Rajib Taid

Mobile Communications Systems Development


Скачать книгу

Access (RA)‐RNTI – RA‐RNTI unambiguously identifies which time‐frequency resource was utilized by the UE to transmit the Random Access Preamble. The eNodeB uses the RA‐RNTI in the RAR from the E‐UTRAN to UE. The eNodeB scrambles Physical Downlink Control Channel’s (PDCCH's) CRC with RA‐RNTI for transmission of PDSCH that carries RAR(s).

       M‐RNTI – It is used to notify a UE about an MCCH information change.

      An ongoing end‐to‐end call for a UE/MS involves resource allocations by the different network elements of a communication network. In this regard, each network element assigns its respective network identities, having local or end‐to‐end significance, which is used to keep track of the various resources allocated by them. When an ongoing call is completed, the network elements release the allocated resources as identified by the respective network identities.

      At times, the end‐to‐end troubleshooting of an issue may be confusing using the different network identities. The corresponding identities are used during the analysis of the different call processing events, both signaling and user data, to isolate the source of the issue, i.e. network elements. Once a network element is isolated from the probable root cause, the same events may be tracked further on the peer network element using the corresponding identities that are used in that network element.

      Note that the network identities are assigned by the different network elements or different protocols layers of a network element. For example, LTE RNTIs are assigned by its Layer 2 MAC layer. Knowing the network identity and its corresponding protocol layer is particularly important during the end‐to‐end troubleshooting of an issue using protocol analysis tools.

      Network identities assigned to a mobile device can be native or mapped ones.

       Native Identity

      A network element may construct a native identity from several fundamental identities. A network element may allocate a native identity to another network element for its identification and tracking of various resources allocated to it. An example of native identity in the case of LTE/EPS is the GUTI as shown in Example 5.2; in Figure 5.3. MME assigns a GUTI to a UE and is used during the various EPS mobility management layer procedures. Similarly, in the GPRS system, the SGSN allocates a P‐TMSI to an MS.

       Mapped Identity

       Mapped identity due to intersystem changes

      Consider a P‐TMSI of a GPRS mobile subscriber which is of 32 bits in length. The mapping and deriving of an NRI and a TLLI from a P‐TMSI is shown in Figure 5.5.

       NRI

      An NRI is mapped into the Bits 23rd to 14th of a P‐TMSI.

       TLLI

      The first two MSBs of a TLLI are set to 1's. The Bits 29th to 0th of a TLLI is mapped into the corresponding bits of a P‐TMSI.

Schematic illustration of GPRS MS identity: mapping of an NRI and TLLI into a P-TMSI.

      Due to a UE's intersystem changes from E‐UTRAN/EPS to GERAN/UTRAN (UMTS) and vice versa, the new SGSN or new MME requires to retrieve the UE information from the old SGSN or old MME. Apart from this, identity mapping is also required at the UE end if it wishes to perform a mobility management procedure in the target system.

      Figure 5.6 shows graphically the mapping of LTE/EPS M‐TMSI from the GERAN/UTRAN P‐TMSI. In the current intersystem change scenario, the visiting and new MME performs the reverse mapping of the identities shown in Table 5.1, and based on these, the new MME is able to contact the old SGSN to retrieve the UE information.

GERAN‐UTRAN E‐UTRAN‐EPC
Mobile Country Code (MCC) Mobile Network Code (MNC)
Mobile Network Code (MNC) Mobile Network Code (MNC)
Location Area Code (LAC) MME Group ID
Routing Area Code (RAC) Bit 23rd to 16th of M‐TMSI
8 Most Significant Bits of NRI MME Code
29th to 24th bits of P‐TMSI 29th to 24th bits of M‐TMSI
15th to 0th bits of P‐TMSI 15th to 0th