hash stringlengths 32 32 | doc_id stringlengths 5 12 | section stringlengths 5 1.47k | content stringlengths 0 6.67M |
|---|---|---|---|
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.1.4 Solution 3: O&M-based distribution of (P)SI
| |
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.1.4.1 General description
| This solution is based on the operator using O&M to update the stored SI/PSI in the neighbouring GERAN cell list of the RNC every time it is modified by O&M in the GERAN cell. This is depicted in figure 3.
1) On installation and initial configuration by O&M of the GERAN neighbouring cell lists in the (C)RNC, the GERAN SI/PSI is included in the information sent to the RNC.
2) The GERAN SI/PSI is transferred using existing RNSAP procedures over the Iur interface towards the SRNC when it requires it.
NOTE: It was discussed that if the NM System is not updated if the BSS changes its system parameters, there can be periods of time where the SI/PSI held in the NM System are out of date. This issue is FFS.
Figure 3: Signalling diagram of Solution 3 of GERAN SI/PSI Retrieval
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.1.4.2 Analysis of the solution
| Pros:
1) No direct signalling required between UTRAN and GERAN.
2) No impact on the SGSN.
Cons:
1) Maybe difficult to ensure that SI/PSI stored in UTRAN is always aligned with that in the GERAN cell.2) Extra impact on 3G NMS and R interface.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.1.5 Comparative analysis of the solutions
| The sub-clauses 6.1.2.2, 6.1.3.2 and 6.1.4.2 are summarised in Table 1.
Table 1: Comparative analysis of the proposed solutions.
Solution
Pros
Cons
1. (P)SI provided to the SRNC
• No additional Iur load generated.
• No additional Iur implementation required.
• Synchronised update of SI/PSI is possible using "on-modification" measurement reporting.
• Generally more SI/PSI stored in each RNC than in other solutions.
• Additional load on the SGSN due to signalling path of RIM procedures.
• Additional load on the BSS due to a potentially high number of measurement contexts being required (for each different SRNC).
2. (P)SI provided to the local RNC
• Generally less SI/PSI stored in each RNC than in other solutions.
• Synchronised update of SI/PSI is possible using "on-modification" measurement reporting.
• Impact on SGSN load is minimised.
• More Iur signalling than SRNC terminated solution.
• Additional load on the DRNC due to potentially high number of measurement contexts being created (for each different SRNC).
3. O&M distribution of (P)SI provided to
• No direct signalling required between UTRAN and GERAN.
• No impact on the SGSN.
• Maybe difficult to ensure that SI/PSI stored in UTRAN is always aligned with that in the GERAN cell.
• Extra impact on 3G NMS and R interface.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.2 UTRAN signalling procedures for NACC
| |
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.2.1 Iur signalling for GERAN SI/PSI transfer from the DRNC to the SRNC
| The transfer of SI/PSI over the Iur is relevant to solution 2, described in sub-clause 6.1.3. Two different solutions have been identified on the Iur interface for the transfer of (P)SI from the local DRNC to the SRNC.
Use the [RNSAP] RADIO LINK SETUP RESPONSE message.
- GERAN SI/PSI could be sent in the "GSM neighbouring cell information" IE for each of the GERAN neighbouring cells.
- It may be inefficient in terms of transmission load and delay increase due to the number of RADIO LINK SETUP RESPONSE messages containing the same information. In addition, there would be no way of knowing (without some kind of "GERAN cell id list" and "value tag" provision in the RADIO LINK Setup Request) which SI/PSI the SRNC already had and whether it was up-to-date.
- This is perhaps the most time critical of all RNSAP messages and the processing in the DRNC before sending this message should not be unduly complicated.
- This is related to Release 5 work on restricting neighbouring cell information on the Iur.
Use the [RNSAP] Information Exchange procedure.
- An Information Exchange procedure could be initiated from the SRNC towards the DRNC when the SRNC establishes its first radio link in the DRNS. The Report Characteristics would be set to "On-modification" (of GERAN SI/PSI messages).
- In Release 5, reporting is only allowed for a single cell.
- The transfer of GERAN SI/PSI information from the DRNC to the SRNC can be time critical i.e. the SRNC may wish to push the UE to GERAN almost immediately after RL establishment. Delays may occur in the SRNC acquiring the SI/PSI if multiple information reporting initiations, and multiple reports, are required.
NOTE: It needs to be analysed if the Information Exchange Object Type IE could contain a list of cells to enable a faster initial report and subsequent reports to the SRNC.
New RNSAP procedure.
- A new procedure could be initiated from the DRNC towards the SRNC after the SRNC establishes its first radio link in the DRNC.
- The DRNC already keeps a list of the GERAN neighbouring cells for each local UTRAN cell. In addition, the DRNC, as local RNC, also keeps the (P)SI of those GERAN cells.
- The local RNC would also be required to keep a list of other RNCs acting as SRNCs for UEs with radio links in local DRNC (i.e. DRNC) and whether they have an update copy of the (P)SI messages of the GERAN cells.
- This procedure would be initiated by the DRNC:
a) towards the SRNC of a UE when a new radio link is added/created to another UTRAN cells with new GERAN neighbouring cells for which the corresponding SRNC does not have the (P)SI;
b) towards one or more (S)RNCs when the local RNC receives an update from a GERAN BSS of the (P)SI for one or more GERAN cells.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.2.2 Use of RANAP or O&M for provision of GERAN SI/PSI to RNC
| The issue of whether to use O&M or whether to use RANAP signalling to inform the RNC of the GERAN SI/PSI is dependant on how often the GERAN SI/PSI would be changed, i.e. how often the operator optimises GERAN SI/PSI. If the O&M solution were chosen and if it is required to update the SI/PSI very frequently, there may be problems in synchronising the BSS/RNC provision of the GERAN SI/PSI between 2G and 3G O&M systems. This would be due to the fact that the operator would probably have to manually synchronise the carrying out of the respective procedures from their respective 2G/3G O&M systems.
GERAN SI/PSI information may evolve, which means that there may be a more dynamic change of this information. So in this case, O&M alignments would be more complex to organise.
6.2.3 Adaptation of GERAN RIM procedures for use across the Iu interface
6.2.3.1. General
In UMTS the information as to which BSC the target neighbouring GERAN cell belongs is not known at the RNC.
Whilst the present NACC RIM GERAN messages [2] can be used as a basis for inclusion into the relevant 3GPP/RAN3 specifications, the following areas for study are identified:
6.2.3.2. Message definition
A RANAP message similar to the GERAN "RAN INFORMATION REQUEST" message sent from the RNC should contain a source RNC-ID (instead of the source CGI as happens in GERAN), the destination (GERAN) CGI, plus a list of other (GERAN) neighbouring cells if whose (P)SI is requested.
The subsequent RAN INFORMATION message sent from the BSCBSS to SGSN would contain the source RNC-ID, in addition to the list of GERAN SI/PSI mapped to each target CGI.
Devising a RANAP message corresponding to the [GERAN] RAN INFORMATION message cannot be a direct correlation i.e. existing connectionless downlink RANAP messages do not include the RNC-ID, as the destination SCCP address is used to route the message on the Iu.
6.2.3.3. Format of RIM messages
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 6.2.3.3.1 General
| What form should the BSS <=> 3G SGSN response RIM messages take?
Three options are analysed in this sub-clause:
1. As per existing agreements for inter-RAT signalling, the host source system - when inter-RAT signalling - adapts to the target system and thus constructs an appropriate RANAP message.
2. The GERAN system continues using with its existing RIM procedures in both directions, – i.e. no adaptation of messages to target system and this means the GERAN RIM message is translated at the CN. (The procedures would not be fully transparent, since the 3G SGSN must "look into" the message and translate the GERAN RIM message into the appropriate RANAP RIM message).
3. The GERAN continues using its existing RIM procedures in both directions, i.e. no adaptation of messages to target system. The GERAN RIM message is routed through the CN and terminated at the UTRAN. The 3G SGSN would need to place the contents of the GTP message on the Gn interface into a RANAP message on the Iu interface, without interpreting its contents.
These alternatives are depicted in Figure 4.
Principle
BSS RNC
RNC BSS
1. Source adapts to target
2. RIM translated at CN
Translation at: a) 2G SGSN, b) 3G SGSN
3. RIM ends at RNC
Figure 4: Alternatives for coding of RIM messages.
6.2.3.3.2. Format of RIM messages on the Iu interface
There are two possible options for the format of the messages sent on the Iu interface:
1. What form should the 3G SGSN <=> RNC RIM messages take?
a) A new RIM procedure is created in RANAP to transfer this NACC information/messages across the Iu interface to the source RNC;
b) OR, (corresponding to 2b) the RIM procedure messages are sent in a container inside messages of the existing Information Transfer procedure messages over the Iu interface. In this case, an INFORMATION TRANSFER REQUEST message would need to be created to contain the [GERAN] RAN INFORMATION REQUEST message.
When considering this question it should be noted that it is not seen as feasible to deconstruct the BSSMAP/RANAP message fully in the SGSN and construct a corresponding RANAP/BSSMAP message. This would have a higher impact on the SGSN implementation, with no extra gain, apart from the fact that the RNC-ID would not be transferred in the RANAP message.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 7 Agreements and associated Contributions
| The main text of the document should start here, after the above clauses have been added.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 7.1 UTRAN NACC signalling architecture
| The mechanism used to gain access to the GERAN SI/PSI at the SRNC is such that the (P)SI will be stored by the local RNC.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 7.2 Format of RIM messages
| GERAN does not adapt RIM messages to the target system and are routed via the CN without interpretation. The RNC alone needs to send and receive BSSGP messages within a container within the RANAP message.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 7.3 Exchange of Information over Iu
| The transfer of RIM information over the Iu from UTRAN, will be performed using a new RANAP procedure – Direct Information Transfer. This generic Class 2 RANAP procedure has been designed such that it will transfer information from the RNC to the CN or vice versa, in unacknowledged mode – maintaining the previously agreed RIM principles.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 7.4 Exchange of Information over Iur
| The transfer of RIM information over the Iur between the SRNC and the DRNC will be performed using an existing RANAP R5 procedure – [RNSAP] Information Exchange – following an appropriate modification/addition to the procedure.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 8 Specification Impact & associated Change Requests
| This section is intended to list the affected specifications and the related agreed Change Requests. It also lists the possible new specifications that may be needed for the completion of the Work Task.
8.1 TS 25.401 UTRAN Overall Description
8.1.1 Impacts
GERAN System Information Retrieval is introduced as an additional UTRAN function, as is RAN Information Management as an additional function related to radio resource management and control.
8.1.2 List of Change Requests
Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP.
8.2 TS 25.410 UTRAN Iu Interface: General Aspects and Principles
8.2.1 Impacts
GERAN System Information Retrieval is introduced as an Iu Mobility Management function.
8.2.2 List of Change Requests
Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP.
8.3 TS 25.413 UTRAN Iu interface RANAP signalling
8.3.1 Impacts
A generic Class 2 RANAP procedure (bi-directional i.e. UL and DL) – Direct Information Transfer - has been introduced in RANAP to enable the transfer of RIM-PDU for the NACC feature initially, and thereafter for future uses if/when they present themselves.
8.3.2 List of Change Requests
Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP.
8.4 TS 25.420 UTRAN Iur interface general aspects and principles
8.4.1 Impacts
The exchange of information over the Iu of UTRAN and GERAN information has been included as a function of the Iur.
8.4.2 List of Change Requests
Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP.
8.5 TS 25.423 UTRAN Iur interface RNSAP signalling
8.5.1 Impacts
In the case that the CRNC is not the SRNC, and the SRNC would like to request NACC information, the Information Exchange Procedure has been modified such that the SRNC can request NACC related data for one or several GSM cells.
8.5.2 List of Change Requests
Refer to http://www.3gpp.org/ftp/tsg_ran/TSG_RAN/TSGR_24/Docs/ZIP/RP-040182.ZIP.
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 9 Project Plan
| |
873bb0765fb9905ca579985e57bc695e | 25.901 | 9.1 Schedule
| Date
Meeting
Scope
[expected] Input
[expected]Output
Sept 2003
RAN#21
RAN Approval
TR Approved
Mar 2004
RAN#23
RAN Approval
TR Approved
June 2004
RAN#24
RAN Approval
TR Approved
|
873bb0765fb9905ca579985e57bc695e | 25.901 | 9.2 Work Task Status
|
Planned Date
Milestone
Status
Annex A:
Change history
Change history
Date
TSG #
TSG Doc.
