Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 5: Additional Network Feature for Mobility Management (ANF-ISIMM)

To provide basic inter-working of TETRA systems in support of user mobility.

Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno delovanje na medsistemskem vmesniku (ISI) - 5. poddel: Dodatna omrežna funkcija: upravljanje mobilnosti (ANF-ISIMM)

General Information

Status
Published
Publication Date
30-Nov-2003
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Dec-2003
Due Date
01-Dec-2003
Completion Date
01-Dec-2003
Standard
SIST ETS 300 392-3-5 E1:2003
English language
429 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)


SLOVENSKI STANDARD
01-december-2003
Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno
delovanje na medsistemskem vmesniku (ISI) - 5. poddel: Dodatna omrežna
funkcija: upravljanje mobilnosti (ANF-ISIMM)
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the
Inter-System Interface (ISI); Sub-part 5: Additional Network Feature for Mobility
Management (ANF-ISIMM)
Ta slovenski standard je istoveten z: ETS 300 392-3-5 Edition 1
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN ETS 300 392-3-5
TELECOMMUNICATION January 2000
STANDARD
Source: TETRA Reference: DE/TETRA-03001-03-5
ICS: 33.020
Key words: radio, interworking, management, mobility, TETRA, V+D
Terrestrial Trunked Radio (TETRA);
VoiceplusData(V+D);
Part 3: Interworking at the Inter-System Interface (ISI);
Sub-part 5: Additional Network Feature for Mobility Management
(ANF-ISIMM)
ETSI
European Telecommunications Standards Institute
ETSI Secretariat
Postal address: F-06921 Sophia Antipolis CEDEX - FRANCE
Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE
Internet: secretariat@etsi.fr - http://www.etsi.org
Tel.:+33492944200- Fax:+33493654716
Copyright Notification: No part may be reproduced except as authorized by written permission. The copyright and the
foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2000. All rights reserved.

Page 2
ETS 300 392-3-5: January 2000
Whilst every care has been taken in the preparation and publication of this document, errors in content,
typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to
"ETSI Standards Making Support Dept." at the address shown on the title page.

Page 3
ETS 300 392-3-5: January 2000
Contents
Foreword.15
1 Scope .17
2 References .18
3 Definitions and abbreviations .19
3.1 Definitions .19
3.2 Abbreviations .21
4 Overview.22
4.1 General .22
4.2 Applicability .22
4.2.1 Entities.22
4.2.2 Services.22
4.3 Testability.23
4.4 Provision/withdrawal .23
4.5 Activation/deactivation .23
4.6 Charging.24
5 The generic ANF-ISIMM stage 1 service model.24
5.1 ANF-ISIMM - the service provider.24
5.2 SwMI MMs - the ANF-ISIMM service users .24
5.3 Stage 1 description conventions .25
6 Migration service description (stage 1).26
6.1 Pre-requisite requirements for the migration service.26
6.2 Service definition.26
6.3 Service description.26
6.4 Service architecture .27
6.5 Normal procedures .27
6.5.1 Invocation .27
6.5.1.1 Invocation criteria.27
6.5.1.2 Invocation of ANF-ISIMM.28
6.5.2 Operation.30
6.5.2.1 Migration with pre-defined migration profile(s).30
6.5.2.1.1 Support for call restoration.31
6.5.2.1.2 Final migration approval.31
6.5.2.2 Migration with migration profile exchange .32
6.5.2.2.1 Basic migration profile exchange.33
6.5.2.2.2 SS-migration profile(s) exchange .42
6.5.2.2.3 Support for call restoration.45
6.5.2.2.4 Final migration approval.45
6.5.2.2.5 SS-migration profile exchange after
final migration approval.45
6.6 Exceptional procedures .46
6.6.1 Detected by the visited SwMI MM .47
6.6.2 Detected by the home SwMI MM .48
6.7 Interactions .48
6.7.1 Interactions with the authentication service.48
6.7.2 Interactions with the group attachment and the group detachment
services .48
6.8 Dynamic description.49
7 Restricted migration service description (stage 1) .53
7.1 Pre-requisite requirements for the restricted migration service .53
7.2 Service definition.53

