hash
stringlengths 32
32
| doc_id
stringlengths 5
12
| section
stringlengths 4
595
| content
stringlengths 0
6.67M
|
---|---|---|---|
8a9283a656db20cd080be5c53231664c | 23.922 | 9.3.4 Scenario 1: Information Flows for Validation | In order to validate scenario 1 proposed above, information flows for registration, location management and call delivery/origination are provided in this section.
The information flows presented in the Call Control and Roaming proposal do not provide many details. Generic names have been chosen for signalling messages. Any resemblance to known existing protocols is due to an attempt simply to proposing information flows immediately comprehensible. Only a restricted subset of the possible information flows is included in the document. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.3.4.1 Registration and Location Management | • In this version of the Technical Report, only a basic registration procedure is considered.
• The basic registration procedure is composed of three steps:
• GPRS attach: is a plain GPRS attach procedure;
• PDP context activation: a PDP context is set up to support application level signalling;
• application level registration with CSCF.
The latter is considered in the registration flows reported in the follow.
Two basic cases of registration are shown here, in order to provide an initial picture of the application level registration.
Figure 9-6: Release 2000 all IP network user registering in Release 2000 all IP network Serving Domain
Steps 4 and 5 are optional and take place only in two cases:
• if the user was previously registered in a different Serving CSCF;
• if the user was not previously registered but, during a MT call, HSS determined that a service profile was needed in the Home CSCF to handle the supplementary services triggered by the incoming call (e.g. a forwarded-to multimedia call triggered by the MT call).
Other registration and location management scenarios are FFS. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.3.4.2 MT/MO Calls | Two call information flows are presented in this version of the Technical Report. The call flows are based on the following call delivery model:
• a call from PSTN towards a DN corresponding to the user is received by one of the MGCF of the Home Network, ISP or corporate LAN domain in the IP multimedia network;
• MGCF reaches the Home CSCF translating the DN;
• Home CSCF interrogates the HSS to retrieve information regarding the user corresponding to DN;
• Home CSCF receives information on how the call has to be routed: in the flows shown here, HSS returns the signalling address of a Serving CSCF, but in general could be the transport address of the MS if there is no Serving CSCF or a forwarde-to number). Also, HSS might return service profile information in case the user is not registred.
• Home CSCF forwards call signalling to the retrieved address
Regarding user-plane, packets are routed from the MGW in the corporate LAN domain or home network to the GGSN in the bearer network where the user is presently located.
No optimisation has been considered for user-plane of MO calls. In case MO routing optimisation is desired, the MGCF used to route the call towards PSTN can be chosen using different possible criteria. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.3.4.2.1 Incoming call from PSTN to a Release 2000 all IP network | The following flow describes the call delivery for a MT call from PSTN to a Release 2000 all IP network user addressed through a DN.
Figure 9-7: Incoming call from PSTN to a Release 2000 all IP network
Issues such as QoS negotiation, policy management, etc. are FFS. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.3.4.2.2 Call from an 3GPP IP based network/Multimedia IP Network to 3GPP IP network | The following flow assumes that a Release 2000 all IP network user has roamed into a visited network. The flow describes a call from a different Release 2000 all IP network terminated into the home domain of the called user. It is assumed that the Release 2000 all IP network where the call is coming from, is aware of the addressing plan information (IP based addressing) that allows the call to directly terminate into the H-CSCF (otherwise, it may have been routed through the PSTN and terminated into MGCF).
Details will need to be worked on.
Figure 9-8: Call from Release 2000 all IP network to Release 2000 all IP network |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.3.5 Scenario 2: Information Flows for Validation | No flow will be shown for this version of the document. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.4 Roaming to Other Networks | In order to ensure compatibility and easy roaming between 2G GSM/GPRS, UMTS R99 and UMTS R00 CS and GPRS domain (excluding the VoIP/multimedia domain), the same mobility procedures are used within and between the 3 kind of networks (storage of the current location in the HSS, use of MAP to update the HSS with the current subscriber location of an user and to download / update the subscriber data in the visited node).
Some enhancements with regard to current mobility procedures are obviously needed:
• in case of a R00 terminal roaming in a MSC/SGSN of a 2G / R99 network:
• R-SGW relays all the MAP / CAP messages between the HSS / SCP and the functions (MSC, SGSN, …) handling Call / Session in the 2G / R99 CN.
• the R00 HSS sends to the MSC/SGSN a MAP_R99 translation of the subscriber data compatible with the data a R99 MSC/SGSN can handle. This should be classical for MAP application context handling.
• in case of a R00 terminal roaming in R99 network and requesting Multimedia service: as in R99 there is no standard way to have a visited GK,
• Either, in order to get a customized service, the R00 terminal requests service from its Home CSCF in its R00 network. The R-SGW is not impacted in this case.
• Or, the service of a GK in the visited PLMN is used and the service cannot be customized. The R-SGW is not impacted in this case.
• in case of a R99 terminal roaming in a MSC/SGSN of a R00 network:
• R-SGW relays all the MAP / CAP messages between the 2G / R99 HLR / SCP and the functions (SGSN, …) handling Call / Session in the All IP R00 CN. The R00 VLR (in SGSN and/or CS domain) or Call / Session handling function is able to interpret MAP_R99 / CAP_R99 received from R99 HLR / SCP
• in case of a R99 terminal roaming in R00 network and requesting Multimedia service: as in R99 there is no standard way to have a visited GK,
• Either, in order to get a customized service, the R99 terminal requests service from its Home CSCF in its R99 network. The R-SGW is not impacted in this case.
• Or, the service of a GK in the visited PLMN is used and the service cannot be customized. The R-SGW is not impacted in this case.
There are currently two proposed solutions for roaming. These solutions are not completely in contradiction with each other but actually include a good set of commonalities. However, further work is needed to identify the commonalities and to consolidate the proposals. The two proposals are summarised in this section with references to more detailed descriptions. The presented roaming cases and key issues addressed in the contributions should be further considered and taken as a baseline for further work on roaming model definition for R00 networks. Alternative solutions for roaming are for further study. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.4.1 Roaming Procedures for R00 networks | One possible solution for the support of roaming in R00 networks is described in Tdoc S2k99117. The contribution covers both roaming between R00 networks and roaming to mobile legacy networks. The contribution only covers the PS-only architecture in UMTS R00. Roaming from UMTS R99 considered in this document is in terms of USIM roaming. The contribution makes certain assumptions on mobility management and network identities that have to be considered as part of the future work. A basic registration procedure is introduced in order to allow the discussion on roaming.
The roaming scenarios described are:
• Roaming within R00 PS domain networks;
• Roaming from R00 PS domain networks to 2G/UMTSR99 networks;
• Roaming from 2G/UMTS R99 networks to R00 PS domain networks; |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.4.2 Overlaid solution to roaming | One roaming solution is to introduce an overlaid personal number service, which keeps track of users registrations (attached to 2G/3G CS and/or PS MultiMedia) and call reception preferences. This enables inter-service as well as inter network roaming for Telephony as classical TeleService Speech in 2G/3G networks and Telephony as the voice component of a MultiMedia service.
The proposed roaming solution is further detailed in Tdoc S2K-99070. The Tdoc elaborates on the driving forces for overlaid roaming and includes examples of user registration and call reception cases. |
8a9283a656db20cd080be5c53231664c | 23.922 | 9.5 Open Issues | The following issues need to be discussed and solved through interaction with the other working groups in Release 2000 all IP network and might require discussion in the plenary.
• Support of multiparty voice and data communications sessions (including the capability for the user or service logic to dynamically add or delete users from an active communications session). The impact on the control plane (e.g. CSCF) and on the user plane (e.g. use of MRF vs. IP multicast) has to be studied.
• UMS structure and functionality has to be defined. As an example, UMS might have additonal interface (e.g. GRIC CSP) to the clean houses as defined in H.225. GRIC Communications, Inc. develops a global intelligent transaction platform (GRIC CSP) that allows diverse networks to interoperate. This platform allows ISPs, Telcos, and emerging carriers to offer multiple IP-based services such as IP Telephony, E-commerce, Internet Roaming, and Internet Faxing. Leveraging its GRIC Alliance Network, a worldwide membership of over 450 major ISPs and telcos in more than 140 countries, GRIC has aggregated an addressable user base of 30 million dial-up users and an estimated 40 million corporate users. For more information on GRIC see http://www.gric.org/ Routing optimisation for calls originated in a Release 2000 all IP network towards a MS of another Release 2000 all IP network and addressed using a DN (Directory Number) in order to bypass the PSTN has to be discussed.
• Also, routing of MT calls towards LN has to be specified.
• CSCF discovery has to be discussed and solutions have to be presented at the next meetings.
• Impact of requirements regarding backward compatibility with 2G networks (e.g. RAN, terminals, call control and roaming, services) needs to be addressed.
• Location confidentiality issues have to be considered versus optimisation of signalling and transport paths.
• The Release 2000 all IP network must provide the capability for service logic to deny or re-route voice and/or data communication requests. This capability has to apply to both incoming and to user initiated communication requests.
• Also, signalling flooding problems and malicious attacks to the network have to be considered.
• The issue could affect the architecture in terms of where more firewall functions will have to be implemented.
• Addressing of multiple PDP flow by means of the same IP address has to be solved as an issue if not yet standardised for GPRS.
• Details regarding the set of vocoders supported in Release 2000 all IP network and the vocoder negotiation mechanism need to be investigated.
• Signalling PDP flow can be activated when the MS attaches/registers with the network and kept alive for all the duration of the attach/registration session (dorment signalling PDP flow), or it can be activated on demand. The choice between the two options has to be discussed considering paging issues, load due to MM for the dorment PDP context even when the MS is idle, and the impact on the MS.
• Is T.120 considered as real-time application, i.e. do T.120 components of multimedia calls have to be controlled by a CSCF?
• Database queries in the HSS and other network databases has to be discussed and defined.
• Addressing of network entities and address translation need to be defined (e.g. It is assumed that MGCF has the ability to retrieve the CSCF/MSC server corresponding to a DN; how MGCF does it is FFS).
• Storage of 2G profiles in Release 2000 all IP network in order to support roaming to 2G legacy networks has to be discussed. In particular, the presence of a 2G HLR functionality in HSS need to be discussed and possible alternatives evaluated.
• Long term issues and assumptions, i.e. not related only to R00, should be considered in order to have a future proof solution. As an example, long terms requirements on addressing mechanisms (e.g. dynamic vs. static, IPv4 vs. IPv6) should be considered.
• a "VLR" type functionality capable of caching the service profile for the user in a serving domain needs to be defined. The functionality should not be related to location management but focus on service profile.
• Differences in the definition of the term “Location” as understood within the cellular/wireless community and in the IETF community have not been addressed yet in this document. This needs to be harmonized.
• Provisioning of location-based services (e.g. service based on geo-location information) and the impact on the architecture need to be considered.
• QoS and security issues have not been addressed yet. |
8a9283a656db20cd080be5c53231664c | 23.922 | 10 Service Platform Impacts | |
8a9283a656db20cd080be5c53231664c | 23.922 | 10.1 3GPP Release 2000 Service Architecture | This section describes how the 3GPP release 99 service architecture [3] can be applied to the 3GPP release 2000 network by extending the VHE/OSA concept to the Multi-Media core network. This can be done by providing an application interface (as described in VHE specification [3]) from the CSCF, see Figure 10-1.. As VHE expect the service to be located in the home domain of the end–user (the Home Environment), other network elements besides the CSCF may be needed to provide an roaming architecture that allow the serving domain to pass control to the home domain where the service logic resides. 1
Note: The architectures in Figure 10-1 and Figure 10-2 show the CAMEL Service Environment (CSE) which is not shown in the Reference Architecture in Section 5.
Figure 10-1: 3GPP Release 2000 service architecture
The Open Service Architecture consists of three parts, as illustrated in Figure 10-1(note that the figure is not meant to be exhaustive of all interrelationships):
• Applications, e.g. VPN, conferencing, location based applications. These applications are implemented in one or more Application Servers;
• Framework, providing the applications with basic services that enable applications to make use of the service capabilities in the network. Examples of framework services are Authentication, Registration and Discovery;
• Service Capabilities, providing the applications with services that are abstractions from underlying network functionality. Examples of services offered by the Service Capabilities are Call Control, Message Transfer and Location. Services are possibly provided by more than one Service Capability Server. For example, the Call Control service might be provided by CAMEL and MexE. The Service Capability Servers taken into account for UMTS Release 99 are CAMEL, MExE, SAT and HLR.
