This ETS will provide an application protocol, compatible with the transport mechanisms provided by both DSS1 and SS7, to support the alpha interface as defined in TCR-TR 013.

Digitalno omrežje z integriranimi storitvami (ISDN) – Protokola digitalne naročniške signalizacije št. 1 (DSS1) in signalizacije št. 7 (SS7) – Aplikacija signalizacije za storitev upravljanja mobilnosti v vmesniku alfa – 1. del: Specifikacija protokola

General Information

Status
Published
Publication Date
31-Dec-2004
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Jan-2005
Due Date
01-Jan-2005
Completion Date
01-Jan-2005

Buy Standard

Standard
SIST EN 301 144-1 V1.1.2:2005
English language
133 pages
sale - 10%
Preview
sale - 10%
Preview

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN 301 144-1 V1.1.2:2005
01-januar-2005
'LJLWDOQRRPUHåMH]LQWHJULUDQLPLVWRULWYDPL ,6'1 ±3URWRNRODGLJLWDOQH
QDURþQLãNHVLJQDOL]DFLMHãW '66 LQVLJQDOL]DFLMHãW 66 ±$SOLNDFLMD
VLJQDOL]DFLMH]DVWRULWHYXSUDYOMDQMDPRELOQRVWLYYPHVQLNXDOID±GHO
6SHFLILNDFLMDSURWRNROD

Integrated Services Digital Network (ISDN); Digital Subscriber Signalling System No. one

(DSS1) and Signalling System No.7 (SS7) protocols; Signalling application for the

mobility management service on the alpha interface; Part 1: Protocol specification

Ta slovenski standard je istoveten z: EN 301 144-1 Version 1.1.2
ICS:
33.080 Digitalno omrežje z Integrated Services Digital
integriranimi storitvami Network (ISDN)
(ISDN)
SIST EN 301 144-1 V1.1.2:2005 en

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN 301 144-1 V1.1.2:2005
---------------------- Page: 2 ----------------------
SIST EN 301 144-1 V1.1.2:2005
ETSI EN 301 144-1 V1.1.2 (2000-10)
European Standard (Telecommunications series)
Integrated Services Digital Network (ISDN);
Digital Subscriber Signalling System No. one (DSS1)
and Signalling System No. 7 (SS7);
Signalling application for the mobility management service
on the alpha interface;
Part 1: Protocol specification
---------------------- Page: 3 ----------------------
SIST EN 301 144-1 V1.1.2:2005
2 ETSI EN 301 144-1 V1.1.2 (2000-10)
Reference
DEN/SPS-05121-1
Keywords
CTM, DSS1, ISDN, protocol, SS7
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.:+33492944200 Fax:+33 493654716
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
Individual copies of the present document can be downloaded from:
http://www.etsi.org

The present document may be made available in more than one electronic version or in print. In any case of existing or

perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).

In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive

within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at http://www.etsi.org/tb/status/

If you find errors in the present document, send your comment to:
editor@etsi.fr
Copyright Notification
No part may be reproduced except as authorized by written permission.
The copyright and the foregoing restriction extend to reproduction in all media.
© European Telecommunications Standards Institute 2000.
All rights reserved.
ETSI
---------------------- Page: 4 ----------------------
SIST EN 301 144-1 V1.1.2:2005
3 ETSI EN 301 144-1 V1.1.2 (2000-10)
Contents

Intellectual Property Rights................................................................................................................................6

Foreword.............................................................................................................................................................6

1 Scope ........................................................................................................................................................7

2 References ................................................................................................................................................7

3 Definitions and abbreviations...................................................................................................................8

3.1 Definitions..........................................................................................................................................................8

3.2 Abbreviations ...................................................................................................................................................10

4 Void........................................................................................................................................................11

5 Description .............................................................................................................................................11

6 Operational requirements .......................................................................................................................14

6.1 Provision and withdrawal.................................................................................................................................14

6.2 Requirements on the network A side................................................................................................................15

6.3 Requirements on the network B side................................................................................................................15

7 Coding requirements ..............................................................................................................................15

8 State definitions......................................................................................................................................25

9 Signalling procedures at the coincident S and T reference point ...........................................................27

9.1 Subscription registration and subscription deregistration.................................................................................27

9.1.1 Subscription registration .............................................................................................................................28

