Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 5: Additional Network Feature for Mobility Management (ANF-ISIMM)

The present document defines the mobility management of interworking at the Inter-System Interface (ISI) for Terrestrial Trunked Radio (TETRA) system supporting Voice plus Data (V+D).
The TETRA V+D Inter-working - basic operation part defines the Inter-System Interface (ISI) between the SwMIs as specified in the following sub-parts:
• Additional Network Feature - Inter-System Interface General Description (ANF-ISIGD);
• Additional Network Feature - Inter-System Interface Individual Call (ANF-ISIIC);
• Additional Network Feature - Inter-System Interface Group Call (ANF-ISIGC);
• Additional Network Feature - Inter-System Interface Short Data Service (ANF-ISISD);
• Additional Network Feature - Inter-System Interface Mobility Management (ANF-ISIMM).
NOTE: These ENs are produced in analogy with the ITU-T Recommendation I.130 [8].
The present document contains the ANF-ISIMM part. The ANF-ISIMM part defines additional Mobility Management (MM) services to the SwMIs. If supported, the ANF-ISIMM services complement the intra-SwMI-MM, authentication and key management services. In support of these, the ANF-ISIMM enables the invocation and operation of these services between the SwMIs over the ISI. Thus, ANF-ISIMM offers the following services:
• migration and restricted migration;
• individual subscriber and group profile update;
• profile update;
• de-registration;
• group attachment/detachment;
• individual subscriber and group database fault recovery;
• authentication, one-directionally or mutually between the individual subscriber and the home SwMI;
• Over-The-Air-Re-keying (OTAR) for Static Cipher Key (SCK) generation and SCK delivery.
For the following service only the stage 1 descriptions are included:
• linking/unlinking of groups.

Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno delovanje na medsistemskem vmesniku (ISI) - 5. poddel: Dodatna omrežna funkcija: upravljanje mobilnosti (ANF-ISIMM)

General Information

Status
Published
Publication Date
31-Mar-2006
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Apr-2006
Due Date
01-Apr-2006
Completion Date
01-Apr-2006

Buy Standard

Standard
SIST EN 300 392-3-5 V1.2.1:2006
English language
423 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN 300 392-3-5 V1.2.1:2006
01-april-2006
Prizemni snopovni radio (TETRA) - Govor in podatki (V+D) - 3. del: Medsebojno
delovanje na medsistemskem vmesniku (ISI) - 5. poddel: Dodatna omrežna
funkcija: upravljanje mobilnosti (ANF-ISIMM)

Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the

Inter-System Interface (ISI); Sub-part 5: Additional Network Feature for Mobility

Management (ANF-ISIMM)
Ta slovenski standard je istoveten z: EN 300 392-3-5 Version 1.2.1
ICS:
33.070.10 Prizemni snopovni radio Terrestrial Trunked Radio
(TETRA) (TETRA)
SIST EN 300 392-3-5 V1.2.1:2006 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 300 392-3-5 V1.2.1:2006
---------------------- Page: 2 ----------------------
SIST EN 300 392-3-5 V1.2.1:2006
ETSI EN 300 392-3-5 V1.2.1 (2004-01)
European Standard (Telecommunications series)
Terrestrial Trunked Radio (TETRA);
Voice plus Data (V+D);
Part 3: Interworking at the Inter-System Interface (ISI);
Sub-part 5: Additional Network Feature
for Mobility Management (ANF-ISIMM)
---------------------- Page: 3 ----------------------
SIST EN 300 392-3-5 V1.2.1:2006
2 ETSI EN 300 392-3-5 V1.2.1 (2004-01)
Reference
REN/TETRA-03089
Keywords
interworking, management, mobility, radio,
TETRA, V+D
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org

The present document may be made available in more than one electronic version or in print. In any case of existing or

perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).

In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive

within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at

http://portal.etsi.org/tb/status/status.asp
If you find errors in the present document, send your comment to:
editor@etsi.org
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2004.
All rights reserved.
TM TM TM

DECT , PLUGTESTS and UMTS are Trade Marks of ETSI registered for the benefit of its Members.

TIPHON and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.

3GPP is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.

ETSI
---------------------- Page: 4 ----------------------
SIST EN 300 392-3-5 V1.2.1:2006
3 ETSI EN 300 392-3-5 V1.2.1 (2004-01)
Contents

Intellectual Property Rights..............................................................................................................................15

Foreword...........................................................................................................................................................15

1 Scope......................................................................................................................................................17

2 References..............................................................................................................................................18

3 Definitions and abbreviations.................................................................................................................19

3.1 Definitions........................................................................................................................................................19

3.2 Abbreviations...................................................................................................................................................21

4 Overview................................................................................................................................................22

4.1 General.............................................................................................................................................................22

4.2 Applicability.....................................................................................................................................................22

4.2.1 Entities........................................................................................................................................................22

4.2.2 Services.......................................................................................................................................................22

4.3 Testability.........................................................................................................................................................23

4.4 Provision/withdrawal........................................................................................................................................23

