hash
stringlengths
32
32
doc_id
stringlengths
5
12
section
stringlengths
5
1.47k
content
stringlengths
0
6.67M
873bb0765fb9905ca579985e57bc695e
25.901
6.1.4 Solution 3: O&M-based distribution of (P)SI
873bb0765fb9905ca579985e57bc695e
25.901
6.1.4.1 General description
This solution is based on the operator using O&M to update the stored SI/PSI in the neighbouring GERAN cell list of the RNC every time it is modified by O&M in the GERAN cell. This is depicted in figure 3. 1) On installation and initial configuration by O&M of the GERAN neighbouring cell lists in the (C)RNC, the GERAN SI/PSI is included in the information sent to the RNC. 2) The GERAN SI/PSI is transferred using existing RNSAP procedures over the Iur interface towards the SRNC when it requires it. NOTE: It was discussed that if the NM System is not updated if the BSS changes its system parameters, there can be periods of time where the SI/PSI held in the NM System are out of date. This issue is FFS. Figure 3: Signalling diagram of Solution 3 of GERAN SI/PSI Retrieval
873bb0765fb9905ca579985e57bc695e
25.901
6.1.4.2 Analysis of the solution
Pros: 1) No direct signalling required between UTRAN and GERAN. 2) No impact on the SGSN. Cons: 1) Maybe difficult to ensure that SI/PSI stored in UTRAN is always aligned with that in the GERAN cell.2) Extra impact on 3G NMS and R interface.
873bb0765fb9905ca579985e57bc695e
25.901
6.1.5 Comparative analysis of the solutions
The sub-clauses 6.1.2.2, 6.1.3.2 and 6.1.4.2 are summarised in Table 1. Table 1: Comparative analysis of the proposed solutions. Solution Pros Cons 1. (P)SI provided to the SRNC • No additional Iur load generated. • No additional Iur implementation required. • Synchronised update of SI/PSI is possible using "on-modification" measurement reporting. • Generally more SI/PSI stored in each RNC than in other solutions. • Additional load on the SGSN due to signalling path of RIM procedures. • Additional load on the BSS due to a potentially high number of measurement contexts being required (for each different SRNC). 2. (P)SI provided to the local RNC • Generally less SI/PSI stored in each RNC than in other solutions. • Synchronised update of SI/PSI is possible using "on-modification" measurement reporting. • Impact on SGSN load is minimised. • More Iur signalling than SRNC terminated solution. • Additional load on the DRNC due to potentially high number of measurement contexts being created (for each different SRNC). 3. O&M distribution of (P)SI provided to • No direct signalling required between UTRAN and GERAN. • No impact on the SGSN. • Maybe difficult to ensure that SI/PSI stored in UTRAN is always aligned with that in the GERAN cell. • Extra impact on 3G NMS and R interface.
873bb0765fb9905ca579985e57bc695e
25.901
6.2 UTRAN signalling procedures for NACC
873bb0765fb9905ca579985e57bc695e
25.901
6.2.1 Iur signalling for GERAN SI/PSI transfer from the DRNC to the SRNC
The transfer of SI/PSI over the Iur is relevant to solution 2, described in sub-clause 6.1.3. Two different solutions have been identified on the Iur interface for the transfer of (P)SI from the local DRNC to the SRNC. Use the [RNSAP] RADIO LINK SETUP RESPONSE message. - GERAN SI/PSI could be sent in the "GSM neighbouring cell information" IE for each of the GERAN neighbouring cells. - It may be inefficient in terms of transmission load and delay increase due to the number of RADIO LINK SETUP RESPONSE messages containing the same information. In addition, there would be no way of knowing (without some kind of "GERAN cell id list" and "value tag" provision in the RADIO LINK Setup Request) which SI/PSI the SRNC already had and whether it was up-to-date. - This is perhaps the most time critical of all RNSAP messages and the processing in the DRNC before sending this message should not be unduly complicated. - This is related to Release 5 work on restricting neighbouring cell information on the Iur. Use the [RNSAP] Information Exchange procedure. - An Information Exchange procedure could be initiated from the SRNC towards the DRNC when the SRNC establishes its first radio link in the DRNS. The Report Characteristics would be set to "On-modification" (of GERAN SI/PSI messages). - In Release 5, reporting is only allowed for a single cell. - The transfer of GERAN SI/PSI information from the DRNC to the SRNC can be time critical i.e. the SRNC may wish to push the UE to GERAN almost immediately after RL establishment. Delays may occur in the SRNC acquiring the SI/PSI if multiple information reporting initiations, and multiple reports, are required. NOTE: It needs to be analysed if the Information Exchange Object Type IE could contain a list of cells to enable a faster initial report and subsequent reports to the SRNC. New RNSAP procedure. - A new procedure could be initiated from the DRNC towards the SRNC after the SRNC establishes its first radio link in the DRNC. - The DRNC already keeps a list of the GERAN neighbouring cells for each local UTRAN cell. In addition, the DRNC, as local RNC, also keeps the (P)SI of those GERAN cells. - The local RNC would also be required to keep a list of other RNCs acting as SRNCs for UEs with radio links in local DRNC (i.e. DRNC) and whether they have an update copy of the (P)SI messages of the GERAN cells. - This procedure would be initiated by the DRNC: a) towards the SRNC of a UE when a new radio link is added/created to another UTRAN cells with new GERAN neighbouring cells for which the corresponding SRNC does not have the (P)SI; b) towards one or more (S)RNCs when the local RNC receives an update from a GERAN BSS of the (P)SI for one or more GERAN cells.
873bb0765fb9905ca579985e57bc695e
25.901
6.2.2 Use of RANAP or O&M for provision of GERAN SI/PSI to RNC
The issue of whether to use O&M or whether to use RANAP signalling to inform the RNC of the GERAN SI/PSI is dependant on how often the GERAN SI/PSI would be changed, i.e. how often the operator optimises GERAN SI/PSI. If the O&M solution were chosen and if it is required to update the SI/PSI very frequently, there may be problems in synchronising the BSS/RNC provision of the GERAN SI/PSI between 2G and 3G O&M systems. This would be due to the fact that the operator would probably have to manually synchronise the carrying out of the respective procedures from their respective 2G/3G O&M systems. GERAN SI/PSI information may evolve, which means that there may be a more dynamic change of this information. So in this case, O&M alignments would be more complex to organise. 6.2.3 Adaptation of GERAN RIM procedures for use across the Iu interface 6.2.3.1. General In UMTS the information as to which BSC the target neighbouring GERAN cell belongs is not known at the RNC. Whilst the present NACC RIM GERAN messages [2] can be used as a basis for inclusion into the relevant 3GPP/RAN3 specifications, the following areas for study are identified: 6.2.3.2. Message definition A RANAP message similar to the GERAN "RAN INFORMATION REQUEST" message sent from the RNC should contain a source RNC-ID (instead of the source CGI as happens in GERAN), the destination (GERAN) CGI, plus a list of other (GERAN) neighbouring cells if whose (P)SI is requested. The subsequent RAN INFORMATION message sent from the BSCBSS to SGSN would contain the source RNC-ID, in addition to the list of GERAN SI/PSI mapped to each target CGI. Devising a RANAP message corresponding to the [GERAN] RAN INFORMATION message cannot be a direct correlation i.e. existing connectionless downlink RANAP messages do not include the RNC-ID, as the destination SCCP address is used to route the message on the Iu. 6.2.3.3. Format of RIM messages
873bb0765fb9905ca579985e57bc695e
25.901
6.2.3.3.1 General
What form should the BSS <=> 3G SGSN response RIM messages take? Three options are analysed in this sub-clause: 1. As per existing agreements for inter-RAT signalling, the host source system - when inter-RAT signalling - adapts to the target system and thus constructs an appropriate RANAP message. 2. The GERAN system continues using with its existing RIM procedures in both directions, – i.e. no adaptation of messages to target system and this means the GERAN RIM message is translated at the CN. (The procedures would not be fully transparent, since the 3G SGSN must "look into" the message and translate the GERAN RIM message into the appropriate RANAP RIM message). 3. The GERAN continues using its existing RIM procedures in both directions, i.e. no adaptation of messages to target system. The GERAN RIM message is routed through the CN and terminated at the UTRAN. The 3G SGSN would need to place the contents of the GTP message on the Gn interface into a RANAP message on the Iu interface, without interpreting its contents. These alternatives are depicted in Figure 4. Principle BSS  RNC RNC  BSS 1. Source adapts to target 2. RIM translated at CN Translation at: a) 2G SGSN, b) 3G SGSN 3. RIM ends at RNC Figure 4: Alternatives for coding of RIM messages. 6.2.3.3.2. Format of RIM messages on the Iu interface There are two possible options for the format of the messages sent on the Iu interface: 1. What form should the 3G SGSN <=> RNC RIM messages take? a) A new RIM procedure is created in RANAP to transfer this NACC information/messages across the Iu interface to the source RNC; b) OR, (corresponding to 2b) the RIM procedure messages are sent in a container inside messages of the existing Information Transfer procedure messages over the Iu interface. In this case, an INFORMATION TRANSFER REQUEST message would need to be created to contain the [GERAN] RAN INFORMATION REQUEST message. When considering this question it should be noted that it is not seen as feasible to deconstruct the BSSMAP/RANAP message fully in the SGSN and construct a corresponding RANAP/BSSMAP message. This would have a higher impact on the SGSN implementation, with no extra gain, apart from the fact that the RNC-ID would not be transferred in the RANAP message.
873bb0765fb9905ca579985e57bc695e
25.901
7 Agreements and associated Contributions
The main text of the document should start here, after the above clauses have been added.
873bb0765fb9905ca579985e57bc695e
25.901
7.1 UTRAN NACC signalling architecture
The mechanism used to gain access to the GERAN SI/PSI at the SRNC is such that the (P)SI will be stored by the local RNC.
873bb0765fb9905ca579985e57bc695e
25.901
7.2 Format of RIM messages
GERAN does not adapt RIM messages to the target system and are routed via the CN without interpretation. The RNC alone needs to send and receive BSSGP messages within a container within the RANAP message.
873bb0765fb9905ca579985e57bc695e
25.901
7.3 Exchange of Information over Iu
The transfer of RIM information over the Iu from UTRAN, will be performed using a new RANAP procedure – Direct Information Transfer. This generic Class 2 RANAP procedure has been designed such that it will transfer information from the RNC to the CN or vice versa, in unacknowledged mode – maintaining the previously agreed RIM principles.
873bb0765fb9905ca579985e57bc695e
25.901
7.4 Exchange of Information over Iur
The transfer of RIM information over the Iur between the SRNC and the DRNC will be performed using an existing RANAP R5 procedure – [RNSAP] Information Exchange – following an appropriate modification/addition to the procedure.
873bb0765fb9905ca579985e57bc695e
25.901
8 Specification Impact & associated Change Requests
This section is intended to list the affected specifications and the related agreed Change Requests. It also lists the possible new specifications that may be needed for the completion of the Work Task. 8.1 TS 25.401 UTRAN Overall Description 8.1.1 Impacts GERAN System Information Retrieval is introduced as an additional UTRAN function, as is RAN Information Management as an additional function related to radio resource management and control. 8.1.2 List of Change Requests Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP. 8.2 TS 25.410 UTRAN Iu Interface: General Aspects and Principles 8.2.1 Impacts GERAN System Information Retrieval is introduced as an Iu Mobility Management function. 8.2.2 List of Change Requests Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP. 8.3 TS 25.413 UTRAN Iu interface RANAP signalling 8.3.1 Impacts A generic Class 2 RANAP procedure (bi-directional i.e. UL and DL) – Direct Information Transfer - has been introduced in RANAP to enable the transfer of RIM-PDU for the NACC feature initially, and thereafter for future uses if/when they present themselves. 8.3.2 List of Change Requests Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP. 8.4 TS 25.420 UTRAN Iur interface general aspects and principles 8.4.1 Impacts The exchange of information over the Iu of UTRAN and GERAN information has been included as a function of the Iur. 8.4.2 List of Change Requests Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP. 8.5 TS 25.423 UTRAN Iur interface RNSAP signalling 8.5.1 Impacts In the case that the CRNC is not the SRNC, and the SRNC would like to request NACC information, the Information Exchange Procedure has been modified such that the SRNC can request NACC related data for one or several GSM cells. 8.5.2 List of Change Requests Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP.