CR
Rev
Subject/Comment
Old
New
June 2004
TSG-RAN#24
RP-040186
Presentation of TR for information
-
1.0.0
June 2004
TSG-RAN#24
Approved at TSG RAN #24 and placed under Change Control
1.0.0
6.0.0
September 2004
TSG-RAN#25
RP-040307
001
-
Tidy Up CR for TR 25.901 (NACC)
6.0.0
6.1.0
June 2007
TSG-RAN#36
Upgrade to Release 7
6.1.0
7.0.0
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 1 Scope
| Some companies have shown their interest in the feasibility of a low output power FDD base station, because it would offer the following advantages:
1. It would not be necessary to use an expensive high power amplifier when a distribution system is connected after the node B. Distribution systems require low input powers. If a high power amplifier is used, the BS output signal must be attenuated before it is fed into the distribution system, thus the high power amplifier is not needed at all. Power consumption would be reduced, and this would also have positive environmental effects.
2. It would facilitate the sharing of infrastructures among operators, especially in locations where it is difficult to find sites, or where operators are forced by regulators to share infrastructures. A common distribution system could be connected to the low output power BS's from each operator.
3. It would increase the flexibility in radio network deployment, because it would allow the placement of one or several base stations in a centralised position with separate RF power amplifiers distributed closer to the subscriber positions. This would also reduce network interference.
A study item called "Low Output Powers for General Purpose FDD BSs" was created during TSG RAN plenary meeting #19, in order to study the feasibility of the low output power FDD base station. The main objectives of this study item are:
1) Identify the range of output powers to be considered. This SI must assess what must be understood as low output power.
2) Once the range of output powers to be considered has been delimited, it must be studied how the RAN specifications can be changed in order to allow that range of output powers.
This technical report will collect the results of the study item. It must be clearly understood that the purpose of this SI is not to create a new interface within the base station. Its purpose is just to enlarge the output power range of the current base station, in order to allow lower output power values. It must also be stated that a BS doesn't have necessarily to comply with the whole allowed output power range. A BS will only fulfil a subrange of the allowed output power range. The manufacturer must declare the maximum output power of the base station, and the power range supported by it. The only requirements for the BS output power range are those imposed by the dynamic range requirements in [2].
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 2 References
| The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
• References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] Tdoc RP-030198: "Low output power FDD Base Station".
[2] 3GPP TS 25.104 (V6.1.0): "BS Radio transmission and reception (FDD)".
[3] Tdoc R4-030744: "New approach to low output power", Telefonica.
[4] Tdoc R3-040128: "Clarification on the use of the downlink and uplink gain", Telefonica.
[5] Tdoc R3-040137: "Solutions for LOP", Telefonica.
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 3 Abbreviations
| For the purposes of the present document, the following abbreviations apply:
3G Third Generation
3GPP Third Generation Partnership Project
BS Base Station
CPICH Common Pilot Channel
DL Downlink
DPCH Dedicated Physical Channel
FDD Frequency Division Duplex
IE Information Element
NBAP Node B Application Part
P-CCPCH Primary-Common Control Physical Channel
Pmax Maximum Output Power
PRACH Physical Random Access Channel
RAN Radio Access Network
RF Radio Frequency
RNC Radio Network Controller
SI Study Item
TR Technical Report
TSG Technical Specification Group
UE User Equipment
UL Uplink
WG Working Group
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 4 Definition of low output power
| Maximum output power, Pmax, of the base station is the mean power level per carrier measured at the antenna connector in specified reference conditions, as defined in [2], section 6.2.1. The lowest maximum output power that can be set for a base station with the current specifications is 0 dBm. The individual channel codes in a carrier are assigned portions of the carrier maximum output power. The lowest output power that can be allocated to an individual channel code with the current specifications is -15 dBm (for the P-CCPCH) and -10 dBm (for all channels but for P-CCPCH).
After consulting several distributed systems manufacturers, they have quoted -20 dBm to +10 dBm as a useful range for the "maximum power" of the input signal to their equipments. Therefore, this range of output powers was initially taken as a definition of "low output power". If Pmax equals -20 dBm, this implies that an individual DPCH code can be radiated with down to -48 dBm (the dynamic power range for a DPCH, according to [2], section 6.4.2, is -3 dB to ‑28 dB). Some companies have argued that this power level could be below or near the noise level. Another company has argued that there are serious implementation problems if the codes are to be transmitted with powers of down to ‑48 dBm.
Because of these problems, the definition of low output power has been relaxed to 0 dBm. Let's analyse what requirements this imposes on the power of the individual codes.
According to [2], section 6.4.2, the power control dynamic range for a code channel is -3 dB to -28 dB. This implies that the power of a DPCH can range between -3 dBm and -28 dBm (assuming that the "maximum output power" of the carrier has been set to 0 dBm). According to [2], section 6.4.3, the total power dynamic range for a base station is 0 dB to -18 dB. This implies that the power of the CPICH can range between -3 dBm (this is the maximum allowed power for a single code channel) and -18 dBm (assuming a Pmax of 0 dBm). Finally, the power range for the P-CCPCH must be set. The current specifications allow a P-CCPCH power of down to -15 dBm. We think that this is more than enough for a realistic situation, because it allows transmitting the P-CCPCH with at least -15 dB relative to the maximum output power.
According to the previous reasoning, the next table summarises what must be understood as low output power:
Table 4.1: Definition of low output power
Power definition
Power range or value
Maximum output power (Pmax)
0 dBm
DPCH power
-3 dBm to -28 dBm
CPICH power
-3 dBm to -18 dBm
P-CCPCH power
-3 dBm to -15 dBm
Only the DPCH and CPICH power ranges are not allowed by the current specifications. So this study item must analyse what must be changed in order to allow these power ranges.
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 5 Solutions for getting low output power
| |
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 5.1 Solution #1
| The first solution for getting low output power is described in Annex B. As it can be seen in this annex, this solution implies only one change to the current specifications, which is the following:
• TS 25.433 (NBAP protocol specification). A new IE must be created, containing the following information:
• External_Gain_DL: This is the DL gain of the external distribution system. This parameter also includes the losses of the coupling system between the low output power base station and the distribution system.
• External_Gain_UL: This is the UL gain of the external distribution system. It comprises all the way from the distribution system remote antenna connector and the low output power base station antenna connector.
The main advantages of this solution are the following:
• It minimises the changes to the specifications.
• There are not backwards compatibility problems with the node B and/or the UE.
From the TSG RAN WG4 point of view, this is a feasible solution for getting low output power, but due to the fact that all the changes that this solution implies affect to RAN specifications under TSG RAN WG3 control, the feasibility of this solution is conditioned to TSG RAN WG3 review.
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 5.2 Solution #2
| Another way of getting low output power would be to introduce these two parameters, as described in Solution #1, DL and UL gain of the distribution system, into the O&M system.
By doing this, the base station would be aware of the presence of this equipment and could therefore adjust its output power, so as to provide the expected power at the antenna port, that is, at the Uu interface.
To provide this information, two possibilities could be foreseen:
a) These two parameters could be stored into the local database of the base station.
b) It could also be possible to include these parameters in the network manager database, though this seems to be indeed more complex, because this information would have to be sent to the base station via the itf-N interface.
Comparing both alternatives, option a) seems to be much simpler than option b), as it would minimise the impact to the specifications. Besides, it would not be needed to involve TSG SA WG5, responsible for the standardisation of the itf-N interface.Therefore, option a) would be the one chosen when referring to Solution #2.
|
e77d3faff9be1de0a0fd3e5e46ddb1f5 | 25.807 | 6 Conclusions
| TSG RAN WG3 has reviewed solution #1 and concluded that, although this could be a feasible solution, it does not seem to be the optimal one.
Therefore, a second solution, solution #2, was proposed trying to minimize the changes to the current specifications.
As option a) of solution #2 seems to be the simplest solution, TSG RAN WG3 agrees to adopt this alternative to provide low output power.
Annex A:
Description of solution #1 for getting low output power
The first solution that one can think of for getting low output power is to change the Iub signalling information elements, so that the RNC can order the node B to transmit the desired power. So this was the first approach taken to obtain low output power. But this solution leads to several problems:
• The changes in the Iub signalling affect not only to the node B, but to the UE [3]. The CPICH power value sent to the UE by the RNC does not correspond to the CPICH power at the distribution system antenna connector. This can lead to problems with some RNC functionality like admission control or the adjustment of the initial power of the PRACH.
• The changes to the Iub signalling are not backwards compatible. A node B or a UE that is not Release 6 compatible would not understand the changes done to the signalling [3].
Because of this, a more feasible solution has been considered. With this solution, current information elements are not changed. The node B and the RNC are the ones that perform the necessary corrections to obtain the low output power. Figure B.1.1 shows an example of this solution.
In this example, we want a Pmax at the distribution system antenna interface of +30 dBm. The gain of the feeder between the node B and the distribution system, plus the distribution system gain, is 30 dB. Therefore, the node B should be ordered to transmit with a Pmax of 0 dBm. But the RNC orders the node B to transmit 30 dBm, which should be the maximum output power at the distribution system antenna interface. The order is sent by using a non changed Release 99 IE. According to this, the node B should transmit with a Pmax of 30 dBm at its antenna interface. But the RNC sends to the node B a new IE, which tells the node B that there is a distribution system connected to its antenna interface. This new IE contains the UL and DL gain of the distribution system. Then the node B is able to correct its output power, and therefore, it transmits with a Pmax of 0 dBm, so that the Pmax at the remote antenna interface is 30 dBm. In order that the RNC can send to the node B the gain of the external distribution system, it is necessary to add two parameters to the RNC, operator configurable, which contain the UL and DL gain of the external distribution system.
Figure B.1: Solution #1 for getting low output power
On the other hand, the CPICH power value sent to the UE by the RNC is 18 dBm, which is the CPICH transmit power at the distribution system antenna interface. With this solution, the correct CPICH power value is sent to the UE, and there are not backwards compatibility problems with the UE's. The only change to the specifications is the new IE in the NBAP protocol, containing the UL and DL gain of the distribution system. There would be no changes in the RRC protocol, and there would be no backward compatibility problems with the NBAP IE's.
In the previous explanation of the approach, no mention has been made of the possible use of the distribution system UL gain for the node B and/or the RNC. It could be useful for correcting the measurement reports received from the node B, because if these reports are not relative to the distribution system antenna connector (the point at which the CPICH power value is given), it could lead to problems with some RNC functionality.
It should also be pointed out that if the or distribution system connected to the node B has several antenna ends, all of them should be configured to transmit the same output power. If not, it would be impossible for the node B to correct its transmit power so that the correct output power is transmitted at all antenna ends. This comment should be included in the relevant documents, for instance in the WDS technical report.
This solution is not fully closed yet. Subsequent modifications or additions to this solution can be incorporated into this TR by means of TSG RAN WG's contributions.
Annex B:
Use of the downlink and uplink gain
To clarify the use of both parameters, downlink and uplink gain of any distributed antenna system connected after the base station, the following structure is to be considered.
Figure C.1: General topology in case of Low Output Power
First of all, it seems clear that, indisputably, the downlink gain of the distributed antenna system connected at the output of the base station will be a value needed by the base station, in order to be able to adjust its output power accordingly. By doing this, the Primary CPICH power at the antenna connector can be correct, as indicated on the BCH.
On the other hand, the purpose of the uplink gain could be less obvious, although it is also important, for this parameter will be used to compensate any dissymmetry between both, uplink and downlink, so as to receive an exact - as accurate as possible - initial power for the PRACH preambles. To clarify this point, it would be useful to analyse in detail how the calculation of this power is performed by the UE.
The formula the UE uses to estimate the power of the initial preamble for the PRACH, Preamble_Initial_Power, is given in 3GPP TS 25.331 as follows:
Preamble_Initial_Power = Primary CPICH TX power IE - CPICH_RSCP
+ UL Interference IE
+ Constant Value IE
Where:
- The Primary CPICH TX power IE is the transmitted Primary CPICH power sent to the UE on the Uu interface. This IE is indicated on the BCH in the System Information Block, SIB, type 6 (or SIB 5, if SIB 6 is not being broadcasted).
- The CPICH_RSCP is measured by the UE as the received value of the Primary CPICH.
- The UL Interference IE is the estimated uplink interference already existing in the cell. This IE is present on the BCH in SIB7.
- The Constant Value IE is a constant chosen by the RNC. This IE is radiated to the UE on the BCH in SIB 6 (or SIB 5, if SIB 6 is not being broadcasted).
In fact, the first two terms represent the estimation of the downlink path loss. Of course, it can only be correct if the Primary CPICH power at the antenna connector is equal to the Primary CPICH TX power IE. So, this is obviously the reason why the base station needs to be aware of the presence of the external element connected at its output before the antenna itself, adjusting its output power in accordance.
Additionally, a constant value is chosen so as to enable RRC connection establishment without delay and without creating too much uplink interference.
Finally, in order to take into account the presence of other UEs in the cell, the UL interference IE is included. This estimation will only be correct if the base station is aware of the UL gain of the external element connected.
As it could be noticed, this formula does not explicitly contain uplink and downlink path losses, but on the contrary, symmetry between both links is implied. This means that the UE assumes that uplink and downlink path losses are almost the same. This hypothesis is usually valid at the antenna connector reference point, that is, immediately after (or before) any external element connected at the output (input) of the base station on the downlink (on the uplink). It is important to maintain this symmetry up to the base station itself, so that the initial power of the preambles would be correct enough.