Figure 4
Figure 10-2: Overview of Open Service Architecture
Note: This may not be in line with the latest version of the VHE/OSA Stage 2 document |
8a9283a656db20cd080be5c53231664c | 23.922 | 10.2 IN based Services | The IN based service is one example of legacy services and the IN based service logic is one example of how legacy services may be introduced to the 3GPP Release 2000 networks. This IN based service logic may need to be enhanced in 3GPP Release 2000 networks, based on the proposed architecture, when full support for multi-media is required.
When only voice/audio has to be supported several options exist:
1. Re-route call to legacy system. This is applicable to very specific services such as 800- and 900- services.
2. Provide ’INAP’ like interfaces between the 3GPP Release 2000 network functional blocks (e.g. CSCF) and a legacy SCP. These interfaces will be used for inter- and intra-network connections, and as such should be based on a suitable INAP protocol (e.g. CAP).
3. Provide new interfaces between legacy IN and 3GPP Release 2000 network functions, allowing the AS to access the application in the legacy SCP.
It shall be noted that the Operator Specific Services defined for the QoS enabled GPRS network are still available and apply for the access bearers towards the MM core network. This will for instance enable the pre-paid charging of the GPRS bearer.
As indicated in the sections below, option 2 (section 10.2.1) will allow the possibility that existing services can be upgraded to provide 3G users with a seamless transition of familiar 2G services, especially whilst roaming. Option 3 (section 10.2.2) does not have this advantage but benefits from future proofing. It would thus seem appropriate to allow the two options to co-exist, where support of legacy CAMEL services would be carried via option 2 and enhanced/future services can be provided via OSA principles as outlined via option 3 or a combination of both.
10.2.1 ‘INAP’ based interface between legacy SCP and R00 network entities
In this option, the classical IN model is extended to include the CSCF as a node capable of supporting a service switching function (based on the 23.078 specification of the gsmSSF) and a transaction based protocol (TCAP) with CAP. Conceptually, a new functional entity is introduced between the CSCF and the CSE. This functional entity, called a softSSF, can potentially be based on a modified release 99 GMSC, VMSC and VLR functionality, where call control, billing and database functions are retained or enhanced. This softSSF interacts with the CSE via CAP and interacts with the CSCF either via an internal interface (if it is co-located with the CSCF) or via an open interface based on OSA concepts (if the softSSF is deployed as a Service Capability Server). Some changes to CAP can be expected to take into account the impact of the underlying IP call control. The CSE is able to offer its services via defined open interfaces based on OSA principles. These services can be implemented by the CSE via the CAP interfaces to the SGSN and the CSCF. (Note the CSCF may also offer its services via defined open interface based on OSA principles).
This option benefits for the extensive re-use of standardised process (gsmSSF), protocol (CAP) and already deployed services.
Figure 10-2 Functional Architecture to support option 2
10.2.1.1 Advantages
• Maximises the re-use of existing functional entities, protocols and services. Such reuse decreases the development and ownership costs allowing existing familiar 2G services to be provided to 3G users from an early stage.
• Minimum changes to the CSE for the support of legacy services. There are several IN/CAMEL services already deployed PrePaid, VPN, Mobile Number Portability, etc which can be used in a voice over IP network.
• Potentially, CAP/TCAP can be carrier over IP (this requires further study/contributions)
• This approach is in line with the work currently underway in ETSI SPAN 3 (Services and Protocols), in particular a work item addressing IN support for voice over IP on the H.323 architecture and associated protocols in association with the TIPHON project. The study will investigate how an H.323 gatekeeper can act as a virtual Service Switching Point (SSP). It is worth noting that ETSI plan to harmonise the fixed line IN protocol (ETSI Core INAP CS3.1) and mobile equivalent (CAP Phase 3) into a common protocol targeted for ETSI Core INAP CS4.
10.2.1.2 Disadvantages
• Introduces new functional entity ‘softSSF’, which provides the necessary mapping between the CSCF and the CSE. However, this functional entity is based on the functions already provided by a VMSC/GMSC, where already standardised process such as the gsmSSF can be reused. The interface between the CSCF and the softSSF requires further study.
10.2.2 New open interface between legacy SCP and R00 network entities
This option adopts the OSA principles where the service capability servers such as the CSCF and the legacy SCF have defined APIs that allow applications in separate application servers to use the features offered by these SCS. This approach allows the service features that are provided by the SCS to be made available to applications designers with out having detailed knowledge of the specific protocols. Currently, the SCSs reflect the service capabilities in UMTS phase1, and CAMEL is one example. From TS 22.121 - “A service capability server consists of one or several server components. Taking CAMEL Services as an example, the server components could be Call Control, Location/Positioning, PLMN Information & Notifications. Each of these server components offers its services via defined open interfaces, and implements these by using GSM/UMTS protocols”.
The problem is that within an all IP network, the above mentioned server components are not all available via the CSE as there is no underlying protocol between the CSE and the network for call control (apart form the CSE/SGSN interface). To provide the same functionality provided by existing legacy services, new applications will have to be created that make some limited use of the features that may be offered by the CSE (for example database lookup), plus service features offered in the CSCF.
APIs supporting client-server models will exist. These APIs will enable the users to access service logic via the UE and specialist servers (e.g. MexE). The interface these specialist servers and the CSCF is for further study.
Figure 10-3 Functional Architecture for option 3
10.2.2.1 Advantages
• An open interface based on OSA concepts. APIs that may interface with the CSCF and the CSE are expected to become available allowing specific protocols to be hidden from the service/application designers
• Easier deployment of new/enhanced services for multimedia applications.
10.2.2.2 Disadvantages
• When considering existing CSE based services, little re-use is made of already standardised protocols, services and processes. More significantly, new processes and protocols must be re-defined and re-implemented for services that already exists, increasing development and ownership costs.
• Requires new applications on an application server to be created in order to support legacy services.
• Impact on the legacy CSE and services considered greater than option 2. |
8a9283a656db20cd080be5c53231664c | 23.922 | 10.3 Issues requiring further contributions | The following issues require further contributions:
• Applications may reside not only in Application Servers (AS) but also in terminals.
• Options for sharing applications or parts of them between AS and terminals
• Which elements, beside the CSCF, will provide API for application design (aligned with VHE/OSA)
• Terminal shall also provide API for application design (aligned with MExE)
• Which new Service Capabilities/Service Capability Features are needed for 3GPP Release 2000 (e.g. WIN)
• Specific implementation cases of the proposed architecture should be provided.
• If and how 3GPP Release 2000 service features could be made accessible to 2G terminals via 2G networks
• If and how 3GPP Release 2000 service features could be made accessible to dual mode 2G/3G terminals via 2G networks
• |
8a9283a656db20cd080be5c53231664c | 23.922 | 11 Security | There will be a common authentication scheme for the terminals operating in the all-IP mode, which will be SIM/USIM based. It is required that all-IP terminals will be able to register and provide basic service when used with a 3GPP SIM/USIM.
12 Work Plan |
8a9283a656db20cd080be5c53231664c | 23.922 | 12.1 Milestones for Release 00 | 3GPP has the objective of producing the second release of specification for UMTS by the end of 2000. The project management for this work will need to include the elements of work package definition, the interdependency of these work packages and their scheduling. As the work is undertaken in the various TSGs and WGs in 3GPP there will need to be agreement across these groups on the overall plan. Subsequent communication between these groups on such issues as changes to schedules and requirements will be essential. An additional task relating to communication is the reviewing of requirements documents to identify technical problems in the implementation at an early stage. The completion of release 99 has the potential to impact the availability of resources and hence the time scales for release 00.
Note: "The text that follows is of more general nature than the rest of the document. This has been included to show the framework for release 2000, of which an All IP Architecture may be one Work Item. The dates shown are assumed dates and need to be verified by TSG-S2." |
8a9283a656db20cd080be5c53231664c | 23.922 | 12.1.1 Release 00 milestones | 3GPP has not yet agreed overall milestones for release 00. For the purposes development of a high-level work plan the following key milestones are proposed.
July 99 3GPP All-IP network feasibility study started
Sept 99 TSG-S2 R00 Ad Hoc will submit the results of the TSG-S2 for approval
Oct 99 After TSG-S2 approval, TSG-S2 R00 Ad Hoc Group results will be submitted to TSG-S for approval
Oct 99 After TSG-S approval Project planning work for R00 (including all IP option) will be started at TSG-S2 project planning ad hoc groups (These groups have adequate participation from all relevant TSGs/WGs).
Dec 99 After TSG-S2 approval the detailed workplan for R00 (including all-IP network option) will be submitted to TSG-S for approval.
Dec 99 Release 00 service requirements available
Jan 00 TSG-SA2 completes first draft architecture for all-IP network.
Jan 00-Dec 00 Work within 3GPP TSGs and WGs proceed according the TSG-S approved R00 Project Plan
Dec 00 Release 00 specifications completed including all-IP option
A high level PERT chart is given overleaf to form the basis of the planning for releases beyond R99. The reviewed first drafts of the service and architecture specifications should be available before the end of 1999. |
8a9283a656db20cd080be5c53231664c | 23.922 | 12.1.2 Detailed activity plan | Date
Meeting group
Proposed activity
August 23 – 27
S2
Progress architectural study
September 13 - 17
S2
Joint S1 – S2 activity on R00 - Finalize the requirements for the architectural study and identify the key issues. Finalize the proposed R00 architecture at the TSG-S2 R00 ad hoc group.
Late September/early October
S2 R00 Ad Hoc Group meeting (provisional)
Possible refinements to the outcome of the ad hoc group
September 29 - 1
S1
Review input on service requirements for R00
October 11 - 13
SA Plenary
Approve the results of TSG-S2 R00 Ad Hoc Group
October 25 – 29
S2
Start the specification of the architecture, and detailed work plan.
Initiate the S2 project coordination adhoc groups work for R00 based on the approved results from TSG-SA Plenary as well as results from other groups, e.g. the Mobile IP ad-hoc group.
November 29 - 3
S1
Review service requirement and architecture
November 29 - 3
S2
Develop architecture specifications
December 15 - 17
SA Plenary
Approve detailed work plan from TSG-S2 project coordination adhoc groups
Figure 14-1: 3GPP Standardisation Activities Beyond Release 99
History
Document history
V0.0.0
July 1999
Creation of document.
V0.0.1
11 Aug 1999
Updated after R2000 Ad Hoc Swindon, 10-11th August.
Scope is clarified and new text added to requirements, Service Platform sections and a new architecture sub-section on support for R99 terminals.
Architecture changes: new CSCF <-> CSCF interface. MGW split into MGW and Transport signalling gateway. SGW to legacy network labelled as roaming gateway.
V0.0.2
1 Sept 1999
Updated after R00 Ad Hoc, based on tdocs s2k99030, s2k99031, s2k99032, s2k99035, s2k99045, s2k99049
V0.0.3
6th Sept 1999
Updated with new sections reviewed by e-mail. Contains marked changes from v0.0.2
V0.1.0
22 Sept 1999
Updated as per meeting week beg. 13th Sept (Bonn). New text on handover and IP header compression /stripping. Definitions on Mc reference point and on the Media Gateway function al blocks.
V0.1.1
28th Sept 1999
Draft for Ad Hoc Helsinki, changes include addition of HSS in section 5, agreeed solution for support of CS terminals.
V0.1.2
29th Sept 1999
2nd draft for Ad Hoc Helsinki, changes include addressing editor’s notes in section 9, addirtion of text to sections on QoS and Security and new subscetions to service Platforms
V0.1.3
30th Sept 1999
Interim draft at R00 Ad Hoc, Helsinki
V0.1.4
1st Oct 1999
Final draft for approval
V.1.0.0
7th Oct 1999
Prepared for presentation at SA#5. Technical content identical to v.0.1.4 |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 1 Scope | The present document specifies the overall requirements for 3G Fault Management as it applies to the NE, EM and NM.
Clauses 4 and 5 define the fault management concept and functional requirements for the detection of faults and the generation, collection and presentation of alarms, operational state data and test results across 3G systems. These functions are described on a non-formal level since the formal standardisation of these functions across the different vendors' equipment is not required. The functional areas to be specified in this part of the document cover:
• fault surveillance and detection in the NEs;
• notification of alarms (including alarm cease) and operational state changes;
• retrieval of current alarms from the NEs;
• fault isolation and defence mechanisms in the NEs;
• alarm filtering;
• management of alarm severity levels;
• alarm and operational state data presentation and analysis at the OS;
• retention of alarm and operational state data in the NEs and the OS; and
• the management of tests.