873bb0765fb9905ca579985e57bc695e
25.901
9 Project Plan
873bb0765fb9905ca579985e57bc695e
25.901
9.1 Schedule
Date Meeting Scope [expected] Input [expected]Output Sept 2003 RAN#21 RAN Approval TR Approved Mar 2004 RAN#23 RAN Approval TR Approved June 2004 RAN#24 RAN Approval TR Approved
873bb0765fb9905ca579985e57bc695e
25.901
9.2 Work Task Status
Planned Date Milestone Status Annex A: Change history Change history Date TSG # TSG Doc. CR Rev Subject/Comment Old New June 2004 TSG-RAN#24 RP-040186 Presentation of TR for information - 1.0.0 June 2004 TSG-RAN#24 Approved at TSG RAN #24 and placed under Change Control 1.0.0 6.0.0 September 2004 TSG-RAN#25 RP-040307 001 - Tidy Up CR for TR 25.901 (NACC) 6.0.0 6.1.0 June 2007 TSG-RAN#36 Upgrade to Release 7 6.1.0 7.0.0
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
1 Scope
Some companies have shown their interest in the feasibility of a low output power FDD base station, because it would offer the following advantages: 1. It would not be necessary to use an expensive high power amplifier when a distribution system is connected after the node B. Distribution systems require low input powers. If a high power amplifier is used, the BS output signal must be attenuated before it is fed into the distribution system, thus the high power amplifier is not needed at all. Power consumption would be reduced, and this would also have positive environmental effects. 2. It would facilitate the sharing of infrastructures among operators, especially in locations where it is difficult to find sites, or where operators are forced by regulators to share infrastructures. A common distribution system could be connected to the low output power BS's from each operator. 3. It would increase the flexibility in radio network deployment, because it would allow the placement of one or several base stations in a centralised position with separate RF power amplifiers distributed closer to the subscriber positions. This would also reduce network interference. A study item called "Low Output Powers for General Purpose FDD BSs" was created during TSG RAN plenary meeting #19, in order to study the feasibility of the low output power FDD base station. The main objectives of this study item are: 1) Identify the range of output powers to be considered. This SI must assess what must be understood as low output power. 2) Once the range of output powers to be considered has been delimited, it must be studied how the RAN specifications can be changed in order to allow that range of output powers. This technical report will collect the results of the study item. It must be clearly understood that the purpose of this SI is not to create a new interface within the base station. Its purpose is just to enlarge the output power range of the current base station, in order to allow lower output power values. It must also be stated that a BS doesn't have necessarily to comply with the whole allowed output power range. A BS will only fulfil a subrange of the allowed output power range. The manufacturer must declare the maximum output power of the base station, and the power range supported by it. The only requirements for the BS output power range are those imposed by the dynamic range requirements in [2].
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] Tdoc RP-030198: "Low output power FDD Base Station". [2] 3GPP TS 25.104 (V6.1.0): "BS Radio transmission and reception (FDD)". [3] Tdoc R4-030744: "New approach to low output power", Telefonica. [4] Tdoc R3-040128: "Clarification on the use of the downlink and uplink gain", Telefonica. [5] Tdoc R3-040137: "Solutions for LOP", Telefonica.
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
3 Abbreviations
For the purposes of the present document, the following abbreviations apply: 3G Third Generation 3GPP Third Generation Partnership Project BS Base Station CPICH Common Pilot Channel DL Downlink DPCH Dedicated Physical Channel FDD Frequency Division Duplex IE Information Element NBAP Node B Application Part P-CCPCH Primary-Common Control Physical Channel Pmax Maximum Output Power PRACH Physical Random Access Channel RAN Radio Access Network RF Radio Frequency RNC Radio Network Controller SI Study Item TR Technical Report TSG Technical Specification Group UE User Equipment UL Uplink WG Working Group
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
4 Definition of low output power
Maximum output power, Pmax, of the base station is the mean power level per carrier measured at the antenna connector in specified reference conditions, as defined in [2], section 6.2.1. The lowest maximum output power that can be set for a base station with the current specifications is 0 dBm. The individual channel codes in a carrier are assigned portions of the carrier maximum output power. The lowest output power that can be allocated to an individual channel code with the current specifications is -15 dBm (for the P-CCPCH) and -10 dBm (for all channels but for P-CCPCH). After consulting several distributed systems manufacturers, they have quoted -20 dBm to +10 dBm as a useful range for the "maximum power" of the input signal to their equipments. Therefore, this range of output powers was initially taken as a definition of "low output power". If Pmax equals -20 dBm, this implies that an individual DPCH code can be radiated with down to -48 dBm (the dynamic power range for a DPCH, according to [2], section 6.4.2, is -3 dB to ‑28 dB). Some companies have argued that this power level could be below or near the noise level. Another company has argued that there are serious implementation problems if the codes are to be transmitted with powers of down to ‑48 dBm. Because of these problems, the definition of low output power has been relaxed to 0 dBm. Let's analyse what requirements this imposes on the power of the individual codes. According to [2], section 6.4.2, the power control dynamic range for a code channel is -3 dB to -28 dB. This implies that the power of a DPCH can range between -3 dBm and -28 dBm (assuming that the "maximum output power" of the carrier has been set to 0 dBm). According to [2], section 6.4.3, the total power dynamic range for a base station is 0 dB to -18 dB. This implies that the power of the CPICH can range between -3 dBm (this is the maximum allowed power for a single code channel) and -18 dBm (assuming a Pmax of 0 dBm). Finally, the power range for the P-CCPCH must be set. The current specifications allow a P-CCPCH power of down to -15 dBm. We think that this is more than enough for a realistic situation, because it allows transmitting the P-CCPCH with at least -15 dB relative to the maximum output power. According to the previous reasoning, the next table summarises what must be understood as low output power: Table 4.1: Definition of low output power Power definition Power range or value Maximum output power (Pmax) 0 dBm DPCH power -3 dBm to -28 dBm CPICH power -3 dBm to -18 dBm P-CCPCH power -3 dBm to -15 dBm Only the DPCH and CPICH power ranges are not allowed by the current specifications. So this study item must analyse what must be changed in order to allow these power ranges.
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
5 Solutions for getting low output power
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
5.1 Solution #1
The first solution for getting low output power is described in Annex B. As it can be seen in this annex, this solution implies only one change to the current specifications, which is the following: • TS 25.433 (NBAP protocol specification). A new IE must be created, containing the following information: • External_Gain_DL: This is the DL gain of the external distribution system. This parameter also includes the losses of the coupling system between the low output power base station and the distribution system. • External_Gain_UL: This is the UL gain of the external distribution system. It comprises all the way from the distribution system remote antenna connector and the low output power base station antenna connector. The main advantages of this solution are the following: • It minimises the changes to the specifications. • There are not backwards compatibility problems with the node B and/or the UE. From the TSG RAN WG4 point of view, this is a feasible solution for getting low output power, but due to the fact that all the changes that this solution implies affect to RAN specifications under TSG RAN WG3 control, the feasibility of this solution is conditioned to TSG RAN WG3 review.
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
5.2 Solution #2
Another way of getting low output power would be to introduce these two parameters, as described in Solution #1, DL and UL gain of the distribution system, into the O&M system. By doing this, the base station would be aware of the presence of this equipment and could therefore adjust its output power, so as to provide the expected power at the antenna port, that is, at the Uu interface. To provide this information, two possibilities could be foreseen: a) These two parameters could be stored into the local database of the base station. b) It could also be possible to include these parameters in the network manager database, though this seems to be indeed more complex, because this information would have to be sent to the base station via the itf-N interface. Comparing both alternatives, option a) seems to be much simpler than option b), as it would minimise the impact to the specifications. Besides, it would not be needed to involve TSG SA WG5, responsible for the standardisation of the itf-N interface.Therefore, option a) would be the one chosen when referring to Solution #2.
e77d3faff9be1de0a0fd3e5e46ddb1f5
25.807
6 Conclusions
TSG RAN WG3 has reviewed solution #1 and concluded that, although this could be a feasible solution, it does not seem to be the optimal one. Therefore, a second solution, solution #2, was proposed trying to minimize the changes to the current specifications. As option a) of solution #2 seems to be the simplest solution, TSG RAN WG3 agrees to adopt this alternative to provide low output power. Annex A: Description of solution #1 for getting low output power The first solution that one can think of for getting low output power is to change the Iub signalling information elements, so that the RNC can order the node B to transmit the desired power. So this was the first approach taken to obtain low output power. But this solution leads to several problems: • The changes in the Iub signalling affect not only to the node B, but to the UE [3]. The CPICH power value sent to the UE by the RNC does not correspond to the CPICH power at the distribution system antenna connector. This can lead to problems with some RNC functionality like admission control or the adjustment of the initial power of the PRACH. • The changes to the Iub signalling are not backwards compatible. A node B or a UE that is not Release 6 compatible would not understand the changes done to the signalling [3]. Because of this, a more feasible solution has been considered. With this solution, current information elements are not changed. The node B and the RNC are the ones that perform the necessary corrections to obtain the low output power. Figure B.1.1 shows an example of this solution. In this example, we want a Pmax at the distribution system antenna interface of +30 dBm. The gain of the feeder between the node B and the distribution system, plus the distribution system gain, is 30 dB. Therefore, the node B should be ordered to transmit with a Pmax of 0 dBm. But the RNC orders the node B to transmit 30 dBm, which should be the maximum output power at the distribution system antenna interface. The order is sent by using a non changed Release 99 IE. According to this, the node B should transmit with a Pmax of 30 dBm at its antenna interface. But the RNC sends to the node B a new IE, which tells the node B that there is a distribution system connected to its antenna interface. This new IE contains the UL and DL gain of the distribution system. Then the node B is able to correct its output power, and therefore, it transmits with a Pmax of 0 dBm, so that the Pmax at the remote antenna interface is 30 dBm. In order that the RNC can send to the node B the gain of the external distribution system, it is necessary to add two parameters to the RNC, operator configurable, which contain the UL and DL gain of the external distribution system. Figure B.1: Solution #1 for getting low output power On the other hand, the CPICH power value sent to the UE by the RNC is 18 dBm, which is the CPICH transmit power at the distribution system antenna interface. With this solution, the correct CPICH power value is sent to the UE, and there are not backwards compatibility problems with the UE's. The only change to the specifications is the new IE in the NBAP protocol, containing the UL and DL gain of the distribution system. There would be no changes in the RRC protocol, and there would be no backward compatibility problems with the NBAP IE's. In the previous explanation of the approach, no mention has been made of the possible use of the distribution system UL gain for the node B and/or the RNC. It could be useful for correcting the measurement reports received from the node B, because if these reports are not relative to the distribution system antenna connector (the point at which the CPICH power value is given), it could lead to problems with some RNC functionality. It should also be pointed out that if the or distribution system connected to the node B has several antenna ends, all of them should be configured to transmit the same output power. If not, it would be impossible for the node B to correct its transmit power so that the correct output power is transmitted at all antenna ends. This comment should be included in the relevant documents, for instance in the WDS technical report. This solution is not fully closed yet. Subsequent modifications or additions to this solution can be incorporated into this TR by means of TSG RAN WG's contributions. Annex B: Use of the downlink and uplink gain To clarify the use of both parameters, downlink and uplink gain of any distributed antenna system connected after the base station, the following structure is to be considered. Figure C.1: General topology in case of Low Output Power First of all, it seems clear that, indisputably, the downlink gain of the distributed antenna system connected at the output of the base station will be a value needed by the base station, in order to be able to adjust its output power accordingly. By doing this, the Primary CPICH power at the antenna connector can be correct, as indicated on the BCH. On the other hand, the purpose of the uplink gain could be less obvious, although it is also important, for this parameter will be used to compensate any dissymmetry between both, uplink and downlink, so as to receive an exact - as accurate as possible - initial power for the PRACH preambles. To clarify this point, it would be useful to analyse in detail how the calculation of this power is performed by the UE. The formula the UE uses to estimate the power of the initial preamble for the PRACH, Preamble_Initial_Power, is given in 3GPP TS 25.331 as follows: Preamble_Initial_Power = Primary CPICH TX power IE - CPICH_RSCP + UL Interference IE + Constant Value IE Where: - The Primary CPICH TX power IE is the transmitted Primary CPICH power sent to the UE on the Uu interface. This IE is indicated on the BCH in the System Information Block, SIB, type 6 (or SIB 5, if SIB 6 is not being broadcasted). - The CPICH_RSCP is measured by the UE as the received value of the Primary CPICH. - The UL Interference IE is the estimated uplink interference already existing in the cell. This IE is present on the BCH in SIB7. - The Constant Value IE is a constant chosen by the RNC. This IE is radiated to the UE on the BCH in SIB 6 (or SIB 5, if SIB 6 is not being broadcasted). In fact, the first two terms represent the estimation of the downlink path loss. Of course, it can only be correct if the Primary CPICH power at the antenna connector is equal to the Primary CPICH TX power IE. So, this is obviously the reason why the base station needs to be aware of the presence of the external element connected at its output before the antenna itself, adjusting its output power in accordance. Additionally, a constant value is chosen so as to enable RRC connection establishment without delay and without creating too much uplink interference. Finally, in order to take into account the presence of other UEs in the cell, the UL interference IE is included. This estimation will only be correct if the base station is aware of the UL gain of the external element connected. As it could be noticed, this formula does not explicitly contain uplink and downlink path losses, but on the contrary, symmetry between both links is implied. This means that the UE assumes that uplink and downlink path losses are almost the same. This hypothesis is usually valid at the antenna connector reference point, that is, immediately after (or before) any external element connected at the output (input) of the base station on the downlink (on the uplink). It is important to maintain this symmetry up to the base station itself, so that the initial power of the preambles would be correct enough. If either uplink or downlink is not compensated correctly, then the Preamble_Initial_Power may not be accurate enough: - Being too low, the RRC connection establishment might be delayed or even impossible. - Being too high, too much uplink interference will be created in the cell. Annex C: Change history Change history Date TSG # TSG Doc. CR Rev Subject/Comment Old New 03/2004 23 RP-040076 - - Approved at TSG RAN #23 and placed under Change Control 1.0.0 6.0.0
1de16545e4a78484b5596a06529f4503
25.463
1 Scope
The present document specifies the Remote Electrical Tilting Application Part (RETAP) between the implementation specific O&M transport function and the RET Antenna Control unit function of the Node B. It defines the Iuant interface and its associated signaling procedures.
1de16545e4a78484b5596a06529f4503
25.463
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. • References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. • For a specific reference, subsequent revisions do not apply. • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TS 25.460: "UTRAN Iuant Interface: General Aspects and Principles". [2] ISO/IEC 13239 (2nd Edition, March 2000): "Information Technology – Telecommunications and information exchange between systems – High-level data link control (HDLC) procedures". [3] 3GPP TS 25.462: "UTRAN Iuant Interface: Signalling Transport". [4] 3GPP TS 25.461: ”UTRAN Iuant Interface: Layer 1”.