If either uplink or downlink is not compensated correctly, then the Preamble_Initial_Power may not be accurate enough:
- Being too low, the RRC connection establishment might be delayed or even impossible.
- Being too high, too much uplink interference will be created in the cell.
Annex C:
Change history
Change history
Date
TSG #
TSG Doc.
CR
Rev
Subject/Comment
Old
New
03/2004
23
RP-040076
-
-
Approved at TSG RAN #23 and placed under Change Control
1.0.0
6.0.0
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 1 Scope
| The present document specifies the Remote Electrical Tilting Application Part (RETAP) between the implementation specific O&M transport function and the RET Antenna Control unit function of the Node B. It defines the Iuant interface and its associated signaling procedures.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 2 References
| The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
• References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TS 25.460: "UTRAN Iuant Interface: General Aspects and Principles".
[2] ISO/IEC 13239 (2nd Edition, March 2000): "Information Technology – Telecommunications and information exchange between systems – High-level data link control (HDLC) procedures".
[3] 3GPP TS 25.462: "UTRAN Iuant Interface: Signalling Transport".
[4] 3GPP TS 25.461: ”UTRAN Iuant Interface: Layer 1”.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 3 Definitions and abbreviations
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 3.1 Definitions
| For the purposes of the present document, the following terms and definitions apply.
Active alarm: An alarm which has an alarm state that has been raised, but not cleared
Alarm: Persistent indication of a fault
Alarm code: A code that identifies a specific alarm. The alarm code set is a subset of the return code set. The alarm codes are listed in annex A of this TS
Alarm state: A condition or state in the existence of an alarm. Alarm states are raised and cleared
ASCII character: A character forming part of the International Reference Version of the 7-bit character set defined in ISO/IEC 646:1991
Calibrate: Exercise the antenna drive unit over its entire range of travel to ensure fault-free operation and synchronise the measured and actual beam tilt of the antenna
Configuration data: A stored table or function defining the relationship between the physical position of the drive and electrical beam tilt
Data type: A definition determining the value range and interpretation of a series of octets. The following specified data types are used in this TS:
Name:
Definition:
AlarmCode
1 octet unsigned enumerated code
All AlarmCode values are listed in annex A of this TS
FieldNumber
1 octet unsigned enumerated code
All field number values are listed in annex B of this TS
ProcedureCode
1 octet unsigned enumerated code
ReturnCode
1 octet unsigned enumerated code
All ReturnCode values are listed in annex A of this TS
TextString
Octets with integer values in the range of 32 to 126 to be interpreted as ASCII characters
Elementary procedure: The RETAP protocol consists of elementary procedures (EPs). An elementary procedure is a unit of interaction between the primary device (Node B) and the secondary devices (RET devices)
An EP consists of an initiating message and possibly a response message.
Two kinds of EPs are used:
- Class 1: Elementary procedures with response (success or failure).
- Class 2: Elementary procedures without response.
For Class 1 EPs, the types of responses can be as follows:
Successful
- A signalling message explicitly indicates that the elementary procedure has been successfully completed with the receipt of the response.
Unsuccessful
- A signalling message explicitly indicates that the EP failed.
Class 2 EPs are considered always successful.
Error: Deviation of a system from normal operation
Fault: Lasting error condition
Little endian: The order of transmission in which the least-significant octets of a multi-octet representation of a number are transmitted first. Little endian only applies to binary integer representations
MaxDataReceiveLength: SecondaryPayloadReceiveLength minus 3 octets (see subclause 4.8.1 in [3])
MaxDataTransmitLength: SecondaryPayloadTransmitLength minus 3 octets (see subclause 4.8.1 in [3])
Procedure code: A code identifying an elementary procedure
Reset: A process by which the device is put in the state it reaches after a completed power-up
Return code: A code which defines information about the outcome of an elementary procedure execution
Tilt (also downtilt, tilt angle, beamtilt): The elevation angle between the direction orthogonal to the antenna element axis and the maximum of its main beam in the elevation plane. A positive electrical tilt angle means that the antenna beam is directed below the direction orthogonal to the antenna axis. An antenna has separate values for electrical and mechanical tilt. The mechanical tilt is fixed by the geometry of the installation. In this TS the tilt referred to is always the electrical tilt unless otherwise stated
Tilt value: A signed integer used in elementary procedures to define the electrical tilt setting of the antenna. The tilt value is 10 times the antenna electrical tilt angle in degrees.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 3.2 Abbreviations
| For the purposes of the present document, the following abbreviations apply:
EP Elementary Procedure
HDLC High-Level Data Link Control
RET Remote Electrical Tilting
RETAP Remote Electrical Tilting Application Part
TCP Time-Consuming Procedure
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 4 General
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 4.1 Procedure specification principles
| The principle for specifying the procedure logic is to specify the functional behaviour of the RET antenna control unit exactly and completely. The Node B functional behaviour is left unspecified.
The following specification principles have been applied for the procedure text in clause 6:
- The procedure text discriminates between:
1) Functionality which "shall" be executed
The procedure text indicates that the receiving node "shall" perform a certain function Y under a certain condition. If the receiving node supports procedure X but cannot perform functionality Y requested in the REQUEST message of a Class 1 EP, the receiving node shall respond with the message used to report unsuccessful outcome for this procedure, containing an appropriate cause value.
2) Functionality which "shall, if supported" be executed
The procedure text indicates that the receiving node "shall, if supported," perform a certain function Y under a certain condition. If the receiving node supports procedure X, but does not support functionality Y, the receiving node shall proceed with the execution of the EP, possibly informing the requesting node about the not supported functionality.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 4.2 Forwards and backwards compatibility
| The forwards and backwards compatibility of all versions of the protocol shall be assured by a mechanism in which all current and further messages will not be changed in the future. These parts can always be decoded regardless of the standard version.
New functionalities are added into the specification by introducing new procedures and thus the existing messages are not changed in the future.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 4.3 Multi-antenna units
| The RETAP elementary procedures are split into a single-antenna oriented part, a multi-antenna oriented part and a common part for both device types in order to support RET units controlling single- or multi-antenna devices. The RET unit responds, upon request, the number of antennas it controls. All multi-antenna oriented elementary procedures include a parameter stating which antenna the elementary procedure addresses. Antennas are numbered 1 and upwards.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 4.4 Integer representation
| Multi-octet integer values are transmitted in little endian order. Signed integers are represented as 2-complement values.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 5 Services expected from signalling transport
| RETAP requires an assured in-sequence delivery service from the signalling transport and notification if the assured in-sequence delivery service is no longer available.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 5.1 Elementary procedure format
| Layer 2 provides a full-duplex link for the transmission of RETAP messages.
There are two types of RETAP elementary procedures:
Class 1: Initiating messages are sent either from the primary to a secondary device, or from a secondary to the primary device, in order to initiate some action within the receiving device. The other device sends a response message completing the procedure.
Class 2: Initiating messages are sent either from the primary to a secondary device, or from a secondary to the primary device. No response message is expected.
All RETAP messages use the same basic format:
Table 5.1.1: Basic format for all RETAP messages
Elementary procedure
Number of data octets
Data
1 octet
2 octets
MaxDataReceiveLength or MaxDataTransmitLength.
NOTE: Response messages have the same basic format as initiating messages. The elementary procedure code shall be the same in the response message as in the associated initiating message.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 5.1.1 Initiating message
| The data part of an initiating message may contain parameters as specified in clause 6 of this TS.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 5.1.2 Response message
| Elementary procedures shall, unless otherwise specified, provide a response message within 1 second. The response time is measured from the time the message frame was received by the transport layer to the time the response message is ready for transfer by the transport layer.
If the class1 elementary procedure requested by the initiating message was successfully executed, the response message data part from a single-antenna device shall contain return code <OK>. Additional information may follow in the data part. The response message data part from a multi-antenna device starts with the antenna number followed by return code <OK> and optional additional information.
If the elementary procedure requested by the initiating message was not successfully executed, the response message data part from a single-antenna device shall contain return code <FAIL>.
The following octet shall contain a second return code which describes why the execution of the requested procedure failed. The response message data part from a multi-antenna device starts with the antenna number followed by return code <FAIL> and a second return code which describes why the execution of the requested procedure failed.
In some situations an initiating message can cause a change of operating conditions, for instance a SetTilt procedure might cause a RET device to discover that an adjuster is jammed or that a previously jammed adjuster works normally again. In these cases an alarm procedure reporting the change of operating conditions shall be used in addition to the regular <OK> or <FAIL> return codes in response message.
A complete annotated table of all return codes with their corresponding hexadecimal numbers is provided in annex A of this TS.
Return codes marked with an X in the Alarm column of annex A in this TS are used to report operating conditions in alarm procedures (see subclauses 6.6.5 and 6.7.6 for details).
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6 Control elementary procedures
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.1 State model
| The state model describing the RET device is shown in figure 6.1 with procedures written in italic.
The relation to the connection state model for layer 2 can be found in [3].
Figure 6.1: State model for the RET device
If an application software is not missing the RET device enters the state OperatingMode.
If an application software is missing, the RET device enters the state DownloadMode. In this state only software download functionality is supported in order to restore the application software.
The primary device will be notified that the RET device has entered the state DownloadMode when a procedure which only is supported in the state OperatingMode fails with the return code WorkingSoftwareMissing.
If no software download functionality is supported, then only the state OperatingMode for the RET device is supported.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.2 General procedure handling
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.2.1 Alarms
| When a fault is detected, the corresponding alarm state shall be changed to state raised by the secondary device. When the fault no longer exists, the corresponding alarm state shall be changed to state cleared by the secondary device. Alarm changes are reported through the AlarmIndication or AntennaAlarmIndication elementary procedures. Whenever an AlarmIndication or AntennaAlarmIndication elementary procedure message is transmitted, it shall contain all the alarm states changed that have not yet been reported as described in subclauses 6.6.5 and 6.7.6.
All alarm states shall be cleared by any type of reset.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.2.2 Procedure message interpretation
| The following message interpretation rules shall apply to a secondary device in the order mentioned:
- Any message shorter than 3 octets shall be disregarded. In case of Multi-Antenna-Procedures any messages shorter than 4 octets shall be disregarded.;
- If a message has a length inconsistent with its “Number of data octets” field value it shall be responded with a failure message stating “FormatError” as the cause of failure. The response message shall be to the initiating message identified by the procedure code;
- If a secondary device in the OperatingMode state receives a procedure message which is undefined for this device type, it shall respond with "Unknown Procedure";
- If a secondary device in the OperatingMode state is receiving a procedure message of an optional procedure not supported, it shall respond with a failure message stating “UnsupportedProcedure” as the cause of failure;
- If a secondary device receives a procedure message, part of the software download procedure sequence described in Annex C, without having received the previous procedure messages in that sequence it shall respond with a failure message stating “InvalidProcedureSequence” as the cause of failure;
- If a secondary device in the DownloadMode state is receiving a procedure message not supported in that state it shall respond with a failure message stating “WorkingSoftwareMissing” as the cause of failure;
- If a message has a length inconsistent with the defined message length in the procedure definition it shall be responded with a failure message stating “FormatError” as the cause of failure. The response message shall be to the initiating message identified by the procedure code;
- If a secondary device in the OperatingMode state is receiving a procedure message which addressed device subunit does not exist “FormatError” shall be returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.2.3 Parallel procedure handling
| The secondary device shall support parallel execution of in maximum one additional EP only in parallel to one of the Time-Consuming Procedures defined in table 6.2.3.1:
Table 6.2.3.1: Definition of TCPs and the execution of procedures in parallel to a TCP
Elementary Procedure
TCP
Execution in parallel to a TCP
Common Procedure Set
(Reserved)
Reset Software
no
mandatory
Get Alarm Status
no
mandatory
Get Information
no
mandatory
Clear Active Alarms
no
disallowed
Read User Data
no
optional
Write User Data
no
optional
Alarm Subscribe
no
optional
Self Test
yes
disallowed
Download Start
no
disallowed
Download Application
no
disallowed
Download End
no
disallowed
Vendor specific procedure
vendor specific
optional
Single-Antenna Procedure Set
Set Device Data
no
optional
Get Device Data
no
optional
Calibrate
yes
disallowed
Send Configuration Data
no
disallowed
Set Tilt
yes
disallowed
Get Tilt
no
optional
Alarm Indication
no
optional
Multi-Antenna Procedure Set
Antenna Calibrate
yes
optional
Antenna Send Configuration Data
no
disallowed
Antenna Set Tilt
yes
optional
Antenna Get Tilt
no
optional
Antenna Set Device Data
no
optional
Antenna Get Device Data
no
optional
Antenna Alarm Indication
no
optional
Antenna Clear Active Alarms
no
disallowed
Antenna Get Alarm Status
no
mandatory
Antenna Get Number of Antennas
no
mandatory
“yes” in the "TCP" column indicates that the procedure is a TCP, “no“ in the "TCP" column indicates that the procedure is not a TCP. “mandatory” in the "Execution in parallel to a TCP" column indicates that the procedure shall be executed in parallel to an ongoing TCP. “optional” in this column indicates, that the support of the execution of the procedure in parallel to an ongoing TCP is optional and “disallowed” indicates that the procedure shall not be executed in parallel to a TCP.