Any (re)configuration activity exerted from the OMC as a consequence of faults will not be subject of the present document, these are described in [1].
Clauses 6 and 7 of the present document describe specific aspects of the Fault Management for the UTRAN and the CN, respectively, with particular emphasis on the exact fault definitions and alarm information to be generated. The definition of the test procedures and the relationship with the UTRAN resp. CN management architecture as defined in [3].
Finally, Clause 8 of the present document defines the functional requirements for the standard Itf-N, for the purpose of Fault Management of 3G networks, as seen from the Network Manager (NM). The Itf-N is fully standardised so as to connect systems of any vendor to the NM via this interface. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 2 References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
• References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies.
[1] 3G TS 32.106: "3G Configuration Management".
[2] 3G TS 32.101: "3G Telecom Management principles and high level requirements".
[3] 3G TS 32.102: "3G Telecom Management architecture".
[4] 3G TS 32.106: "3G Performance Management".
[5] ITU-T Recommendation X.710: "Common management information service definition for CCITT applications".
[6] ITU-T Recommendation X.711: "Common management information protocol specification for CCITT applications".
[7] ITU-T Recommendation X.721: "Information technology - Open Systems Interconnection - Structure of management information: Definition of management information".
[8] ITU-T Recommendation X.731: "Information technology - Open Systems Interconnection - Systems Management: State management function".
[9] ITU-T Recommendation X.733: "Information technology - Open Systems Interconnection - Systems Management: Alarm reporting function".
[10] ITU-T Recommendation X.734: "Information technology - Open Systems Interconnection - Systems Management: Event report management function".
[11] ITU-T Recommendation X.735: "Information technology - Open Systems Interconnection - Systems Management: Log control function".
[12] ISO 8571: "File Transfer, Access and Management". |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 3 Definitions and abbreviations | |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 3.1 Definitions | For the purposes of the present document, the following terms and definitions apply:
Active alarm: an alarm that has not been cleared. An alarm is active until the fault that caused the alarm is corrected and a clear alarm is generated
Alarm: an alarm is an abnormal network entity condition which categorises an event as a fault
Alarm notification: a notification used to inform the recipient about the occurrence of an alarm
Clear alarm: an alarm where the severity value is set to "cleared"
Event: this is a generic term for any type of occurrence within a network entity. A notification or event report may be used to inform one or more OS(s) about the occurrence of the event
Fault: a deviation of a system from normal operation. This deviation may result in the loss of operational capabilities of the element or the loss of redundancy in case of a redundant configuration
Notification: information message originated within a network entity to inform one or more OS(s) about the occurrence of an event
Steady fault: a steady fault is characterised by well-defined conditions for the declaration of its presence or absence, i.e. fault occurrence and fault clearing conditions. This implies that the fault can be both detected and cleared automatically by the fault management functions of the network entity
Unsteady fault: an unsteady fault is characterised by a defined condition for the declaration of the fault, but no clearing condition exists. This implies that the fault can be detected but not cleared automatically by the fault management functions of the network entity |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 3.2 Abbreviations | For the purposes of the present document, the following abbreviations apply:
CCITT The International Telegraph and Telephone Consultative Committee
CM Configuration Management
CMIP Common Management Information Protocol
CMIS Common Management Information Service
CMISE Common Management Information Service Element
EIR Equipment Identity Register
ETSI European Telecommunications Standards Institute
FTAM File Transfer Access and Management
FTP File Transfer Protocol
HLR Home Location Register
ISO International Standards Organisation
MMI Man-Machine Interface
MML Man-Machine Language
MOC Managed Object Class
MOI Managed Object Instance
MS Mobile Station
MSC Mobile Services Switching Centre
NE Network Element
NMC Network Management Centre
OA&M Operation, Administration and Maintenance
OMC Operation and Maintenance Centre
OS Operations System
OSI Open System Interconnection
O&M Operations and Maintenance
QoS Quality of Service
RNC Radio Network Controller
TFTP Trivial File Transfer Protocol
TMN Telecommunications Management Network
TS Technical Specification
VLR Visitors Location Register |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4 Fault Management concept | Any evaluation of the network elements' and the overall network health status will require the detection of faults in the network and, consequently, the notification of alarms to the OS (EM and/or NM). Depending on the nature of the fault, it may be combined with a change of the operational state of the logical and/or physical resource(s) affected by the fault. Detection and notification of these state changes is as essential as it is for the alarms. A list of active alarms in the network and operational state information as well as alarm/state history data are required by the system operator for further analysis. Additionally, test procedures can be used in order to obtain more detailed information if necessary, or to verify an alarm or state or the proper operation of NEs and their logical and physical resources.
The following subclauses explain the detection of faults, the handling of alarms and states and the execution of tests. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1 Faults and alarms | Faults that may occur in the network can be grouped into one of the following categories:
• Hardware failures, i.e. the malfunction of some physical resource within a NE.
• Software problems, e.g. software bugs, database inconsistencies.
• Functional faults, i.e. a failure of some functional resource in a NE and no hardware component can be found responsible for the problem.
• Loss of some or all of the NE's specified capability due to overload situations.
• Communication failures between two NEs, or between NE and OS, or between two OSs.
In any case, as a consequence of faults, appropriate alarms related to the physical or logical resource(s) affected by the fault(s), shall be generated by the network entities.
The following subclauses focus on the aspects of fault detection, alarm generation and storage, fault recovery and retrieval of stored alarm information. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.1 Fault detection | When any type of fault described above occurs within a 3G network, the affected network entities must be able to detect them immediately.
The network entities accomplish this task using autonomous self-check circuits/procedures, including, in the case of Nes, the observation of measurements, counters and thresholds. The threshold measurements may be predefined by the manufacturer and executed autonomously in the NE, or they may be based on performance measurements administered by the EM, cf. [4]. The fault detection mechanism as defined above shall cover both active and standby components of the network entities.
The majority of the faults will have well-defined conditions for the declaration of their presence or absence, i.e. fault occurrence and fault clearing conditions. Any such incident shall be referred to in the present document as a steady fault. The network entities must be able to recognise when a previously detected steady fault is no longer present, i.e. the clearing of the fault, using similar techniques as they use to detect the occurrence of the fault. For some faults, no clearing condition exists. For the purpose of the present document, these faults shall be referred to as unsteady faults. An example of this is when the network entity has to restart a software process due to some inconsistencies, and normal operation can be resumed afterwards. In this case, although the inconsistencies are cleared, the cause of the problem is not yet corrected. Manual intervention by the system operator will always be necessary to clear unsteady faults since these, by definition, cannot be cleared by the network entity itself.
For some faults there is no need for any short-term action, neither from the system operator, nor from the network entity itself, since the fault condition lasted for a short period of time only and then disappeared. An example of this is when an NE detects the crossing of some observed threshold, and in the next sampling interval, the observed value stays within its limits.
For each fault, the fault detection process shall supply the following information:
• the device/resource/file/functionality/smallest replaceable unit as follows:
• for hardware faults, the smallest replaceable unit that is faulty;
• for software faults, the affected software component, e.g. corrupted file(s) or databases or software code;
• for functional faults, the affected functionality;
• for faults caused by overload, information on the reason for the overload;
• for all the above faults, wherever applicable, an indication of the physical and logical resources that are affected by the fault if applicable, a description of the loss of capability of the affected resource.
• the type of the fault (communication, environmental, equipment, processing error, quality of service) according to [9];
• the severity of the fault (indeterminate, warning, minor, major, critical), as defined in [9];
• the probable cause of the fault;
• the time at which the fault was detected in the faulty network entity;
• the nature of the fault, i.e. steady or unsteady;
• any other information that will help understanding the cause and the location of the abnormal situation (system/implementation specific).
For some faults, additional means, such as test and diagnosis features, may be necessary in order to obtain the required level of detail. See subclause 4.3 for details. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.2 Generation of alarms | For each detected fault, appropriate alarms shall be generated by the faulty network entity, regardless of whether it is a steady or unsteady fault. Such alarms shall contain all the information provided by the fault detection process as described in subclause 4.1.1.
In order to ease the fault localisation and repair, the faulty network entity should generate for each single fault, one single alarm, also in the case where a single fault causes a degradation of the operational capabilities of more than one physical or logical resource within the network entity. An example of this is a hardware fault which affects not only a physical resource but also degrades the logical resource(s) that this hardware supports. In this case the network entity shall generate one single alarm for the faulty resource (i.e. the resource which needs to be repaired) and a number of events related to state management (cf. subclause 4.2) for all the physical/logical resources affected by the fault, including the faulty one itself.
In case a network entity is not able to recognise that a single fault manifests itself in different ways, the single fault is detected as multiple faults and originates multiple alarms. In this case however, when the fault is repaired the network entity must be able to detect the repair of all the multiple faults and clear the related multiple alarms.
When a fault occurs on the connection media between two NEs or between a NE and an OS, and affects the communication capability between such NE/OS, each affected NE/OS will detect the fault as described in subclause 4.1.1 and generate its own associated communication alarm toward the managing OS. In this case it is the responsibility of the OS to correlate alarms received from different NEs/OSs and localise the fault in the best possible way.
Within each NE, all alarms generated by that NE shall be input into a list of active alarms. The NEs must be able to provide such a list of active alarms to the OS when requested. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.3 Clearing of alarms | The alarms originated in consequence of faults need to be cleared. To clear an alarm it is necessary to repair the corresponding fault. The procedures to repair faults are implementation dependent and therefore they are out of the scope of the present document, however, in general:
• the equipment faults are repaired by replacing the faulty units with working ones;
• the software faults are repaired by means of partial or global system initialisations, by means of software patches or by means of updated software loads;
• the communication faults are repaired by replacing the faulty transmission equipment or, in case of excessive noise, by removing the cause of the noise;
• the QOS faults are repaired either by removing the causes that degraded the QOS or by improving the capability of the system to react against the causes that could result in a degradation of the QOS;
• Solving the environmental problem repairs the environment faults (high temperature, high humidity, etc.).
It is also possible that a steady fault is spontaneously repaired, without the intervention of the operator (e.g. a threshold crossed fault). In this case the NE behaves as for the steady faults repaired by the operator.
In principle, the NE uses the same mechanisms to detect that a fault has been repaired, as for the detection of the occurrence of the fault. However, for unsteady faults, manual intervention by the operator is always necessary to clear the fault. Practically, various methods exist for the system to detect that a fault has been repaired and clear alarms and the faults that triggered them. For example:
• The system operator implicitly requests the NE to clear a fault, e.g. by initialising a new device that replaces a faulty one. Once the new device has been successfully put into service, the NE will clear the fault(s). Consequently, the NE will clear all related alarms.
• The system operator explicitly requests the clearing of one or more alarms. Once the alarm(s) has/have been cleared, the NE will detect that the fault condition has ceased.
• The NE detects the exchange of a faulty device by a new one and initialises it autonomously. Once the new device has been successfully put into service, the NE will clear the fault(s). Consequently, the NE will clear all related alarms.
• The NE detects that a previously reported threshold crossed alarm is no longer valid. It will then clear the corresponding active alarm and the associated fault, without requiring any operator intervention. The details for the administration of thresholds and the exact condition for the NE to clear a threshold crossed alarm are implementation specific and depend on the definition of the threshold measurement, see also subclause 4.1.1.
• Unsteady faults/alarms can, by definition, not be cleared by the NE autonomously. Therefore, in any case, system operator functions shall be available to request the clearing of unsteady alarms/faults in the NE. Once an unsteady alarm/fault has been cleared, the NE will clear the associated unsteady fault/alarm.
Details of these mechanisms are system/implementation specific.
Each time an alarm is cleared the NE shall generate an appropriate clear alarm event. A clear alarm is defined as an alarm, as specified in subclause 4.1.2, except that its severity is set to "cleared". The relationship between the clear alarm and the active alarm is established:
• by re-using a set of parameters that uniquely identify the active alarm (cf. subclause 4.1.2); or
• by including a reference to the active alarm in the clear alarm.
When a clear alarm is generated the corresponding active alarm is removed from the active alarm list. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.4 Alarm forwarding and filtering | |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.5 Storage and retrieval of alarms in/from the NE | For fault management purposes, each NE will have to store and retain the following information:
• a list of all active alarms, i.e. all alarms that have not yet been cleared; and
• alarm history information, i.e. all notifications related to the occurrence and clearing of alarms.