1de16545e4a78484b5596a06529f4503
25.463
3 Definitions and abbreviations
1de16545e4a78484b5596a06529f4503
25.463
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply. Active alarm: An alarm which has an alarm state that has been raised, but not cleared Alarm: Persistent indication of a fault Alarm code: A code that identifies a specific alarm. The alarm code set is a subset of the return code set. The alarm codes are listed in annex A of this TS Alarm state: A condition or state in the existence of an alarm. Alarm states are raised and cleared ASCII character: A character forming part of the International Reference Version of the 7-bit character set defined in ISO/IEC 646:1991 Calibrate: Exercise the antenna drive unit over its entire range of travel to ensure fault-free operation and synchronise the measured and actual beam tilt of the antenna Configuration data: A stored table or function defining the relationship between the physical position of the drive and electrical beam tilt Data type: A definition determining the value range and interpretation of a series of octets. The following specified data types are used in this TS: Name: Definition: AlarmCode 1 octet unsigned enumerated code All AlarmCode values are listed in annex A of this TS FieldNumber 1 octet unsigned enumerated code All field number values are listed in annex B of this TS ProcedureCode 1 octet unsigned enumerated code ReturnCode 1 octet unsigned enumerated code All ReturnCode values are listed in annex A of this TS TextString Octets with integer values in the range of 32 to 126 to be interpreted as ASCII characters Elementary procedure: The RETAP protocol consists of elementary procedures (EPs). An elementary procedure is a unit of interaction between the primary device (Node B) and the secondary devices (RET devices) An EP consists of an initiating message and possibly a response message. Two kinds of EPs are used: - Class 1: Elementary procedures with response (success or failure). - Class 2: Elementary procedures without response. For Class 1 EPs, the types of responses can be as follows: Successful - A signalling message explicitly indicates that the elementary procedure has been successfully completed with the receipt of the response. Unsuccessful - A signalling message explicitly indicates that the EP failed. Class 2 EPs are considered always successful. Error: Deviation of a system from normal operation Fault: Lasting error condition Little endian: The order of transmission in which the least-significant octets of a multi-octet representation of a number are transmitted first. Little endian only applies to binary integer representations MaxDataReceiveLength: SecondaryPayloadReceiveLength minus 3 octets (see subclause 4.8.1 in [3]) MaxDataTransmitLength: SecondaryPayloadTransmitLength minus 3 octets (see subclause 4.8.1 in [3]) Procedure code: A code identifying an elementary procedure Reset: A process by which the device is put in the state it reaches after a completed power-up Return code: A code which defines information about the outcome of an elementary procedure execution Tilt (also downtilt, tilt angle, beamtilt): The elevation angle between the direction orthogonal to the antenna element axis and the maximum of its main beam in the elevation plane. A positive electrical tilt angle means that the antenna beam is directed below the direction orthogonal to the antenna axis. An antenna has separate values for electrical and mechanical tilt. The mechanical tilt is fixed by the geometry of the installation. In this TS the tilt referred to is always the electrical tilt unless otherwise stated Tilt value: A signed integer used in elementary procedures to define the electrical tilt setting of the antenna. The tilt value is 10 times the antenna electrical tilt angle in degrees.
1de16545e4a78484b5596a06529f4503
25.463
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply: EP Elementary Procedure HDLC High-Level Data Link Control RET Remote Electrical Tilting RETAP Remote Electrical Tilting Application Part TCP Time-Consuming Procedure
1de16545e4a78484b5596a06529f4503
25.463
4 General
1de16545e4a78484b5596a06529f4503
25.463
4.1 Procedure specification principles
The principle for specifying the procedure logic is to specify the functional behaviour of the RET antenna control unit exactly and completely. The Node B functional behaviour is left unspecified. The following specification principles have been applied for the procedure text in clause 6: - The procedure text discriminates between: 1) Functionality which "shall" be executed The procedure text indicates that the receiving node "shall" perform a certain function Y under a certain condition. If the receiving node supports procedure X but cannot perform functionality Y requested in the REQUEST message of a Class 1 EP, the receiving node shall respond with the message used to report unsuccessful outcome for this procedure, containing an appropriate cause value. 2) Functionality which "shall, if supported" be executed The procedure text indicates that the receiving node "shall, if supported," perform a certain function Y under a certain condition. If the receiving node supports procedure X, but does not support functionality Y, the receiving node shall proceed with the execution of the EP, possibly informing the requesting node about the not supported functionality.
1de16545e4a78484b5596a06529f4503
25.463
4.2 Forwards and backwards compatibility
The forwards and backwards compatibility of all versions of the protocol shall be assured by a mechanism in which all current and further messages will not be changed in the future. These parts can always be decoded regardless of the standard version. New functionalities are added into the specification by introducing new procedures and thus the existing messages are not changed in the future.
1de16545e4a78484b5596a06529f4503
25.463
4.3 Multi-antenna units
The RETAP elementary procedures are split into a single-antenna oriented part, a multi-antenna oriented part and a common part for both device types in order to support RET units controlling single- or multi-antenna devices. The RET unit responds, upon request, the number of antennas it controls. All multi-antenna oriented elementary procedures include a parameter stating which antenna the elementary procedure addresses. Antennas are numbered 1 and upwards.
1de16545e4a78484b5596a06529f4503
25.463
4.4 Integer representation
Multi-octet integer values are transmitted in little endian order. Signed integers are represented as 2-complement values.
1de16545e4a78484b5596a06529f4503
25.463
5 Services expected from signalling transport
RETAP requires an assured in-sequence delivery service from the signalling transport and notification if the assured in-sequence delivery service is no longer available.
1de16545e4a78484b5596a06529f4503
25.463
5.1 Elementary procedure format
Layer 2 provides a full-duplex link for the transmission of RETAP messages. There are two types of RETAP elementary procedures: Class 1: Initiating messages are sent either from the primary to a secondary device, or from a secondary to the primary device, in order to initiate some action within the receiving device. The other device sends a response message completing the procedure. Class 2: Initiating messages are sent either from the primary to a secondary device, or from a secondary to the primary device. No response message is expected. All RETAP messages use the same basic format: Table 5.1.1: Basic format for all RETAP messages Elementary procedure Number of data octets Data 1 octet 2 octets MaxDataReceiveLength or MaxDataTransmitLength. NOTE: Response messages have the same basic format as initiating messages. The elementary procedure code shall be the same in the response message as in the associated initiating message.
1de16545e4a78484b5596a06529f4503
25.463
5.1.1 Initiating message
The data part of an initiating message may contain parameters as specified in clause 6 of this TS.
1de16545e4a78484b5596a06529f4503
25.463
5.1.2 Response message
Elementary procedures shall, unless otherwise specified, provide a response message within 1 second. The response time is measured from the time the message frame was received by the transport layer to the time the response message is ready for transfer by the transport layer. If the class1 elementary procedure requested by the initiating message was successfully executed, the response message data part from a single-antenna device shall contain return code <OK>. Additional information may follow in the data part. The response message data part from a multi-antenna device starts with the antenna number followed by return code <OK> and optional additional information. If the elementary procedure requested by the initiating message was not successfully executed, the response message data part from a single-antenna device shall contain return code <FAIL>. The following octet shall contain a second return code which describes why the execution of the requested procedure failed. The response message data part from a multi-antenna device starts with the antenna number followed by return code <FAIL> and a second return code which describes why the execution of the requested procedure failed. In some situations an initiating message can cause a change of operating conditions, for instance a SetTilt procedure might cause a RET device to discover that an adjuster is jammed or that a previously jammed adjuster works normally again. In these cases an alarm procedure reporting the change of operating conditions shall be used in addition to the regular <OK> or <FAIL> return codes in response message. A complete annotated table of all return codes with their corresponding hexadecimal numbers is provided in annex A of this TS. Return codes marked with an X in the Alarm column of annex A in this TS are used to report operating conditions in alarm procedures (see subclauses 6.6.5 and 6.7.6 for details).
1de16545e4a78484b5596a06529f4503
25.463
6 Control elementary procedures
1de16545e4a78484b5596a06529f4503
25.463
6.1 State model
The state model describing the RET device is shown in figure 6.1 with procedures written in italic. The relation to the connection state model for layer 2 can be found in [3]. Figure 6.1: State model for the RET device If an application software is not missing the RET device enters the state OperatingMode. If an application software is missing, the RET device enters the state DownloadMode. In this state only software download functionality is supported in order to restore the application software. The primary device will be notified that the RET device has entered the state DownloadMode when a procedure which only is supported in the state OperatingMode fails with the return code WorkingSoftwareMissing. If no software download functionality is supported, then only the state OperatingMode for the RET device is supported.
1de16545e4a78484b5596a06529f4503
25.463
6.2 General procedure handling
1de16545e4a78484b5596a06529f4503
25.463
6.2.1 Alarms
When a fault is detected, the corresponding alarm state shall be changed to state raised by the secondary device. When the fault no longer exists, the corresponding alarm state shall be changed to state cleared by the secondary device. Alarm changes are reported through the AlarmIndication or AntennaAlarmIndication elementary procedures. Whenever an AlarmIndication or AntennaAlarmIndication elementary procedure message is transmitted, it shall contain all the alarm states changed that have not yet been reported as described in subclauses 6.6.5 and 6.7.6. All alarm states shall be cleared by any type of reset.
1de16545e4a78484b5596a06529f4503
25.463
6.2.2 Procedure message interpretation
The following message interpretation rules shall apply to a secondary device in the order mentioned: - Any message shorter than 3 octets shall be disregarded. In case of Multi-Antenna-Procedures any messages shorter than 4 octets shall be disregarded.; - If a message has a length inconsistent with its “Number of data octets” field value it shall be responded with a failure message stating “FormatError” as the cause of failure. The response message shall be to the initiating message identified by the procedure code; - If a secondary device in the OperatingMode state receives a procedure message which is undefined for this device type, it shall respond with "Unknown Procedure"; - If a secondary device in the OperatingMode state is receiving a procedure message of an optional procedure not supported, it shall respond with a failure message stating “UnsupportedProcedure” as the cause of failure; - If a secondary device receives a procedure message, part of the software download procedure sequence described in Annex C, without having received the previous procedure messages in that sequence it shall respond with a failure message stating “InvalidProcedureSequence” as the cause of failure; - If a secondary device in the DownloadMode state is receiving a procedure message not supported in that state it shall respond with a failure message stating “WorkingSoftwareMissing” as the cause of failure; - If a message has a length inconsistent with the defined message length in the procedure definition it shall be responded with a failure message stating “FormatError” as the cause of failure. The response message shall be to the initiating message identified by the procedure code; - If a secondary device in the OperatingMode state is receiving a procedure message which addressed device subunit does not exist “FormatError” shall be returned.
1de16545e4a78484b5596a06529f4503
25.463
6.2.3 Parallel procedure handling
The secondary device shall support parallel execution of in maximum one additional EP only in parallel to one of the Time-Consuming Procedures defined in table 6.2.3.1: Table 6.2.3.1: Definition of TCPs and the execution of procedures in parallel to a TCP Elementary Procedure TCP Execution in parallel to a TCP Common Procedure Set (Reserved) Reset Software no mandatory Get Alarm Status no mandatory Get Information no mandatory Clear Active Alarms no disallowed Read User Data no optional Write User Data no optional Alarm Subscribe no optional Self Test yes disallowed Download Start no disallowed Download Application no disallowed Download End no disallowed Vendor specific procedure vendor specific optional Single-Antenna Procedure Set Set Device Data no optional Get Device Data no optional Calibrate yes disallowed Send Configuration Data no disallowed Set Tilt yes disallowed Get Tilt no optional Alarm Indication no optional Multi-Antenna Procedure Set Antenna Calibrate yes optional Antenna Send Configuration Data no disallowed Antenna Set Tilt yes optional Antenna Get Tilt no optional Antenna Set Device Data no optional Antenna Get Device Data no optional Antenna Alarm Indication no optional Antenna Clear Active Alarms no disallowed Antenna Get Alarm Status no mandatory Antenna Get Number of Antennas no mandatory “yes” in the "TCP" column indicates that the procedure is a TCP, “no“ in the "TCP" column indicates that the procedure is not a TCP. “mandatory” in the "Execution in parallel to a TCP" column indicates that the procedure shall be executed in parallel to an ongoing TCP. “optional” in this column indicates, that the support of the execution of the procedure in parallel to an ongoing TCP is optional and “disallowed” indicates that the procedure shall not be executed in parallel to a TCP. If a secondary device receives an initiating message for an EP which cannot be executed due to the ongoing execution of other EPs, the secondary device shall respond with a failure message stating “Busy” as the cause of failure. Parallel execution of one TCP marked “optional” in the "Execution in parallel to a TCP" column in table 6.2.3.1 may be supported for each antenna by the secondary device. The EPs AntennaSetTilt and AntennaCalibrate shall be executed in parallel only for different antenna numbers. If more than one TCP is executed, ResetSoftware shall be executed anyway and never be responded with “Busy”. If the EPs Get Tilt and Antenna GetTilt are executed in parallel with a TCP, their response message shall deliver a tilt value sampled during their execution.