If a secondary device receives an initiating message for an EP which cannot be executed due to the ongoing execution of other EPs, the secondary device shall respond with a failure message stating “Busy” as the cause of failure.
Parallel execution of one TCP marked “optional” in the "Execution in parallel to a TCP" column in table 6.2.3.1 may be supported for each antenna by the secondary device. The EPs AntennaSetTilt and AntennaCalibrate shall be executed in parallel only for different antenna numbers. If more than one TCP is executed, ResetSoftware shall be executed anyway and never be responded with “Busy”.
If the EPs Get Tilt and Antenna GetTilt are executed in parallel with a TCP, their response message shall deliver a tilt value sampled during their execution.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.3 Overview of elementary procedures
| The set of elementary procedures for RET antenna control provides procedure-oriented instructions. An overview of the procedures is given in annex D. Table 6.3.1 lists all common elementary procedures described in subclause 6.5. Table 6.3.2 lists all elementary procedures specific for single-antenna device types described in subclause 6.6. Table 6.3.3 lists all elementary procedures specific for multi-antenna device types described in subclause 6.7. subclause 6.4 describes how to interpret the elementary procedure definitions in subclauses 6.5 to 6.7.
Some elementary procedures shall be performed in sequence as described in Annex C for the software download.
Table 6.3.1: Common elementary procedure set for all device types
Elementary procedure
Requirement
Comment
Reset Software
mandatory
Get Alarm Status
mandatory
Get Information
mandatory
Clear Active Alarms
mandatory
Alarm Subscribe
mandatory
Read User Data
mandatory
Write User Data
mandatory
Self Test
mandatory
Download Start
optional
This procedure is mandatory if the software download feature is supported
Download Application
optional
This procedure is mandatory if the software download feature is supported
Download End
optional
This procedure is mandatory if the software download feature is supported
Vendor specific procedure
optional
Table 6.3.2: Elementary procedure set for single-antenna device type
Elementary procedure
Requirement
Comment
Calibrate
mandatory
Send Configuration Data
mandatory
Set Tilt
mandatory
Get Tilt
mandatory
Alarm Indication
mandatory
Set Device Data
mandatory
Get Device Data
mandatory
Table 6.3.3: Elementary procedure set for multi-antenna device type
Elementary procedure
Requirement
Comment
Antenna Calibrate
mandatory
Antenna Send Configuration Data
mandatory
Antenna Set Tilt
mandatory
Antenna Get Tilt
mandatory
Antenna Set Device Data
mandatory
Antenna Get Device Data
mandatory
Antenna Alarm Indication
mandatory
Antenna Clear Active Alarms
mandatory
Antenna Get Alarm Status
mandatory
Antenna Get Number Of Antennas
mandatory
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.4 Description of elementary procedures
| Table 6.4.1: Description of elementary procedures
Name:
The name used to refer to the elementary procedure
Code:
The code is defined here. All other code references are informative
Issued by:
Primary device or secondary device
Procedure class:
Class 1 or Class 2
DownloadMode state:
Defines whether the procedure shall be supported in the DownloadMode state.
Power mode:
Defines the secondary device power consumption as described in [4] during the execution of the elementary procedure.
Table 6.4.2: Initiating and response message parameters and format
Number
Length
Type
Description
The enumerated order in which the parameter occurs in the data field of the message. The first number is 1.
The length of the parameter, in number of octets, if defined.
The data type used in the parameter.
Description of the parameter.
Table 6.4.3: Response message parameters and format for common class 1
elementary procedures upon error
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code FAIL
2
1 octet
ReturnCode
Reason for failure
Table 6.4.4: Response message parameters and format for single-antenna class 1 elementary procedures upon error
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code FAIL
2
1 octet
ReturnCode
Reason for failure
Table 6.4.5: Response message parameters and format for multi-antenna class 1 elementary procedures upon error
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code FAIL
3
1 octet
ReturnCode
Reason for failure
NOTE: The response message in the elementary procedure AntennaGetAntennaNumber, has the format given in table 6.4.4, although it is defined as a multi-antenna class 1 elementary procedure.
Description:
Describes the purpose of the elementary procedure.
Table 6.4.6: Return codes
OK
FAIL
Comment
All return codes applicable in a response message to a successful procedure, except “OK”, are listed here. The return codes are listed by name as defined in annex A.
All return codes applicable in a response message to a failing procedure, except “FAIL” are listed here. The return codes are listed by name as defined in annex A.
Any comment needed for clarification.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5 Common elementary procedures
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.1 Reset Software
| Table 6.5.1.1: Elementary procedure Reset Software
Name:
ResetSoftware
Code:
0x03
Issued by:
Primary device
Procedure class:
1
DownloadMode state.
Yes
Power mode:
Low
Table 6.5.1.2: Initiating message parameters and format for Reset Software
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.1.3: Response message parameters and format for Reset Software
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On the receipt of the initiating message the secondary device shall reset the application. All alarm states shall be cleared.
If the initiating message is received in the OperatingMode state, the transport layer shall remain unaffected.
If the initiating message is received in the DownloadMode state, the ResetSoftware procedure shall reset the entire device without activating any new application software downloaded since entering the DownloadMode state.
The device shall not execute the reset procedure before transport layer acknowledgement through sequence number update is received for the response.
Table 6.5.1.4: Return codes for Reset Software
OK
FAIL
Comment
FormatError
In case of format error, the procedure code validity is not secured.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.2 Get Alarm Status
| Table 6.5.2.1: Elementary procedure Get Alarm Status
Name:
GetAlarmStatus
Code:
0x04
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.2.2: Initiating message parameters and format for Get Alarm Status
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.2.3: Response message parameters and format for Get Alarm Status
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
i + 1
1 octet
AlarmCode
Active alarm number i
i = 1 … N
Description:
On receipt of the initiating message the secondary device reports the alarm codes of the active alarms.
Table 6.5.2.4: Return codes for Get Alarm Status
OK
FAIL
Comment
All return codes marked as used for alarms in Annex A.
FormatError
WorkingSoftwareMissing
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.3 Get Information
| Table 6.5.3.1: Elementary procedure Get Information
Name:
GetInformation
Code:
0x05
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.3.2: Initiating message parameters and format for Get Information
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.3.3: Response message parameters and format for Get Information
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
1 octet
Unsigned integer
Length of parameter 3 in number of octets
3
TextString
Product number
4
1 octet
Unsigned integer
Length of parameter 5 in number of octets
5
TextString
Serial number
6
1 octet
Unsigned integer
Length of parameter 7 in number of octets
7
TextString
Hardware Version
8
1 octet
Unsigned integer
Length of parameter 9 in number of octets
9
TextString
Software Version
Description:
On receipt of the initiating message the secondary device shall return the product number ProdNr and the serial number SerNr of the secondary device. If known, also the hardware version and the software version may be returned. The software version should indicate the version number of the currently executed software.
The parameters HWVersion and SWVersion in the response message refer to the version designators of the hardware and installed software of the secondary device. If the application is missing or no HW or SW version number is found, then an empty string shall be returned as the HW or SW version number. The empty string is represented as a length field equals 0 and no octets in the TextString field.
The response message length shall be less than or equal to the minimum SecondaryPayloadTransmitLength as given in subclause 4.8.1 in [3].
Table 6.5.3.4: Return codes for Get Information
OK
FAIL
Comment
FormatError
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.4 Clear Active Alarms
| Table 6.5.4.1: Elementary procedure Clear Active Alarms
Name:
ClearActiveAlarms
Code:
0x06
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.4.2: Initiating message parameters and format for Clear Active Alarms
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.4.3: Response message parameters and format for Clear Active Alarms
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall first clear all stored alarm information and then return a procedure response message.
Table 6.5.4.4: Return codes for Clear Active Alarms
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.5 Alarm Subscribe
| Table 6.5.5.1: Elementary procedure Alarm Subscribe
Name:
AlarmSubscribe
Code:
0x12
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.5.2: Initiating message parameters and format for Alarm Subscribe
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.5.3: Response message parameters and format for Alarm Subscribe
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall start reporting alarms to the primary device.
Table 6.5.5.4: Return codes for Alarm Subscribe
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.6 Self Test
| Table 6.5.6.1: Elementary procedure Self Test
Name:
SelfTest
Code:
0x0A
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.5.6.2: Initiating message parameters and format for Self Test
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.6.3: Response message parameters and format for Self Test
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
i + 1
1 octet
AlarmCode
Alarm code for alarm i detected during self test.
i = 1 … N
Description:
On receipt of the initiating message the secondary device shall execute a test procedure which may include a check of physical and processor functions. The specific tests to be performed are implementation specific, and may include the movement of the adjuster, which shall not exceed +-5% of total available tilting range starting from the current adjuster position.
The response message of the secondary device on the procedure provides information on detected faults or, if no fault is detected, with confidence that the operation of the device is normal in all respects.
During the test the operational parameters of the device shall not change beyond operationally acceptable limits and on completion all parameters shall be returned to their initial values.
In the normal response message, after the self test was executed successfully, the return codes are set to report possible detected faults during the self test. If no faults are detected, this shall be signalled by no return codes following the return code <OK>.
In the case of a failure response message, the self test could not be executed successfully and the reported return code relates to the inability of the device to perform the requested self-test operation.
Table 6.5.6.4: Return codes for Self Test
OK
FAIL
Comment
All return codes marked as alarms in annex A.
FormatError
Busy
WorkingSoftwareMissing
NotCalibrated
NotScaled
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.7 Void
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.8 Void
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.9 Read User Data
| Table 6.5.9.1: Elementary procedure Read User Data
Name:
ReadUserData
Code:
0x10
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.9.2: Initiating message parameters and format for Read User Data
Number
Length
Type
Description
1
2 octets
Unsigned integer
Memory offset
2
1 octet
Unsigned integer
Number of octets to read
NOTE: Number of octets to read shall be less than, or equal toMaxDataTransmit Length minus 1.
Table 6.5.9.3: Response message parameters and format for Read User Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
Number of octets given by parameter 2 of the initiating message
User specific
User data
Description:
On receipt of the initiating message the secondary device shall send back user specific data stored in a user data area to the primary device.
The user data area is intended for storage of user defined data, e.g. inventory information.
Table 6.5.9.4: Return codes for Read User Data
OK
FAIL
Comment
FormatError
WorkingSoftwareMissing
OutOfRange
The return code OutOfRange is used, if the given memory address range is outside the valid address space.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.10 Write User Data
| Table 6.5.10.1: Elementary procedure Write User Data
Name:
WriteUserData
Code:
0x11
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.10.2: Initiating message parameters and format for Write User Data
Number
Length
Type
Description
1
2 octets
Unsigned integer
Memory offset
2
1 octet
Unsigned integer
Number of octets to write
3
Message specific, given by parameter 2
User specific
Data to write
NOTE: Number of octets to write shall be less than, or equal to MaxDataReceiveLength minus 3.
Table 6.5.10.3: Response message parameters and format for Write User Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall store user data in non-volatile memory. The user data is stored in the user data area using the relative memory address offset given in the initiating message and starting with zero.
The user data area is intended for storage of user defined data, e.g. inventory information.
Table 6.5.10.4: Return codes for Write User Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
HardwareError
OutOfRange
The return code OutOfRange is used if the given memory address range is outside the valid address space.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.11 Download Start
| Table 6.5.11.1: Elementary procedure Download Start
Name:
DownloadStart
Code:
0x40
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.11.2: Initiating message parameters and format for Download Start
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.11.3: Response message parameters and format for Download Start
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of this initiating message the software download process shall be initiated. Following transition to the DownloadMode state, the secondary device sends return code <OK>. Previous subscription of alarms by use of the AlarmSubscribe procedure is cancelled.
Table 6.5.11.4: Return codes for Download Start
OK
FAIL
Comment
FormatError
Busy
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.12 Download Application
| Table 6.5.12.1: Elementary procedure Download Application
Name:
DownloadApplication
Code:
0x41
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.12.2: Initiating message parameters and format for Download Application
Number
Length
Type
Description
1
Less than, or equal to MaxDataReceiveLength
Vendor specific
Software data
Table 6.5.12.3: Response message parameters and format for Download Application
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
This elementary procedure is used once or several times to transfer software data from the primary device to the secondary device.