The storage space for alarm history in the NE will be limited. Therefore it shall be organised as a circular buffer, i.e. the oldest data item(s) shall be overwritten by new data if the buffer is full. Further "buffer full" behaviours, e.g. those defined in [11], may be implemented as an option. The storage capacity itself, and thus the duration for which the data can be retained, will be Operator and implementation dependent. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.6 Fault Recovery | After a fault has been detected and the replaceable faulty units have been identified, some management functions are necessary in order to perform system recovery and/or restoration, either automatically by the NE and/or the EM, or manually by the operator.
The fault recovery functions are used in various phases of the fault management:
1) Once a fault has been detected, the NE shall be able to evaluate the effect of the fault on the telecommunication services and autonomously take recovery actions in order to minimise service degradation or disruption.
2) Once the faulty unit(s) has (have) been replaced or repaired, it shall be possible from the EM to put the previously faulty unit(s) back into service so that normal operation is restored. This transition should be done in such a way that the currently provided telecommunication services are not, or only minimally, disturbed.
3) At any time the NE shall be able to perform recovery actions if requested by the operator. The operator may have several reasons to require such actions; e.g. he has deduced a faulty condition by analysing and correlating alarm reports, or he wants to verify that the NE is capable of performing the recovery actions (proactive maintenance).
The recovery actions that the NE performs (autonomously or on demand) in case of faults depend on the nature and severity of the faults, on the hardware and software capabilities of the NE and on the current configuration of the NE.
Faults are distinguished in two categories: software faults and hardware faults. In the case of software faults, depending on the severity of the fault, the recovery actions may be system initialisations (at different levels), activation of a backup software load, activation of a fallback software load, download of a software unit etc. In the case of hardware faults, the recovery actions depend on the existence and type of redundant (i.e. back-up) resources. Redundancy of some resources may be provided in the NE in order to achieve fault tolerance and to improve system availability.
If the faulty resource has no redundancy, the recovery actions shall be:
a) Isolate and remove from service the faulty resource so that it cannot disturb other working resources;
b) Remove from service the physical and functional resources (if any) which are dependent on the faulty one. This prevents the propagation of the fault effects to other fault-free resources;
c) State management related activities for the faulty resource and other affected/dependent resources, cf. subclause 4.2;
d) Generate and forward appropriate notifications to inform the OS about all the changes performed.
If the faulty resource has redundancy, the NE shall perform action a), c) and d) above and, in addition, the recovery sequence that is specific to that type of redundancy. Several types of redundancy exist (e.g. hot standby, cold standby, duplex, symmetric/asymmetric, N plus one or N plus K redundancy, etc.), and for each one, there is a specific sequence of actions to be performed in case of failure. The present document specifies the Fault Management aspects of the redundancies, but it does not define the specific recovery sequences of the redundancy types.
In the case of a failure of a resource providing service, the recovery sequence shall start immediately. Before or during the changeover, a temporary and limited loss of service shall be acceptable. In the case of a management command, the NE should perform the changeover without degradation of the telecommunication services.
The management of the redundancies is strictly related to the way they are modelled in the MIM of the NE. For the modelling of the redundancies, the relationships shall be defined among the objects, which participate in each redundancy. This will identify the objects and the roles that they have in the redundancy. By defining the relationships, also the role of the objects participating in the relationships are implicitly defined by the relationships’ attribute values.
The NE shall provide the OS with the capability to monitor and control any redundancy of the NE. The control of a redundancy by the OS (which means the capability to trigger a changeover or a change-back) can be achieved by means of state management, cf. subclause 4.2.
If a fault causes the interruption of ongoing calls, then the interrupted calls shall be cleared, i.e. all resources allocated to these calls shall immediately be released by the system. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.7 Support of Maintenance Action | |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.1.8 Configuration of Alarms | |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.2 State management | The State Management is a common service defined within Configuration Management (TS 32.106) and used by several management areas, including Fault Management. In this clause, some detailed requirements on State Management as they apply to the Fault Management are defined.
From the point of view of Fault Management, only two of the three primary state attributes are really important: the Administrative state and the Operational state. In addition the resources may have some secondary ‘status’ attributes which give further detailed information about the reason of the primary state.
The Administrative state is used by the Operator to make a resource available for service, or to remove a resource from service. For example:
• for fault correction the Administrative state can be used to isolate a faulty resource;
• in case of redundancy the Administrative state can be used to lock the active resource and let the standby resource to become active (preventive maintenance);
• for Test management the Administrative state can be used to put a resource out of service to run an intrusive test on it.
The Operational state gives the information about the real capability of a resource to provide or not provide service.
• The operational state is "enabled" when the resource is able to provide service, "disabled" when the resource cannot provide service.
• A resource can lose the capability to provide service because of a fault or because another resource on which it depends is out of service (e.g. disabled or locked).
• In case a resource does not loose completely its capability to provide service, the Operational state shall be "enabled" and the Availability status shall be "degraded".
The changes of the state and status attributes of a resource must be notified to the relative manager(s) as specified in TS 32.106.
When a state change is originated by a failure, the alarm notification and the related state change notifications must be correlated to each other by means of explicit relationship information. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.2.1 Propagation of state change | Within a managed element, when for any reason a resource changes its state, the change must be propagated, in a consistent way, to all the other resources that are functionally dependent on the first one. Therefore:
• In case of a fault occurring on a resource makes that resource completely out of service, if the current operational state is "enabled", it shall be changed to "disabled" and a state change notification shall be generated. Then, all the dependant resources (following the fault dependency diagram specific to that managed element) must be checked and, in case they are "enabled" they shall be changed to "disabled". In this process, also the secondary status must be changed consistently, in a way that it shall be possible to distinguish whether an object is disabled because it is faulty or because of it is functionally dependent on another object which is disabled.
• In case a faulty resource is repaired, the Operational state of that resource is changed from "disabled" to "enabled" and all the dependent resources are turned back to "enabled" (this is the simple case). In more complex cases, some of the objects may be disabled for different causes (different faults or faults plus locks on different superior resources), in this cases the repaired resource can be turned "enabled" only when all the causes are cleared (i.e. faults are repaired and superior resources are unlocked). Also in this process the secondary status must be changed consistently.
• In case the operator locks a resource, the process of the state change propagation is similar to the first case (resource failure) except for the locked resource which does not change its operational state but only the administrative state from "unlocked" to "locked". The dependent resources are processed as in the first case.
• In case the operator unlocks a resource, the process of the state change propagation is similar to the second case (fault reparation) except for the first resource (the unlocked one) which does not change its operational state but only the administrative state from "locked" to "unlocked". The dependent resources are processed as in the first case. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 4.3 Test management | x Fault management requirements
This clause defines the FM requirements from the OS's perspective. According to the concept described in clause 4, the NEs shall maintain alarm and state change information. This information shall then be forwarded to one or more OS(s), i.e. the OMC and/or NMC. The OMC's role to play in this environment depends on implementation options chosen by the vendor and the network operator.
• The NMC interface (cf. clause 8) may be implemented in the NEs or the OMC. This means that the OMC may not be involved in the forwarding of alarm and state information to the NMC, if the NMC interface is implemented in the NE. In contrast, the OMC may have to act as a mediation device if the interface to the NMC is implemented in the OMC and the interface between OMC and the NEs uses a different (proprietary) technology.
• The network operator may choose to operate his network, in terms of FM, mainly from the NMC. This implies that functions for the forwarding and retrieval of alarms and states as well as the processing and user interface presentation of this information may not be required in the OMC, but the NMC. As a consequence, all of these functions, as described in the following subclauses, are optional in the OMC, which means they may or may not be implemented, but if implemented, they shall comply with the present document. Details of these considerations are a matter of vendor/operator agreement.
x.y Alarm and state management
x.y.z Alarm/state change forwarding and filtering
Alarm and state change events shall be forwarded by the NE, in the form of unsolicited notifications, according to the following scheme:
• as soon as an alarm is entered into or removed from the pending alarms list;
• immediately when an operational state change event is recorded in the NE.
If forwarding is not possible at this time, e.g. due to communication breakdown, then the notifications shall be sent as soon as the communication capability has been restored.
If the NMC interface is implemented in the NE, then the destination of the notifications is the NMC, and the interface shall comply with the stipulations made in clause 8. If the NMC interface resides in the OMC, proprietary means may be employed to forward the notifications to the OMC. Note that, even if the NMC interface is implemented in the NE, the OMC may still also receive the notifications by one of the above mechanisms, however, the present document does not explicitly require the NEs to support the OMC as a second destination.
The event report shall include all information defined for the respective event (cf. subclauses 4.1.2, 4.1.3 and 4.1.4), plus an identification of the NE that generated the report. This NE identification shall be identical to the identifiers defined within the CM domain, see [1].
The system operator shall be able to allow or suppress alarm reporting by the NE. As a minimum, the following criteria shall be supported for alarm filtering:
• the NE that generated the alarm, i.e. all alarm messages of that NE will be suppressed;
• the device/resource/function to which the alarm relates;
• the severity of the alarm, except "clear". Suppression of alarm clear messages shall be determined according to the following stipulations:
• if the initial alarm was not suppressed, then the alarm cleared message shall also be forwarded;
• if the initial alarm was suppressed, then the criteria set for alarm suppression at the time the cleared message occurs shall be taken into account;
• the time at which the alarm was detected, i.e. the alarm time; and,
• any combination of the above criteria.
The same functionality and criteria, as far as applicable, shall also be available for state changes, as follows:
• the NE that generated the state change event, i.e. all state change messages of that NE will be suppressed;
• the device/resource/function to which the state change relates;
• the time at which the state change occurred; and,
• any combination of the above criteria.
The result of any command to modify the forwarding criteria shall be confirmed by the NE to the requesting operator.
x.y.z Retrieval of alarm and state information
The NEs shall offer a facility for an OS to retrieve alarm and operational state information stored in the NE (cf. subclause 4.1.5). If the interface to the NMC is implemented in the NEs, then this facility shall be implemented according to the stipulations given in clause 8. If the NMC interface resides in the OMC, then proprietary means may be employed on the NE-OMC interface, however, a bulk data retrieval based on existing protocols, such as FTP, TFTP, or FTAM, is anticipated. Note that either of the two above mechanisms may still be used by the OMC even if the NMC interface resides in the NEs.
The alarm retrieval facility shall entail the following features:
• read alarms from the alarm history;
• read state changes from the state change history;
• retrieve the pending alarms from the NE; and
• read current values of the operational state.
It shall be possible to apply filters to each of the above operations as defined in subclause 5.1.1, plus the "cleared" alarm severity level.
x.y.z Support of Maintenance Action
In order to facilitate maintenance of the network, the system shall support the following OMC commands:
• request isolation of device for maintenance. Ongoing calls shall be allowed to be terminated by the users.
• request clearing of calls for maintenance. This will isolate the device addressed by the command, and ongoing calls using the device will be cleared.
• clear device from control channels (Node B - per channel, per carrier, per cell). It shall be possible to specify an alternate device to take over the channel(s), otherwise automatic reconfiguration shall be performed.
• establish priorities for automatic reconfiguration. This will force the NE's automatic reconfiguration after a fault to follow a scheme predefined by the system operator.
The NE shall confirm the result of the command to the requesting system operator.
x.y.z Configuration of Alarms
It shall be possible to configure the alarm actions, thresholds and severities through OMC commands, according to the following requirements:
• upon detection of a fault, certain actions will be carried out by the NE, e.g. putting the defective device/resource/function out of service. It shall be possible to change these activities for each individual fault.
• the operator shall be able to configure any threshold that determines the declaration or clearing of a fault. If a series of thresholds are defined to generate alarms of various severities, then for each alarm severity the threshold values shall be configurable individually.
• it shall be possible to modify, in the NE, the severity of each alarm defined in the system, e.g. from major to critical.
The NE shall confirm the result of any such alarm configuration command to the requesting system operator.
x.y.z Communication failure
If forwarding of alarms or state change events by a NE is not possible due to communication breakdown, then the notifications shall be sent as soon as the communication capability has been restored. The recipient of the notifications, i.e. the OMC and/or NMC, shall notice the communication failure and generate appropriate internal alarms in order to alert the system operator of the problem. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5 N interface | |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.1 Fault Management concept of Itf-N | An operations system on the network management layer (i.e. the NM) provides fault management services and functions required by the 3G operator on top of the element management layer.