1de16545e4a78484b5596a06529f4503
25.463
6.3 Overview of elementary procedures
The set of elementary procedures for RET antenna control provides procedure-oriented instructions. An overview of the procedures is given in annex D. Table 6.3.1 lists all common elementary procedures described in subclause 6.5. Table 6.3.2 lists all elementary procedures specific for single-antenna device types described in subclause 6.6. Table 6.3.3 lists all elementary procedures specific for multi-antenna device types described in subclause 6.7. subclause 6.4 describes how to interpret the elementary procedure definitions in subclauses 6.5 to 6.7. Some elementary procedures shall be performed in sequence as described in Annex C for the software download. Table 6.3.1: Common elementary procedure set for all device types Elementary procedure Requirement Comment Reset Software mandatory Get Alarm Status mandatory Get Information mandatory Clear Active Alarms mandatory Alarm Subscribe mandatory Read User Data mandatory Write User Data mandatory Self Test mandatory Download Start optional This procedure is mandatory if the software download feature is supported Download Application optional This procedure is mandatory if the software download feature is supported Download End optional This procedure is mandatory if the software download feature is supported Vendor specific procedure optional Table 6.3.2: Elementary procedure set for single-antenna device type Elementary procedure Requirement Comment Calibrate mandatory Send Configuration Data mandatory Set Tilt mandatory Get Tilt mandatory Alarm Indication mandatory Set Device Data mandatory Get Device Data mandatory Table 6.3.3: Elementary procedure set for multi-antenna device type Elementary procedure Requirement Comment Antenna Calibrate mandatory Antenna Send Configuration Data mandatory Antenna Set Tilt mandatory Antenna Get Tilt mandatory Antenna Set Device Data mandatory Antenna Get Device Data mandatory Antenna Alarm Indication mandatory Antenna Clear Active Alarms mandatory Antenna Get Alarm Status mandatory Antenna Get Number Of Antennas mandatory
1de16545e4a78484b5596a06529f4503
25.463
6.4 Description of elementary procedures
Table 6.4.1: Description of elementary procedures Name: The name used to refer to the elementary procedure Code: The code is defined here. All other code references are informative Issued by: Primary device or secondary device Procedure class: Class 1 or Class 2 DownloadMode state: Defines whether the procedure shall be supported in the DownloadMode state. Power mode: Defines the secondary device power consumption as described in [4] during the execution of the elementary procedure. Table 6.4.2: Initiating and response message parameters and format Number Length Type Description The enumerated order in which the parameter occurs in the data field of the message. The first number is 1. The length of the parameter, in number of octets, if defined. The data type used in the parameter. Description of the parameter. Table 6.4.3: Response message parameters and format for common class 1 elementary procedures upon error Number Length Type Description 1 1 octet ReturnCode Return code FAIL 2 1 octet ReturnCode Reason for failure Table 6.4.4: Response message parameters and format for single-antenna class 1 elementary procedures upon error Number Length Type Description 1 1 octet ReturnCode Return code FAIL 2 1 octet ReturnCode Reason for failure Table 6.4.5: Response message parameters and format for multi-antenna class 1 elementary procedures upon error Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code FAIL 3 1 octet ReturnCode Reason for failure NOTE: The response message in the elementary procedure AntennaGetAntennaNumber, has the format given in table 6.4.4, although it is defined as a multi-antenna class 1 elementary procedure. Description: Describes the purpose of the elementary procedure. Table 6.4.6: Return codes OK FAIL Comment All return codes applicable in a response message to a successful procedure, except “OK”, are listed here. The return codes are listed by name as defined in annex A. All return codes applicable in a response message to a failing procedure, except “FAIL” are listed here. The return codes are listed by name as defined in annex A. Any comment needed for clarification.
1de16545e4a78484b5596a06529f4503
25.463
6.5 Common elementary procedures
1de16545e4a78484b5596a06529f4503
25.463
6.5.1 Reset Software
Table 6.5.1.1: Elementary procedure Reset Software Name: ResetSoftware Code: 0x03 Issued by: Primary device Procedure class: 1 DownloadMode state. Yes Power mode: Low Table 6.5.1.2: Initiating message parameters and format for Reset Software Number Length Type Description None 0 octets None No data carried Table 6.5.1.3: Response message parameters and format for Reset Software Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On the receipt of the initiating message the secondary device shall reset the application. All alarm states shall be cleared. If the initiating message is received in the OperatingMode state, the transport layer shall remain unaffected. If the initiating message is received in the DownloadMode state, the ResetSoftware procedure shall reset the entire device without activating any new application software downloaded since entering the DownloadMode state. The device shall not execute the reset procedure before transport layer acknowledgement through sequence number update is received for the response. Table 6.5.1.4: Return codes for Reset Software OK FAIL Comment FormatError In case of format error, the procedure code validity is not secured.
1de16545e4a78484b5596a06529f4503
25.463
6.5.2 Get Alarm Status
Table 6.5.2.1: Elementary procedure Get Alarm Status Name: GetAlarmStatus Code: 0x04 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.5.2.2: Initiating message parameters and format for Get Alarm Status Number Length Type Description None 0 octets None No data carried Table 6.5.2.3: Response message parameters and format for Get Alarm Status Number Length Type Description 1 1 octet ReturnCode Return code OK i + 1 1 octet AlarmCode Active alarm number i i = 1 … N Description: On receipt of the initiating message the secondary device reports the alarm codes of the active alarms. Table 6.5.2.4: Return codes for Get Alarm Status OK FAIL Comment All return codes marked as used for alarms in Annex A. FormatError WorkingSoftwareMissing
1de16545e4a78484b5596a06529f4503
25.463
6.5.3 Get Information
Table 6.5.3.1: Elementary procedure Get Information Name: GetInformation Code: 0x05 Issued by: Primary device Procedure class: 1 DownloadMode state: Yes Power mode: Low Table 6.5.3.2: Initiating message parameters and format for Get Information Number Length Type Description None 0 octets None No data carried Table 6.5.3.3: Response message parameters and format for Get Information Number Length Type Description 1 1 octet ReturnCode Return code OK 2 1 octet Unsigned integer Length of parameter 3 in number of octets 3 TextString Product number 4 1 octet Unsigned integer Length of parameter 5 in number of octets 5 TextString Serial number 6 1 octet Unsigned integer Length of parameter 7 in number of octets 7 TextString Hardware Version 8 1 octet Unsigned integer Length of parameter 9 in number of octets 9 TextString Software Version Description: On receipt of the initiating message the secondary device shall return the product number ProdNr and the serial number SerNr of the secondary device. If known, also the hardware version and the software version may be returned. The software version should indicate the version number of the currently executed software. The parameters HWVersion and SWVersion in the response message refer to the version designators of the hardware and installed software of the secondary device. If the application is missing or no HW or SW version number is found, then an empty string shall be returned as the HW or SW version number. The empty string is represented as a length field equals 0 and no octets in the TextString field. The response message length shall be less than or equal to the minimum SecondaryPayloadTransmitLength as given in subclause 4.8.1 in [3]. Table 6.5.3.4: Return codes for Get Information OK FAIL Comment FormatError
1de16545e4a78484b5596a06529f4503
25.463
6.5.4 Clear Active Alarms
Table 6.5.4.1: Elementary procedure Clear Active Alarms Name: ClearActiveAlarms Code: 0x06 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.5.4.2: Initiating message parameters and format for Clear Active Alarms Number Length Type Description None 0 octets None No data carried Table 6.5.4.3: Response message parameters and format for Clear Active Alarms Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall first clear all stored alarm information and then return a procedure response message. Table 6.5.4.4: Return codes for Clear Active Alarms OK FAIL Comment FormatError Busy WorkingSoftwareMissing
1de16545e4a78484b5596a06529f4503
25.463
6.5.5 Alarm Subscribe
Table 6.5.5.1: Elementary procedure Alarm Subscribe Name: AlarmSubscribe Code: 0x12 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.5.5.2: Initiating message parameters and format for Alarm Subscribe Number Length Type Description None 0 octets None No data carried Table 6.5.5.3: Response message parameters and format for Alarm Subscribe Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall start reporting alarms to the primary device. Table 6.5.5.4: Return codes for Alarm Subscribe OK FAIL Comment FormatError Busy WorkingSoftwareMissing
1de16545e4a78484b5596a06529f4503
25.463
6.5.6 Self Test
Table 6.5.6.1: Elementary procedure Self Test Name: SelfTest Code: 0x0A Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: High Table 6.5.6.2: Initiating message parameters and format for Self Test Number Length Type Description None 0 octets None No data carried Table 6.5.6.3: Response message parameters and format for Self Test Number Length Type Description 1 1 octet ReturnCode Return code OK i + 1 1 octet AlarmCode Alarm code for alarm i detected during self test. i = 1 … N Description: On receipt of the initiating message the secondary device shall execute a test procedure which may include a check of physical and processor functions. The specific tests to be performed are implementation specific, and may include the movement of the adjuster, which shall not exceed +-5% of total available tilting range starting from the current adjuster position. The response message of the secondary device on the procedure provides information on detected faults or, if no fault is detected, with confidence that the operation of the device is normal in all respects. During the test the operational parameters of the device shall not change beyond operationally acceptable limits and on completion all parameters shall be returned to their initial values. In the normal response message, after the self test was executed successfully, the return codes are set to report possible detected faults during the self test. If no faults are detected, this shall be signalled by no return codes following the return code <OK>. In the case of a failure response message, the self test could not be executed successfully and the reported return code relates to the inability of the device to perform the requested self-test operation. Table 6.5.6.4: Return codes for Self Test OK FAIL Comment All return codes marked as alarms in annex A. FormatError Busy WorkingSoftwareMissing NotCalibrated NotScaled
1de16545e4a78484b5596a06529f4503
25.463
6.5.7 Void
1de16545e4a78484b5596a06529f4503
25.463
6.5.8 Void
1de16545e4a78484b5596a06529f4503
25.463
6.5.9 Read User Data
Table 6.5.9.1: Elementary procedure Read User Data Name: ReadUserData Code: 0x10 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.5.9.2: Initiating message parameters and format for Read User Data Number Length Type Description 1 2 octets Unsigned integer Memory offset 2 1 octet Unsigned integer Number of octets to read NOTE: Number of octets to read shall be less than, or equal toMaxDataTransmit Length minus 1. Table 6.5.9.3: Response message parameters and format for Read User Data Number Length Type Description 1 1 octet ReturnCode Return code OK 2 Number of octets given by parameter 2 of the initiating message User specific User data Description: On receipt of the initiating message the secondary device shall send back user specific data stored in a user data area to the primary device. The user data area is intended for storage of user defined data, e.g. inventory information. Table 6.5.9.4: Return codes for Read User Data OK FAIL Comment FormatError WorkingSoftwareMissing OutOfRange The return code OutOfRange is used, if the given memory address range is outside the valid address space.
1de16545e4a78484b5596a06529f4503
25.463
6.5.10 Write User Data
Table 6.5.10.1: Elementary procedure Write User Data Name: WriteUserData Code: 0x11 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.5.10.2: Initiating message parameters and format for Write User Data Number Length Type Description 1 2 octets Unsigned integer Memory offset 2 1 octet Unsigned integer Number of octets to write 3 Message specific, given by parameter 2 User specific Data to write NOTE: Number of octets to write shall be less than, or equal to MaxDataReceiveLength minus 3. Table 6.5.10.3: Response message parameters and format for Write User Data Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall store user data in non-volatile memory. The user data is stored in the user data area using the relative memory address offset given in the initiating message and starting with zero. The user data area is intended for storage of user defined data, e.g. inventory information. Table 6.5.10.4: Return codes for Write User Data OK FAIL Comment FormatError Busy WorkingSoftwareMissing HardwareError OutOfRange The return code OutOfRange is used if the given memory address range is outside the valid address space.
1de16545e4a78484b5596a06529f4503
25.463
6.5.11 Download Start
Table 6.5.11.1: Elementary procedure Download Start Name: DownloadStart Code: 0x40 Issued by: Primary device Procedure class: 1 DownloadMode state: Yes Power mode: Low Table 6.5.11.2: Initiating message parameters and format for Download Start Number Length Type Description None 0 octets None No data carried Table 6.5.11.3: Response message parameters and format for Download Start Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of this initiating message the software download process shall be initiated. Following transition to the DownloadMode state, the secondary device sends return code <OK>. Previous subscription of alarms by use of the AlarmSubscribe procedure is cancelled. Table 6.5.11.4: Return codes for Download Start OK FAIL Comment FormatError Busy UnsupportedProcedure
1de16545e4a78484b5596a06529f4503
25.463
6.5.12 Download Application
Table 6.5.12.1: Elementary procedure Download Application Name: DownloadApplication Code: 0x41 Issued by: Primary device Procedure class: 1 DownloadMode state: Yes Power mode: Low Table 6.5.12.2: Initiating message parameters and format for Download Application Number Length Type Description 1 Less than, or equal to MaxDataReceiveLength Vendor specific Software data Table 6.5.12.3: Response message parameters and format for Download Application Number Length Type Description 1 1 octet ReturnCode Return code OK Description: This elementary procedure is used once or several times to transfer software data from the primary device to the secondary device. Table 6.5.12.4: Return codes for Download Application OK FAIL Comment FormatError Busy HardwareError InvalidFileContent InvalidProcedureSequence
1de16545e4a78484b5596a06529f4503
25.463
6.5.13 Download End
Table 6.5.13.1: Elementary procedure Download End Name: DownloadEnd Code: 0x42 Issued by: Primary device Procedure class: 1 DownloadMode state: Yes Power mode: Low Table 6.5.13.2: Initiating message parameters and format for Download End Number Length Type Description None 0 octets None No data carried Table 6.5.13.3: Response message parameters and format for Download End Number Length Type Description 1 1 octet ReturnCode Return code OK Description: This elementary procedure signals the end of a multi-message data transfer to the secondary device. The secondary device shall respond after verifying the received data. The secondary device shall reset autonomously after completion of the layer 2 response and activate the new application software. Table 6.5.13.4: Return codes for Download End OK FAIL Comment FormatError Busy HardwareError ChecksumError InvalidFileContent InvalidProcedureSequence
1de16545e4a78484b5596a06529f4503
25.463
6.5.14 Vendor specific procedure
Table 6.5.14.1: Elementary procedure Vendor Specific Procedure Name: VendorSpecificProcedure Code: 0x90 Issued by: Vendor specific Procedure class: Vendor specific DownloadMode state: Vendor specific Power mode: Vendor specific Table 6.5.14.2: Initiating message parameters and format for Vendor Specific Procedure Number Length Type Description 1 2 octets ASCII Vendor code 1 + i Vendor specific Vendor specific i = 1 … N Table 6.5.14.3: Response message parameters and format for Vendor Specific Procedure Number Length Type Description i Vendor specific Vendor specific Vendor specific i = 1 … N Description: The vendor specific procedure is intended for vendor specific purposes like e.g. testing. Table 6.5.14.4: Return codes for vendor specific procedure OK FAIL Comment FormatError UnsupportedProcedure If the Vendor code in the initiating message does not match that of the RET device, UnsupportedProcedure shall be returned.