Table 6.5.12.4: Return codes for Download Application
OK
FAIL
Comment
FormatError
Busy
HardwareError
InvalidFileContent
InvalidProcedureSequence
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.13 Download End
| Table 6.5.13.1: Elementary procedure Download End
Name:
DownloadEnd
Code:
0x42
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.13.2: Initiating message parameters and format for Download End
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.13.3: Response message parameters and format for Download End
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
This elementary procedure signals the end of a multi-message data transfer to the secondary device. The secondary device shall respond after verifying the received data. The secondary device shall reset autonomously after completion of the layer 2 response and activate the new application software.
Table 6.5.13.4: Return codes for Download End
OK
FAIL
Comment
FormatError
Busy
HardwareError
ChecksumError
InvalidFileContent
InvalidProcedureSequence
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.5.14 Vendor specific procedure
| Table 6.5.14.1: Elementary procedure Vendor Specific Procedure
Name:
VendorSpecificProcedure
Code:
0x90
Issued by:
Vendor specific
Procedure class:
Vendor specific
DownloadMode state:
Vendor specific
Power mode:
Vendor specific
Table 6.5.14.2: Initiating message parameters and format for Vendor Specific Procedure
Number
Length
Type
Description
1
2 octets
ASCII
Vendor code
1 + i
Vendor specific
Vendor specific
i = 1 … N
Table 6.5.14.3: Response message parameters and format for Vendor Specific Procedure
Number
Length
Type
Description
i
Vendor specific
Vendor specific
Vendor specific
i = 1 … N
Description:
The vendor specific procedure is intended for vendor specific purposes like e.g. testing.
Table 6.5.14.4: Return codes for vendor specific procedure
OK
FAIL
Comment
FormatError
UnsupportedProcedure
If the Vendor code in the initiating message does not match that of the RET device, UnsupportedProcedure shall be returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6 Single-antenna elementary procedures
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.1 Calibrate
| Table 6.6.1.1: Elementary procedure Calibrate
Name:
Calibrate
Code:
0x31
Issued by:
Primary Device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.6.1.2: Initiating message parameters and format for Calibrate
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.6.1.3: Response message parameters and format for Calibrate
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall perform a calibration of the RET antenna where the actuator is driven through its whole tilt range.
The response time to this Calibrate procedure shall be less than 4 minutes.
Table 6.6.1.4: Return codes for Calibrate
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.2 Send Configuration Data
| Table 6.6.2.1: Elementary procedure Send Configuration Data
Name:
SendConfigurationData
Code:
0x32
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.2.2: Initiating message parameters and format for Send Configuration Data
Number
Length
Type
Description
1
Less than, or equal to MaxDataReceiveLength
Vendor specific
Configuration data
Table 6.6.2.3: Response message parameters and format for Send Configuration Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall store the provided vendor and antenna specific configuration data for the relationship between the movement of the drive system and the beam tilt position of the antenna.
If the configuration data exceeds MaxDataReceiveLength, the data shall be split into a number of MaxDataReceiveLength segments and one final segment with whatever is left. The primary device transmits the segments in order. The layer 2 sequence numbers guarantee that no segment will be lost or received out of order.
Table 6.6.2.4: Return codes for Send Configuration Data
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
ChecksumError
InvalidFileContent
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.3 Set Tilt
| Table 6.6.3.1: Elementary procedure Set Tilt
Name:
SetTilt
Code:
0x33
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.6.3.2: Initiating message parameters and format for Set Tilt
Number
Length
Type
Description
1
2 octets
Signed integer
Tilt value
Table 6.6.3.3: Response message parameters and format for Set Tilt
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall set the electrical tilt in increments of 0.1°.
The secondary device shall respond to the initiating message in less than 2 minutes.
The tilt value corresponding to the actual tilt angle shall not go outside of the range between the tilt value corresponding to the current tilt angle and the tilt value corresponding to the requested tilt angle by more than 5 during this operation.
The format of the value of parameter 1 is given in subclause 3.1.
Table 6.6.3.4: Return codes for Set Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
NotCalibrated
OutOfRange
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.4 Get Tilt
| Table 6.6.4.1: Elementary procedure Get Tilt
Name:
GetTilt
Code:
0x34
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.4.2: Initiating message parameters and format for Get Tilt
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.6.4.3: Response message parameters and format for Get Tilt
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
2 octets
Signed integer
Tilt value
Description:
On receipt of the initiating message the secondary device shall return the current tilt value.
The returned tilt value is given in the format specified in subclause 3.1.
Table 6.6.4.4: Return codes for Get Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
NotCalibrated
NotConfigured
UnsupportedProcedure
HardwareError shall only be used, if error is detected in tilt detector.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.5 Alarm Indication
| Table 6.6.5.1: Elementary procedure Alarm Indication
Name:
AlarmIndication
Code:
0x07
Issued by:
Secondary device
Procedure class:
2
DownloadMode state:
No
Power mode:
Low
Table 6.6.5.2: Initiating message parameters and format for Alarm Indication
Number
Length
Type
Description
2 i – 1
1 octet
Unsigned integer
Return code i; see annex A
2 i
1 octet
Unsigned integer
State flag i
i = 1 … N
Description:
The secondary device uses this procedure to report alarm state changes to the primary device. This procedure shall only be performed if the secondary has performed an AlarmSubscribe procedure since its latest reset.
For each alarm, the current alarm state and alarm code shall be reported if and only if any change in its state has occurred during the period of time since the last reported state. An AlarmIndication procedure shall be performed if at least one alarm shall be reported. The first AlarmIndication procedure after the AlarmSubscribe procedure shall report the active alarms.
Alarm state changes are considered as reported at the time the message is passed to the transport layer.
State flag = 0 represents alarm state cleared.
State flag = 1 represents alarm state raised.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.6 Set Device Data
| Table 6.6.6.1: Elementary procedure Set Device Data
Name:
SetDeviceData
Code:
0x0E
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.6.2: Initiating message parameters and format for Set Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Field number, see annex B
2
See annex B
See annex B
Data to write
Table 6.6.6.3: Response message parameters and format for Set Device Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall write the data given in the parameters of the initiating message into the fields optionally provided for configuration data and listed in annex B of this TS. If an attempt is made to write to fields which are designated as read only, the return code ReadOnly is returned and the data for those fields is ignored. If an attempt is made to write to fields which are not supported by the device the return code UnknownParameter is returned and the data for those fields is ignored.
Table 6.6.6.4: Return codes for Set Device Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
HardwareError
ReadOnly
UnknownParameter
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.6.7 Get Device Data
| Table 6.6.7.1: Elementary procedure Get Device Data
Name:
GetDeviceData
Code:
0x0F
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.7.2: Initiating message parameters and format for Get Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Field number; see annex B
Table 6.6.7.3: Response message parameters and format for Get Device Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
See annex B
See annex B
Field value
Description:
In this procedure the secondary device shall return the data stored in the field for configuration data specified by the field number in the procedure and listed in annex B of this TS.
Table 6.6.7.4: Return codes for Get Device Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
UnknownParameter
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7 Multi-antenna elementary procedures
| |
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.1 Antenna Calibrate
| Table 6.7.1.1: Elementary procedure Antenna Calibrate
Name:
AntennaCalibrate
Code:
0x80
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.7.1.2: Initiating message parameters and format for Antenna Calibrate
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
Table 6.7.1.3: Response message parameters and format for Antenna Calibrate
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall perform a calibration of the antenna addressed by the antenna number. During calibration the actuator is driven through the whole tilt range of the antenna.
The response time to this Antenna Calibrate procedure shall be less than 4 minutes.
Table 6.7.1.4: Return codes for Antenna Calibrate
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.2 Antenna Set Tilt
| Table 6.7.2.1: Elementary procedure Antenna Set Tilt
Name:
AntennaSetTilt
Code:
0x81
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.7.2.2: Initiating message parameters and format for Antenna Set Tilt
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
2 octets
Signed integer
Tilt value
Table 6.7.2.3: Response message parameters and format for Antenna Set Tilt
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall set the electrical tilt of the antenna addressed by the antenna number in increments of 0.1°.
The secondary device shall respond to the initiating message in less than 2 minutes.
The tilt value corresponding to the actual tilt angle shall not go outside of the range between the tilt value corresponding to the current tilt angle and the tilt value corresponding to the requested tilt angle by more than 5 during this operation.
The format of the value of parameter 2 is given in subclause 3.1.
Table 6.7.2.4: Return codes for Antenna Set Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
NotCalibrated
OutOfRange
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.3 Antenna Get Tilt
| Table 6.7.3.1: Elementary procedure Antenna Get Tilt
Name:
AntennaGetTilt
Code:
0x82
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.3.2: Initiating message parameters and format for Antenna Get Tilt
Number
Length
Type
Description
1
1 octet
Unsigned interger
Antenna number
Table 6.7.3.3: Response message parameters and format for Antenna Get Tilt
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
3
2 octets
Signed integer
Tilt value
Description:
On receipt of the initiating message the secondary device shall return the current tilt value of the antenna addressed by the antenna number.
The returned tilt value is in the format specified in subclause 3.1.
Table 6.7.3.4: Return codes for Antenna Get Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
NotConfigured
NotCalibrated
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
HardwareError shall only be used, if an error is detected in tilt detector.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.4 Antenna Set Device Data
| Table 6.7.4.1: Elementary procedure Antenna Set Device Data
Name:
AntennaSetDeviceData
Code:
0x83
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.4.2: Initiating message parameters and format for Antenna Set Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
Unsigned integer
Field number; see annex B
3
See annex B
See annex B
Data to write
Table 6.7.4.3: Response message parameters and format for Antenna Set Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall write the provided data for the antenna addressed by the antenna number into the fields optionally provided for configuration data and listed in annex B of this TS. If an attempt is made to write to fields which are designated as read only for the addressed antenna the return code ReadOnly is returned and the data for those fields is ignored. If an attempt is made to write to fields which are not supported for the addressed antenna the return code UnknownParameter is returned and the data for those fields is ignored.
Table 6.7.4.4: Return codes for Antenna Set Device Data
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
ReadOnly
UnknownParameter
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.5 Antenna Get Device Data
| Table 6.7.5.1: Elementary procedure Antenna Get Device Data
Name:
AntennaGetDeviceData
Code:
0x84
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.5.2: Initiating message parameters and format for Antenna Get Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
Unsigned integer
Field number to read; see annex B
Table 6.7.5.3: Response message parameters and format for Antenna Get Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
3
See annex B
See annex B
Field value
Description:
On receipt of the initiating message the secondary device shall return the data stored for the addressed antenna in the field for configuration data specified by the field number in the initiating message and listed in annex B of this TS.
Table 6.7.5.4: Return codes for Antenna Get Device Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
UnsupportedProcedure
UnknownParameter
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.6 Antenna Alarm Indication
| Table 6.7.6.1: Elementary procedure Antenna Alarm Indication
Name:
AntennaAlarmIndication
Code:
0x85
Issued by:
Secondary device
Procedure class:
2
DownloadMode state:
No
Power mode:
Low
Table 6.7.6.2: Initiating message parameters and format for Antenna Alarm Indication
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2 i
1 octet
Unsigned integer
Return code i; see annex A
2 i +1
1 octet
Unsigned integer
State flag i
i = 1 … N
Description:
The multi-antenna secondary device uses this procedure to report antenna alarm state changes to the primary device. This procedure shall only be performed if the secondary has performed an AlarmSubscribe procedure since its latest reset. Multi-antenna devices shall use this AntennaAlarmIndication procedure only for multi-antenna specific alarms and the AlarmIndication procedure in subclause 6.6.5 for the other alarms.
For each alarm, the current alarm state and alarm code shall be reported if and only if any change in its state has occurred during the period of time since the last reported state. An AntennaAlarmIndication procedure shall be performed if at least one multi-antenna specific alarm shall be reported. The first AntennaAlarmIndication procedure after the AlarmSubscribe procedure shall report the active alarms.
Alarm state changes are considered as reported at the time the message is passed to the transport layer.
State flag = 0 represents alarm state cleared.
State flag = 1 represents alarm state raised.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.7 Antenna Clear Active Alarms
| Table 6.7.7.1: Elementary procedure Antenna Clear Active Alarms
Name:
AntennaClearActiveAlarms
Code:
0x86
Issued by:
Secondary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.7.2: Initiating message parameters and format for Antenna Clear Active Alarms
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
Table 6.7.7.3: Response message parameters and format for Antenna Clear Active Alarms
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall first clear all stored alarm information for the addressed antenna and then return a procedure response message.
Table 6.7.7.4: Return codes for Antenna Clear Active Alarms
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.8 Antenna Get Alarm Status
| Table 6.7.8.1: Elementary procedure Antenna Get Alarm Status
Name:
AntennaGetAlarmStatus
Code:
0x87
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.8.2: Initiating message parameters and format for Antenna Get Alarm Status
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
Table 6.7.8.3: Response message parameters and format for Antenna Get Alarm Status
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
i + 2
1 octet
AlarmCode
Active alarm number i
i = 1 ... N
Description:
On receipt of the initiating message the secondary device shall report the alarm codes of the active alarms for the addressed antenna.