Page 4
ETS 300 392-3-5: January 2000
7.3 Service description . 53
7.4 Service architecture. 54
7.5 Normal procedures. 54
7.5.1 Invocation. 54
7.5.1.1 Invocation criteria . 54
7.5.1.2 Invocation of ANF-ISIMM . 55
7.5.2 Operation . 58
7.5.2.1 Operation when the visited SwMI MM invokes restricted
migration . 58
7.5.2.2 Invocation of RSI. 59
7.5.2.3 Support for emergency call restoration . 59
7.5.2.4 Receipt of restricted migration approval. 59
7.6 Exceptional procedures. 60
7.6.1 Detected by the visited SwMI MM. 61
7.6.2 Detected by the home SwMI MM. 61
7.7 Interactions. 61
7.7.1 Interactions with the authentication service . 61
7.7.2 Interactions with the group attachment and the group detachment
services. 61
7.8 Dynamic description . 61
8 Removal of Subscriber Information (RSI) service description (stage 1). 63
8.1 Service definition . 63
8.2 Service description . 63
8.3 Service architecture. 64
8.4 Normal procedures. 64
8.4.1 Invocation. 64
8.4.1.1 Invocation criteria . 64
8.4.1.2 Invocation of ANF-ISIMM . 65
8.4.2 Operation . 66
8.5 Exceptional procedures. 67
8.6 Interaction with authentication. 68
8.7 Dynamic description . 68
9 De-registration service description (stage 1) . 69
9.1 Service definition . 69
9.2 Service description . 70
9.3 Service architecture. 70
9.4 Normal procedures. 70
9.4.1 Invocation. 70
9.4.1.1 Invocation criteria . 70
9.4.1.2 Invocation of ANF-ISIMM . 71
9.4.2 Operation . 71
9.5 Exceptional procedures. 72
9.5.1 Detected by the visited SwMI MM. 73
9.5.2 Detected by the home SwMI MM. 73
9.6 Dynamic description . 73
10 Profile update service description (stage 1). 75
10.1 Service definition . 75
10.2 Service description . 75
10.3 Service architecture. 75
10.4 Normal procedures.75
10.4.1 Invocation. 75
10.4.1.1 Invocation criteria . 75
10.4.1.2 Invocation of ANF-ISIMM . 76
10.4.2 Operation . 85
10.5 Exceptional operation.95
10.6 Dynamic description .95
11 SS-profile update service description (stage 1). 96
11.1 Service definition . 96
11.2 Service description . 97

Page 5
ETS 300 392-3-5: January 2000
11.3 Service architecture .97
11.4 Normal procedures .97
11.4.1 Invocation .97
11.4.1.1 Invocation criteria.97
11.4.1.2 Invocation of ANF-ISIMM.98
11.4.2 Operation.98
11.4.2.1 Creation of temporary SS-migration profiles.98
11.4.2.2 Informing home SwMI MM about the temporary
SS-migration profiles .99
11.5 Exceptional operation.101
11.6 Dynamic description.101
12 Authentication service description (stage 1).103
12.1 Pre-requisite requirements for the authentication service .103
12.2 Service definition.103
12.3 Service description.103
12.4 Service architecture .104
12.5 Normal procedures .104
12.5.1 Invocation .104
12.5.1.1 Invocation criteria.104
12.5.1.2 Invocation of ANF-ISIMM.105
12.5.2 Operation.105
12.5.2.1 Exchange of authentication parameters .106
12.5.2.2 Sending of authentication result .106
12.6 Exceptional procedures .107
12.6.1 Detected by the visited SwMI MM .108
12.6.2 Detected by the home SwMI MM .108
12.7 Interaction with migration and restricted migration .109
12.7.1 Normal operation.109
12.7.2 Exceptional procedures.109
12.8 Dynamic description.110
13 Over The Air Re-keying (OTAR) service description (stage 1) .111
13.1 Pre-requisite requirements.111
13.2 Service definition.111
13.3 Service description.111
13.4 Service architecture .112
13.5 Normal procedures .113
13.5.1 Invocation .113
13.5.1.1 Invocation criteria.113
13.5.1.2 Invocation of ANF-ISIMM.113
13.5.1.2.1 Case 1) .113
13.5.1.2.2 Case 2) .114
13.5.1.2.3 Case 3) .114
13.5.1.2.4 Case 4) .115
13.5.2 Operation.115
13.5.2.1 Case 1) .115
13.5.2.2 Case 2) .116
13.5.2.3 Case 3) .117
13.5.2.4 Case 4) .118
13.6 Exceptional procedures .118
13.6.1 Detected by the visited SwMI MM .120
13.6.2 Detected by the home SwMI MM .120
13.7 Dynamic description.120
14 Individual subscriber Database Recovery (IDR) service description (stage 1) .122
14.1 Service definition.122
14.2 Service description.122
14.3 Service architecture .123
14.4 Normal procedures .124
14.4.1 Invocation .124
14.4.1.1 Invocation criteria.124
14.4.1.2 Invocation of ANF-ISIMM.124