4.5 Activation/deactivation....................................................................................................................................23

4.6 Charging...........................................................................................................................................................23

5 The generic ANF-ISIMM stage 1 service model ...................................................................................24

5.1 ANF-ISIMM - the service provider..................................................................................................................24

5.2 SwMI MMs - the ANF-ISIMM service users...................................................................................................24

5.3 Stage 1 description conventions .......................................................................................................................25

6 Migration service description - stage 1 ..................................................................................................26

6.1 Pre-requisite requirements for the migration service........................................................................................26

6.2 Service definition.............................................................................................................................................26

6.3 Service description...........................................................................................................................................26

6.4 Service architecture..........................................................................................................................................27

6.5 Normal procedures...........................................................................................................................................27

6.5.1 Invocation...................................................................................................................................................27

6.5.1.1 Invocation criteria.................................................................................................................................27

6.5.1.2 Invocation of ANF-ISIMM...................................................................................................................28

6.5.2 Operation....................................................................................................................................................29

6.5.2.1 Migration with pre-defined migration profile(s) ...................................................................................30

6.5.2.1.1 Support for call restoration..............................................................................................................30

6.5.2.1.2 Final migration approval.................................................................................................................31

6.5.2.2 Migration with migration profile exchange...........................................................................................32

6.5.2.2.1 Basic migration profile exchange ....................................................................................................32

6.5.2.2.2 SS-migration profile(s) exchange....................................................................................................42

6.5.2.2.3 Support for call restoration..............................................................................................................44

6.5.2.2.4 Final migration approval.................................................................................................................44

6.5.2.2.5 SS-migration profile exchange after final migration approval ........................................................45

6.6 Exceptional procedures....................................................................................................................................45

6.6.1 Detected by the visited SwMI MM.............................................................................................................47

6.6.2 Detected by the home SwMI MM ..............................................................................................................48

6.7 Interactions.......................................................................................................................................................48

6.7.1 Interactions with the authentication service................................................................................................48

6.7.2 Interactions with the group attachment and the group detachment services ...............................................48

6.8 Dynamic description.........................................................................................................................................48

7 Restricted migration service description - stage 1..................................................................................51

7.1 Pre-requisite requirements for the restricted migration service........................................................................51

7.2 Service definition.............................................................................................................................................51

7.3 Service description...........................................................................................................................................51

7.4 Service architecture..........................................................................................................................................52

7.5 Normal procedures...........................................................................................................................................53

ETSI
---------------------- Page: 5 ----------------------
SIST EN 300 392-3-5 V1.2.1:2006
4 ETSI EN 300 392-3-5 V1.2.1 (2004-01)

7.5.1 Invocation...................................................................................................................................................53

7.5.1.1 Invocation criteria.................................................................................................................................53

7.5.1.2 Invocation of ANF-ISIMM...................................................................................................................53

7.5.2 Operation....................................................................................................................................................56

7.5.2.1 Operation when the visited SwMI MM invokes restricted migration ...................................................56

7.5.2.2 Invocation of RSI ..................................................................................................................................57

7.5.2.3 Support for emergency call restoration .................................................................................................57

7.5.2.4 Receipt of restricted migration approval...............................................................................................57

7.6 Exceptional procedures....................................................................................................................................57

7.6.1 Detected by the visited SwMI MM.............................................................................................................59

7.6.2 Detected by the home SwMI MM ..............................................................................................................59

7.7 Interactions.......................................................................................................................................................59

7.7.1 Interactions with the authentication service................................................................................................59

7.7.2 Interactions with the group attachment and the group detachment services ...............................................59

7.8 Dynamic description.........................................................................................................................................59

8 Removal of Subscriber Information (RSI) service description - stage 1................................................61

8.1 Service definition.............................................................................................................................................61

8.2 Service description...........................................................................................................................................61

8.3 Service architecture..........................................................................................................................................62

8.4 Normal procedures...........................................................................................................................................62

8.4.1 Invocation...................................................................................................................................................62

8.4.1.1 Invocation criteria.................................................................................................................................62

8.4.1.2 Invocation of ANF-ISIMM...................................................................................................................63

8.4.2 Operation....................................................................................................................................................64

8.5 Exceptional procedures....................................................................................................................................65

8.6 Interaction with authentication.........................................................................................................................66

8.7 Dynamic description.........................................................................................................................................66

9 De-registration service description - stage 1 ..........................................................................................67

9.1 Service definition.............................................................................................................................................67

9.2 Service description...........................................................................................................................................67

9.3 Service architecture..........................................................................................................................................68

9.4 Normal procedures...........................................................................................................................................68

9.4.1 Invocation...................................................................................................................................................68

9.4.1.1 Invocation criteria.................................................................................................................................68

9.4.1.2 Invocation of ANF-ISIMM...................................................................................................................68

9.4.2 Operation....................................................................................................................................................69

9.5 Exceptional procedures....................................................................................................................................70

9.5.1 Detected by the visited SwMI MM.............................................................................................................71

