TS 101 863-3 : 1.1.2
Current
The latest, up-to-date edition.
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions, symbols and abbreviations
3.1 Definitions
3.2 Symbols
3.3 Abbreviations
4 General
5 Interworking mappings, FP attached to the UMTS PLMN, FP
C-Plane IWU procedures
5.1 Call handling IWU procedures
5.1.1 Normal outgoing call
5.1.2 Emergency call
5.1.3 Incoming call
5.1.4 Normal call release initiated by the PP
5.1.5 Normal call release initiated by the UMTS PLMN
5.1.6 Abnormal call release initiated by the PP
5.1.7 Abnormal call release initiated by the UMTS
network
5.1.8 Exceptional cases
5.1.9 Other
5.2 Other IWU procedures
5.2.1 Authentication procedures
5.2.1.1 CS authentication
5.2.2 Identity procedure
5.2.3 Location registration related procedures
5.2.4 Detach procedure
5.2.5 Temporary identity assignment procedures
5.2.6 Security procedure
5.2.6.1 Security mode failure
5.2.7 CM service procedure
5.2.8 CM service procedure abnormal cases
5.2.9 External handover procedure (FP)
5.2.9.1 General description
5.2.9.2 Handover candidate procedure
5.2.9.3 IU RELOCATION REQUIRED indication
5.2.9.4 Handover resource allocation
5.2.9.5 Handover execution by FP
5.2.9.6 IU-RELOCATION-REQUIRED to FP-2
5.2.9.7 Handover confirm by FP-2
5.2.9.8 Ciphering procedure
5.2.9.9 Handover completion
5.2.9.10 Sequence number handling
5.2.9.11 Handover reject
5.3 Paging related IWU procedure
5.4 Other specific IWU procedures
5.4.1 Equipment identity IWU procedures
5.4.2 Miscellaneous procedures
5.4.2.1 Notification of progress and interworking
5.4.2.2 User notification
5.4.3 Handling of Dual Tone Multi-Frequency (DTMF)
5.5 Exception handling
5.5.1 Error handling
5.5.2 Timers
5.5.2.1 Call handling IWU procedures
5.5.2.2 Other IWU procedures and paging procedures
6 Message mappings
6.1 UMTS to DECT
6.1.1 AUTHENTICATION REQUEST-{AUTHENTICATION-REQUEST}
6.1.2 AUTHENTICATION REJECT - {MM-INFO-SUGGEST}
6.1.3 IDENTITY-REQUEST - {IDENTITY-REQUEST}
6.1.4 TMSI REALLOCATION COMMAND -
{TEMPORARY-IDENTITY-ASSIGN}
6.1.5 SECURITY MODE COMMAND - {CIPHER-REQUEST}
6.1.6 LOCATION UPDATING ACCEPT - {LOCATE-ACCEPT}
6.1.7 LOCATION UPDATING REJECT - {LOCATE-REJECT}
6.1.8 ALERTING - {CC-ALERTING}
6.1.9 CALL-PROC - {CC-CALL-PROC}
6.1.10 CONNECT - {CC-CONNECT}
6.1.11 SETUP - {CC-SETUP}
6.1.12 DISCONNECT - {CC-RELEASE}
6.1.13 RELEASE - {CC-RELEASE-COM}
6.1.14 RELEASE COMPLETE - {CC-RELEASE-COM}
6.1.15 CM SERVICE REJECT - {CC-RELEASE-COM}
6.1.16 ABORT - {CC-RELEASE-COM}
6.1.17 CONNECT-ACK to {CC-CONNECT-ACK}
6.1.18 PROGRESS - {CC-INFO}
6.1.19 PROGRESS - {CC-NOTIFY}
6.1.20 DISCONNECT - {CC-INFO}
6.1.21 RELEASE - {CC-RELEASE}
6.1.22 START DTMF ACK - {CC-INFO}
6.1.23 START-DTMF-REJECT - {CC-INFO}
6.1.24 STOP-DTMF-ACK - {CC-INFO}
6.1.25 CM SERVICE ACCEPT - {CC-SETUP-ACK}
6.1.26 IU RELOCATION COMMAND - {MM-INFO-ACCEPT}
6.1.27 IU RELEASE COMMAND - {CC-RELEASE}
6.1.28 RELOCATION PREPARATION FAILURE - {MM-INFO-REJECT}
6.1.29 IU RELOCATION COMMAND - {MM-INFO-SUGGEST}
6.1.30 NOTIFY - {CC-INFO}
6.2 DECT to UMTS
6.2.1 {LOCATE-REQUEST} - LOCATION UPDATING REQUEST
6.2.2 {LCE-PAGE-RESPONSE} - PAGING RESPONSE
6.2.3 {AUTHENTICATION-REPLY} - AUTHENTICATION RESPONSE
6.2.4 {AUTHENTICATION-REJECT} - AUTHENTICATION FAILURE
6.2.5 void
6.2.6 {DETACH} - IMSI DETACH INDICATION
6.2.7 {TEMPORARY-IDENTITY-ASSIGN-ACK} - TMSI
REALLOCATION COMPLETE
6.2.8 {CC-SETUP} - CM SERVICE REQUEST
6.2.9 {IDENTITY-REPLY} - IDENTITY RESPONSE