Table 6.7.8.4: Return codes for Antenna Get Alarm Status
OK
FAIL
Comment
All return codes marked as used for alarms in Annex A
FormatError
WorkingSoftwareMissing
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.9 Antenna Get Number Of Antennas
| Table 6.7.9.1: Elementary procedure Antenna Get Number Of Antennas
Name:
AntennaGetNumberOfAntennas
Code:
0x88
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.9.2: Initiating message parameters and format for Antenna Get Number Of Antennas
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.7.9.3: Response message parameters and format for Antenna Get Number Of Antennas
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
1 octet
Unsigned integer
Number of antennas
Description:
On receipt of the initiating message the secondary device shall return the number of antennas it controls.
Table 6.7.9.4: Return codes for Antenna Get Number Of Antennas
OK
FAIL
Comment
FormatError
WorkingSoftwareMissing
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 6.7.10 Antenna Send Configuration Data
| Table 6.7.10.1: Elementary procedure Antenna Send Configuration Data
Name:
AntennaSendConfigurationData
Code:
0x89
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.10.2: Initiating message parameters and format for Antenna Send Configuration Data
Number
Length
Type
Description
1
1 octet
Unsigned Integer
Antenna number
2
Less than, or equal to MaxDataReceiveLength minus 1
Vendor specific
Configuration data
Table 6.7.10.3: Response message parameters and format for Antenna Send Configuration Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall store the provided vendor and antenna specific configuration data for the relationship between the movement of the drive system and the beam tilt position of the addressed antenna.
If the configuration data exceeds MaxDataReceiveLength minus 1, the data shall be split into a number of MaxDataReceiveLength minus 1 segments and one final segment with whatever is left. The primary device transmits the segments in order. The layer 2 sequence numbers guarantee that no segment will be lost or received out of order.
Table 6.7.10.4: Return codes for Antenna Send Configuration Data
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
ChecksumError
InvalidFileContent
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503 | 25.463 | 7 Unknown elementary procedures
| Void.
Annex A (normative):
Return codes for secondary devices
Table A.1: Return Codes for Secondary Devices
Code
Meaning
Alarm
DownloadMode state
0x00
OK
Normal response
X
0x02
Motor Jam
Motor cannot move
X
0x03
ActuatorJam
Actuator jam has been detected. No movement of the actuator, but movement of the motor was detected
X
0x05
Busy
The device is busy and cannot respond until an ongoing activity is completed
0x06
ChecksumError
Checksum incorrect for otherwise valid data..
0x0B
FAIL
Abnormal response. Indicates that a procedure has not been executed successfully
X
0x0E
NotCalibrated
The device has not completed a calibration operation, or calibration has been lost
X
0x0F
NotConfigured
Actuator configuration data is missing
X
0x11
HardwareError
Any hardware error which cannot be classified. May not be reported as an alarm until the fault is likely to be persistent
X
X
0x13
OutOfRange
A parameter given by an operator (e.g. tilt value or memory offset) is out of range
0x19
UnknownProcedure
Received procedure code is not defined
X
0x1D
ReadOnly
Invalid device data parameter usage
X
0x1E
UnknownParameter
Specified parameter is not supported for the used procedure
X
0x21
WorkingSoftwareMissing
The unit is inDownloadMode state. Returned upon unsupported procedure when in DownloadMode state
X
0x22
InvalidFileContent
The data being downloaded is detected to be of wrong format or size
X
0x24
FormatError
Procedure message is inconsistent or if an addressed field or antenna is invalid or the data parameter field length is inconsistent with the corresponding field length parameter
X
0x25
UnsupportedProcedure
The procedure is optional and not supported or the procedure does not apply to this device type
0x26
InvalidProcedureSequence
Procedure sequence as described in annex C is expected but not experienced by the secondary device
0x27
ActuatorInterference
An actuator movement outside the control of the RET unit has been detected. Probable cause is manual interference
X
Annex B (normative):
Assigned fields for additional data
The following standard fields have no operational impact and are used by the procedures SetDeviceData, GetDeviceData, AntennaSetDeviceData and AntennaGetDeviceData. Little endian order is used for storage of multiple-octet numbers. Where ASCII variables are shorter than the assigned field lengths the characters are right aligned and leading blanks are filled with null characters (0x00).
Table B.1: Assigned fields for additional data
Field No.
Length (octets)
Format
Description
0x01
15
ASCII
Antenna model number
0x02
17
ASCII
Antenna serial number
0x03
2
16-bit unsigned
Antenna operating band(s): see below
0x04
8
4 x 16-bit unsigned
Beamwidth for each operating band in band order (deg), beginning with lowest band. The lowest band is transmitted within the first 16-bit value. (unused values are assigned to 0x0000)
(example: width for band I, width for band III)
0x05
4
4 x 8-bit unsigned
Gain [dBi] for each operating band in band order , expressed in gain value times 10 , beginning with the lowest band. The lowest band is transmitted within the first 8-bit value. (unused values are assigned to 0x00)
(example: gain for band I, gain for band III)
0x06
2
16-bit signed
Maximum supported electrical tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1
0x07
2
16-bit signed
Minimum supported electrical tilt tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1
0x21
6
ASCII
Installation date
0x22
5
ASCII
Installer's ID
0x23
32
ASCII
Base station ID
0x24
32
ASCII
Sector ID
0x25
2
16-bit unsigned
Antenna bearing [degree], in the range of 0 – 359,9 degree, expressed as bearing value times 10
0x26
2
16-bit signed
Installed mechanical tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1
Table B.2: Coding for operating bands in field 0x03
Bit no
15…10
9
8
7
6
5
4
3
2
1
0
Operating band
Spare
X
IX
VIII
VII
I
II
III
IV
V
VI
The operating bands are defined in subclause 4.3.7 in [4].
Bits are numbered from 0 to 15, bit no 0 set=1 represents the value 0x0001.
Bit set=1 represents operating band is supported.
Bit set=0 represents operating band is not supported.
Spare bits shall be set=0.
Unused Beamwidth and Gain octets shall be set to 0x0000.
Examples of operating bands: 0000 0000 0001 0000 = Operating band II
0000 0000 0011 1000 = Operating band I, II and III
Annex C (normative):
Procedure sequence for download of software to a secondary device
Figure C.1: Procedure sequence for Software Download
The erasure of the secondary device application software shall not be done before the reception of the Download Application message. The data content of the Download Application message is implementation specific but it is recommended to support an application software validity feature that shall minimise the risk of downloading faulty or invalid application software.
Annex D (informative):
Overview of elementary procedures
Table D.1: Elementary Procedures and Procedure Codes
Elementary Procedure
Procedure Code
Issued by
DownloadMode state
Common Procedure Set
(Reserved)
0x01
Reset Software
0x03
primary device
yes
Get Alarm Status
0x04
primary device
no
Get Information
0x05
primary device
yes
Clear Active Alarms
0x06
primary device
no
Read User Data
0x10
primary device
no
Write User Data
0x11
primary device
no
Alarm Subscribe
0x12
primary device
no
Self Test
0x0A
primary device
no
Download Start
0x40
primary device
yes
Download Application
0x41
primary device
yes
Download End
0x42
primary device
yes
Vendor Specific Procedure
0x90
primary device
Vendor specific
Single-Antenna Procedure Set
Set Device Data
0x0E
primary device
no
Get Device Data
0x0F
primary device
no
Calibrate
0x31
primary device
no
Send Configuration Data
0x32
primary device
no
Set Tilt
0x33
primary device
no
Get Tilt
0x34
primary device
no
Alarm Indication
0x07
secondary device
no
Multi-Antenna Procedure Set
Antenna Calibrate
0x80
primary device
no
Antenna Send Configuration Data
0x89
primary device
no
Antenna Set Tilt
0x81
primary device
no
Antenna Get Tilt
0x82
primary device
no
Antenna Set Device Data
0x83
primary device
no
Antenna Get Device Data
0x84
primary device
no
Antenna Alarm Indication
0x85
secondary device
no
Antenna Clear Active Alarms
0x86
primary device
no
Antenna Get Alarm Status
0x87
primary device
no
Antenna Get Number of Antennas
0x88
primary device
no
NOTE: The notion "yes" in the DownloadMode state column indicates that the listed procedures are mandatory if the DownloadMode state can be entered by the secondary device.
Annex E (informative):
Change history
Change history
Date
TSG #
TSG Doc.
CR
Rev
Subject/Comment
Old
New
September 2004
TSG-RAN#25
RP-040346
_
_
presentation to TSG-RAN for information
_
1.0.0
September 2004
TSG-RAN#25
RP-040346
_
_
approved at TSG-RAN#25 and placed under change control
1.0.0
6.0.0
12/2004
26
RP-040445
1
2
Reduction of risk of accidentional erasure of Ret application SW
6.0.0
6.1.0
12/2004
26
RP-040445
2
-
Clarification of allowed tilt operation during self test
6.0.0
6.1.0
12/2004
26
RP-040445
3
-
State Model for RET device
6.0.0
6.1.0
12/2004
26
RP-040445
4
-
Corrections and editorial changes to 25.463 according to RAN3#44
6.0.0
6.1.0
12/2004
26
RP-040445
5
1
Antenna Send Configuration Data procedure missing
6.0.0
6.1.0
12/2004
26
RP-040445
7
1
Introduction of Software Download State model
6.0.0
6.1.0
12/2004
26
RP-040445
8
3
Alarm handling clarification
6.0.0
6.1.0
12/2004
26
RP-040445
9
2
RET DC power consumption clarification
6.0.0
6.1.0
12/2004
26
RP-040445
10
2
Response message format clarification
6.0.0
6.1.0
12/2004
26
RP-040445
12
2
Return code clean-up and clarification
6.0.0
6.1.0
12/2004
26
RP-040445
15
2
Clarification on the intention of the elementary procedures ReadUserData and WriteUserData
6.0.0
6.1.0
12/2004
26
RP-040445
16
2
Maximum data payload size in elementary procedures
6.0.0
6.1.0
12/2004
26
RP-040445
17
-
Definition of response time in the appication layer
6.0.0
6.1.0
12/2004
26
RP-040445
18
2
Redefinition of the Elementary Procedures GetDeviceData and SetDeviceData
6.0.0
6.1.0
03/2005
27
RP-050061
20
Wrong numbering in table 6.7.6.2
6.1.0
6.2.0
03/2005
27
RP-050061
23
1
Editorial Corrections to 25.463 after RAN3#45
6.1.0
6.2.0
03/2005
27
RP-050061
24
Minor Corrections to 25.463 after RAN3#45
6.1.0
6.2.0
03/2005
27
RP-050061
25
2
Clarification on antenna movement during Set Tilt
6.1.0
6.2.0
03/2005
27
RP-050061
26
1
Redefinition or the Software Reset procedure
6.1.0
6.2.0
06/2005
28
RP-050237
31
Antenna Set Device Data
6.2.0
6.3.0
06/2005
28
RP-050237
32
Editorial Corrections to 25.463
6.2.0
6.3.0
06/2005
28
RP-050237
35
Clarification of Tilt
6.2.0
6.3.0
06/2005
28
RP-050237
36
Definition of "empty string"
6.2.0
6.3.0
06/2005
28
RP-050237
37
Improvement of Annex B
6.2.0
6.3.0
06/2005
28
RP-050237
38
Vendor specific procedure
6.2.0
6.3.0
06/2005
28
RP-050237
39
2
Set Tilt Correction
6.2.0
6.3.0
06/2005
28
RP-050237
43
3
Parallel procedure handling
6.2.0
6.3.0
06/2005
28
RP-050237
48
Forward and backward compatibility clarification
6.2.0
6.3.0
06/2005
28
RP-050226
34
Introduction of UMTS 2.6 GHz frequency band definition
6.3.0
7.0.0
09/2005
29
RP-050439
54
Missing definitions for Vendor Specific EP
7.0.0
7.1.0
12/2005
30
RP-050703
55
Introduction of UMTS 900
7.1.0
7.2.0
12/2005
30
RP-050704
56
Introduction of UMTS 1700
7.1.0
7.2.0
06/2006
32
RP-060286
58
1
Return codes in response message
7.2.0
7.3.0
12/2006
34
RP-060704
59
Introduction of Band X (Extended UMTS 1.7/2.1 GHz) in 25.463
7.3.0
7.4.0
03/2007
35
RP-070055
61
1
Disregarded message length (paragraph 6.2.2)
7.4.0
7.5.0
03/2007
35
RP-070055
63
1
Correction of MaxDataReceiveLength
7.4.0
7.5.0
03/2007
35
RP-070055
65
3
Correction of procedure message interpretation
7.4.0
7.5.0
03/2007
35
RP-070055
67
1
Correction of additional data resolution description (Annex B)
7.4.0
7.5.0
03/2007
35
RP-070055
69
1
Definition of antenna bearing resolution (Annex B)
7.4.0
7.5.0
03/2007
35
RP-070055
71
1
Clarification of additional data beamwidth description
7.4.0
7.5.0
NOTE: Contents of the present TS is transferred to 3GPP TS 25.466, and 25.463 was closed at RAN#35. No further maintenance will be performed on the present document.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 1 Scope
| Editor's note: clean up the scope in each part.