9.1.1.1 Normal operation ..................................................................................................................................28

9.1.1.2 Exceptional procedure...........................................................................................................................28

9.1.2 Subscription deregistration .........................................................................................................................29

9.1.2.1 Normal operation ..................................................................................................................................29

9.1.2.2 Exceptional procedure...........................................................................................................................29

9.2 Activation and deactivation..............................................................................................................................29

9.2.1 Location registration...................................................................................................................................30

9.2.1.1 Normal operation ..................................................................................................................................30

9.2.1.2 Exceptional procedure...........................................................................................................................31

9.2.2 Location cancellation..................................................................................................................................32

9.2.2.1 Normal operation ..................................................................................................................................32

9.2.2.2 Exceptional procedure...........................................................................................................................32

9.2.3 Detach.........................................................................................................................................................33

9.2.3.1 Normal operation ..................................................................................................................................33

9.2.3.2 Exceptional procedure...........................................................................................................................33

9.3 Invocation and operation..................................................................................................................................33

9.3.1 Location registration suggest ......................................................................................................................33

9.3.1.1 Normal operation ..................................................................................................................................33

9.3.1.2 Exceptional procedure...........................................................................................................................34

9.3.2 Terminal authentication ..............................................................................................................................34

9.3.2.1 Normal operation ..................................................................................................................................34

9.3.2.2 Exceptional procedure...........................................................................................................................35

9.3.3 Network authentication...............................................................................................................................36

9.3.3.1 Normal operation ..................................................................................................................................37

9.3.3.2 Exceptional procedure...........................................................................................................................37

9.3.4 Encryption - network initiated ciphering ....................................................................................................37

9.3.4.1 Normal operation ..................................................................................................................................38

9.3.4.2 Exceptional procedure...........................................................................................................................38

9.3.5 Encryption - portable initiated ciphering ....................................................................................................39

9.3.5.1 Normal operation ..................................................................................................................................40

9.3.5.2 Exceptional procedure...........................................................................................................................40

9.3.6 Temporary identity assignment...................................................................................................................40

9.3.6.1 Normal operation ..................................................................................................................................40

ETSI
---------------------- Page: 5 ----------------------
SIST EN 301 144-1 V1.1.2:2005
4 ETSI EN 301 144-1 V1.1.2 (2000-10)

9.3.6.1.1 Temporary identity assignment .......................................................................................................40

9.3.6.1.2 Linked temporary identity assignment ............................................................................................41

9.3.6.2 Exceptional procedure...........................................................................................................................41

9.3.6.2.1 Temporary identity assignment .......................................................................................................41

9.3.6.2.2 Linked temporary identity assignment ............................................................................................41

9.3.7 Key allocation.............................................................................................................................................42

9.3.7.1 Normal operation ..................................................................................................................................42

9.3.7.2 Exceptional procedure...........................................................................................................................42

9.3.8 Identity request ...........................................................................................................................................43

9.3.8.1 Normal operation ..................................................................................................................................43

9.3.8.2 Exceptional procedure...........................................................................................................................44

9.3.9 Outgoing call ..............................................................................................................................................45

9.3.9.1 Normal operation ..................................................................................................................................45

9.3.9.2 Exceptional procedure...........................................................................................................................46

9.3.10 Incoming call ..............................................................................................................................................47

9.3.10.1 Normal operation ..................................................................................................................................47

9.3.10.2 Exceptional procedures .........................................................................................................................48

10 Procedures for interworking with private ISDNs...................................................................................49

11 Interactions with other networks ............................................................................................................49

12 Interactions with other supplementary services .....................................................................................49

13 Parameter values (timers).......................................................................................................................49

14 Dynamic description (SDL diagrams)....................................................................................................49

Annex A (informative): Signalling flows for mobility management ..................................................50

A.1 Registration and deregistration...............................................................................................................51

A.1.1 Subscription registration...................................................................................................................................51

A.1.2 Subscription deregistration...............................................................................................................................52

A.2 Activation and deactivation....................................................................................................................53

A.2.1 Location registration - GSM.............................................................................................................................53

A.2.2 Location cancellation - CTM............................................................................................................................54

A.2.3 Detach ..............................................................................................................................................................55

A.3 Invocation and operation........................................................................................................................56

A.3.1 Location registration suggest............................................................................................................................56