6.2.10 {CC-ALERTING} - ALERTING
6.2.11 {CC-CONNECT} - CONNECT
6.2.12 {CC-INFO} (F-02) - SETUP
6.2.13 {CC-RELEASE} - DISCONNECT
6.2.14 {CC-RELEASE} - RELEASE
6.2.15 CC-RELEASE-COM - RELEASE
6.2.16 {CC-RELEASE-COM} - RELEASE-COMPLETE
6.2.17 {CC-SETUP} - SETUP
6.2.18 {CC-SETUP} - EMERGENCY SETUP
6.2.19 {CC-RELEASE} - CM SERVICE ABORT
6.2.20 {CC-INFO} - START-DTMF
6.2.21 {CC-INFO} - STOP DTMF
6.2.22 {MM-INFO-REQUEST} - IU RELOCATION REQUIRED
6.2.23 {CC-SETUP} - IU RELOCATION DETECT
6.2.24 {CC-CONNECT-ACK} - IU RELOCATION COMPLETE
6.2.25 {MM-INFO-REQUEST} - IU RELOCATION FAILURE
6.2.26 {CIPHER-REJECT} - Security mode failure
6.2.27 {-} Layer 2 ciphering - Security mode complete
7 Information element mappings
7.1 UMTS to DECT
7.1.1 Mobile identity - NWK assigned identity
7.1.2 Authentication parameter RAND - RAND1
7.1.3 Cipher key sequence number - auth type
7.1.4 void
7.1.5 Location area identification - location area
7.1.6 Identity type - identity type
7.1.7 Reject cause - reject reason
7.1.8 Bearer capabilities 1 - basic service
7.1.9 Progress indicator - progress indicator
7.1.10 Cause - release reason
7.1.11 Reject cause - release reason
7.1.12 Signal - signal
7.1.13 Keypad facility - multi display
7.1.14 Cause - multi display
7.1.15 Layer 3 information - fixed identity
7.1.16 Layer 3 information - network parameter
7.1.17 Notification indicator - multi display
7.1.18 Authentication parameter AUTN - RS
7.2 DECT to UMTS
7.2.1 Portable identity - mobile identity
7.2.2 Network assigned identity- mobile identity
7.2.3 Location area - location area identification
7.2.4 Cipher info - cipher key sequence number
7.2.5 RES - Authentication Response parameter
7.2.6 Portable identity- mobile identity
7.2.7 Basic service - CM service type
7.2.8 Basic service - bearer capabilities
7.2.9 Called-party-number - called-party-number
7.2.10 Called-party-subaddress - called-party-subaddress
7.2.11 Multi keypad - called-party-number
7.2.12 Multi keypad - keypad facility (F-10)
7.2.13 Release reason - cause
7.2.14 Info type - cause
7.2.15 Model identifier- Mobile identity
7.2.16 RES 1 - Authentication response parameter
(extension)
7.2.17 Source RNC to target RNC transparent container
7.2.18 IE Reject reason in Authentication Failure
7.2.19 IE Authentication Failure Parameter in
Authentication Failure
8 Fields in information element coding
8.1 UMTS to DECT
8.1.1 Protocol discriminator - protocol discriminator
8.1.2 Transaction identifier - transaction identifier
8.1.3 Message type - message type
8.1.4 Id for info element (IEI) - id for info element
8.1.5 Length of contents - length of contents
8.1.6 Type, (Mobile identity, NWK assigned identity)
8.1.7 Identity value, (mobile identity, NWK assigned
identity)
8.1.8 Y/N bit (encryption information - cipher info)
8.1.9 RAND field (RAND - RAND)
8.1.10 Cipher key number (key sequence - cipher key
number)
8.1.11 Extended location information (location area
identification - location area)
8.1.12 Identity group (identity type - identity type)
8.1.13 Type (identity type - identity type)
8.1.14 void
8.1.15 Portable user type, (mobile identity, portable
identity)
8.1.16 Identity value, (mobile identity - portable
identity)
8.1.17 Reject cause value - reject reason code
8.1.18 Coding-standard - coding-standard
8.1.19 Information transfer capability - basic service
8.1.20 Location - location
8.1.21 Progress-description - progress-description
8.1.22 Cause-value - release-reason-code