9.5.2 Detected by the home SwMI MM ..............................................................................................................71

9.6 Dynamic description.........................................................................................................................................71

10 Profile update service description - stage 1............................................................................................72

10.1 Service definition.............................................................................................................................................72

10.2 Service description...........................................................................................................................................72

10.3 Service architecture..........................................................................................................................................73

10.4 Normal procedures...........................................................................................................................................73

10.4.1 Invocation...................................................................................................................................................73

10.4.1.1 Invocation criteria.................................................................................................................................73

10.4.1.2 Invocation of ANF-ISIMM...................................................................................................................74

10.4.2 Operation....................................................................................................................................................84

10.5 Exceptional operation.......................................................................................................................................94

10.6 Dynamic description.........................................................................................................................................95

11 SS-profile update service description - stage 1 ......................................................................................96

11.1 Service definition.............................................................................................................................................96

11.2 Service description...........................................................................................................................................96

11.3 Service architecture..........................................................................................................................................96

11.4 Normal procedures...........................................................................................................................................97

11.4.1 Invocation...................................................................................................................................................97

11.4.1.1 Invocation criteria.................................................................................................................................97

11.4.1.2 Invocation of ANF-ISIMM...................................................................................................................97

ETSI
---------------------- Page: 6 ----------------------
SIST EN 300 392-3-5 V1.2.1:2006
5 ETSI EN 300 392-3-5 V1.2.1 (2004-01)

11.4.2 Operation....................................................................................................................................................98

11.4.2.1 Creation of temporary SS-migration profiles........................................................................................98

11.4.2.2 Informing home SwMI MM about the temporary SS-migration profiles .............................................98

11.5 Exceptional operation.....................................................................................................................................100

11.6 Dynamic description.......................................................................................................................................101

12 Authentication service description - stage 1.........................................................................................102

12.1 Pre-requisite requirements for the authentication service...............................................................................102

12.2 Service definition...........................................................................................................................................102

12.3 Service description.........................................................................................................................................102

12.4 Service architecture........................................................................................................................................102

12.5 Normal procedures.........................................................................................................................................103

12.5.1 Invocation.................................................................................................................................................103

12.5.1.1 Invocation criteria...............................................................................................................................103

12.5.1.2 Invocation of ANF-ISIMM.................................................................................................................103

12.5.2 Operation..................................................................................................................................................104

12.5.2.1 Exchange of authentication parameters...............................................................................................104

12.5.2.2 Sending of authentication result..........................................................................................................105

12.6 Exceptional procedures..................................................................................................................................105

12.6.1 Detected by the visited SwMI MM...........................................................................................................106

12.6.2 Detected by the home SwMI MM ............................................................................................................107

12.7 Interaction with migration and restricted migration .......................................................................................107

12.7.1 Normal operation......................................................................................................................................107

12.7.2 Exceptional procedures.............................................................................................................................107

12.8 Dynamic description.......................................................................................................................................108

13 Over The Air Re-keying (OTAR) service description - stage 1...........................................................109

13.1 Pre-requisite requirements..............................................................................................................................109

13.2 Service definition...........................................................................................................................................109

13.3 Service description.........................................................................................................................................110

13.4 Service architecture........................................................................................................................................110

13.5 Normal procedures.........................................................................................................................................111

13.5.1 Invocation.................................................................................................................................................111

13.5.1.1 Invocation criteria...............................................................................................................................111

13.5.1.2 Invocation of ANF-ISIMM.................................................................................................................111

13.5.1.2.1 Case 1)...........................................................................................................................................111

13.5.1.2.2 Case 2)...........................................................................................................................................112

13.5.1.2.3 Case 3)...........................................................................................................................................112

13.5.1.2.4 Case 4)...........................................................................................................................................113

13.5.2 Operation..................................................................................................................................................113

13.5.2.1 Case 1)................................................................................................................................................113

13.5.2.2 Case 2)................................................................................................................................................114

13.5.2.3 Case 3)................................................................................................................................................115

13.5.2.4 Case 4)................................................................................................................................................115

13.6 Exceptional procedures..................................................................................................................................115

13.6.1 Detected by the visited SwMI MM...........................................................................................................117

13.6.2 Detected by the home SwMI MM ............................................................................................................117

13.7 Dynamic description.......................................................................................................................................117

14 Individual subscriber Database Recovery (IDR) service description - stage 1 ....................................120

14.1 Service definition...........................................................................................................................................120

14.2 Service description.........................................................................................................................................121

14.3 Service architecture........................................................................................................................................121

14.4 Normal procedures.........................................................................................................................................122

14.4.1 Invocation.................................................................................................................................................122

14.4.1.1 Invocation criteria...............................................................................................................................122

14.4.1.2 Invocation of ANF-ISIMM.................................................................................................................122

14.4.2 Operation..................................................................................................................................................124

14.4.2.1 The visited SwMI MM receives the HMM recovery indication .........................................................124

14.4.2.1A The home SwMI MM receives the VMM recovery indication ...................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.