1de16545e4a78484b5596a06529f4503
25.463
6.6 Single-antenna elementary procedures
1de16545e4a78484b5596a06529f4503
25.463
6.6.1 Calibrate
Table 6.6.1.1: Elementary procedure Calibrate Name: Calibrate Code: 0x31 Issued by: Primary Device Procedure class: 1 DownloadMode state: No Power mode: High Table 6.6.1.2: Initiating message parameters and format for Calibrate Number Length Type Description None 0 octets None No data carried Table 6.6.1.3: Response message parameters and format for Calibrate Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall perform a calibration of the RET antenna where the actuator is driven through its whole tilt range. The response time to this Calibrate procedure shall be less than 4 minutes. Table 6.6.1.4: Return codes for Calibrate OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing MotorJam ActuatorJam NotConfigured UnsupportedProcedure
1de16545e4a78484b5596a06529f4503
25.463
6.6.2 Send Configuration Data
Table 6.6.2.1: Elementary procedure Send Configuration Data Name: SendConfigurationData Code: 0x32 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.6.2.2: Initiating message parameters and format for Send Configuration Data Number Length Type Description 1 Less than, or equal to MaxDataReceiveLength Vendor specific Configuration data Table 6.6.2.3: Response message parameters and format for Send Configuration Data Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall store the provided vendor and antenna specific configuration data for the relationship between the movement of the drive system and the beam tilt position of the antenna. If the configuration data exceeds MaxDataReceiveLength, the data shall be split into a number of MaxDataReceiveLength segments and one final segment with whatever is left. The primary device transmits the segments in order. The layer 2 sequence numbers guarantee that no segment will be lost or received out of order. Table 6.6.2.4: Return codes for Send Configuration Data OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing ChecksumError InvalidFileContent UnsupportedProcedure
1de16545e4a78484b5596a06529f4503
25.463
6.6.3 Set Tilt
Table 6.6.3.1: Elementary procedure Set Tilt Name: SetTilt Code: 0x33 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: High Table 6.6.3.2: Initiating message parameters and format for Set Tilt Number Length Type Description 1 2 octets Signed integer Tilt value Table 6.6.3.3: Response message parameters and format for Set Tilt Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall set the electrical tilt in increments of 0.1°. The secondary device shall respond to the initiating message in less than 2 minutes. The tilt value corresponding to the actual tilt angle shall not go outside of the range between the tilt value corresponding to the current tilt angle and the tilt value corresponding to the requested tilt angle by more than 5 during this operation. The format of the value of parameter 1 is given in subclause 3.1. Table 6.6.3.4: Return codes for Set Tilt OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing MotorJam ActuatorJam NotConfigured NotCalibrated OutOfRange UnsupportedProcedure
1de16545e4a78484b5596a06529f4503
25.463
6.6.4 Get Tilt
Table 6.6.4.1: Elementary procedure Get Tilt Name: GetTilt Code: 0x34 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.6.4.2: Initiating message parameters and format for Get Tilt Number Length Type Description None 0 octets None No data carried Table 6.6.4.3: Response message parameters and format for Get Tilt Number Length Type Description 1 1 octet ReturnCode Return code OK 2 2 octets Signed integer Tilt value Description: On receipt of the initiating message the secondary device shall return the current tilt value. The returned tilt value is given in the format specified in subclause 3.1. Table 6.6.4.4: Return codes for Get Tilt OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing NotCalibrated NotConfigured UnsupportedProcedure HardwareError shall only be used, if error is detected in tilt detector.
1de16545e4a78484b5596a06529f4503
25.463
6.6.5 Alarm Indication
Table 6.6.5.1: Elementary procedure Alarm Indication Name: AlarmIndication Code: 0x07 Issued by: Secondary device Procedure class: 2 DownloadMode state: No Power mode: Low Table 6.6.5.2: Initiating message parameters and format for Alarm Indication Number Length Type Description 2 i – 1 1 octet Unsigned integer Return code i; see annex A 2 i 1 octet Unsigned integer State flag i i = 1 … N Description: The secondary device uses this procedure to report alarm state changes to the primary device. This procedure shall only be performed if the secondary has performed an AlarmSubscribe procedure since its latest reset. For each alarm, the current alarm state and alarm code shall be reported if and only if any change in its state has occurred during the period of time since the last reported state. An AlarmIndication procedure shall be performed if at least one alarm shall be reported. The first AlarmIndication procedure after the AlarmSubscribe procedure shall report the active alarms. Alarm state changes are considered as reported at the time the message is passed to the transport layer. State flag = 0 represents alarm state cleared. State flag = 1 represents alarm state raised.
1de16545e4a78484b5596a06529f4503
25.463
6.6.6 Set Device Data
Table 6.6.6.1: Elementary procedure Set Device Data Name: SetDeviceData Code: 0x0E Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.6.6.2: Initiating message parameters and format for Set Device Data Number Length Type Description 1 1 octet Unsigned integer Field number, see annex B 2 See annex B See annex B Data to write Table 6.6.6.3: Response message parameters and format for Set Device Data Number Length Type Description 1 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall write the data given in the parameters of the initiating message into the fields optionally provided for configuration data and listed in annex B of this TS. If an attempt is made to write to fields which are designated as read only, the return code ReadOnly is returned and the data for those fields is ignored. If an attempt is made to write to fields which are not supported by the device the return code UnknownParameter is returned and the data for those fields is ignored. Table 6.6.6.4: Return codes for Set Device Data OK FAIL Comment FormatError Busy WorkingSoftwareMissing HardwareError ReadOnly UnknownParameter
1de16545e4a78484b5596a06529f4503
25.463
6.6.7 Get Device Data
Table 6.6.7.1: Elementary procedure Get Device Data Name: GetDeviceData Code: 0x0F Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.6.7.2: Initiating message parameters and format for Get Device Data Number Length Type Description 1 1 octet Unsigned integer Field number; see annex B Table 6.6.7.3: Response message parameters and format for Get Device Data Number Length Type Description 1 1 octet ReturnCode Return code OK 2 See annex B See annex B Field value Description: In this procedure the secondary device shall return the data stored in the field for configuration data specified by the field number in the procedure and listed in annex B of this TS. Table 6.6.7.4: Return codes for Get Device Data OK FAIL Comment FormatError Busy WorkingSoftwareMissing UnknownParameter
1de16545e4a78484b5596a06529f4503
25.463
6.7 Multi-antenna elementary procedures
1de16545e4a78484b5596a06529f4503
25.463
6.7.1 Antenna Calibrate
Table 6.7.1.1: Elementary procedure Antenna Calibrate Name: AntennaCalibrate Code: 0x80 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: High Table 6.7.1.2: Initiating message parameters and format for Antenna Calibrate Number Length Type Description 1 1 octet Unsigned integer Antenna number Table 6.7.1.3: Response message parameters and format for Antenna Calibrate Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall perform a calibration of the antenna addressed by the antenna number. During calibration the actuator is driven through the whole tilt range of the antenna. The response time to this Antenna Calibrate procedure shall be less than 4 minutes. Table 6.7.1.4: Return codes for Antenna Calibrate OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing MotorJam ActuatorJam NotConfigured UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
6.7.2 Antenna Set Tilt
Table 6.7.2.1: Elementary procedure Antenna Set Tilt Name: AntennaSetTilt Code: 0x81 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: High Table 6.7.2.2: Initiating message parameters and format for Antenna Set Tilt Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 2 octets Signed integer Tilt value Table 6.7.2.3: Response message parameters and format for Antenna Set Tilt Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall set the electrical tilt of the antenna addressed by the antenna number in increments of 0.1°. The secondary device shall respond to the initiating message in less than 2 minutes. The tilt value corresponding to the actual tilt angle shall not go outside of the range between the tilt value corresponding to the current tilt angle and the tilt value corresponding to the requested tilt angle by more than 5 during this operation. The format of the value of parameter 2 is given in subclause 3.1. Table 6.7.2.4: Return codes for Antenna Set Tilt OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing MotorJam ActuatorJam NotConfigured NotCalibrated OutOfRange UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
6.7.3 Antenna Get Tilt
Table 6.7.3.1: Elementary procedure Antenna Get Tilt Name: AntennaGetTilt Code: 0x82 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.3.2: Initiating message parameters and format for Antenna Get Tilt Number Length Type Description 1 1 octet Unsigned interger Antenna number Table 6.7.3.3: Response message parameters and format for Antenna Get Tilt Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK 3 2 octets Signed integer Tilt value Description: On receipt of the initiating message the secondary device shall return the current tilt value of the antenna addressed by the antenna number. The returned tilt value is in the format specified in subclause 3.1. Table 6.7.3.4: Return codes for Antenna Get Tilt OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing NotConfigured NotCalibrated UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned. HardwareError shall only be used, if an error is detected in tilt detector.
1de16545e4a78484b5596a06529f4503
25.463
6.7.4 Antenna Set Device Data
Table 6.7.4.1: Elementary procedure Antenna Set Device Data Name: AntennaSetDeviceData Code: 0x83 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.4.2: Initiating message parameters and format for Antenna Set Device Data Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet Unsigned integer Field number; see annex B 3 See annex B See annex B Data to write Table 6.7.4.3: Response message parameters and format for Antenna Set Device Data Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall write the provided data for the antenna addressed by the antenna number into the fields optionally provided for configuration data and listed in annex B of this TS. If an attempt is made to write to fields which are designated as read only for the addressed antenna the return code ReadOnly is returned and the data for those fields is ignored. If an attempt is made to write to fields which are not supported for the addressed antenna the return code UnknownParameter is returned and the data for those fields is ignored. Table 6.7.4.4: Return codes for Antenna Set Device Data OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing ReadOnly UnknownParameter UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
6.7.5 Antenna Get Device Data
Table 6.7.5.1: Elementary procedure Antenna Get Device Data Name: AntennaGetDeviceData Code: 0x84 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.5.2: Initiating message parameters and format for Antenna Get Device Data Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet Unsigned integer Field number to read; see annex B Table 6.7.5.3: Response message parameters and format for Antenna Get Device Data Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK 3 See annex B See annex B Field value Description: On receipt of the initiating message the secondary device shall return the data stored for the addressed antenna in the field for configuration data specified by the field number in the initiating message and listed in annex B of this TS. Table 6.7.5.4: Return codes for Antenna Get Device Data OK FAIL Comment FormatError Busy WorkingSoftwareMissing UnsupportedProcedure UnknownParameter If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
6.7.6 Antenna Alarm Indication
Table 6.7.6.1: Elementary procedure Antenna Alarm Indication Name: AntennaAlarmIndication Code: 0x85 Issued by: Secondary device Procedure class: 2 DownloadMode state: No Power mode: Low Table 6.7.6.2: Initiating message parameters and format for Antenna Alarm Indication Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 i 1 octet Unsigned integer Return code i; see annex A 2 i +1 1 octet Unsigned integer State flag i i = 1 … N Description: The multi-antenna secondary device uses this procedure to report antenna alarm state changes to the primary device. This procedure shall only be performed if the secondary has performed an AlarmSubscribe procedure since its latest reset. Multi-antenna devices shall use this AntennaAlarmIndication procedure only for multi-antenna specific alarms and the AlarmIndication procedure in subclause 6.6.5 for the other alarms. For each alarm, the current alarm state and alarm code shall be reported if and only if any change in its state has occurred during the period of time since the last reported state. An AntennaAlarmIndication procedure shall be performed if at least one multi-antenna specific alarm shall be reported. The first AntennaAlarmIndication procedure after the AlarmSubscribe procedure shall report the active alarms. Alarm state changes are considered as reported at the time the message is passed to the transport layer. State flag = 0 represents alarm state cleared. State flag = 1 represents alarm state raised.