As pointed out in clause 5, the N interface (Itf-N) may connect the network management system either to EMs or directly to the NEs. This is done by means of IRPs. In the following, the term "subordinate entities" defines either EMs or NEs, which are in charge of supporting the N interface.
This clause describes the properties of an interface enabling a NM to supervise a 3G-telecommunication network including - if necessary - the managing EMs. To provide to the NM the fault management capability for the network implies that the subordinate entities have to provide information about:
• events and failures occurring in the subordinate entities;
• events and failures of the connections towards the subordinate entities and also of the connections within the 3G network;
• the network configuration (due to the fact that alarms and related state change information are always originated by network resources, see [1]). This is, however, not part of the FM functionality.
Therefore, for the purpose of fault management the subordinate entities send notifications to a NM indicating:
• alarm reports (indicating the occurrence or the clearing of failures within the subordinate entities), so that the related alarm information can be updated;
• state change event reports, so that the related (operational) state information can be updated.
The forwarding of these notifications is controlled by the NM operator using adequate filtering mechanisms within the subordinate entities.
The Itf-N provides also means to allow the NM operator the storage ("logging") and the later evaluation of desired information within the subordinate entities.
The retrieval capability of alarm-related information concerns two aspects:
• retrieval of "dynamic" information (e.g. alarms, states), which describes the momentary alarm condition in the subordinate entities and allows the NM operator a synchronisation of its alarm overview data;
• retrieval of "history" information from the logs (e.g. active/clear alarms and state changes occurred in the past), which allows the evaluation of events that may have been lost, e.g. after an Itf-N interface failure or a system recovery.
As a consequence of the requirements described above, both the NM and the subordinate entity must be able to initiate the communication. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.2 Management of alarm and state change event reports | |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.2.1 Mapping of alarm and related state change event reports | The alarm and state change reports received by the NM relate to functional objects in accordance with the information model of Itf-N. This information model tailored for a multi-vendor capability is different from the information model of the EM-NE interface (if an EM is available) or from the internal resource modelling within the NE (in case of direct NM-NE interface), thus a mapping of alarm and related state change event reports is performed by a mediation function within the subordinate entity.
The mediation function translates the original alarm/state change event reports (which may contain proprietary parameters or parameter values) taking into account the information model of the Itf-N.
If a mediation application function is needed, it works according to the following principles:
• Every alarm notification generated by a functional object in a subordinate entity is mapped to an alarm report of the corresponding ("equivalent") functional object at the Itf-N. If the functional object generating the original alarm notification has not a direct corresponding object at the Itf-N, the mediation functions maps the alarm to the next superior functional object in accordance with the containment tree of the Itf-N.
• Every state change notification generated by a functional object in a subordinate entity is mapped to a state change report of the corresponding ("equivalent") functional object at the Itf-N. If the functional object generating the original state change notification has not a direct corresponding object at the Itf-N, the mediation functions maps the alarm to the next superior functional object in accordance with the containment tree of the Itf‑N.
Every alarm notification generated by a manufacturer-specific, equipment-related object in the subordinate entity is mapped to an alarm report of a generic logical object, which models the corresponding equipment-related resource.
NOTE: In some cases a failure or the locking of an equipment-related object implies also the change of the operational state of its corresponding functional object within the NE or EM (if EM is available). The mapping of this state change notification to an alarm or state change notification of the corresponding functional object at the Itf-N is subject of further study.
On the Itf-N the correlation between functional related and the generic logical objects (modeling equipment-related network resources) is performed explicitly by means of a relationship attribute in the functional object class definition.
With regard to the multi-vendor capability of the Itf-N, this mapping concept combines the following requirements:
• Precise information about manufacturer-specific, equipment-related failures for the NM operator in charge of network maintenance (this information is provided in some parameters of alarm reports mapped to the generic logical objects).
• If functionality is affected, an additional alarm report concerning the related functional object is provided for the NM operator in charge of network's quality of service.
If possible, the two types of alarm reports generated by the mediation function shall be correlated. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.2.2 Real-time forwarding of event reports | If the Itf-N is in normal operation (the NM connection to the subordinate entities is up), alarm and related state change event reports are forwarded in real-time to the NM via appropriate filtering located in the subordinate entity. These filters may be controlled either locally or remotely by the managing NM (via Itf-N) and ensure that only the event reports which fulfil pre-defined criteria can reach the superior NM. In a multi-NM environment each NM must have an own filter within every subordinate entity which may generate notifications. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.2.3 Alarm clearing | On the Itf-N, alarm reports containing the value "cleared" of the parameter perceivedSeverity are used to clear the alarms. The correlation between the clear alarm and the related active alarms is performed by means of unambiguous identifiers.
This clearing mechanism ensures the correct clearing of alarms, independently of the (manufacturer-specific) implementation of the mapping of alarms/state change events in accordance with the information model of the Itf-N. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.3 Retrieval of alarm and state information | The retrieval of alarm and state information comprises two aspects:
a) Retrieval of current information
This mechanism shall ensure data consistency about the current alarm/state change information between the NM and its subordinate entities and is achieved by means of a so-called synchronisation ("alignment") procedure, triggered by the NM. The synchronisation is required after every start-up of the Itf-N, nevertheless the NM may trigger it at any time.
b) Logging and retrieval of history information
This mechanism offers to the NM the capability to get the alarm/state change information stored within the subordinate entities for later evaluation. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.3.1 Retrieval of current alarm information on NM request | The present document defines a flexible, generic synchronisation procedure, which fulfils the following requirements:
• The alarm information provided by means of the synchronisation procedure shall be the same (at least for the mandatory parameters) as the information already available in the alarm list. The procedure shall be able to assign the received synchronisation-alarm information to the correspondent requests, if several synchronisation procedures triggered by one NM run at the same time.
• The procedure shall allow the NM to trigger the start at any time and to recognise unambiguously the end and the successful completion of the synchronisation.
• The procedure shall allow the NM to discern easily between an "on-line" (spontaneous) alarm report and an alarm report received as consequence of a previously triggered synchronisation procedure.
NOTE: This requirement is for further investigation.
• The procedure shall allow the NM to specify filter criteria in the alignment request (e.g. for a full network or only a part of it.
• The procedure shall support connections to several NM and route the alignment-related information only to the requesting NM.
• During the synchronisation procedure new ("real-time") alarms may be sent at any time to the managing NM.
If applicable, an alarm synchronisation procedure may be aborted by the requesting NM. (This requirement is for further investigation. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.3.2 Retrieval of current state change information on NM request | The requirements defined above for the alarm synchronisation procedure are valid analogously for the retrieval of current state change information as well.
Nevertheless the state change synchronisation procedure takes into account only the object instances whose state information is different from a combined default state. As combined default state the following values (according to [7]) shall be used:
• Operational state: enabled.
• Administrative state: unlocked.
• Usage state: idle (if supported). |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.3.3 Logging and retrieval of alarm and state change history information on NM request | The alarm/state change history information may be stored in the subordinate entities in dependence on the NM requirements. The NM is able to create logs for alarms/state change event reports and to define the criteria for storage of alarm/state change information according to [11].
The subsequent retrieval of stored information is possible on NM request in two different ways:
• via a read command with appropriate filtering;
• via bulk data transfer, using standardised file transfer procedures, as mentioned in subclause 5.1.2.
Nevertheless these particular requirements are not specific for alarm or state change information. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.4 Co-operative alarm acknowledgement on the Itf-N | The acknowledgement of an alarm is a maintenance function that aids the operators in his day to day management activity of his network. An alarm is acknowledged by the operator to indicate he has started the activity to resolve this specific problem. In general a human operator performs the acknowledgement, however a management system (NM or EM) may automatically acknowledge an alarm as well.
The alarm acknowledgement function requires that:
a) All involved OSs have the same information about the alarms to be managed (including the current responsibility for alarm handling).
b) All involved OSs have the capability to send and to receive acknowledgement messages associated to previous alarm reports.
A co-operative alarm acknowledgement means that the acknowledgement performed at EM layer is notified at NM layer and vice versa, thus the acknowledgement-related status of this alarm is the same across the whole management hierarchy.
The co-operative alarm acknowledgement on Itf-N shall fulfil the following requirements:
• Acknowledgement messages may be sent in both directions between EMs and NM, containing the following information:
• Correlation information to the alarm just acknowledged. - Acknowledgement history data, including the current alarm state (active | cleared), the time of alarm acknowledgement and, as configurable information, the management system (EM | NM) and the operator in charge of acknowledgement (the parameter operator name or, in case of auto-acknowledgement, a generic system name).
• Acknowledgements notifications sent to NM shall be filtered with the same criteria applied to the alarms.
• The alarm acknowledgement procedure on the Itf-N shall cope with different customer requirements concerning the acknowledgement competence between operators working at EMs and NM. This matter may be managed by means of a "competence type" information, which may be controlled by every connected EM.
• Every time the communication between the two management systems is established, the NM is able to determine which OS is most suitable to handle the acknowledgement of alarms.
• Taking into account the acknowledgement functionality, the above described synchronisation procedure for retrieval of current alarm information on NM request may be extended. Additionally to the requirements defined in subclause 8.3.1, this extended synchronisation procedure relates not only to the active, but also to the "cleared and not acknowledged" alarms, which have still to be managed by the EM. |
98d280e9ebdd62e62b9d51749d594208 | 32.111 | 5.5 Overview of IRPs related to fault management | The N interface is built up by a number of IRPs. The basic structure of the IRPs is defined in [2] and [3].
For the purpose of Fault Management the following IRPs are needed:
• Alarm IRP
• Notification IRP
• Log IRP
(NOTE: This IRP may not be part of Release 1999)
Annex A (informative):
Change history
This annex lists all change requests approved for this document since the specification was first approved by 3GPP TSG-SA.
Change history
TSG SA#
Version
CR
Tdoc SA
New Version
Subject/Comment
S_07
2.0.0
-
SP-000013
3.0.0
Approved at TSG SA #7 and placed under Change Control
Mar 2000
3.0.0
3.0.1
cosmetic |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 1 Scope | This document outlines the working methods [to be] used by SMG and its sub-groups and by PT SMG in relation to document management, i.e. handling of specifications, updating procedures, change request procedures, version control mechanisms, specifications status information etc. It complements the rules and procedures defined in ETSI. This document does not stipulate the details of the internal working of the TB sub-groups. From the Technical Specification Group point of view, a task and responsibility is given to a Working Group (WG) directly answering to SMG. In practice, the work/task may be carried out in a subgroup of that WG. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 2 Definitions and Abbreviations | Change Control When a specification has been put under change control, changes to the specification require an approval of formal change requests. Rules for change control are defined in section 4.
Closed A closed major version of a specification is still published; however no changes to the major version of the specification are possible anymore (not even essential corrections).
CR Change Request.
Draft A specification is draft before getting under change control.
Frozen For a frozen major version of a specification, the only allowed change requests are essential corrections.
Major Version For version w.x.y of a specification, w is called the major version. Example: For version 7.2.0 of a specification, the major version is 7.
Project Team The support group supporting the Technical Body.
PT Project Team
Specification In this document, the generic term Specification is used for both Technical Specifications and Technical Reports. A distinction between the two is done only where relevant.
TB Technical Body, denotes Technical Body SMG
TB Change Control Technical Body Change Control: The Technical Body is responsible for approval of Change Requests.
TB Sub-Group: An TB Working Group or a subgroup installed by a TB Sub-Group (recursive definition)
TB WG Technical Body Working Group
Technical Body Working Group A working group installed by the TB and reporting to the TB. This denotes an SMG Sub-Technical Committee, such as SMG1, SMG2, …
TB WG Change Control Technical Body Working Group Change Control: The TB Working Group is responsible for approval of Change Requests.
Version A specification has versions which are identified by three numbers w.x.y. Example: version 7.12.3.
WI Work Item.
WID Work Item Description.
Withdrawn A withdrawn specification doesn’t belong to the set of valid specifications.
Work Item A work item aims at introduction of a new feature or at enhancement of existing features. It may entail new specifications and/or changes to existing specifications.
Work Item Description The description of a Work Item in a standard Work Item Description sheet. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 3 General responsibilities of the Project Team | The Project Team for SMG (PT, or PT SMG) is responsible for the project management of the work of the TB. This includes editorship and management of specifications once they have been put under TB change control. It also includes preparation of and support for the meetings (including meeting reports) of the TB and its Sub-groups, in descending priority
TB > TB WG > other TB SG.
