Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions, symbols and abbreviations
3.1 Definitions
3.2 Symbols
3.3 Abbreviations
4 General
4.1 Mapping principles
5 Network Procedures
5.1 UMTS GMM procedures
5.1.1 Attach procedure
5.1.1.1 Attach procedure, successful
5.1.1.2 Attach procedure, unsuccessful
5.1.2 Detach procedure
5.1.2.1 Detach procedure, PT originated
5.1.2.2 Detach procedure, network originated
5.1.3 Routing area update
5.1.3.1 Routing area update, successful
5.1.3.2 Routing area update, unsuccessful,
network rejects
5.1.3.3 Routing area update, unsuccessful,
MS rejects
5.1.4 P-TMSI reallocation procedure
5.1.4.1 P-TMSI reallocation procedure, successful
5.1.4.2 P-TMSI reallocation procedure, successful
5.1.5 Authentication and Ciphering procedure
5.1.5.1 Authentication and Ciphering procedure,
successful
5.1.5.2 Authentication and Ciphering procedure,
unsuccessful authentication (MS)
5.1.5.3 Authentication and Ciphering procedure,
unsuccessful authentication (network)
5.1.6 Identity procedure
5.1.7 GMM information and status procedures
5.1.7.1 GMM Information procedure
5.1.7.2 GMM Status procedure, MS originated
5.1.7.3 GMM Status procedure, network originated
5.1.8 Service Request Procedure
5.1.8.1 Service Request Procedure, successful
5.1.8.2 Service Request Procedure, unsuccessful
5.2 UMTS SM procedures
5.2.1 PDP context activation procedure
5.2.1.1 PT initiated PDP context activation,
successful
5.2.1.2 PT initiated PDP context activation,
unsuccessful
5.2.1.3 Network initiated PDP context activation
5.2.1.4 Network initiated PDP context activation,
unsuccessful
5.2.2 Secondary PDP context activation procedure
5.2.2.1 Successful activation
5.2.2.2 Unsuccessful activation
5.2.3 PDP context modification procedure
5.2.3.1 Network originated PDP context
modification procedure
5.2.3.2 PT originated PDP context modification
procedure
5.2.3.3 PT originated PDP context modification
procedure, unsuccessful
5.2.4 PDP context deactivation procedure
5.2.4.1 Network originated deactivation
5.2.4.2 PT originated deactivation
5.2.5 SM Status message
5.2.5.1 Network originated SM Status message
5.2.5.2 PT originated SM Status message
6 Message mappings
6.1 UMTS to DECT
6.1.1 ATTACH ACCEPT (GMM) to {LOCATE ACCEPT} (MM)
6.1.2 ATTACH REJECT (GMM) to {LOCATE REJECT} (MM)
6.1.3 void
6.1.4 void
6.1.5 P-TMSI REALLOCATION COMMAND (GMM) to
{TEMPORARY-IDENTITY-ASSIGN} (MM)
6.1.6 AUTHENTICATION AND CIPHERING REQUEST (GMM) to
{AUTHENTICATION-REQUEST} (MM)
6.1.7 AUTHENTICATION AND CIPHERING REJECT (GMM) to
{MM-INFO-SUGGEST} (MM)
6.1.8 IDENTITY REQUEST (GMM) to {IDENTITY-REQUEST} (MM)
6.1.9 ROUTING AREA UPDATE ACCEPT (GMM) to
{LOCATE-ACCEPT} (MM)
6.1.10 ROUTING AREA UPDATE REJECT (GMM) to
{LOCATE-REJECT} (MM)
6.1.11 GMM STATUS (GMM) to {MM-IWU}
6.1.12 GMM INFORMATION (GMM) to {IWU-INFO}
6.1.13 Service Accept (GMM) to {IWU-INFO}
6.1.14 Service Reject (GMM) to {MM-IWU}
6.1.15 ACTIVATE PDP CONTEXT ACCEPT (SM) to {CC-CONNECT}
(CC)
6.1.16 ACTIVATE PDP CONTEXT REJECT (SM) to
{CC-RELEASE-COM} (CC)
6.1.17 ACTIVATE SECONDARY PDP CONTEXT ACCEPT (SM) to
{CC-CONNECT} (CC)
6.1.18 ACTIVATE SECONDARY PDP CONTEXT REJECT (SM) to
{CC-RELEASE-COM} (CC)
6.1.19 REQUEST PDP CONTEXT ACTIVATION (SM) to {MM-IWU}
(MM)
6.1.20 MODIFY PDP CONTEXT REQUEST (SM) to
