36331 3GPP PDF

The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the. 3GPP. (j). Service accessibility. Retrieved 21 September from Home page of 3GPP technical specification groups (TSGs). /htmlinfo/htm.

Author: Guzil Kagajin
Country: Togo
Language: English (Spanish)
Genre: Video
Published (Last): 19 August 2012
Pages: 457
PDF File Size: 8.58 Mb
ePub File Size: 5.20 Mb
ISBN: 496-3-39978-587-6
Downloads: 28704
Price: Free* [*Free Regsitration Required]
Uploader: Gozahn

An RN configured with an RN subframe configuration does not need to apply the system information acquisition and change monitoring procedures. The AS applies three different security keys: For a specific reference, subsequent revisions do not apply. Commercial Mobile Alert System: That is, the response to the message used to activate security is not ciphered, while the subsequent messages e.

3GPP a60_图文_百度文库

Normal measurement and mobility procedures are used to support handover to cells broadcasting a CSG identity. No AS-parameters are exchanged to serve as inputs for the derivation of the new AS keys at connection establishment. Performs logging of available measurements together with location and time for logged measurement configured UEs. At each point in time, the UE keeps a single value for each field except for during handover when the UE temporarily stores the previous configuration so it can revert back upon handover failure.

Whenever the UE shall setup or reconfigure a configuration in accordance with a field that is received it applies the new configuration, except for the cases addressed by the above statements. UEs may use systemInfoValueTag, e. If no paging message is received by the UE during a modification period, the UE may assume that no change of system information will occur at the next modification period boundary. When the network changes some of the system information, it first notifies the UEs about this change, i.

  CONVERT COURSESMART TEXTBOOK PDF

The UE acquires the detailed time-domain scheduling and other information, e.

When DCI format 1C is used the maximum allowed by the physical layer is bits bytes while for format 1A the limit is bits bytessee TS The measured quantities are filtered by the L3 filter as configured in the mobility measurement configuration.

Upon connection establishment new AS keys are derived. Before sending the handover message to the UE, the source eNB prepares one or more target cells. Segmentation can be applied for the delivery of a CMAS notification. A term defined in the present document takes precedence over the definition of the same 36313, if any, in TR The integrity and ciphering algorithms can only 3gp changed upon handover. The source eNB transparently i. Additionally, the UE considers stored system information to be invalid after 3 hours from the moment it was successfully confirmed as valid, unless 3gp otherwise.

The UE applies the system information acquisition and change monitoring procedures for the PCell only. Full configuration option includes an initialization of the 3gppp configuration, which makes the procedure independent of the configuration used in the source cell s with the exception that the security algorithms are continued for the RRC re-establishment.

www.3gpp.org – /ftp/specs/archive/36_series/36.331/

One UE behaviour to be performed upon handover is specified, i. The additional information is used to verify whether or not the UE is authorised to access the target PCell and may also be needed to identify handover candidate cell PCI confusion i. The number of warning messages that a UE can re-assemble simultaneously is a function of UE implementation. The RRC messages to activate security command and successful response are integrity protected, while ciphering is started only after completion of the procedure.

  ATTA SEXDENS PDF

The PCell is used to provide the security inputs and upper layer system information i.

An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR The Organizational Partners accept no liability for any use of this Specification.

Security mode command, failure The purpose of this procedure is to activate AS security upon RRC connection establishment. The RRC states can further be characterised as follows: 3gp addition to the state transitions shown in Figure 4. Neither integrity protection nor ciphering applies for SRB0. The UE may apply 3gpl failure handling also in case the RRCConnectionReconfiguration message causes a protocol error for which the generic error handling as defined in 5. The services provided by physical layer e.

Following T expiry any dedicated preamble, if provided within the rach-ConfigDedicated, is not available for use by the UE anymore. RRC handles the configuration of the security parameters which are part of the AS configuration: However, 3pgp is possible to switch to a ‘NULL’ ciphering algorithm eea0. In the next modification period, the network transmits the updated system information.

The UE applies the previously acquired system information until the UE acquires the 3gp system information. References are either specific identified by date of publication, edition number, version number, etc.