A.3.2 Terminal authentication....................................................................................................................................56

A.3.2.1 Terminal authentication - CTM ..................................................................................................................56

A.3.2.2 Terminal authenticationReject - GSM ........................................................................................................57

A.3.3 Network authentication ....................................................................................................................................58

A.3.4 Network initiated ciphering..............................................................................................................................59

A.3.5 Portable initiated ciphering...............................................................................................................................59

A.3.6 Temporary identity assignment ........................................................................................................................60

A.3.7 Key allocation ..................................................................................................................................................61

A.3.8 Identity request.................................................................................................................................................62

A.3.9 Outgoing call ....................................................................................................................................................63

A.3.10 Incoming call....................................................................................................................................................64

A.3.10.1 Incoming call serial.....................................................................................................................................64

A.3.10.2 Incoming call parallel .................................................................................................................................65

Annex B (normative): Specific transport mechanism requirements for mobility

management ...................................................................................................66

B.1 Normative references .............................................................................................................................66

B.2 General ...................................................................................................................................................66

B.3 NCICS connection establishment...........................................................................................................66

B.3.1 Normal NCICS connection establishment........................................................................................................66

B.3.2 NCICS connection establishment collision ......................................................................................................66

ETSI
---------------------- Page: 6 ----------------------
SIST EN 301 144-1 V1.1.2:2005
5 ETSI EN 301 144-1 V1.1.2 (2000-10)

B.4 Information transfer on NCICS connection ...........................................................................................67

B.5 NCICS connection release......................................................................................................................67

B.5.1 Normal NCICS connection release...................................................................................................................67

B.5.1.1 Radio interface loss.....................................................................................................................................67

B.5.2 Abnormal NCICS release.................................................................................................................................67

B.5.3 Collision case ...................................................................................................................................................67

Annex C (informative): Information flow for the generic functional protocol.................................68

Annex D (informative): CTM versus DECT/GSM conventions.........................................................70

Annex E (normative): Additions to the generic functional protocol for mobility

management ...................................................................................................71

E.1 Normative references .............................................................................................................................71

E.2 Definitions..............................................................................................................................................71

E.3 Abbreviations .........................................................................................................................................72

E.4 Description .............................................................................................................................................73

E.5 Coding requirements ..............................................................................................................................74

E.5.1 Transport mechanism .......................................................................................................................................74

E.5.2 GFT-control......................................................................................................................................................74

E.5.2.1 Network facility extension..........................................................................................................................75

E.5.2.2 Service function values...............................................................................................................................75

E.6 Signalling procedures at the coincident S and T reference point ...........................................................76

E.6.1 GFT-control......................................................................................................................................................76

E.6.1.1 Requirements for sending mobility management APDUs ..........................................................................76

E.6.1.2 Requirements for receiving mobility management APDUs........................................................................77

E.7 Procedures for interworking with private ISDNs...................................................................................78

E.7.1 GFT-control......................................................................................................................................................78

E.7.1.1 Requirements for sending mobility management APDUs ..........................................................................78

E.7.1.2 Requirements for receiving mobility management APDUs........................................................................79

Annex F (Informative): SDL system structure description ................................................................80

Bibliography...................................................................................................................................................132

History ............................................................................................................................................................133

ETSI
---------------------- Page: 7 ----------------------
SIST EN 301 144-1 V1.1.2:2005
6 ETSI EN 301 144-1 V1.1.2 (2000-10)
Intellectual Property Rights

IPRs essential or potentially essential to the present document may have been declared to ETSI. The information

pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found

in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in

respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web

server (http://www.etsi.org/ipr).

Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee

can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web

server) which are, or may be, or may become, essential to the present document.
Foreword

This European Standard (Telecommunications series) has been produced by ETSI Technical Committee Services and

Protocols for Advanced Networks (SPAN).