The present document is one of a multi-part TS, and contains objectives, requirements and test cases that are specific to the Lawful Interception elements of a 3GPP network: Administration Function (ADMF), Point of Interception (POI), Triggering Function (TF), Location Acquisition Requesting Function (LARF), Mediation and Delivery Function (MDF).
It refers to the TS 33.117 Catalogue of general security assurance requirements [2] and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique to the Lawful Interception system.
The present document covers SCAS tests for NF-embedded LI functions.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 2 References
| The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
- References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
- For a specific reference, subsequent revisions do not apply.
- For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications".
[2] 3GPP TS 33.117: "Catalogue of general security assurance requirements".
[3] 3GPP TS 33.916: "Security Assurance Methodology (SECAM) for 3GPP network products".
[4] 3GPP TS 33.926: "Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes".
[5] 3GPP TS 33.126: "Lawful Interception Requirements".
[6] 3GPP TS 33.127: "Lawful Interception (LI) architecture and functions".
[7] 3GPP TS 33.128: "Protocol and procedures for Lawful Interception (LI); Stage 3".
[8] Editor's Note: TODO: NESAS "How to"
[X] Editor's Note: TODO: Add TS 103-221-1
…
[x] <doctype> <#>[ ([up to and including]{yyyy[-mm]|V<a[.b[.c]]>}[onwards])]: "<Title>".
It is preferred that the reference to TR 21.905 be the first in the list.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 3 Definitions of terms, symbols and abbreviations
| This clause and its three (sub) clauses are mandatory. The contents shall be shown as "void" if the TS/TR does not define any terms, symbols, or abbreviations.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 3.1 Terms
| For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1].
Definition format (Normal)
<defined term>: <definition>.
example: text used to clarify abstract rules by applying them literally.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 3.2 Symbols
| For the purposes of the present document, the following symbols apply:
Symbol format (EW)
<symbol> <Explanation>
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 3.3 Abbreviations
| For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1].
Abbreviation format (EW)
<ABBREVIATION> <Expansion>
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 4 Overview
| 4.1 Approach
This TS was developed based on the guidance and methodology described in 3GPP TR 33.916 "Security Assurance Methodology (SECAM) for 3GPP network products" [3]. 3GPP has organized SCAS documents by publishing one TS per architectural network element. In contrast, we take a different approach in the LI space and collect all LI SCAS in the present TS.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 5 Prerequisites
| 5.1 Network administration
There are multiple privilege levels in the network. At a minimum, there are at least two:
• Lawful Interception privileged
• Non-LI privileged
Editor's Note: here are at least three categories: "root," "day-to-day operations," LI
Deployments in the field may split access more granularly, but this is the minimum required to perform tests in the present specification.
5.2 Prerequisite Tests
All test described in TS 33.117 apply to the present document. Clause 6 of the present document contains variances or extensions particular to the Lawful Interception system.
6 Variances and Extensions
Editor’s Note: This will be the landing spot of the separate tracking spreadsheet.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 6.1.1 System Hardening
| |
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 6.1.2 Authentication and Access Control
| |
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 6.1.3 POI Implementation
| |
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 6.1.4 Transport/API Security
| |
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 6.1.5 Virtualisation
| |
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 7 Additional NF-Embedded-LI SCAS
| 7.1 Introduction
The present clause contains requirements and test cases that pertain to NF-Embedded LI elements, such as POIs, TFs.
7.2 Requirements
The following TS 33.126 requirements are tested in the present document:
TS 33.126 R6.6-30: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
Editor's Note: This section will contain a full listing of requirements covered in this document.
7.3 Test cases
7.3.1 Baseline
7.3.1.1 Unauthorized detection of target under LI, log leak method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-LOG-01
Test case:
Test Name: TC_LI_EMBEDDED_LOG_LEAK
Purpose:
Ensure that general privileged administrators cannot detect whether an a-priori chosen subscriber is under LI.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared an account with sufficient privileges to access logs.
Execution Steps
Execute the following steps:
1. The tester notes the start time of the test, to be used later to pull the log that corresponds to the test period.
2. The tester starts a communication session from any user account and records any identifiers pertaining to this account.
3. The tester stops the communication session.
4. The tester pulls the logs from the NF for the period of the communication session.
5. The tester sets this log aside for later comparison with another.
6. The tester logs into the LI privileged account on the ADMF and sets up the same user account used in step 2 as an LI target.
7. The tester performs the same previous steps (1 through 5) from the LI target account.
8. The tester diffs the two logs.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester submits a human-readable diff and a plain-language conclusion whether the general privileged admin can use this log leak method to ascertain that LI is occurring.
7.3.1.2 Unauthorized detection of target under LI, configuration file method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-CONFIG-02
Test case:
Test Name: TC_LI_EMBEDDED_CONFIG_DIFF_ANALYSIS
Purpose:
Ensure that general privileged administrators (e.g., config reviewers, system auditors) cannot detect that interception is taking place by analysing configuration files before and after LI provisioning.
Editor's note: configuration aspects other than configuration files are not covered by this test case.
Procedure and execution steps:
Pre-Condition:
1. The tester has administrative access to a network element that contains a POI that supports configuration snapshots.
2. An LI system is available in the network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. The configuration mechanism is file-based or produces structured output (e.g., XML, YAML, JSON).
5. The system supports exporting these configurations.
Execution Steps
Execute the following steps:
1. The tester logs in using the general privileged account and exports a complete configuration snapshot.
2. The snapshot is timestamped and saved securely for later comparison.
3. The tester logs in using the LI privileged account and provisions an interception target.
4. The tester repeats the configuration export from the general privileged account.
5. The tester performs a diff on the two snapshots.
6. The tester inspects the diff for any structural or content-level indication that LI has been configured, including:
a. new service entries
b. altered service entries
c. any difference that could indicate LI activity
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester submits a human-readable diff and a plain language conclusion on whether any observed changes in config can be used to infer the presence of an LI target.
7.3.1.3 Unauthorized detection of LI, CPU utilization side-channel attack method one
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-RES-CPU-03
Test case:
Test Name: TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_CPU_METHOD_ONE
Purpose:
Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared appropriate CPU utilization monitoring tools. The availability of these depends on the platform. The following are offered as non-exhaustive examples: top, htop, mpstat, vmstat, iostat -c for physical hosts, or top, virsh domstats / virt-top, cgroups/systemd-cgtop, docker stats for virtual deployments.
Execution Steps
Execute the following steps:
1. The tester measures the CPU utilization on the host, notes the baseline.
2. The tester starts a new communication session as a regular network user, using any network user account.
3. The tester takes a new measurement of the CPU utilization, records the measurement, and calculates the delta between the baseline from step 1 and this new value. It is essential that these two measurements be as close in time as possible. An automated (scripted) process should be used to take multiple samples.
4. The tester inserts a new target into the LI stack, provisioning the interception for full content.
5. The tester repeats the above measurements steps.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 7.3.1.4 Unauthorized detection of LI, CPU utilization side-channel attack method two
| Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-RES-CPU-04
Test case:
Test Name: LI_EMBEDDED_UNAUTHORISED_INTERCEPTION_DETECTION_CPU_METHOD_TWO
Purpose:
Ensure that non-LI authorized network administrators cannot detect whether the LI function in an NF is performing interception.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a voice communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared appropriate CPU utilization monitoring tools. The availability of these depends on the platform. The following are offered as non-exhaustive examples: top, htop, mpstat, vmstat, iostat -c for physical hosts, or top, virsh domstats / virt-top, cgroups/systemd-cgtop, docker stats for virtual deployments.
Execution Steps
Execute the following steps:
1. The tester logs into the system from both the non-LI-authorized account and the LI-authorized account.
2. The tester measures the CPU utilization on the host, notes the baseline.
3. The tester conducts a call using a test device configured as a regular network user, and:
a. Continuously monitors the CPU utilization
b. Records the raw CPU utilization measurements at the following steps of the call:
i. STEP 1 (Initial INVITE is seen at the NF)
ii. STEP 2 (call is answered)
iii. STEP 3 (BYE is seen at the NF)
iv. STEP 4 (Session is closed)
4. For each measurement in step 3b, the tester calculates the delta between the baseline and the measured CPU utilization.
5. The tester repeats steps 2-4 five times and calculates the average CPU usage at each step.
6. The tester (in LI-authorized mode) activates a new task to intercept the test device including both IRI and CC with no service scoping.
7. The tester (in non-LI-authorized mode) repeats steps 2-5.
8. The tester compares the average calculated in step 5 with the average calculated in step 7.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively, along with a plain-language conclusion whether the non-LI-authorised admin can use the CPU utilization side channel to detect LI.
7.3.1.5 Unauthorized detection of target under LI, bandwidth utilization side-channel attack method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-RES-NET-05
Test case:
Test Name: TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_BANDWIDTH_METHOD
Purpose:
Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a voice communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared appropriate network bandwidth probes on all the network interfaces on the NF. The availability of these depends on the platform. The following are offered as non-exhaustive examples: iftop, nload, ip -s link, bmon, etc. in physical hosts, or ethtool -S <iface>, ovs-vsctl or ovs-ofctl for Open vSwitch, libvirt / virsh domifstat for KVM/QEMU VMs, cAdvisor / Prometheus and Grafana for Docker/Kubernetes virtual deployments
Execution Steps
Execute the following steps:
1. The tester measures the network interface utilization on the host, notes the baseline.
2. The tester starts a new communication session as a regular network user, using any network user account.
3. The tester takes a new measurement of the network interface utilization, records the measurement, and calculates the delta between the baseline from step 1 and this new value. It is essential that these two measurements be as close in time as possible. An automated (scripted) process should be used to take five samples.
4. The tester inserts a new target into the LI stack, provisioning the interception for full content.
5. The tester repeats the above measurements steps.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity.
7.3.1.6 Detection of LI via Timing Anomalies
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-TIMING-06
Test case:
Test Name: TC_LI_EMBEDDED _TIMING_SIGNATURE_LEAK
Purpose:
Ensure that LI activity cannot be detected by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic.
Procedure and execution steps:
Pre-Condition:
1. The tester has access to all network interfaces on the network function that contains the POI.
2. The tester has LI privileges and can activate LI on the same network function.
3. The tester has access to traffic timing statistics or packet captures from the POI-to-MDF interface and can also stimulate LI traffic.
4. An LI system is ready to provision IRI and CC.
Execution Steps
Execute the following steps:
1. Tester provisions a high-content communication session (e.g., 60 seconds of voice or data) between two non-LI involved endpoints, one of which is on the same network function as the POI.
2. The tester captures packet timing and burst intervals over a 5-minute window under no LI activity as a baseline.
3. The tester provisions an interception target on the POI in the NF under test.
4. The tester starts a communication session between the target and another party, that will cause the POI to capture and deliver LI product.
5. The tester repeats the measurements under LI-active conditions.
6. The tester applies statistical analysis (e.g., inter-packet arrival histograms, burst length variability) to both captures.
Expected Results:
It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active.
Expected format of evidence:
A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies.
Editor's Note: The group has discussed tests up to here (specifically, 7, 8, 9 haven't been discussed - but 10 and further have.)
7.3.1.7 Detection of MDF to LEMF LI Product Flow via Timing Anomalies
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-TIMING-07
Test case:
Test Name: TC_LI_EMBEDDED_MDF_LEMF_LI_PRODUCT_TIMING_SIGNATURE_LEAK
Purpose:
Ensure that internal administrators with access to MDF/LEMF transport segments cannot detect the presence of LI activity by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic.
Procedure and execution steps:
Pre-Condition:
1. The MDF and LEMF are logically separate components on the network.
2. The LI product transport between MDF and LEMF is observable at a transport layer (e.g., netflow, mirrored span port).
3. The tester has access to traffic timing statistics or packet captures from the MDF-to-LEMF interface.
4. An LI system is ready to provision IRI and CC.
Execution Steps
Execute the following steps:
1. The tester captures packet timing and burst intervals between MDF and LEMF over a 5-minute window under no LI activity.
2. The tester provisions a new target for full IRI and CC.
3. The tester repeats the traffic capture under LI-active conditions.
4. The tester applies statistical analysis (e.g., inter-packet arrival histograms, burst length variability) to both captures.
Expected Results:
It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active.
Expected format of evidence:
A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies.