1de16545e4a78484b5596a06529f4503
25.463
6.7.7 Antenna Clear Active Alarms
Table 6.7.7.1: Elementary procedure Antenna Clear Active Alarms Name: AntennaClearActiveAlarms Code: 0x86 Issued by: Secondary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.7.2: Initiating message parameters and format for Antenna Clear Active Alarms Number Length Type Description 1 1 octet Unsigned integer Antenna number Table 6.7.7.3: Response message parameters and format for Antenna Clear Active Alarms Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall first clear all stored alarm information for the addressed antenna and then return a procedure response message. Table 6.7.7.4: Return codes for Antenna Clear Active Alarms OK FAIL Comment FormatError Busy WorkingSoftwareMissing UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
6.7.8 Antenna Get Alarm Status
Table 6.7.8.1: Elementary procedure Antenna Get Alarm Status Name: AntennaGetAlarmStatus Code: 0x87 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.8.2: Initiating message parameters and format for Antenna Get Alarm Status Number Length Type Description 1 1 octet Unsigned integer Antenna number Table 6.7.8.3: Response message parameters and format for Antenna Get Alarm Status Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK i + 2 1 octet AlarmCode Active alarm number i i = 1 ... N Description: On receipt of the initiating message the secondary device shall report the alarm codes of the active alarms for the addressed antenna. Table 6.7.8.4: Return codes for Antenna Get Alarm Status OK FAIL Comment All return codes marked as used for alarms in Annex A FormatError WorkingSoftwareMissing UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
6.7.9 Antenna Get Number Of Antennas
Table 6.7.9.1: Elementary procedure Antenna Get Number Of Antennas Name: AntennaGetNumberOfAntennas Code: 0x88 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.9.2: Initiating message parameters and format for Antenna Get Number Of Antennas Number Length Type Description None 0 octets None No data carried Table 6.7.9.3: Response message parameters and format for Antenna Get Number Of Antennas Number Length Type Description 1 1 octet ReturnCode Return code OK 2 1 octet Unsigned integer Number of antennas Description: On receipt of the initiating message the secondary device shall return the number of antennas it controls. Table 6.7.9.4: Return codes for Antenna Get Number Of Antennas OK FAIL Comment FormatError WorkingSoftwareMissing UnsupportedProcedure
1de16545e4a78484b5596a06529f4503
25.463
6.7.10 Antenna Send Configuration Data
Table 6.7.10.1: Elementary procedure Antenna Send Configuration Data Name: AntennaSendConfigurationData Code: 0x89 Issued by: Primary device Procedure class: 1 DownloadMode state: No Power mode: Low Table 6.7.10.2: Initiating message parameters and format for Antenna Send Configuration Data Number Length Type Description 1 1 octet Unsigned Integer Antenna number 2 Less than, or equal to MaxDataReceiveLength minus 1 Vendor specific Configuration data Table 6.7.10.3: Response message parameters and format for Antenna Send Configuration Data Number Length Type Description 1 1 octet Unsigned integer Antenna number 2 1 octet ReturnCode Return code OK Description: On receipt of the initiating message the secondary device shall store the provided vendor and antenna specific configuration data for the relationship between the movement of the drive system and the beam tilt position of the addressed antenna. If the configuration data exceeds MaxDataReceiveLength minus 1, the data shall be split into a number of MaxDataReceiveLength minus 1 segments and one final segment with whatever is left. The primary device transmits the segments in order. The layer 2 sequence numbers guarantee that no segment will be lost or received out of order. Table 6.7.10.4: Return codes for Antenna Send Configuration Data OK FAIL Comment FormatError Busy HardwareError WorkingSoftwareMissing ChecksumError InvalidFileContent UnsupportedProcedure If the addressed antenna is not existing, FormatError is returned.
1de16545e4a78484b5596a06529f4503
25.463
7 Unknown elementary procedures
Void. Annex A (normative): Return codes for secondary devices Table A.1: Return Codes for Secondary Devices Code Meaning Alarm DownloadMode state 0x00 OK Normal response X 0x02 Motor Jam Motor cannot move X 0x03 ActuatorJam Actuator jam has been detected. No movement of the actuator, but movement of the motor was detected X 0x05 Busy The device is busy and cannot respond until an ongoing activity is completed 0x06 ChecksumError Checksum incorrect for otherwise valid data.. 0x0B FAIL Abnormal response. Indicates that a procedure has not been executed successfully X 0x0E NotCalibrated The device has not completed a calibration operation, or calibration has been lost X 0x0F NotConfigured Actuator configuration data is missing X 0x11 HardwareError Any hardware error which cannot be classified. May not be reported as an alarm until the fault is likely to be persistent X X 0x13 OutOfRange A parameter given by an operator (e.g. tilt value or memory offset) is out of range 0x19 UnknownProcedure Received procedure code is not defined X 0x1D ReadOnly Invalid device data parameter usage X 0x1E UnknownParameter Specified parameter is not supported for the used procedure X 0x21 WorkingSoftwareMissing The unit is inDownloadMode state. Returned upon unsupported procedure when in DownloadMode state X 0x22 InvalidFileContent The data being downloaded is detected to be of wrong format or size X 0x24 FormatError Procedure message is inconsistent or if an addressed field or antenna is invalid or the data parameter field length is inconsistent with the corresponding field length parameter X 0x25 UnsupportedProcedure The procedure is optional and not supported or the procedure does not apply to this device type 0x26 InvalidProcedureSequence Procedure sequence as described in annex C is expected but not experienced by the secondary device 0x27 ActuatorInterference An actuator movement outside the control of the RET unit has been detected. Probable cause is manual interference X Annex B (normative): Assigned fields for additional data The following standard fields have no operational impact and are used by the procedures SetDeviceData, GetDeviceData, AntennaSetDeviceData and AntennaGetDeviceData. Little endian order is used for storage of multiple-octet numbers. Where ASCII variables are shorter than the assigned field lengths the characters are right aligned and leading blanks are filled with null characters (0x00). Table B.1: Assigned fields for additional data Field No. Length (octets) Format Description 0x01 15 ASCII Antenna model number 0x02 17 ASCII Antenna serial number 0x03 2 16-bit unsigned Antenna operating band(s): see below 0x04 8 4 x 16-bit unsigned Beamwidth for each operating band in band order (deg), beginning with lowest band. The lowest band is transmitted within the first 16-bit value. (unused values are assigned to 0x0000) (example: width for band I, width for band III) 0x05 4 4 x 8-bit unsigned Gain [dBi] for each operating band in band order , expressed in gain value times 10 , beginning with the lowest band. The lowest band is transmitted within the first 8-bit value. (unused values are assigned to 0x00) (example: gain for band I, gain for band III) 0x06 2 16-bit signed Maximum supported electrical tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1 0x07 2 16-bit signed Minimum supported electrical tilt tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1 0x21 6 ASCII Installation date 0x22 5 ASCII Installer's ID 0x23 32 ASCII Base station ID 0x24 32 ASCII Sector ID 0x25 2 16-bit unsigned Antenna bearing [degree], in the range of 0 – 359,9 degree, expressed as bearing value times 10 0x26 2 16-bit signed Installed mechanical tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1 Table B.2: Coding for operating bands in field 0x03 Bit no 15…10 9 8 7 6 5 4 3 2 1 0 Operating band Spare X IX VIII VII I II III IV V VI The operating bands are defined in subclause 4.3.7 in [4]. Bits are numbered from 0 to 15, bit no 0 set=1 represents the value 0x0001. Bit set=1 represents operating band is supported. Bit set=0 represents operating band is not supported. Spare bits shall be set=0. Unused Beamwidth and Gain octets shall be set to 0x0000. Examples of operating bands: 0000 0000 0001 0000 = Operating band II 0000 0000 0011 1000 = Operating band I, II and III Annex C (normative): Procedure sequence for download of software to a secondary device Figure C.1: Procedure sequence for Software Download The erasure of the secondary device application software shall not be done before the reception of the Download Application message. The data content of the Download Application message is implementation specific but it is recommended to support an application software validity feature that shall minimise the risk of downloading faulty or invalid application software. Annex D (informative): Overview of elementary procedures Table D.1: Elementary Procedures and Procedure Codes Elementary Procedure Procedure Code Issued by DownloadMode state Common Procedure Set (Reserved) 0x01 Reset Software 0x03 primary device yes Get Alarm Status 0x04 primary device no Get Information 0x05 primary device yes Clear Active Alarms 0x06 primary device no Read User Data 0x10 primary device no Write User Data 0x11 primary device no Alarm Subscribe 0x12 primary device no Self Test 0x0A primary device no Download Start 0x40 primary device yes Download Application 0x41 primary device yes Download End 0x42 primary device yes Vendor Specific Procedure 0x90 primary device Vendor specific Single-Antenna Procedure Set Set Device Data 0x0E primary device no Get Device Data 0x0F primary device no Calibrate 0x31 primary device no Send Configuration Data 0x32 primary device no Set Tilt 0x33 primary device no Get Tilt 0x34 primary device no Alarm Indication 0x07 secondary device no Multi-Antenna Procedure Set Antenna Calibrate 0x80 primary device no Antenna Send Configuration Data 0x89 primary device no Antenna Set Tilt 0x81 primary device no Antenna Get Tilt 0x82 primary device no Antenna Set Device Data 0x83 primary device no Antenna Get Device Data 0x84 primary device no Antenna Alarm Indication 0x85 secondary device no Antenna Clear Active Alarms 0x86 primary device no Antenna Get Alarm Status 0x87 primary device no Antenna Get Number of Antennas 0x88 primary device no NOTE: The notion "yes" in the DownloadMode state column indicates that the listed procedures are mandatory if the DownloadMode state can be entered by the secondary device. Annex E (informative): Change history Change history Date TSG # TSG Doc. CR Rev Subject/Comment Old New September 2004 TSG-RAN#25 RP-040346 _ _ presentation to TSG-RAN for information _ 1.0.0 September 2004 TSG-RAN#25 RP-040346 _ _ approved at TSG-RAN#25 and placed under change control 1.0.0 6.0.0 12/2004 26 RP-040445 1 2 Reduction of risk of accidentional erasure of Ret application SW 6.0.0 6.1.0 12/2004 26 RP-040445 2 - Clarification of allowed tilt operation during self test 6.0.0 6.1.0 12/2004 26 RP-040445 3 - State Model for RET device 6.0.0 6.1.0 12/2004 26 RP-040445 4 - Corrections and editorial changes to 25.463 according to RAN3#44 6.0.0 6.1.0 12/2004 26 RP-040445 5 1 Antenna Send Configuration Data procedure missing 6.0.0 6.1.0 12/2004 26 RP-040445 7 1 Introduction of Software Download State model 6.0.0 6.1.0 12/2004 26 RP-040445 8 3 Alarm handling clarification 6.0.0 6.1.0 12/2004 26 RP-040445 9 2 RET DC power consumption clarification 6.0.0 6.1.0 12/2004 26 RP-040445 10 2 Response message format clarification 6.0.0 6.1.0 12/2004 26 RP-040445 12 2 Return code clean-up and clarification 6.0.0 6.1.0 12/2004 26 RP-040445 15 2 Clarification on the intention of the elementary procedures ReadUserData and WriteUserData 6.0.0 6.1.0 12/2004 26 RP-040445 16 2 Maximum data payload size in elementary procedures 6.0.0 6.1.0 12/2004 26 RP-040445 17 - Definition of response time in the appication layer 6.0.0 6.1.0 12/2004 26 RP-040445 18 2 Redefinition of the Elementary Procedures GetDeviceData and SetDeviceData 6.0.0 6.1.0 03/2005 27 RP-050061 20 Wrong numbering in table 6.7.6.2 6.1.0 6.2.0 03/2005 27 RP-050061 23 1 Editorial Corrections to 25.463 after RAN3#45 6.1.0 6.2.0 03/2005 27 RP-050061 24 Minor Corrections to 25.463 after RAN3#45 6.1.0 6.2.0 03/2005 27 RP-050061 25 2 Clarification on antenna movement during Set Tilt 6.1.0 6.2.0 03/2005 27 RP-050061 26 1 Redefinition or the Software Reset procedure 6.1.0 6.2.0 06/2005 28 RP-050237 31 Antenna Set Device Data 6.2.0 6.3.0 06/2005 28 RP-050237 32 Editorial Corrections to 25.463 6.2.0 6.3.0 06/2005 28 RP-050237 35 Clarification of Tilt 6.2.0 6.3.0 06/2005 28 RP-050237 36 Definition of "empty string" 6.2.0 6.3.0 06/2005 28 RP-050237 37 Improvement of Annex B 6.2.0 6.3.0 06/2005 28 RP-050237 38 Vendor specific procedure 6.2.0 6.3.0 06/2005 28 RP-050237 39 2 Set Tilt Correction 6.2.0 6.3.0 06/2005 28 RP-050237 43 3 Parallel procedure handling 6.2.0 6.3.0 06/2005 28 RP-050237 48 Forward and backward compatibility clarification 6.2.0 6.3.0 06/2005 28 RP-050226 34 Introduction of UMTS 2.6 GHz frequency band definition 6.3.0 7.0.0 09/2005 29 RP-050439 54 Missing definitions for Vendor Specific EP 7.0.0 7.1.0 12/2005 30 RP-050703 55 Introduction of UMTS 900 7.1.0 7.2.0 12/2005 30 RP-050704 56 Introduction of UMTS 1700 7.1.0 7.2.0 06/2006 32 RP-060286 58 1 Return codes in response message 7.2.0 7.3.0 12/2006 34 RP-060704 59 Introduction of Band X (Extended UMTS 1.7/2.1 GHz) in 25.463 7.3.0 7.4.0 03/2007 35 RP-070055 61 1 Disregarded message length (paragraph 6.2.2) 7.4.0 7.5.0 03/2007 35 RP-070055 63 1 Correction of MaxDataReceiveLength 7.4.0 7.5.0 03/2007 35 RP-070055 65 3 Correction of procedure message interpretation 7.4.0 7.5.0 03/2007 35 RP-070055 67 1 Correction of additional data resolution description (Annex B) 7.4.0 7.5.0 03/2007 35 RP-070055 69 1 Definition of antenna bearing resolution (Annex B) 7.4.0 7.5.0 03/2007 35 RP-070055 71 1 Clarification of additional data beamwidth description 7.4.0 7.5.0 NOTE: Contents of the present TS is transferred to 3GPP TS 25.466, and 25.463 was closed at RAN#35. No further maintenance will be performed on the present document.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
1 Scope
Editor's note: clean up the scope in each part. The present document is one of a multi-part TS, and contains objectives, requirements and test cases that are specific to the Lawful Interception elements of a 3GPP network: Administration Function (ADMF), Point of Interception (POI), Triggering Function (TF), Location Acquisition Requesting Function (LARF), Mediation and Delivery Function (MDF). It refers to the TS 33.117 Catalogue of general security assurance requirements [2] and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique to the Lawful Interception system. The present document covers SCAS tests for NF-embedded LI functions.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
2 References
The following documents contain provisions which, through reference in this text, constitute provisions of the present document. - References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific. - For a specific reference, subsequent revisions do not apply. - For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document. [1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications". [2] 3GPP TS 33.117: "Catalogue of general security assurance requirements". [3] 3GPP TS 33.916: "Security Assurance Methodology (SECAM) for 3GPP network products". [4] 3GPP TS 33.926: "Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes". [5] 3GPP TS 33.126: "Lawful Interception Requirements". [6] 3GPP TS 33.127: "Lawful Interception (LI) architecture and functions". [7] 3GPP TS 33.128: "Protocol and procedures for Lawful Interception (LI); Stage 3". [8] Editor's Note: TODO: NESAS "How to" [X] Editor's Note: TODO: Add TS 103-221-1 … [x] <doctype> <#>[ ([up to and including]{yyyy[-mm]|V<a[.b[.c]]>}[onwards])]: "<Title>". It is preferred that the reference to TR 21.905 be the first in the list.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