It furthermore includes liaison to other bodies and relevant groups and institutions. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4 Handling of Specifications | This section describes the general procedures and events involved in, and related to, the lifetime of a specification. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.1 Overview | This section gives an overview on the development of a specification, dealing with the unexceptional cases only, and leaving out details. A more detailed description is given in the remainder of section 4.
A new specification is created in a TB WG. At creation, a rapporteur is nominated. The rapporteur elaborates the first versions, version 0.0.0, version 0.1.0, possibly 0.1.1, 0.1.2 and so on, then version 0.2.0 etc..
The versions 0.1.0, 0.2.0, 0.3.0 etc. must be presented to the responsible TB SG. The versions 0.i.1, 0.i.2 etc. may be internal versions.
As soon as title, scope and some other information on the specification is stable, the PT assigns a specification number and enters the specification into the Status List of Specifications, see section 7.
When a specification is sufficiently stable, it is presented as version 1.0.0 to the TB for information.
Further versions 1.x.y are elaborated until version 2.0.0 is presented for approval at the TB.
After approval, the specification becomes version x.0.0 where x >=3. It is under TB change control. Further changes are made by means of formal change requests, to be approved by the TB. The number x is called the major version of the specification. If all change requests approved were editorial, the new version increments the right most number (e.g., from 7.2.1 to 7.2.2); if at least one approved CR has been non-editorial, the middle number is incremented and the right most number reset to 0 (e.g., from 7.2.1 to 7.3.0).
At some point in time, the specification is frozen: Only corrections of essential errors will be applicable. (At the same time, a new major version may be developed for inclusion of new features.)
At a later point in time, the specification is closed: it is still publicly available, but no changes are carried out any more. (At the same time, higher major versions of the specification may be under development.)
The major versions of specifications may be developed in releases: Releases like Release 1999, Release 2000, Release 20001 are specified in major versions of the specifications.
For example,
- GSM phase 1 is specified in the most recent versions 3.x.y of the specifications, that is in major version 3;
- GSM phase 2 is specified in the most recent versions 4.x.y of the specifications, that is in major version 4;
- GSM Release 96 is specified in the most recent versions 5.x.y of the specifications, that is in major version 5;
- GSM Release 97 is specified in the most recent versions 6.x.y of the specifications, that is in major version 6;
- GSM Release 98 is specified in the most recent versions 7.x.y of the specifications, that is in major version 7. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.2 Characteristics of a specification | - The specification has a prime responsible TB.
- The specification may have a prime responsible TB WG.
- The specification may have one or more secondary responsible TBs and/or TB WG.
- The specification may have a prime responsible TB Sub-Group below a Working Group as decided by the prime responsible TB WG.
- The specification should have a rapporteur (i.e., at least one rapporteur): a delegate from a member company (or, in exceptional cases, a PT expert); the delegate participates regularly in the prime responsible TB WG (and further TB SG if applicable).
- The specification is a Technical Report or a Technical Specification
- A specification has versions which are identified by three numbers w.x.y where w is called the major version.
Note: In the description above, attribute values are underlined while attributes aren’t.
The prime responsible TB WG may assign prime responsibility for a specification to one of its subgroups. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.3 Characteristics of a major version of a specification: | A major version 0 or 1 or 2 of a specification has the following characteristics:
- It is either a draft or withdrawn.
- It is TB internal.
A major version w > 2 of a specification has the following characteristics:
- It is either under TB WG Change Control or under TB Change Control or closed or withdrawn.
- It is either authorised for publication or TB internal.
A major version of a specification under TB WG Change Control is TB internal.
A major version under TB WG Change Control or TB Change Control is called major version under Change Control.
A major version of a specification under TB Change Control is
- either not yet frozen or frozen.
Note: In the description above, attribute values are underlined while attributes aren’t. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.4 Characteristics of a version of a specification | 0.x.y
- draft (or withdrawn)
- TB internal
- no version of the specification has been presented for information to the TB yet
- no major version of the specification is under TB change control yet
1.0.0
- draft (or withdrawn)
- TB internal
- this version 1.0.0 is presented to TB
- for information
- or for information and approval
- no major version of the specification has been under TB Change Control yet
1.x.y (x > 0 or y > 0)
- draft (or withdrawn)
- earlier version 1.0.0 has been presented for information to the TB
- no major version of the specification is under TB Change Control yet
2.0.0
- draft or withdrawn
- TB internal
- earlier version 1.0.0 has been presented for information to the TB
- this version 2.0.0 is presented to the TB for approval
- no version of the specification has been approved yet
- no major version of the specification has been under TB Change Control yet
2.x.y (x > 0 or y > 0)
- draft
- TB internal
[- earlier version 1.0.0 has been presented for information to the TB]
- no major version of the specification is under TB Change Control yet
- earlier version 2.0.0 had been presented to the TB for approval but had not been approved by the TB
x.y.z (x 3)
- under TB Change Control or closed
- TB internal or authorised for publication
[- earlier version 1.0.0 has been presented for information to the TB]
- earlier major versions of the specification, if any, shall be under TB Change Control or closed or withdrawn
draft y.z of version x
- under TB WG Change Control
- TB internal
[- earlier version 1.0.0 has been presented for information to TB]
- earlier major versions of the specification, if any, shall be under TB Change Control or closed or withdrawn
Notes: In a future version, file name conventions should be added in the table above.
In the table above, statements between square brackets are true but not relevant. The first two lines of each row are implied by section 4.2. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.5 Actions on a specification | In the following subsections the concept of "stability" is used , which is linked to the likelihood that a given specification will change more or less significantly before reaching it's final steady. The attributes "low stability", "medium stability" and "good stability" are used. The assessment of stability cannot be based on absolute criteria and is left to the decision of the responsible TB WG(s) and finally decision of the TB. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.5.1 Actions on a new specification (version 0.x.y) | - A new specification (a specification version 0.0.0) may be created by a TB WG. A rapporteur (more exactly: at least one rapporteur) is assigned by that WG. A prime responsible subgroup of the TB WG may be allocated by the TB WG.
- The rapporteur prepares version 0.1.0 and presents it to the prime responsible TB WG/SG for discussion.
- In an iterative process, the rapporteur prepares a new version 0.x+1.0 incorporating comments from the prime responsible TB WG/SG to versions 0.x.y and presents version 0.x+1.0 to the prime responsible TB WG/SG for discussion.
- Between version 0.x.0 and 0.x+1.0, the rapporteur may create versions 0.x.1, 0.x.2, … with only editorial modifications.
- When the title and scope of a specification is sufficiently stable, a Specification Number is assigned by the PT, which also informs the other relevant Technical Bodies.
- The TB WG reports the creation of a new specification to the TB.
- New specifications should be co-ordinated between the 3GPP TSGs and SMG. These bodies should seek agreement on prime and secondary responsibilities for each specification. In areas of common interest it is recommended to agree on new specifications in joint meetings.
- The TB may cancel a new specification.
- The TB WG may decide to present a specification version 0.x.y to the prime responsible TB and to the secondary responsible TB SG(s) for information; the specification should then have reached the “medium stability” state.
- The TB WG may also conclude that the specification has already reached the “good stability” state and decide to present it to the TB for information and approval; before doing that, comments from secondary responsible TB SGs, if any, should have been taken into account.
Then the specification is handed over to the PT for the necessary - strictly editorial - cleaning up resulting in version 1.0.0. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.5.2 Actions on version 1.x.y of a specification | - On decision of the prime responsible TB WG, the PT transforms version 0.x.y of a specification into version 1.0.0, performing the necessary - strictly editorial - cleaning up, and version 1.0.0 is presented by the TB WG to the to the prime responsible TB and to the secondary responsible TB SG(s) for information or for information and approval.
- The TB may decide to put the specification under change control as major version x (where x > 2 depends on the Release which the specification belongs to). In this case, version 1.0.0 is transformed by the PT into version x.0.0, and the further handling is described in section 4.5.4. Otherwise, the handling of the specification continues as described below:
- In an iterative process, the rapporteur prepares a new version 1.x+1.0 incorporating comments from the prime and secondary responsible TB SGs to versions 1.x.y and presents version 1.x+1.0 to the prime and secondary responsible TB SGs for discussion.
- Between version 1.x.0 and 1.x+1.0, the rapporteur may create versions 1.x.1, 1.x.2, … with only editorial modifications.
- The prime responsible TB WG may decide to present a specification version 1.x.y to the prime responsible TB for approval; the specification should then have reached the “good stability” state ; comments of the secondary responsible TB SGs should have been taken into account.
Then the specification is handed over to the PT for the necessary - strictly editorial - cleaning up resulting in version 2.0.0. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.5.3 Actions on version 2.x.y of a specification | - On decision of the prime responsible TB WG, the PT transforms version 1.x.y of a specification into version 2.0.0, performing the necessary - strictly editorial - cleaning up, and version 2.0.0 is presented by the prime responsible TB WG to the prime responsible TB for approval; comments of the secondary responsible TB SGs should have been taken into account. If version 2.0.0 is not approved, work continues with versions 2.x.y.
- The TB may decide to put the specification under change control. In this case, version 2.0.0 is transformed by the PT into version x.0.0, (where x > 2, see section a.4), and the further handling is described in section 4.5.4. Otherwise, the handling of the specification continues as described below:
- In an iterative process, the rapporteur prepares a new version 2.x+1.0 incorporating comments from the prime and secondary responsible TB SGs to versions 2.x.y and presents version 2.x+1.0 to the prime and secondary responsible TB SGs for discussion.
- Between version 2.x.0 and 2.x+1.0, the rapporteur may create versions 2.x.1, 2.x.2, … with only editorial modifications.
- The prime responsible TB WG may decide to present a specification version 2.x.y to the TB for approval; the specification should then have reached the “good stability” state ; comments of the secondary responsible TB SGs should have been taken into account.
Then the specification is handed over to the PT for the necessary - strictly editorial - cleaning up resulting in version 2.x+1.0. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.5.4 Actions on version w.x.y of a specification (w > 2) | - On decision of the TB, the PT transforms a version v.x.y of a specification into version w.0.0, performing the necessary - strictly editorial - cleaning up.
- The prime responsible TB WG may agree on Change Requests to the most recent version w.x.y of major version w of a specification. It will then propose these CRs to the TB for approval, however before doing that, it has to seek comments from the secondary responsible TB (WG)s - if any - and to take them into account (joint meetings of the appropriate TB SGs are recommended for that purpose). If and when at least one Change Request to version w.x.y of major version w of that specification is approved by the TB, the PT includes all Change Requests to version w.x.y of major version w of that specification into a new version
- w.x.y+1 if all change requests approved by the TB are editorial
- w.x+1.0 if at least one change request approved by the TB is not editorial
- From a version w.x.y of major version w of a specification, the PT may create a new version w.x.y+1 where only changes in the front sheet, preface and history are performed (for publication purposes)
- From the most recent version w.x.y of major version w of a specification, the PT may create a new version w.x.y+1 in agreement with the rapporteur and the prime responsible TB WG where only strictly editorial changes are performed.
- If Change Requests have been introduced incorrectly into the most recent version w.x.y of major version w of a specification, the PT may create a new version w.x+1.0 in agreement with the rapporteur and the prime responsible TB WG, to correct the introduction of Change Requests. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.5.5 Actions on the major version of a specification | - The TB may decide to create a new major version >2 of a specification.
- The TB may decide to withdraw a major version of a specification.
- The TB may decide to close a frozen major version of a specification.
- The TB may authorise a major version >2 for publication or decide that it is TB internal.
- The TB may decide to freeze a major version of a specification under change control.
- The TB may decide to unfreeze a major version of a specification under change control.
- The prime responsible TB WG may decide to create a new major version > 2 of a specification under TB WG Change Control.
These decisions have to be taken in agreement with all relevant TBs (that is with all applicable TSGs, if UMTS is concerned). |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.6 Change Request Regime | Modifications to specifications under TB Change Control are decided by the TB, on the basis of Change Requests (CR). These CRs, described in the following sections, shall in principle only be presented to the TB after having been scrutinised by the TB WG responsible for the concerned specification; comments from secondary responsible TBs (if any) have to be have sought and comments have to be have taken into account. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.6.1 Change Requests | Whenever an error or an inconsistency is discovered or when a new feature is proposed to be included, a Change Request is produced, normally by the one discovering the error but in consultation with the rapporteur and/or with the PT.