8.1.23 Signal value - signal value
8.1.24 Skip indicator - transaction identifier
8.1.25 Reject cause value - release reason code
8.1.26 IWU-TO-IWU information (authentication
reject/authentication and ciphering reject)
8.1.27 Cause - Release reason
8.2 DECT to UMTS
8.2.1 Protocol discriminator - protocol discriminator
8.2.2 Transaction identifier - transaction identifier
8.2.3 Message type - message type
8.2.4 Id for info element - id for info element (IEI)
8.2.5 Length of contents - length of contents
8.2.6 Length of identity value (portable identity -
mobile identity)
8.2.7 Type, (portable identity - mobile identity)
8.2.8 Portable user type, (portable identity - mobile
identity)
8.2.9 Identity value, (portable identity - mobile
identity)
8.2.10 Type, (NWK assigned identity - mobile identity)
8.2.11 Identity value, (NWK assigned identity - mobile
identity)
8.2.12 Extended location information, (location area -
location area identification)
8.2.13 Cipher key number, (cipher info - cipher key
sequence number)
8.2.14 RES field (RES - auth. response parameter)
8.2.15 Type, (portable identity - mobile identity)
8.2.16 Call class, (basic service - CM service type)
8.2.17 Basic service - information transfer capability
8.2.18 Number-type - type-of-number
8.2.19 Numbering-plan identification - numbering-plan
identification
8.2.20 Release-reason-code - cause-value
8.2.21 Transaction identifier - skip indicator
8.2.22 Type, (MANIC-MODIC - mobile identity)
8.2.23 Subaddress type - Type of subaddress
8.2.24 Parameter type - Cause Value
8.2.25 Info type - Cause
8.2.26 Reject Reason - Reject Cause Value
9 FP U-Plane IWU procedures
9.1 Service activation
10 PP C-Plane IWU mappings
10.1 CS Call handling IWU procedures
10.1.1 CS Call establishment procedure
10.1.1.1 Outgoing call
10.1.1.2 Emergency call
10.1.1.3 Incoming call
10.1.2 Call release/reject procedures
11 Other IWU procedures
11.1 CS Authentication procedure
11.2 Identity procedure
11.3 Location registration procedure
11.3.1 General
11.3.2 Normal location updating
11.3.3 Periodic location updating
11.3.4 IMSI attach procedure
11.3.5 Generic location updating procedure
11.3.5.1 Location updating initiation by the PP
11.3.5.2 Attempt counter
11.3.5.3 Location updating not accepted by the
network
11.4 Detach procedure
11.5 Temporary identity assignment procedure
11.6 Ciphering related procedure
11.7 External handover procedure (PP)
11.7.1 Handover candidate procedure
11.7.2 Handover reference retrieval
11.7.3 Handover execution by PP
11.7.4 IU-RELOCATION-REQUIRED to FP-2
11.7.5 Handover accept by PP
11.7.6 Ciphering procedure
11.7.7 Release of old connection
11.7.8 Handover reject
11.7.9 Support of external handover due to O&M
activities
11.7.10 Handling of transaction identifiers during and
after external handover
11.8 Paging related IWU procedure
11.9 Stopping of CC timers
12 Interworking connection type definitions
Annex A (normative): Derivation of the DECT ciphering key CK
A.1 Introduction
A.2 Algorithm to calculate the DECT CK from UMTS CK
Annex B (normative): Deletion of the UMTS CK, UMTS IK,
KSI(CKSN), GSM CK, TMSI and LAI
Annex C (normative): Mapping of equipment identities
Annex D (informative): Physical attachment models for the FP
D.1 Introduction
D.2 Physical attachment to the 3G MSC
D.3 Physical attachment to the GSN
Annex E (informative): Bibliography
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.