Page 6
ETS 300 392-3-5: January 2000
14.4.2 Operation . 126
14.4.2.1 The visited SwMI MM receives the HMM recovery
indication . 126
14.4.2.1A The home SwMI MM receives the VMM recovery
indication . 127
14.4.2.2 The virtual migration or restricted migration. 127
14.4.2.3 The virtual RSI . 128
14.4.2.4 The iteration . 128
14.4.2.5 The completion of the IDR . 128
14.4.2.5.1 VMM recovery . 128
14.4.2.5.2 HMM recovery . 129
14.5 Exceptional procedures. 129
14.6 Dynamic description . 130
15 Group attachment service description (stage 1). 134
15.1 Service definition . 134
15.2 Service description . 134
15.3 Service architecture. 135
15.4 Normal procedures. 135
15.4.1 Invocation. 135
15.4.1.1 Invocation criteria . 135
15.4.1.2 Invocation of ANF-ISIMM . 136
15.4.1.2.1 Case 1). 136
15.4.1.2.2 Cases 2) - 4). 138
15.4.1.2.3 Case 5). 139
15.4.1.2.4 Case 6). 144
15.4.2 Operation . 145
15.4.2.1 Case 1). 145
15.4.2.1.1 Group attachment with pre-defined
migration profile(s). 145
15.4.2.1.2 Group attachment with migration
profile exchange. 147
15.4.2.1.3 SS-migration profile(s) exchange. 152
15.4.2.2 Cases 2) - 4) . 156
15.4.2.2.1 Updates to G-HDB . 156
15.4.2.2.2 Sending of group attachment approval156
15.4.2.2.3 Receipt of group attachment approval 156
15.4.2.3 Case 5). 157
15.4.2.3.1 Home SwMI MM initiated group
attachment with pre-defined migration
profile(s) . 157
15.4.2.3.2 Home SwMI MM initiated group
attachment with migration profile
exchange. 158
15.5 Exceptional procedures. 161
15.5.1 Detected by the visited SwMI MM. 163
15.5.2 Detected by the home SwMI MM. 164
15.6 Interactions. 164
15.7 Dynamic description . 165
16 Group detachment service description (stage 1). 168
16.1 Service definition . 168
16.2 Service description . 169
16.3 Service architecture. 170
16.4 Normal procedures. 170
16.4.1 Invocation. 170
16.4.1.1 Invocation criteria . 170
16.4.1.2 Invocation of ANF-ISIMM . 171
16.4.1.2.1 Cases 1) - 3). 171
16.4.1.2.2 Case 4). 172
16.4.2 Operation . 172
16.4.2.1 Cases 1) - 3) . 172
16.4.2.2 Case 4). 173

Page 7
ETS 300 392-3-5: January 2000
16.5 Exceptional procedures .174
16.6 Interactions .176
16.7 Dynamic description.177
17 Group Database Recovery (GDR) service description (stage 1) .178
17.1 Service definition.178
17.2 Service description.178
17.3 Service architecture .179
17.4 Normal procedures .180
17.4.1 Invocation .180
17.4.1.1 Invocation criteria.180
17.4.1.2 Invocation of ANF-ISIMM.180
17.4.2 Operation.181
17.4.2.1 Verification of age information .182
17.4.2.2 The visited SwMI MM receives the G-HDR indication .182
17.4.2.3 The home SwMI MM receives the G-VDR indication .183
17.4.2.4 The virtual group attachment and detachment .183
17.4.2.5 The iteration.184
17.4.2.6 The completion of the GDR .185
17.4.2.6.1 G-HDR .185
17.4.2.6.2 G-VDR .185
17.5 Exceptional procedures .186
17.6 Dynamic description.187
18 Group linking/unlinking service description (stage 1).190
18.1 Service definition.190
18.2 Service description.190
18.3 Service architecture .192
18.4 Normal procedures .192
18.4.1 Invocation .192
18.4.1.1 Invocation criteria.192
18.4.1.2 Invocation of ANF-ISIMM.193
18.4.1.2.1 Case 1) - group linking service .193
18.4.1.2.2 Case 2) - group unlinking service .194
18.4.1.2.3 Case 3) - remote group unlinking
service.194
18.4.2 Operation.194
18.4.2.1 Case 1) - group linking service .194
18.4.2.1.1 First phase of group linking service .194
18.4.2.1.2 Second phase of group linking service195
18.4.2.2 Case 2) - group unlinking service .196
18.4.2.3 Case 3) - remote group unlinking service.197
18.5 Exceptional procedures .197
18.5.1 Case 1) - group linking service.197
18.5.2 Case 2) - group unlinking service.199
18.5.3 Case 3) - remote group unlinking service.199
18.6 Interactions .200
18.7 Dynamic description.200
19 ANF-ISIMM stage 2 specification .204
19.1 General .204
19.2 Functional model.204
19.3 Information flow diagrams.205
20 Migration - stage 2 information flow sequences.206
20.1 Normal operation .206
20.1.1 Migration with pre-defined profile(s) .206
20.1.2 Migration with basic migration profile exchange.207
20.1.3 Migration with basic migration and SS-migration profiles exchange.208
20.1.3.1 SS-migration profiles exchanged before final migration
approval .208
20.1.3.2 SS-migration profiles exchanged after final migration
approval .210