3 Definitions of terms, symbols and abbreviations
This clause and its three (sub) clauses are mandatory. The contents shall be shown as "void" if the TS/TR does not define any terms, symbols, or abbreviations.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
3.1 Terms
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1]. Definition format (Normal) <defined term>: <definition>. example: text used to clarify abstract rules by applying them literally.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
3.2 Symbols
For the purposes of the present document, the following symbols apply: Symbol format (EW) <symbol> <Explanation>
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
3.3 Abbreviations
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1]. Abbreviation format (EW) <ABBREVIATION> <Expansion>
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
4 Overview
4.1 Approach This TS was developed based on the guidance and methodology described in 3GPP TR 33.916 "Security Assurance Methodology (SECAM) for 3GPP network products" [3]. 3GPP has organized SCAS documents by publishing one TS per architectural network element. In contrast, we take a different approach in the LI space and collect all LI SCAS in the present TS.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
5 Prerequisites
5.1 Network administration There are multiple privilege levels in the network. At a minimum, there are at least two: • Lawful Interception privileged • Non-LI privileged Editor's Note: here are at least three categories: "root," "day-to-day operations," LI Deployments in the field may split access more granularly, but this is the minimum required to perform tests in the present specification. 5.2 Prerequisite Tests All test described in TS 33.117 apply to the present document. Clause 6 of the present document contains variances or extensions particular to the Lawful Interception system. 6 Variances and Extensions Editor’s Note: This will be the landing spot of the separate tracking spreadsheet.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
6.1.1 System Hardening
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
6.1.2 Authentication and Access Control
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
6.1.3 POI Implementation
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
6.1.4 Transport/API Security
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
6.1.5 Virtualisation
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
7 Additional NF-Embedded-LI SCAS
7.1 Introduction The present clause contains requirements and test cases that pertain to NF-Embedded LI elements, such as POIs, TFs. 7.2 Requirements The following TS 33.126 requirements are tested in the present document: TS 33.126 R6.6-30: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. Editor's Note: This section will contain a full listing of requirements covered in this document. 7.3 Test cases 7.3.1 Baseline 7.3.1.1 Unauthorized detection of target under LI, log leak method Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 Threat reference: T-LOG-01 Test case: Test Name: TC_LI_EMBEDDED_LOG_LEAK Purpose: Ensure that general privileged administrators cannot detect whether an a-priori chosen subscriber is under LI. Procedure and execution steps: Pre-Condition: 1. A minimal network and two user agents are available, sufficient to start a communication session between two parties. 2. An LI system is available in the above network, sufficient to provision a target for LI. 3. On the LI system, the tester has an account prepared from which a target can be provisioned. 4. On an NF that contains a POI or a TF, the tester has prepared an account with sufficient privileges to access logs. Execution Steps Execute the following steps: 1. The tester notes the start time of the test, to be used later to pull the log that corresponds to the test period. 2. The tester starts a communication session from any user account and records any identifiers pertaining to this account. 3. The tester stops the communication session. 4. The tester pulls the logs from the NF for the period of the communication session. 5. The tester sets this log aside for later comparison with another. 6. The tester logs into the LI privileged account on the ADMF and sets up the same user account used in step 2 as an LI target. 7. The tester performs the same previous steps (1 through 5) from the LI target account. 8. The tester diffs the two logs. Expected Results: The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. Expected format of evidence: The tester submits a human-readable diff and a plain-language conclusion whether the general privileged admin can use this log leak method to ascertain that LI is occurring. 7.3.1.2 Unauthorized detection of target under LI, configuration file method Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 Threat reference: T-CONFIG-02 Test case: Test Name: TC_LI_EMBEDDED_CONFIG_DIFF_ANALYSIS Purpose: Ensure that general privileged administrators (e.g., config reviewers, system auditors) cannot detect that interception is taking place by analysing configuration files before and after LI provisioning. Editor's note: configuration aspects other than configuration files are not covered by this test case. Procedure and execution steps: Pre-Condition: 1. The tester has administrative access to a network element that contains a POI that supports configuration snapshots. 2. An LI system is available in the network, sufficient to provision a target for LI. 3. On the LI system, the tester has an account prepared from which a target can be provisioned. 4. The configuration mechanism is file-based or produces structured output (e.g., XML, YAML, JSON). 5. The system supports exporting these configurations. Execution Steps Execute the following steps: 1. The tester logs in using the general privileged account and exports a complete configuration snapshot. 2. The snapshot is timestamped and saved securely for later comparison. 3. The tester logs in using the LI privileged account and provisions an interception target. 4. The tester repeats the configuration export from the general privileged account. 5. The tester performs a diff on the two snapshots. 6. The tester inspects the diff for any structural or content-level indication that LI has been configured, including: a. new service entries b. altered service entries c. any difference that could indicate LI activity Expected Results: The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. Expected format of evidence: The tester submits a human-readable diff and a plain language conclusion on whether any observed changes in config can be used to infer the presence of an LI target. 7.3.1.3 Unauthorized detection of LI, CPU utilization side-channel attack method one Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 Threat reference: T-RES-CPU-03 Test case: Test Name: TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_CPU_METHOD_ONE Purpose: Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI. Procedure and execution steps: Pre-Condition: 1. A minimal network and two user agents are available, sufficient to start a communication session between two parties. 2. An LI system is available in the above network, sufficient to provision a target for LI. 3. On the LI system, the tester has an account prepared from which a target can be provisioned. 4. On an NF that contains a POI or a TF, the tester has prepared appropriate CPU utilization monitoring tools. The availability of these depends on the platform. The following are offered as non-exhaustive examples: top, htop, mpstat, vmstat, iostat -c for physical hosts, or top, virsh domstats / virt-top, cgroups/systemd-cgtop, docker stats for virtual deployments. Execution Steps Execute the following steps: 1. The tester measures the CPU utilization on the host, notes the baseline. 2. The tester starts a new communication session as a regular network user, using any network user account. 3. The tester takes a new measurement of the CPU utilization, records the measurement, and calculates the delta between the baseline from step 1 and this new value. It is essential that these two measurements be as close in time as possible. An automated (scripted) process should be used to take multiple samples. 4. The tester inserts a new target into the LI stack, provisioning the interception for full content. 5. The tester repeats the above measurements steps. Expected Results: The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. Expected format of evidence: The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
7.3.1.4 Unauthorized detection of LI, CPU utilization side-channel attack method two
Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 Threat reference: T-RES-CPU-04 Test case: Test Name: LI_EMBEDDED_UNAUTHORISED_INTERCEPTION_DETECTION_CPU_METHOD_TWO Purpose: Ensure that non-LI authorized network administrators cannot detect whether the LI function in an NF is performing interception. Procedure and execution steps: Pre-Condition: 1. A minimal network and two user agents are available, sufficient to start a voice communication session between two parties. 2. An LI system is available in the above network, sufficient to provision a target for LI. 3. On the LI system, the tester has an account prepared from which a target can be provisioned. 4. On an NF that contains a POI or a TF, the tester has prepared appropriate CPU utilization monitoring tools. The availability of these depends on the platform. The following are offered as non-exhaustive examples: top, htop, mpstat, vmstat, iostat -c for physical hosts, or top, virsh domstats / virt-top, cgroups/systemd-cgtop, docker stats for virtual deployments. Execution Steps Execute the following steps: 1. The tester logs into the system from both the non-LI-authorized account and the LI-authorized account. 2. The tester measures the CPU utilization on the host, notes the baseline. 3. The tester conducts a call using a test device configured as a regular network user, and: a. Continuously monitors the CPU utilization b. Records the raw CPU utilization measurements at the following steps of the call: i. STEP 1 (Initial INVITE is seen at the NF) ii. STEP 2 (call is answered) iii. STEP 3 (BYE is seen at the NF) iv. STEP 4 (Session is closed) 4. For each measurement in step 3b, the tester calculates the delta between the baseline and the measured CPU utilization. 5. The tester repeats steps 2-4 five times and calculates the average CPU usage at each step. 6. The tester (in LI-authorized mode) activates a new task to intercept the test device including both IRI and CC with no service scoping. 7. The tester (in non-LI-authorized mode) repeats steps 2-5. 8. The tester compares the average calculated in step 5 with the average calculated in step 7. Expected Results: The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. Expected format of evidence: The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively, along with a plain-language conclusion whether the non-LI-authorised admin can use the CPU utilization side channel to detect LI. 7.3.1.5 Unauthorized detection of target under LI, bandwidth utilization side-channel attack method Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01 Attacker reference: AT-INTERNAL-01 Threat reference: T-RES-NET-05 Test case: Test Name: TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_BANDWIDTH_METHOD Purpose: Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI. Procedure and execution steps: Pre-Condition: 1. A minimal network and two user agents are available, sufficient to start a voice communication session between two parties. 2. An LI system is available in the above network, sufficient to provision a target for LI. 3. On the LI system, the tester has an account prepared from which a target can be provisioned. 4. On an NF that contains a POI or a TF, the tester has prepared appropriate network bandwidth probes on all the network interfaces on the NF. The availability of these depends on the platform. The following are offered as non-exhaustive examples: iftop, nload, ip -s link, bmon, etc. in physical hosts, or ethtool -S <iface>, ovs-vsctl or ovs-ofctl for Open vSwitch, libvirt / virsh domifstat for KVM/QEMU VMs, cAdvisor / Prometheus and Grafana for Docker/Kubernetes virtual deployments Execution Steps Execute the following steps: 1. The tester measures the network interface utilization on the host, notes the baseline. 2. The tester starts a new communication session as a regular network user, using any network user account. 3. The tester takes a new measurement of the network interface utilization, records the measurement, and calculates the delta between the baseline from step 1 and this new value. It is essential that these two measurements be as close in time as possible. An automated (scripted) process should be used to take five samples. 4. The tester inserts a new target into the LI stack, provisioning the interception for full content. 5. The tester repeats the above measurements steps. Expected Results: The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI. Expected format of evidence: The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity. 7.3.1.6 Detection of LI via Timing Anomalies Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 Threat reference: T-TIMING-06 Test case: Test Name: TC_LI_EMBEDDED _TIMING_SIGNATURE_LEAK Purpose: Ensure that LI activity cannot be detected by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic. Procedure and execution steps: Pre-Condition: 1. The tester has access to all network interfaces on the network function that contains the POI. 2. The tester has LI privileges and can activate LI on the same network function. 3. The tester has access to traffic timing statistics or packet captures from the POI-to-MDF interface and can also stimulate LI traffic. 4. An LI system is ready to provision IRI and CC. Execution Steps Execute the following steps: 1. Tester provisions a high-content communication session (e.g., 60 seconds of voice or data) between two non-LI involved endpoints, one of which is on the same network function as the POI. 2. The tester captures packet timing and burst intervals over a 5-minute window under no LI activity as a baseline. 3. The tester provisions an interception target on the POI in the NF under test. 4. The tester starts a communication session between the target and another party, that will cause the POI to capture and deliver LI product. 5. The tester repeats the measurements under LI-active conditions. 6. The tester applies statistical analysis (e.g., inter-packet arrival histograms, burst length variability) to both captures. Expected Results: It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active. Expected format of evidence: A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies. Editor's Note: The group has discussed tests up to here (specifically, 7, 8, 9 haven't been discussed - but 10 and further have.) 7.3.1.7 Detection of MDF to LEMF LI Product Flow via Timing Anomalies Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 Threat reference: T-TIMING-07 Test case: Test Name: TC_LI_EMBEDDED_MDF_LEMF_LI_PRODUCT_TIMING_SIGNATURE_LEAK Purpose: Ensure that internal administrators with access to MDF/LEMF transport segments cannot detect the presence of LI activity by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic. Procedure and execution steps: Pre-Condition: 1. The MDF and LEMF are logically separate components on the network. 