{CC-SERVICE-CHANGE} (CC)
6.1.21 MODIFY PDP CONTEXT ACCEPT (SM) to
{CC-SERVICE-ACCEPT} (CC)
6.1.22 MODIFY PDP CONTEXT REJECT (SM) to
{CC-SERVICE-REJECT} (CC)
6.1.23 DEACTIVATE PDP CONTEXT REQUEST (SM) to
{CC-RELEASE-COM} (CC)
6.1.24 DEACTIVATE PDP CONTEXT ACCEPT (SM) to
{CC-RELEASE-COM} (CC)
6.1.25 SM Status (SM) to {IWU-INFO}
6.2 DECT to UMTS
6.2.1 {LOCATE REQUEST} to ATTACH REQUEST
6.2.2 {TEMPORARY IDENTITY ASSIGN-ACK} to ATTACH
COMPLETE (GMM)
6.2.3 {DETACH} to DETACH REQUEST (GMM)
6.2.4 {TEMPORARY IDENTITY ASSIGN-REJ} to DETACH
REQUEST (GMM)
6.2.5 {TEMPORARY IDENTITY ASSIGN-ACK} to P-TMSI
REALLOCATION COMPLETE (GMM)
6.2.6 {AUTHENTICATION-REPLY} to AUTHENTICATION AND
CIPHERING RESPONSE (GMM)
6.2.7 {AUTHENTICATION-REJECT} to AUTHENTICATION AND
CIPHERING FAILURE (GMM)
6.2.8 {IDENTITY-REPLY} to IDENTITY RESPONSE (GMM)
6.2.9 {LOCATE-REQUEST} to ROUTING AREA UPDATE REQUEST
(GMM)
6.2.10 {TEMPORARY-IDENTITY-ASSIGN-ACK} to ROUTING AREA
UPDATE COMPLETE (GMM)
6.2.11 {MM-IWU} to GMM STATUS (GMM)
6.2.12 {MM-IWU} to Service Request (GMM)
6.2.13 {CC-SETUP}(CC) to ACTIVATE PDP CONTEXT REQUEST
(SM)
6.2.14 {CC-SETUP}{CC} to ACTIVATE SECONDARY PDP CONTEXT
REQUEST (SM)
6.2.15 {CC-RELEASE-COM}(CC) to REQUEST PDP CONTEXT
ACTIVATION REJECT (SM)
6.2.16 {CC-SERVICE-CHANGE}(CC) to MODIFY PDP CONTEXT
REQUEST (SM)
6.2.17 {CC-SERVICE-ACCEPT} to MODIFY PDP CONTEXT
ACCEPT (SM)
6.2.18 {CC-RELEASE}(CC) to DEACTIVATE PDP CONTEXT
REQUEST (SM)
6.2.19 {CC-RELEASE-COM}(CC) to DEACTIVATE PDP CONTEXT
ACCEPT (SM)
6.2.20 {MM-IWU} to SM Status (SM)
7 Information element mappings
7.1 UMTS to DECT
7.1.1 Service Change Info
7.1.2 Mobile identity - Portable identity
7.1.3 Ciphering algorithm - {AUTH-TYPE}
7.1.4 (UMTS IE) - {IWU-TO-IWU}
7.1.5 (UMTS message) - {IWU-TO-IWU}
7.1.6 Ciphering algorithm - Cipher info
7.2 DECT to UMTS
7.2.1 {IWU-TO-IWU} - (UMTS IE)
7.2.2 MS network capability
7.2.3 MS Access capability
7.2.4 {IWU-TO-IWU} - (UMTS message)
7.2.5 {IWU-TO-IWU} - (Transaction Identifier)
8 Fields in information element coding
8.1 UMTS to DECT
8.1.1 Protocol discriminator - protocol discriminator
8.1.2 Transaction identifier - transaction identifier
8.1.3 Message type - message type
8.1.4 Id for info element (IEI) - id for info element
8.1.5 Length of contents - length of contents
8.1.6 Type of identity - Type (Mobile, portable identity)
8.1.7 Type of identity - Portable User Type (Mobile,
portable identity)
8.1.8 Identity digits, Identity value (Mobile identity,
portable identity)
8.1.9 Type of algorithm, Cipher algorithm identifier
(Ciphering algorithm, Cipher info)
8.2 DECT to UMTS
8.2.1 Protocol discriminator - protocol discriminator
8.2.2 Transaction identifier - transaction identifier
8.2.3 Message type - message type
8.2.4 Id for info element - id for info element (IEI)
8.2.5 Length of contents - length of contents
9 PP-IWU Reference Configuration
10 Profile requirements
10.1 Terminal capability indication
10.2 Call Resources/Parameters negotiation
10.3 IWU-attributes change
10.4 Collective and Group Ringing
10.5 Broadcast attributes management
Annex A (informative): Possible scenarios
A.1 Scenario data only
A.2 Scenario multi-connection
A.3 Scenario cordless and mobile environments
Annex B (informative): Bibliography
History