Page 8
ETS 300 392-3-5: January 2000
20.2 Exceptional operation. 212
20.2.1 Migration rejection request upon receipt of the Migration_ind . 212
20.2.2 Migration rejection request upon receipt of Profile update_conf and
SS-profile update_conf . 213
20.3 FE actions for subscriber migration. 214
20.3.1 FE actions of FE1 . 214
20.3.2 FE actions of FE3 . 215
21 Restricted migration - stage 2 information flow sequences . 216
21.1 Normal operation. 216
21.1.1 Restricted migration requested by visited SwMI MM. 216
21.1.2 Restricted migration requested by home SwMI upon receipt of
MIGRATION_ind from the visited SwMI MM . 216
21.1.3 Restricted migration requested by home SwMI MM upon receipt of
PROFILE UPDATE_ind (and possibly SS-PROFILE UPDATE_ind) from
the visited SwMI MM. 216
21.2 Exceptional operation. 217
21.3 FE actions for restricted migration . 217
21.3.1 FE actions of FE1 . 217
21.3.2 FE actions of FE3 . 217
22 Removal of Subscriber Information - stage 2 information flow sequences . 218
22.1 Normal operation. 218
22.2 Exceptional operation. 219
22.3 FE actions for subscriber migration. 219
22.3.1 FE actions of FE1 . 219
22.3.2 FE actions of FE4 . 219
23 De-registration - stage 2 information flow sequences . 220
23.1 Normal operation. 220
23.1.1 Visited SwMI MM initiated de-registration. 220
23.1.2 Home SwMI MM initiated de-registration. 221
23.2 Exceptional operation. 222
23.2.1 Visited SwMI MM initiated de-registration rejected. 222
23.2.2 Home SwMI MM initiated de-registration rejected . 223
23.3 FE actions . 223
23.3.1 FE actions of FE1 . 223
23.3.2 FE actions of FE3 . 224
24 Profile update - stage 2 information flow sequences. 225
24.1 Normal operation. 225
24.2 Profile update rejection. 226
24.3 FE actions for Profile update. 226
24.3.1 FE actions of FE1 . 226
24.3.2 FE actions of FE3 . 226
25 SS-profile update - stage 2 information flow sequences . 227
25.1 Normal operation. 227
25.2 SS-profile update rejection . 228
25.3 FE actions for SS-profile update . 228
25.3.1 FE actions of FE1 . 228
25.3.2 FE actions of FE3 . 228
26 Authentication - stage 2 information flow sequences . 229
26.1 Normal operation. 229
26.1.1 Authentication . 229
26.1.2 Successful subsequent authentication . 230
26.2 Authentication invoked in conjunction with migration . 231
26.3 Exceptional operation. 233
26.3.1 Authentication rejection in the visited SwMI. 233
26.4 FE actions for authentication. 234
26.4.1 FE actions of FE1 . 234
26.4.2 FE actions of FE3 . 235

Page 9
ETS 300 392-3-5: January 2000
27 Over The Air Re-keying (OTAR) - stage 2 information flow sequences.236
27.1 Normal operation .236
27.1.1 OTAR SCK generation service.236
27.1.2 Visited SwMI MM initiated OTAR SCK delivery service .237
27.1.3 Home SwMI MM initiated OTAR SCK delivery service .238
27.1.4 OTAR SCK generation service, subsequent use of parameters.239
27.2 Exceptional operation.240
27.2.1 Failed OTAR SCK generation service.240
27.2.2 Failed visited SwMI MM initiated OTAR SCK delivery.241
27.2.3 Failed home SwMI MM initiated OTAR SCK delivery.242
27.2.4 Failed subsequent use of OTAR SCK generation parameters .243
27.3 FE actions for OTAR.243
27.3.1 FE actions of FE1.243
27.3.2 FE actions of FE3.244
28 Individual subscriber database recovery - stage 2 information flow sequences .245
28.1 Normal operation .245
28.1.1 HMM recovery .245
28.1.2 VMM recovery .248
28.2 Exceptional operation.251
28.2.1 Rejection of HMM recovery .251
28.2.2 Rejection of VMM recovery .252
28.3 FE actions .252
28.3.1 FE actions of FE1.252
28.3.2 FE actions of FE3.253
28.3.3 FE actions of FE4.253
29 Group attachment - stage 2 information flow sequences.254
29.1 Normal operation .254
29.1.1 Visited SwMI MM initiated group attachment without migration profile
exchange.254
29.1.2 Visited SwMI MM initiated first group attachment with migration profile
exchange.255
29.1.3 Home SwMI MM initiated group attachment without migration profile
exchange.257
29.1.4 Home SwMI MM initiated group attachment with migration profile
exchange.258
29.2 Exceptional operation.260
29.2.1 Rejection of visited SwMI MM
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...