2. The LI product transport between MDF and LEMF is observable at a transport layer (e.g., netflow, mirrored span port). 3. The tester has access to traffic timing statistics or packet captures from the MDF-to-LEMF interface. 4. An LI system is ready to provision IRI and CC. Execution Steps Execute the following steps: 1. The tester captures packet timing and burst intervals between MDF and LEMF over a 5-minute window under no LI activity. 2. The tester provisions a new target for full IRI and CC. 3. The tester repeats the traffic capture under LI-active conditions. 4. The tester applies statistical analysis (e.g., inter-packet arrival histograms, burst length variability) to both captures. Expected Results: It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active. Expected format of evidence: A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies. 7.3.1.8 Interruption of POI-MDF Link Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 Threat reference: T-INTERRUPTION-07 Test case: Test Name: TC_LI_EMBEDDED_POI-MDF_LINK_FAULT_CONDITIONS Purpose: To ensure that the LI system does not exhibit differential behaviour during delivery path faults between POI and MDF, such that an internal administrator without LI privilege cannot distinguish whether LI is active based on service degradation patterns. Procedure and execution steps: Pre-Condition: 1. A test call generator and an LI system are available to initiate full CC/IRI on a test UE. 2. The network segment between POI and MDF is under controlled lab conditions, capable of simulating link failure (e.g., disabling an interface, simulating packet drop via tc or iptables). 3. Logging mechanisms on POI/MDF are available for correlation. Execution Steps Execute the following steps: 1. Tester provisions a high-content communication session (e.g., 60 seconds of voice or data) between two non-LI involved endpoints, one of which is on the same network function as the POI. 2. At second 30 of the call, tester introduces an artificial failure on the LI product delivery path (e.g., disables interface, blocks TCP/UDP port). 3. Tester restores the path at second 45. 4. Tester monitors the communication from step 1 for: a. Gaps b. Jitter or misaligned timestamps c. Recovery mechanisms triggered (e.g., buffering, retransmit) d. Log entries on the NF 5. Tester provisions interception of a high-content session (e.g., 60 seconds, voice or data) on a separate target (not the same as the endpoint in step 1) on the same logical node. 6. Tester performs the same procedure from steps 2-4. 7. Tester compares the behaviour of the function between the two cases. Expected Results: The NF is expected to behave in the same way in both cases (LI active and not active). Expected format of evidence: Packet trace timestamps, POI/MDF log excerpts, and human-readable summary of whether the system degraded gracefully or failed differently in the two cases. 7.3.1.9 Unauthorized detection of target under LI, TLS session count method Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-LI-PRODUCT-06 Attacker reference: AT-INTERNAL-01 Threat reference: T-SESSION-COUNT-09 Test case: Test Name: TC_LI_EMBEDDED_SESSION_COUNT_ANALYSIS Purpose: Ensure that lawful interception provisioning does not create observable differences in TLS session counts or handshake patterns that could be used to infer LI activity. Procedure and execution steps: Pre-Condition: 1. The network or function uses TLS for control or media transport. 2. TLS session logs, counters, or telemetry are accessible to general privileged roles. 3. LI infrastructure is in place and uses secure links. Execution Steps Execute the following steps: 1. The tester initiates standard traffic sessions and records the number of TLS sessions/handshakes initiated per session from the general privileged account. 2. The tester provisions an LI target and repeats the session. 3. The tester compares the TLS session metrics between the surveilled and non-surveilled flows. 4. The tester analyses whether additional TLS handshakes (e.g., toward MDF) correlate with the surveilled session. 5. The tester checks whether handshake timing, mutual TLS behaviour, or cert exchange patterns leak interception status. Expected Results: It is expected that the TLS metrics are be indistinguishable between surveilled and non-surveilled flows. LI MDF must not be visible as secondary TLS endpoints or cause measurable handshake side effects. Expected format of evidence: The tester supplies a TLS session count comparison and an interpretation of whether a general privileged observer could detect LI activity from the metrics. Editor's note: for the next message (TLS) cast a wider net: 1. reverse direction 2. X2/3 3. send X1 commands on an X2/3 (or other SBI) interface
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
7.3.1.10 LI_X1 HTTP connection is disallowed
Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01, Attacker reference: AT-INTERNAL-01, Threat reference: T-CONFIG-02, T-INTERFACE-SEC-10 Test case: Test Name: TC_LI_EMBEDDED_X1_HTTP_DISALLOWED Purpose: To verify that non secured X1 connection attempts fail. Procedure and execution steps: Pre-Condition: Execution Steps Execute the following steps: 1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP. Expected Results: The HTTP transaction fails. Expected format of evidence: Any suitable evidence (e.g. output of netcat or packet capture), or plain language description of the failure.
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
7.3.1.11 LI_X1 is protected by TLS
Editor's Note: Is there a way to verify the layer 3/4 handshake only, without using any meaningful application layer message as a first step - using a simple testing harness/simulator, that doesn't necessarily have any layer 7/app layer knowledge. Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01, Attacker reference: AT-INTERNAL-01, Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers) Editor's Note: Mutually authenticated TLS Threat reference: T-CONFIG-02 Editor's Note: this test is relevant whether this is configurable or hard-coded - T-INTERFACE-SEC-10 Test case: Test Name: TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS Purpose: To verify that TLS is used to protect LI_X1. Procedure and execution steps: Pre-Condition: 1. The POI under test shall expose an ETSI TS 103 221-1 LI_X1 interface 2. The tester shall have the capability to connect to LI_X1 over HTTPS (including relevant certificates). Execution Steps Execute the following steps: 1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTPS and supplying valid credentials. 2. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP. Expected Results: The HTTPS transaction from execution step 1 succeeds. The HTTP transaction from execution step 2 does not succeed (fails at the transport layer). Expected format of evidence: Any suitable evidence (e.g. output of netcat or packet capture).
b4c51a57e104b0092e2dd0e80dd56a84
33.129-2
7.3.1.12 LI_X1 is protected by TLS - failure for other reasons
Editor's Note: Is there a way to verify the layer 3/4 handshake only, without using any meaningful application layer message as a first step - using a simple testing harness/simulator, that doesn't necessarily have any layer 7/app layer knowledge. Requirement Name: Undetectability by Non-Authorized Parties. Requirement Reference: TS 33.126 R6.6-30. Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place. References: Asset reference: AS-TARGET-01, Attacker reference: AT-INTERNAL-01, Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers) Editor's Note: Mutually authenticated TLS Threat reference: T-CONFIG-02 Editor's Note: this test is relevant whether this is configurable or hard-coded - T-INTERFACE-SEC-10 Test case: Test Name: TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS Purpose: The tester shall prove that using anything else but a valid certificate will fail. Editor's Note: write separate tests for the following: e.g.: 1. expired certs 2. revoked certs 3. cert IDs don’t match the LI_X1 IDs 4. LI_X1 ID (or other parameters) missing altogether 5. NEID in LI_X1 doesn't match the NEID of the POI under test 6. valid cert that hangs under the wrong root of trust 7. partial vs full cert chain verification by the POI (root of trust is valid, but the sub-CA is wrong) Procedure and execution steps: Pre-Condition: 1. 2. 3. The POI under test shall expose an ETSI TS 103 221-1 LI_X1 interface 4. The tester shall have the capability to connect to LI_X1 over HTTPS (including relevant certificates). Execution Steps Execute the following steps: 1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTPS and supplying valid credentials. 2. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP. Expected Results: The HTTPS transaction from execution step 1 succeeds. The HTTP transaction from execution step 2 does not succeed (fails at the transport layer). Expected format of evidence: Any suitable evidence (e.g. output of netcat or packet capture). Editor's note: Write MOAT: The tester shall verify that ALL interfaces are not vulnerable to the top (20?) common OWASP vulnerabilities / CBEs 7.3.2 Additional Tests Editor's Note: This clause will contain tests that are not directly traceable to TS 33.126 requirements 7.3.2.1 COMMON New Requirement Test Name Annex <A> (normative): <Normative annex for a Technical Specification> Start each annex on a new page. Annexes are labelled A, B, C, etc. and designated either "normative" or "informative" depending on their content. Normative annexes only to appear in Technical Specifications. Use style "Heading 8". Annex <B> (informative): <Informative annex for a Technical Specification> Informative annexes may appear in both Technical Specifications and Technical Reports. Use style "Heading 8" for use in TSs. Informative annexes shall not contain requirements for the implementation of the Technical Specification. B.1 Heading levels in an annex Heading levels within an annex are used as in the main document, but for Heading level selection, the "A.", "B.", etc. are ignored. e.g. B.1.2 is formatted using Heading 2 style. Annex <C>: <Informative annex title for a Technical Report> Informative annexes in Technical Reports do not use "(informative") in the title, since all annexes in TRs are informative. Use style "Heading 9" in TRs. Annex <D> (informative): Bibliography Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs. The Bibliography is optional. If it exists, it shall follow the last technical annex in the document. The following material, though not specifically referenced in the body of the present document (or not publicly available), gives supporting information. Bibliography format <Publication>: "<Title>". Annex <E> (informative): Index Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs. The Index is optional. If it exists, it shall immediately precede the Changes history annex. Generate the index using MS Word's index field feature. Annex <F> (informative): Change history Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs. This is the last annex for TS/TSs which details the change history using the following table. This table is to be used for recording progress during the WG drafting process till TSG approval of this TS/TR. For TRs under change control, use one line per approved Change Request Date: use format YYYY-MM CR: four digits, leading zeros as necessary Rev: blank, or number (max two digits) Cat: use one of the letters A, B, C, D, F Subject/Comment: for TSs under change control, include full text of the subject field of the Change Request cover New vers: use format [n]n.[n]n.[n]n Change history Date Meeting TDoc CR Rev Cat Subject/Comment New version 2025-07 SA3#98-LI s3i250358 - - - First introduction of baseline to the group. 0.0.10 Change history of this template: 2001-07 Copyright date changed to 2001; space character added before TTC in copyright notification; space character before first reference deleted. 1.3.3 2002-01 Copyright date changed to 2002. 1.3.4 2002-07 Extra Releases added to title area. 1.3.5 2002-12 "TM" added to 3GPP logo. 1.3.6 2003-02 Copyright date changed to 2003. 1.3.7 2003-12 Copyright date changed to 2004. Chinese OP changed from CWTS to CCSA 14.0 2004-04 North American OP changed from T1 to ATIS 1.5.0 2005-11 Stock text of clause 3 includes reference to 21.905. 1.6.0 2005-11 Caters for new TSG structure. Minor corrections. 1.6.1 2006-01 Revision marks removed. 1.6.2 2008-11 LTE logo line added, © date changed to 2008, guidance on keywords modified; acknowledgement of trade marks; sundry editorial corrections and cosmetic improvements 1.7.0 2010-02 3GPP logo changed for cleaner version, with tag line; LTE-Advanced logo line added; © date changed to 2010; editorial change to cover page footnote text; trade marks acknowledgement text modified; additional Releases added on cover page; proforma copyright release text block modified 1.8.0 2010-02 Smaller 3GPP logo file used. 1.8.1 2010-07 Guidance note concerning use of LTE-Advanced logo added. 1.8.2 2011-04-01 Guidance of use of logos on cover page modified; copyright year modified. 1.8.3 2013-05-15 Changed File Properties to MCC macro default. Removed R99, added Rel-12/13. Modified Copyright year. Guidance on annex X Change history. 1.8.4 2014-10-27 Updated Release selection on cover. In clause 3, added "3GPP" to TR 21.905. 1.8.5 2015-01-06 New Organizational Partner TSDSI added to copyright block. Old Releases removed. 1.9.0 2015-12-03 Provision for LTE Advanced Pro logo Update copyright year to 2016 1.10.0 2016-03-08 Standarization of the layout of the Change History table in the last annex.(Unreleased) 1.11.0 2016-06-15 Minor adjustment to Change History table heading 1.11.1 2017-03-13 Adds option for 5G logo on cover 1.12.0 2017-05-03 Smaller 5G logo to reduce file size 1.12.1 2019-02-25 Replacement of frames on cover pages by in-line text. Clarification of help text on when to use 5G logo. Removal of defunct keywords frame on page 2. Add Rel-16, Rel-17 options, eliminated earlier, frozen, Releases (cover page, below title) Corrections to some guidance text, addition of guidance text concerning automatic page headers under Word 2016 ff. Use of modal auxiliary verbs added to Foreword. More explicit guidance on Bibliography and Index annexes. Converted to .docx format. 1.13.0 2019-09-12 Cover page table outline shown dotted for ease of logo selection. (Author to hide outline after logo selection.) User now needs to delete whole table rows instead of individual cells, which proved to be tricky. Change of style for "notes" in the Foreword to normal paragraphs. Insertion of new bookmarks, correction of location of existing bookmarks. (To improve navigation.) Improvements to guidance text. 1.13.1 2021-06-18 Provision for 5G Advanced logo Update copyright year to 2021 Additional guidance on the use of Heading 8/9 in annexes C, D and X. 1.14.0 2022-04-01 Correction of table formatting Update copyright year to 2022 1.15.0 2023-03-14 Updated copyright year to 2023 Updated URLs from HTTP to HTTPS Updated FTP link to HTTP counterpart Fixed numbering of annexes 1.16.0 2024-03-19 Updated copyright year to 2024 1.17.0 2024-09-06 Adds option for 6G logo on the cover page 1.18.0 2024-10-15 Correction of table formatting to ease outline hiding after logo selection. 1.18.1 2024-10-18 Addition/removal of spaces in Release indications and update of Release in the example within the body. Unlock "update field" for ToC 1.19.0