The present document is part 1 of a multi-part deliverable covering the signalling application for the mobility

management service on the alpha interface, as identified below:
Part 1: "Protocol specification";

Part 2: "Protocol Implementation Conformance Statement (PICS) proforma specification";

National transposition dates
Date of adoption of this EN: 13 October 2000
Date of latest announcement of this EN (doa): 31 January 2001
Date of latest publication of new National Standard
or endorsement of this EN (dop/e): 31 July 2001
Date of withdrawal of any conflicting National Standard (dow): 31 July 2001
ETSI
---------------------- Page: 8 ----------------------
SIST EN 301 144-1 V1.1.2:2005
7 ETSI EN 301 144-1 V1.1.2 (2000-10)
1 Scope

This first part of EN 301 144 specifies the stage 3 of the signalling application for the mobility management service on

the alpha interface. The mobility management service functions include Cordless Terminal Mobility (CTM) for CTM

phase 1 (DECT/GAP limitation) and DECT access to GSM via an Integrated Services Digital Network (ISDN)

user-network interface at the T reference point or coincident S and T reference point (as defined in

ITU-T Recommendation I.411 [18]) by means of the Digital Subscriber Signalling System No. one (DSS1) protocol.

Stage three identifies the protocol procedures and switching functions needed to support a telecommunication service

(see CCITT Recommendation I.130 [15]).

The signalling application for the alpha interface describes the mobility management procedures required to allow users

of cordless terminals to be mobile within and between networks. Whenever radio coverage is provided and the cordless

terminal has appropriate access rights, the user is able to make calls from and to receive calls at, any location within the

network.

The signalling application for the alpha interface is applicable to the telephony 3,1 kHz teleservice (see

ETS 300 111 [3]), speech bearer service (see ETS 300 109 [1]) and 3,1 kHz audio bearer service (see ETS 300 110 [2]).

Further parts of EN 301 144 specify the method of testing required to identify conformance to the present document.

The present document is applicable to equipment supporting the signalling application for the alpha interface, to be

attached at either side of a T reference point and coincident S and T reference point when used as an access to the public

ISDN or GSM network.
2 References

The following documents contain provisions which, through reference in this text, constitute provisions of the present

document.

• References are either specific (identified by date of publication, edition number, version number, etc.) or

non-specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies.

• A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same

number.

[1] ETS 300 109 (1992): "Integrated Services Digital Network (ISDN); Circuit-mode 64 kbit/s 8 kHz

structured bearer service category usable for speech information transfer; Service description".

[2] ETS 300 110 (1992): "Integrated Services Digital Network (ISDN); Circuit-mode 64 kbit/s 8 kHz

structured bearer service category usable for 3,1 kHz audio information transfer; Service

description".

[3] ETS 300 111 (1992): "Integrated Services Digital Network (ISDN); Telephony 3,1 kHz

teleservice; Service description".

[4] EN 300 175-5: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface

(CI); Part 5: Network (NWK) layer".

[5] EN 300 175-6: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface

(CI); Part 6: Identities and addressing".

[6] EN 300 175-7: "Digital Enhanced Cordless Telecommunications (DECT); Common Interface

(CI); Part 7: Security features".

[7] EN 300 196-1 (V1.2): "Integrated Services Digital Network (ISDN); Generic functional protocol

for the support of supplementary services; Digital Subscriber Signalling System No. one (DSS1)

protocol; Part 1: Protocol specification".
ETSI
---------------------- Page: 9 ----------------------
SIST EN 301 144-1 V1.1.2:2005
8 ETSI EN 301 144-1 V1.1.2 (2000-10)

[8] EN 300 370: "Digital Enhanced Cordless Telecommunications (DECT); Global System for Mobile

communications (GSM); DECT/GSM Interworking Profile (IWP); Access and mapping
(protocol/procedure description for 3,1 kHz speech service)".

[9] EN 300 403-1 (V1.2): "Integrated Services Digital Network (ISDN); Digital Subscriber Signalling

System No. one (DSS1) protocol; Signalling network layer for circuit-mode basic call control;

Part 1: Protocol specification [ITU-T Recommendation Q.931 (1993), modified]".

[10] EN 300 444 (V1.2): "Digital Enhanced Cordless Telecommunications (DECT); Generic Access

Profile (GAP)".

[11] ETS 300 557: "Digital cellular telecommunications system (Phase 2); Mobile radio interface;

Layer 3 specification (GSM 04.08 version 4.19.2)".

[12] ETS 300 788: "Digital Enhanced Cordless Telecommunications (DECT); Global System for

Mobile communications (GSM); Integrated Services Digital Network (ISDN); DECT access to

GSM via ISDN; Functional capabilities and information flows".
[13] ITU-T
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.