The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the. 3GPP. (j). Service accessibility. Retrieved 21 September from Home page of 3GPP technical specification groups (TSGs). /htmlinfo/htm.
|Published (Last):||23 April 2004|
|PDF File Size:||9.33 Mb|
|ePub File Size:||20.16 Mb|
|Price:||Free* [*Free Regsitration Required]|
Lower layers discard RRC messages for which the integrity check has failed and indicate the integrity verification check failure to RRC. Whenever the UE shall setup or reconfigure a configuration in accordance with a field that is received it applies the new configuration, except for the cases addressed by the above statements.
Mathematical function used to ’round down’ i.
In addition, an overflow counter mechanism is used: The handling of the radio bearers after the successful completion of the PDCP re-establishment, e. The source eNB may also provide the target eNB with a list of best cells on each frequency for which measurement information is available, in 3tpp of decreasing RSRP.
In the next modification period, the network transmits the updated system information. In addition sub-clause 5.
www.3gpp.org – /ftp/specs/archive/36_series/36.331/
To facilitate this, the network may configure the UE to perform measurement reporting possibly including the configuration of measurement gaps. Radio configuration is not just the resource configuration but includes other configurations like MeasConfig and OtherConfig. RRC handles the configuration of the security parameters which are part of the AS configuration: The number of warning messages that a UE can re-assemble simultaneously is a function of UE implementation. The segmentation is fixed for transmission of a given CMAS notification within a cell i.
In downlink piggybacking of NAS 3gp is used only for one dependant i. The RRC states can further be characterised as follows: The MIB includes a limited number of most essential and most frequently transmitted parameters that are needed to acquire other information from the cell, and is transmitted on BCH. An abbreviation defined in the present document takes precedence over the definition 3631 the same abbreviation, if any, in TR Security mode command, failure The purpose of this procedure is to activate AS security upon RRC connection establishment.
Only in 33631 cases, as specified within this specification, TS If this is not the case, i. More specifically, the following three SRBs are defined: Commercial Mobile Alert System: There may be multiple SI messages transmitted with the same periodicity. The integrity and ciphering of the RRC message used to perform handover is based on the security configuration used prior to the handover and is performed by the source eNB.
However, the UE needs to perform system information acquisition upon cell re-selection. Upon initiation of the procedure, the UE shall: The UE applies the system information acquisition and change monitoring procedures for the PCell only. For further details see TS The UE may apply above failure handling also in case the RRCConnectionReconfiguration message causes a protocol error for which the generic error handling as defined in 5.
The UE applies the previously acquired system information until the UE acquires the new system information. Although the UE may be informed about changes in system information, no further details are provided e. The network triggers the handover procedure e.
The integrity and ciphering algorithms can only be changed upon handover. The RRC messages to activate security command and successful response are integrity protected, while ciphering is started only after completion of the procedure. Neither integrity protection nor ciphering applies for SRB0. The source eNB transparently i. The segmentation is fixed for transmission of a given secondary notification within a cell i. In this case, the target eNB should use the full configuration option to reconfigure the UE for Handover and Re-establishment.
Release 10 AS feature handling Additionally, the UE considers stored system information to be invalid after 3 hours from the moment it was successfully confirmed as valid, unless specified otherwise.