the RR connection. In this case, the network aborts the reallocation procedure, releases all MM connections, and follows the rules for RR connection failure. Issue 01 (2007-09-05) Huawei Technologies Proprietary 9-3
  • 4. HUAWEI BSC6000 Base Station Subsystem 9 TMSI Reallocation Signaling Analysis Guide Handling Suggestions The BSC does no special processing. 9-4 Huawei Technologies Proprietary Issue 01 (2007-09-05)