In the case of an essential error corrections, separate Change Requests for each affected major versions that is under TB Change Control or TB WG Change Control shall be produced.
In the case of a correction of a non-essential error, separate Change Requests for each affected major versions that is
- under TB Change Control and not yet frozen or
- under TB WG Change Control
shall be produced. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.6.2 Change Request forms | To ensure an appropriate and consistent way of presenting and documenting Change Requests, there exist standardised front covers (forms) for CRs as well as rules on how to accurately identify the modified parts of the specification.
The purpose of the CR form itself is to provide the relevant management information of the proposed changes, e.g. such as
- Target specification with its version number,
- Source of the CR,
- Reason for the proposed change and consequences if not accepted,
- Category of proposed change (i.e. correction, change request corresponding to an earlier phase change request, addition of feature, functional modification of feature, or editorial modification),
- Cross-phase compatibility aspects.
As the degree of acceptability for modifications differs between not yet frozen major versions of specifications and frozen major versions of specifications, the CRs differ on the allowed/possible Categories:
- CRs to a frozen major version of a specification can only be essential corrections whilst
- CRs to a not yet frozen major version of a specification can also fall into any other of the categories quoted above.
The actual CR forms to be applied and guidance how to apply them are distributed by the PT. The access to them is described in an annex of each TB plenary report. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.6.3 Contents of Change Requests | Although the CR form shall indicate the details of change, each CR shall have attached the pages of the specification that are affected by the CR, using the latest version of the major version. These pages shall have the proposed modifications clearly marked, by means of the word processor's "revision mode", i.e. new proposed text should be double underlined (xxx) and proposed deletions should be marked by strike through (xxx), and a bar in the margin should further indicate the change.
In case there are more than one independent CR to the same part of the specification, neither of them should contain the proposed modifications from the other(s), however any potential interaction between the modifications should of course be resolved before presentation. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.6.4 Handling of the Change Requests | Entry to the TB WG:
A proposed CR should be brought to the relevant TB WG or, if applicable, to the prime responsible TB SG in charge of the specification concerned and discussed there, before presentation to the TB. If possible it should be distributed, by the source, as soon as possible and prior to the coming TB SG / TB WG meeting to the relevant email reflector (with a clear indication of the subject) , for the purpose of shortening discussions in meetings and to try at an as early stage as possible to come to a widely acceptable solution. Comments from secondary responsible TBs (if any) have to be have sought and comments have to be have taken into account before presentation to the TB for approval.
When the relevant TB WG decides to submit a CR to the TB for approval, the CR is categorised as strategic or non-strategic by the TB WG chairperson in agreement with the TB WG. Non-strategic CRs are submitted to the TB for approval without presentation; strategic CRs are submitted to the TB for approval with presentation.
To ease the work of the TB SG and of the PT, a proposed CR should be presented in a form suitable for TB SG agreement and TB approval. If a CR is not immediately accepted it is the responsibility of the originator to update the CR taking into account comments and other guidelines from the relevant groups, including change of reference version if needed, and to re-present it to the TB SG.
Note: It is also highly important that the originator of the CR provides the PT with an electronic copy since the contents is supposed to be incorporated into the specification, by the PT, and re-typing of CRs is clearly a waste of resources and a possible source of errors.
CR identification:
A CR can have different revisions: rev. 0, 1, 2, and so on. Revision 0 of a CR is the not revised CR. A given revision of a CR is applicable to a certain version of a specification. The CR identifies, to which specification, which version of the specification and which phase it applies. A given revision of a CR is uniquely defined by
- the specification it belongs to
- an alphanumeric string (the CR number) and
- the revision number (default, i.e. the value if no number is given, is 0).
One CR may only apply to one version of a specification, that is to the latest version of a major version. If more than one major version of a specification exists, it may be necessary to elaborate parallel CRs for different major versions.
The uniqueness of the CR number is on a per specification basis, but independent of the major version, i.e. CR No 001 [may] exist for each specification but only once.
The CR number is allocated by the PT. It may be allocated prior, during or after the TB SG meeting at which it is discussed but before submission to the TB. Even though different TB SGs have different working routines it is beneficial and thus recommended that CR numbers are allocated no later than at TB SG agreement.
CR numbers are unique and shall never be reused, not even numbers used for [early] rejected CRs.
Impact on other specifications and Joint CRs:
If the contents of the CR is such that isolated it makes the whole set of approved Specifications inconsistent, corresponding CRs must also be considered and produced. This shall preferably be carried out by the originator of the CR (and his/her colleagues in other TBs and TB SGs) in advance. The PT is co-responsible for identifying and communicating cross TB and cross TB SG impacts.
In principle, a CR shall not be forwarded to the TB unless the potential impact on other specifications have been thoroughly examined and concluded, either resulting in a 'No impact' statement or in a full and consistent set of corresponding CRs to all affected specifications. Such sets of CRs are normally combined in one single document, by the PT, before submission to all responsible TBs and called 'Joint CR'. An approval by all prime responsible TBs is necessary.
If some of the corresponding CRs are to be considered by other TB SGs or TBs then the PT is responsible for monitoring the result in the TB SGs and to submit the full set, when available, to the TB. This might mean that in some cases the TB SG agreed CRs are not presented to the immediately following TB meeting due to outstanding CRs from other TB SGs or TBs.
Other "consequential" CRs, needed for reasons other than direct consistency, may be drafted, presented and agreed independently. This covers typically additions to Test specifications and O&M specifications. It should be noted though that if a CR causes an inconsistency with an existing/approved test or O&M specification, the corresponding CRs should be presented together with the core specification CR.
Handling of the CR in the TB:
If the TB WG has agreed to a CR and comments from secondary responsible TB (SG)s have been taken into account, the CR is forwarded to the prime responsible TB for formal approval. It is the responsibility of the PT to make sure that TB WG agreed CRs are made available to the TB, and that they are properly formatted, numbered and consistent. Likewise, it is the responsibility of the PT to ensure that Joint CRs are complete and put together before submission to the TB(s).
Non-strategic CRs are submitted to the TB for approval without presentation; strategic CRs are submitted to the TB for approval with presentation.
The PT is responsible for making available to the TB summary lists of all CRs presented for decision. This list is then updated to include the result of each and every CR.
Note: This list is generated from the CR database held by the PT, see section 7.
Decisions on CRs, and results:
The TB considers and concludes on each strategic CR independently, except for Joint CRs which are handled and concluded together, and the verdicts could be as follows:
Verdict
Meaning
Approved:
Contents to be incorporated in the specification.
Postponed:
Concept of CR seems acceptable in principle but further refinements are necessary. CR is sent back to the TB-SG for revision and possible re-submission at a later TB meeting.
Rejected:
CR not acceptable in any sense. If further discussions on the subject should take place that shall be done on the basis of different documents and approaches.
Non-strategic CRs presented to a TB meeting are automatically accepted at the end of the meeting if no TB delegate requested discussion of the CR during the TB meeting. If at least one delegate requests discussion of a non-strategic CR during the TB meeting, the CR is presented to the meeting and further treated as a strategic CR.
If there is at least one Approved CR to a given specification, a new version number of the specification is allocated (see clause 4.2.3), and the PT will produce and issue a new version of the specification after the TB approval.
Control and notification of CR decisions:
• The PT makes available the list of non-strategic CRs presented to a TB meeting before the meeting to all heads of delegation.
• Towards the end of each TB meeting, the PT issues lists containing the detailed result of the CRs presented at the meeting, including information about the consequential new version numbers of the concerned specifications. These lists form an annex to the meeting report (and hence are part of a permanent document). These lists, being the evidence of which specifications have changed and how, are important management tools for both TB delegates and the PT since it always takes some time before the new versions of the specifications as such can be compiled and released.
Databases: See section 7. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 4.6.5 Updating and release of new versions of the specifications | After TB approval of one or more CRs, the PT produces a new version of the specification (with the version number incremented according to above). |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 5 Availability and distribution of specifications | The latest versions of TB approved and TB WG approved specifications are made available on a TB server (exact location see TB meeting report) by the PT. For specifications (or major versions of specifications) that are not yet under change control, the versions presented to the responsible TB-SG or WG, shall be made available to the PT by the rapporteur and made available on a TB server by the PT. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6 Work items | For project management purposes, the work is itemised in Work Items (WI), which are documented, developed and handled as described in this section.
The possible modifications of the specifications are basically of different natures:
- Error corrections; Modifications which correct overlooked errors or inconsistencies in the specifications.
- Enhancements; Modifications that enhance the system, e.g. by new services or features, or by improving performance or decreasing costs.
Modifications of the correction category are ongoing maintenance tasks and are handled with direct CRs and thus not by means of Work Items.
Modifications of the enhancement category are handled within the concept of Work Items as described in the sections below. Note that prior agreement of the TB is needed before any substantial work is launched. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.1 Creation of a Work Item | When an enhancement of the standard is considered desirable a delegate or delegation can make a proposal by submitting a Work Item Description sheet to the relevant TB or TB WG.
- For new services, features or functions, the TB responsible for Services and System Aspects is the relevant TB. This TB also assigns prime and, if necessary, second responsible TBs for the corresponding work items.
- For pure performance enhancements, other TB WGs may be the responsible TBs (the test specifications are normally not seen as independent work items).
The relevant TB WG should study and refine the WI sheet before passing it on to the TB for adoption.
No substantial work shall commence in a TB WG prior to a decision of the responsible TB.
The actual WI description sheets to be used and guidance how to apply them are distributed by the PT. The access to them is described in an annex of each TB plenary report.
The TB shall not approve a WI unless the Work Item Description (WID) sheet has been properly filled in to the degree possible at that time.
Once the TB has approved the WI, it is included in the WI Status List and the WI Description sheet is included in the WID compilation. Both these actions are carried out by the PT. The WID should be updated as soon as new information is available.
The effects of the WI in terms of initial work distribution and responsibilities in the TB (WG)s must be identified and allocated. Also, one or more rapporteurs have to be identified for the initial tasks, typically one for the service aspects and one for the system requirements. This should preferably be done prior to submission to the TB, but in the worst case during the following TB (WG) meetings. This information is also included in the WI Status List managed by the PT. During the lifetime of the WI, additional responsibilities as well as output documents and corresponding rapporteurs can be identified. Similarly, this information is then included in the status list.
A work item normally implies the creation of new specification and Change Requests to existing specifications. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.2 Type of Work Items | Modifications of the standard could in principle be of two different types:
- New services/features/functions that in general affects several specifications and several TB-SGs;
- Pure [technical] enhancements that affects a small number of specifications and TB-SGs only (generally only one).
Of these, modifications of the latter type can be submitted to the TB SG(s) and then TB directly as a Change Request without prior presentation/agreement of a WI Description sheet. Such CRs shall instead refer to the pseudo Work Item 'Technical Enhancements'. For the other type of modifications, the following sections apply. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.3 Start and continuation of the work and responsibilities | An early task when elaborating a work item is to identify the tasks related to the WI and allocate those to the TBs and TB SGs.
In most cases the tasks from a WI can be split immediately in the following areas:
- Service requirements
- System/Architectural requirements and implications
- Protocol specifications
Service requirements:
The responsibility of the service requirements can usually be allocated immediately at the creation/adoption of the WI. Occasionally other groups may be given responsibility for the service requirements. This might be another TB-SG, e.g. a Task Force. In any case, however, it should be a single group and one that reports directly to the TB.
System/Architectural requirements and implications:
Also, the responsibility for system/architectural requirements should be allocated immediately, even though the implications and requirements normally will be seen only after the study on service/system requirements have been initiated. The responsibility for the system/architectural requirements must be given to a single body to guarantee the consistency of the adopted solution.
The choice of group should not [pre-]determine the technical choices and in many cases, the responsibility for system and architectural requirement study needs a widening of the competency and a readiness to look to a variety of technical aspects. This can be obtained either by drawing the attraction of the suitable experts (e.g., by setting special meetings or clear meeting dates) or by the organisation of joint meetings.
The overall consistency of the system architecture must be maintained along with the numerous modifications due to various work items. This responsibility is allocated to the TB SG on system/architecture (SMG 12) which for this purpose ensures the co-ordination of the development of general architecture concepts and their applications to individual Work Items, and should thus also draw attention and expertise from other TBs and TB SGs as well.
Protocol specifications:
The responsibility for the elaboration of the protocol specifications can in most cases not be allocated at the early stages since it depends on the technical implementation choices and hence on the results of the study of the service/system requirements as well as on the architectural conclusions.