7.3.1.8 Interruption of POI-MDF Link
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-INTERRUPTION-07
Test case:
Test Name: TC_LI_EMBEDDED_POI-MDF_LINK_FAULT_CONDITIONS
Purpose:
To ensure that the LI system does not exhibit differential behaviour during delivery path faults between POI and MDF, such that an internal administrator without LI privilege cannot distinguish whether LI is active based on service degradation patterns.
Procedure and execution steps:
Pre-Condition:
1. A test call generator and an LI system are available to initiate full CC/IRI on a test UE.
2. The network segment between POI and MDF is under controlled lab conditions, capable of simulating link failure (e.g., disabling an interface, simulating packet drop via tc or iptables).
3. Logging mechanisms on POI/MDF are available for correlation.
Execution Steps
Execute the following steps:
1. Tester provisions a high-content communication session (e.g., 60 seconds of voice or data) between two non-LI involved endpoints, one of which is on the same network function as the POI.
2. At second 30 of the call, tester introduces an artificial failure on the LI product delivery path (e.g., disables interface, blocks TCP/UDP port).
3. Tester restores the path at second 45.
4. Tester monitors the communication from step 1 for:
a. Gaps
b. Jitter or misaligned timestamps
c. Recovery mechanisms triggered (e.g., buffering, retransmit)
d. Log entries on the NF
5. Tester provisions interception of a high-content session (e.g., 60 seconds, voice or data) on a separate target (not the same as the endpoint in step 1) on the same logical node.
6. Tester performs the same procedure from steps 2-4.
7. Tester compares the behaviour of the function between the two cases.
Expected Results:
The NF is expected to behave in the same way in both cases (LI active and not active).
Expected format of evidence:
Packet trace timestamps, POI/MDF log excerpts, and human-readable summary of whether the system degraded gracefully or failed differently in the two cases.
7.3.1.9 Unauthorized detection of target under LI, TLS session count method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-SESSION-COUNT-09
Test case:
Test Name: TC_LI_EMBEDDED_SESSION_COUNT_ANALYSIS
Purpose:
Ensure that lawful interception provisioning does not create observable differences in TLS session counts or handshake patterns that could be used to infer LI activity.
Procedure and execution steps:
Pre-Condition:
1. The network or function uses TLS for control or media transport.
2. TLS session logs, counters, or telemetry are accessible to general privileged roles.
3. LI infrastructure is in place and uses secure links.
Execution Steps
Execute the following steps:
1. The tester initiates standard traffic sessions and records the number of TLS sessions/handshakes initiated per session from the general privileged account.
2. The tester provisions an LI target and repeats the session.
3. The tester compares the TLS session metrics between the surveilled and non-surveilled flows.
4. The tester analyses whether additional TLS handshakes (e.g., toward MDF) correlate with the surveilled session.
5. The tester checks whether handshake timing, mutual TLS behaviour, or cert exchange patterns leak interception status.
Expected Results:
It is expected that the TLS metrics are be indistinguishable between surveilled and non-surveilled flows. LI MDF must not be visible as secondary TLS endpoints or cause measurable handshake side effects.
Expected format of evidence:
The tester supplies a TLS session count comparison and an interpretation of whether a general privileged observer could detect LI activity from the metrics.
Editor's note: for the next message (TLS) cast a wider net:
1. reverse direction
2. X2/3
3. send X1 commands on an X2/3 (or other SBI) interface
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 7.3.1.10 LI_X1 HTTP connection is disallowed
| Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01,
Attacker reference: AT-INTERNAL-01,
Threat reference: T-CONFIG-02, T-INTERFACE-SEC-10
Test case:
Test Name: TC_LI_EMBEDDED_X1_HTTP_DISALLOWED
Purpose:
To verify that non secured X1 connection attempts fail.
Procedure and execution steps:
Pre-Condition:
Execution Steps
Execute the following steps:
1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP.
Expected Results:
The HTTP transaction fails.
Expected format of evidence:
Any suitable evidence (e.g. output of netcat or packet capture), or plain language description of the failure.
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 7.3.1.11 LI_X1 is protected by TLS
| Editor's Note: Is there a way to verify the layer 3/4 handshake only, without using any meaningful application layer message as a first step - using a simple testing harness/simulator, that doesn't necessarily have any layer 7/app layer knowledge.
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01,
Attacker reference: AT-INTERNAL-01,
Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers)
Editor's Note: Mutually authenticated TLS
Threat reference: T-CONFIG-02 Editor's Note: this test is relevant whether this is configurable or hard-coded - T-INTERFACE-SEC-10
Test case:
Test Name: TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS
Purpose:
To verify that TLS is used to protect LI_X1.
Procedure and execution steps:
Pre-Condition:
1. The POI under test shall expose an ETSI TS 103 221-1 LI_X1 interface
2. The tester shall have the capability to connect to LI_X1 over HTTPS (including relevant certificates).
Execution Steps
Execute the following steps:
1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTPS and supplying valid credentials.
2. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP.
Expected Results:
The HTTPS transaction from execution step 1 succeeds.
The HTTP transaction from execution step 2 does not succeed (fails at the transport layer).
Expected format of evidence:
Any suitable evidence (e.g. output of netcat or packet capture).
|
b4c51a57e104b0092e2dd0e80dd56a84 | 33.129-2 | 7.3.1.12 LI_X1 is protected by TLS - failure for other reasons
| Editor's Note: Is there a way to verify the layer 3/4 handshake only, without using any meaningful application layer message as a first step - using a simple testing harness/simulator, that doesn't necessarily have any layer 7/app layer knowledge.
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01,
Attacker reference: AT-INTERNAL-01,
Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers)
Editor's Note: Mutually authenticated TLS
Threat reference: T-CONFIG-02 Editor's Note: this test is relevant whether this is configurable or hard-coded - T-INTERFACE-SEC-10
Test case:
Test Name: TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS
Purpose:
The tester shall prove that using anything else but a valid certificate will fail.
Editor's Note: write separate tests for the following:
e.g.:
1. expired certs
2. revoked certs
3. cert IDs don’t match the LI_X1 IDs
4. LI_X1 ID (or other parameters) missing altogether
5. NEID in LI_X1 doesn't match the NEID of the POI under test
6. valid cert that hangs under the wrong root of trust
7. partial vs full cert chain verification by the POI (root of trust is valid, but the sub-CA is wrong)
Procedure and execution steps:
Pre-Condition:
1.
2.
3. The POI under test shall expose an ETSI TS 103 221-1 LI_X1 interface
4. The tester shall have the capability to connect to LI_X1 over HTTPS (including relevant certificates).
Execution Steps
Execute the following steps:
1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTPS and supplying valid credentials.
2. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP.
Expected Results:
The HTTPS transaction from execution step 1 succeeds.
The HTTP transaction from execution step 2 does not succeed (fails at the transport layer).
Expected format of evidence:
Any suitable evidence (e.g. output of netcat or packet capture).
Editor's note: Write MOAT: The tester shall verify that ALL interfaces are not vulnerable to the top (20?) common OWASP vulnerabilities / CBEs
7.3.2 Additional Tests
Editor's Note: This clause will contain tests that are not directly traceable to TS 33.126 requirements
7.3.2.1 COMMON New Requirement Test Name
Annex <A> (normative):
<Normative annex for a Technical Specification>
Start each annex on a new page.
Annexes are labelled A, B, C, etc. and designated either "normative" or "informative" depending on their content.
Normative annexes only to appear in Technical Specifications. Use style "Heading 8".
Annex <B> (informative):
<Informative annex for a Technical Specification>
Informative annexes may appear in both Technical Specifications and Technical Reports. Use style "Heading 8" for use in TSs.
Informative annexes shall not contain requirements for the implementation of the Technical Specification.
B.1 Heading levels in an annex
Heading levels within an annex are used as in the main document, but for Heading level selection, the "A.", "B.", etc. are ignored. e.g. B.1.2 is formatted using Heading 2 style.
Annex <C>:
<Informative annex title for a Technical Report>
Informative annexes in Technical Reports do not use "(informative") in the title, since all annexes in TRs are informative. Use style "Heading 9" in TRs.
Annex <D> (informative):
Bibliography
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
The Bibliography is optional. If it exists, it shall follow the last technical annex in the document.
The following material, though not specifically referenced in the body of the present document (or not publicly available), gives supporting information.
Bibliography format
<Publication>: "<Title>".
Annex <E> (informative):
Index
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
The Index is optional. If it exists, it shall immediately precede the Changes history annex.
Generate the index using MS Word's index field feature.
Annex <F> (informative):
Change history
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
This is the last annex for TS/TSs which details the change history using the following table.
This table is to be used for recording progress during the WG drafting process till TSG approval of this TS/TR.
For TRs under change control, use one line per approved Change Request
Date: use format YYYY-MM
CR: four digits, leading zeros as necessary
Rev: blank, or number (max two digits)
Cat: use one of the letters A, B, C, D, F
Subject/Comment: for TSs under change control, include full text of the subject field of the Change Request cover
New vers: use format [n]n.[n]n.[n]n
Change history
Date
Meeting
TDoc
CR
Rev
Cat
Subject/Comment
New version
2025-07
SA3#98-LI
s3i250358
-
-
-
First introduction of baseline to the group.
0.0.10
Change history of this template:
2001-07
Copyright date changed to 2001; space character added before TTC in copyright notification; space character before first reference deleted.
1.3.3
2002-01
Copyright date changed to 2002.
1.3.4
2002-07
Extra Releases added to title area.
1.3.5
2002-12
"TM" added to 3GPP logo.
1.3.6
2003-02
Copyright date changed to 2003.
1.3.7
2003-12
Copyright date changed to 2004. Chinese OP changed from CWTS to CCSA
14.0
2004-04
North American OP changed from T1 to ATIS
1.5.0
2005-11
Stock text of clause 3 includes reference to 21.905.
1.6.0
2005-11
Caters for new TSG structure. Minor corrections.
1.6.1
2006-01
Revision marks removed.
1.6.2
2008-11
LTE logo line added, © date changed to 2008, guidance on keywords modified; acknowledgement of trade marks; sundry editorial corrections and cosmetic improvements
1.7.0
2010-02
3GPP logo changed for cleaner version, with tag line;
LTE-Advanced logo line added;
© date changed to 2010;
editorial change to cover page footnote text;
trade marks acknowledgement text modified;
additional Releases added on cover page;
proforma copyright release text block modified
1.8.0
2010-02
Smaller 3GPP logo file used.
1.8.1
2010-07
Guidance note concerning use of LTE-Advanced logo added.
1.8.2
2011-04-01
Guidance of use of logos on cover page modified; copyright year modified.
1.8.3
2013-05-15
Changed File Properties to MCC macro default.
Removed R99, added Rel-12/13.
Modified Copyright year.
Guidance on annex X Change history.
1.8.4
2014-10-27
Updated Release selection on cover. In clause 3, added "3GPP" to TR 21.905.
1.8.5
2015-01-06
New Organizational Partner TSDSI added to copyright block.
Old Releases removed.
1.9.0
2015-12-03
Provision for LTE Advanced Pro logo
Update copyright year to 2016
1.10.0
2016-03-08
Standarization of the layout of the Change History table in the last annex.(Unreleased)
1.11.0
2016-06-15
Minor adjustment to Change History table heading
1.11.1
2017-03-13
Adds option for 5G logo on cover
1.12.0
2017-05-03
Smaller 5G logo to reduce file size
1.12.1
2019-02-25
Replacement of frames on cover pages by in-line text.
Clarification of help text on when to use 5G logo.
Removal of defunct keywords frame on page 2.
Add Rel-16, Rel-17 options, eliminated earlier, frozen, Releases (cover page, below title)
Corrections to some guidance text, addition of guidance text concerning automatic page headers under Word 2016 ff.
Use of modal auxiliary verbs added to Foreword.
More explicit guidance on Bibliography and Index annexes.
Converted to .docx format.
1.13.0
2019-09-12
Cover page table outline shown dotted for ease of logo selection. (Author to hide outline after logo selection.) User now needs to delete whole table rows instead of individual cells, which proved to be tricky.
Change of style for "notes" in the Foreword to normal paragraphs.
Insertion of new bookmarks, correction of location of existing bookmarks. (To improve navigation.)
Improvements to guidance text.
1.13.1
2021-06-18
Provision for 5G Advanced logo
Update copyright year to 2021
Additional guidance on the use of Heading 8/9 in annexes C, D and X.
1.14.0
2022-04-01
Correction of table formatting
Update copyright year to 2022
1.15.0
2023-03-14
Updated copyright year to 2023
Updated URLs from HTTP to HTTPS
Updated FTP link to HTTP counterpart
Fixed numbering of annexes
1.16.0
2024-03-19
Updated copyright year to 2024
1.17.0
2024-09-06
Adds option for 6G logo on the cover page
1.18.0
2024-10-15
Correction of table formatting to ease outline hiding after logo selection.
1.18.1
2024-10-18
Addition/removal of spaces in Release indications and update of Release in the example within the body.
Unlock "update field" for ToC
1.19.0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.