The identification of new protocols to be specified and/or existing protocols to enhance will be derived from the system/architectural requirements. In general, modifications of existing protocols are done by the TB SG in charge of the protocol in question, whilst the responsibility for development of new protocols is allocated by the TB based on proposals from the TB SG on system/architecture. Then, whether the actual work is done in the TB SG itself or in an ad hoc subgroup thereof is at the discretion of that TB SG. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4 Realisation of Work Items | |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4.1 Planning and categorisation of the deliverables (and control thereof) | Planning:
An initial time plan should be set up at an early point. As a basis, the time plan should include at least the following points:
1. Presentation for principle agreement of the service requirements;
2. Presentation for principle agreement of the architectural/system implications and requirements;
3. Presentation for information of the drafts of all needed deliverables,
4. Presentation for approval of all needed deliverables.
The time plane includes realistically achievable dates for each step and should be part of the Status List.
The WI Status List contains also information/lists about existing and planned permanent and semi-permanent documents related to the WI, e.g. future specifications as well as interim/temporary requirements "specifications", including the responsible TB SG/group, the rapporteur, the state of the documents, expected completion dates, etc.
Categorisation:
Before the substantial work on a Work Item starts, the WI shall be examined in the light of its technical and commercial dependency with respect to the existing specifications as well as with respect to other Work Items. Aspects that must be considered and settled at an early stage are:
- Required versus acceptable time scales;
- Whether the WI has an impact on Mobile Stations or not;
- Whether the WI has an architectural impact or not;
- To which degree the WI needs to be standardise (and hence how much can be left "open", to speed up the work);
- Whether the WI can be technically and/or commercially combined/grouped with other WIs;
- ......
Unless the above aspects are sorted out in the beginning of (or prior to) the work, the risk of getting inefficient and non-optimal specifications increases and the control of the work becomes difficult and unmanageable.
These aspects are also contained in the WI Status List. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4.2 Choice of deliverables | The WI will be realised as new specifications and/or amendments to existing specifications; the exact structure lies with the individual TB SGs and the TB. Typically, a new feature may result in at least three completely new specifications (Stages 1, 2 and 3) but also cause amendments to the major protocol specifications. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4.3 Contents of deliverables | |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4.3.1 Service Requirements | This task, allocated and controlled according to above clauses, consists in describing in details the aim of the work item, as seen by those for which a service is provided, e.g. end users, operators, service providers, etc.
Apart from the general rules on how to write specifications, certain state of the art ways of producing service requirements specifications are established in the TB, but as most new types of service differ in nature and structure from each other, no detailed rules are written.
In many cases it is preferred that prior to the actual service requirements specification being produced, an initial combined service and system/architectural requirements and considerations document is produced, involving both service oriented and implementation expertise. In particular when an ad hoc Task Force is charged with performing a study on a certain WI (aspect) such a starting point document is produced and then used as a basis for the TB SGs when carrying out the detailed work on service requirements/descriptions and technical realisation specifications. Such setting-the-basis documents are generally kept for some time after the actual work on the detailed specifications has progressed to a mature level (mainly for the purpose of easing the understanding and to shorten the interaction and negotiation period between service requirements and system/architectural and technical restrictions).
Such 'setting-the-basis' document can also be used to describe the project management of a work item (to collect all prepared but not yet approved CRs related to the WI in question and so on). |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4.3.2 Technical realisation specifications | This covers both the overall architectural and interface specific detailed specifications. The architectural implications and requirements need to be identified at a very early stage, both for the purpose of knowing which parts of the standard (and hence of the UMTS system) are affected by a WI, but also for the purpose of supporting the identification of cross-WI similarities (and hence more overall efficient solutions).
The overall co-ordination of the architectural/system requirements is with a single group as stated above, whilst the ensuing detailed protocol definitions and specifications may be distributed over several groups (according to their scope). |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.4.3.3 Test Specifications | Changes to the core specifications may have impact on the test specifications. The corresponding changes to test specifications have to be approved before publication the new core specifications. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 6.5 Closing of Work Items | When all necessary modifications for a given Work Item (or group of Work Items) are completed all over the scope of the system, and all the corresponding new specifications and Change Requests have been approved and released, then the Work Item is officially closed. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7 Management documents and tools | This clause summarises and lists the various permanent or semi-permanent documents (and means of documenting).
All these documents/tools are within the responsibilities of the PT but are available to SMG delegates. They are made available on a document server (the exact location is published in each TB meeting report).
All data bases are in Microsoft Access format unless otherwise stated. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.1 Status List of Specifications | This list (data base) contains information about all SMG specifications, in terms of specification number, title, latest approved version, history on version numbers, rapporteur and some other details. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.2 Work Item Status List | This data base contains information about all SMG work items, in terms of identified future specifications, identified specifications to be amended, supplementary/temporary documentation, expected/planned completion dates and intermediary milestones, and other management information related to specifications, responsible TB Sub-Groups, rapporteurs, completion dates etc.. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.3 Change Request data base | The Change Request data base records all CRs to specifications. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.4 Mailing lists data bases | The members data base contains information of all SMG delegates. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.5 Electronic tools used/preferred | For the various types of documents and parts of documents of SMG, a minimum variety of word processors etc. should be used. The following lists those tools to be used for documents:
Type
Tool(s)
Comments
Text
Microsoft Word 97 (SR-2)
Graphics
Micrografx Designer version 7.0
MS Draw 98
Freeware from Microsoft. The built-in drawing package of Word is not recommended.
SDL, MSC,
Telelogic SDT version 3.2
Rapporteurs can obtain, as a loan, this software from ETSI
TTCN
Telelogic ITEX version 3.4
Databases
Microsoft Access 97 (SR-2)
General Tools
Microsoft Office 97 software Suite (Excel 97, Powerpoint 97, etc.) |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.6 WEB and FTP services | ETSI (http://www.etsi.org) and 3GPP (http://www.3gpp.org) web pages provide up-to-date information on specification work like: meeting calendar, meeting minutes, meeting documents and latest specifications. FTP links to file server areas of each TB WG can be found via WEB. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 7.7 E-mail reflectors | All TB WGs have their own e-mail lists. There are also several additional lists per topic. Further information can be found on WEB pages. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 8 Email decisions | TB sub-groups may apply email decision procedures for decisions they are entitled to take, as defined by superior bodies (e.g. on specifications, CRs, Liaison statements, etc). Each TB sub group may set its rules for making email decisions, however, it is required
- that the rules are clearly defined and documented;
- that a delegate having participated in plenary meetings is able to identify that he has possibly missed an email relevant to email decision.
Chapters 8.1-8.6 describe an email decision procedure example.
8.1 Email drafting phase
An email drafting can be launched, either on a dedicated exploder list as a cybermeeting or as an informal discussion between interested delegates. Objectives can extend from debating an existing contribution, a Liaison Statement or a Change Request to progressing the service requirements of a specific Work Item and involving one or more Work Groups within an ad hoc.
In case of "cybermeeting", the chairman of the discussions shall issue an un-ambiguous guideline including:
1. The objectives and agenda of the meeting,
2. Input document(s) to be clearly specified
3. Start date and end date of the debates.
4. Afterwards, summary of results of the "cybermeeting"
The end-goal being to reach an “agreement” on the deliverable, either at the next meeting or via an e-mail approval procedure. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 8.2 Email decision declaration | Authority for an Email decision to take place should be agreed usually at plenary meeting. If this is not possible, there shall be a clear mail (i.e. status report) indicating that there will be a email decision. This mail shall be sent on working groups main mailing lists. Target and timeframe need to be clearly indicated. Email decision shall take place using the main WG reflector. A permanent Chairman (i.e. WG chairman or vice chairman) must be nominated who is responsible for managing email desision procedure, including initiation, monitoring and announcing when it is complete.
It is not the objective for email desision procedure to re-open the discussions of a “cyber meeting”. The only use of the main reflector, when approving the outcome of a “cyber meeting”, shall be to accept the outcome of the cyber meeting unchanged (apart from editorial remarks), or reject it. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 8.3 Status reporting | During the e-mail desicion period, there shall be clear message stating what the status of each open item is. It is recommended to have a weekly summary of the status of all items, from the previous plenary listing:
• The name of the open item
• The name of the responsible delegate,
• Time left for comments before the deadline & expiration date
• Current work versions of documents: Tdoc number, CR number, Revision number
• Status (Debate ongoing, Agreed, Postponed, Rejected...) |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 8.4 Decision announcement | When a decision is made (Agreed, rejected, postponed,..) a clear notification on what has been agreed shall be sent on the WGs’ main mailing list. Notification may be included at status report. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 8.5 Timing | Email decision procedure should start latest 3 weeks before plenary:
• Email decision period is two weeks (one status report required).
• Procedure shall be completed one week before the plenary due to practical arrangements. |
714fea1a3412b60c57d0fb418fe8bfee | 01.00 | 8.6 General | • On exceptional case's when procedure cannot be followed a clear notice from chairman is required.
• Emails on mailing list shall contain a header with meaningful keywords, e.g. S1 Tdoc xxx on Charging or/and CR 22xxA012r4.
• If there are no comments during the allowed period, agreement is granted automatically.
• TB WGs status report to higher body meeting, is emailed to mailing list one week before the meeting. This allows delegated final possibility to review last periods progress.
Annex A (informative): Change control history
SMG#
VERS
SUBJECT
30
8.0.0
Version 8.0.0 created from version 7.2.0 |
7e80bf24517beeb9be2fa8c530e8ca88 | 01.56 | 1 Scope | This specification constitutes a requirement specification for a set of associated cryptographic algorithms which is used for Cordless Telephony System (CTS) Radio Interface authentication and key management in the GSM Cordless Telephony System.
This specification is intended to provide ETSI SAGE with the information it requires in order to design and deliver a technical specification for such an algorithm set.
This specification covers the intended use of the algorithm set and use of the algorithm set specification, technical requirements on the algorithm set, requirements on the algorithm set specification and test data, and quality assurance requirements on both the algorithm set and its documentation. The document also outlines the background to the production of this specification. |
7e80bf24517beeb9be2fa8c530e8ca88 | 01.56 | 1.1 Organisation of this specification | The material presented in the subsequent clauses of this specification is organised as follows:
subclause 1.2 provides some background to the production of this specification.
clauses 4 and 5 describe the context in which the algorithm set and its specification are intended to be used.
Clause 4 outlines the intended use of the algorithm set in terms of which organisations shall be entitled to use it, what they shall use it for, where it shall be used, and how it shall be implemented.
Clause 5 describes the intended use of the algorithm specification set in terms of who shall own it, who shall use it, and how and under what conditions the specification shall be provided to those users.
clause 6 specifies the functional requirements for the algorithm set. This covers the type and parameters of the algorithm, the interface to the algorithm set, the envisaged modes of operation of the algorithm set, implementation and operational considerations which may have an impact on the design of the algorithm set and requirements on the resilience of the algorithm set.
clause 7 details requirements on the algorithm set specification and associated test data deliverables.
clause 8 addresses quality assurance requirements, needed to give confidence in the design of the algorithm set and the adequacy of the algorithm set specification and test data.
clause 9 is a summary of the deliverables expected from ETSI SAGE. |
7e80bf24517beeb9be2fa8c530e8ca88 | 01.56 | 1.2 Motivation | Discussions within SMG led to the conclusion that GSM-CTS can only be provided on a commercially solid and successful basis if appropriate security features are integrated into the system. In particular it was decided to standardise mechanisms both authentication and key generation algorithms.
Consequently an annex to GSM 03.20 was produced, which specifies the security features of the CTS. It was also concluded that, in order to support inter-operability between equipment, and in line with the policy for GSM, a set of standard ETSI algorithms for CTS Radio Interface authentication and key management needs to be specified.
The implementation of the algorithm set is mandatory, the implementation shall be in line with this specification. |
7e80bf24517beeb9be2fa8c530e8ca88 | 01.56 | 2 Normative References | The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
• References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies.
• A non-specific reference to an ETS shall also be taken to refer to later versions published as an EN with the same number.
[1] GSM 01.04: "Digital cellular telecommunications system (Phase 2+); Abbreviations and acronyms"
[2] GSM 03.20: "Digital cellular telecommunications system (Phase 2+); Security related network functions; Stage 2. |
7e80bf24517beeb9be2fa8c530e8ca88 | 01.56 | 3 Definitions and abbreviations |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.