hash
stringlengths 32
32
| doc_id
stringlengths 5
12
| section
stringlengths 4
1.47k
| content
stringlengths 0
6.67M
|
---|---|---|---|
e77d3faff9be1de0a0fd3e5e46ddb1f5
|
25.807
|
5.1 Solution #1
|
The first solution for getting low output power is described in Annex B. As it can be seen in this annex, this solution implies only one change to the current specifications, which is the following:
• TS 25.433 (NBAP protocol specification). A new IE must be created, containing the following information:
• External_Gain_DL: This is the DL gain of the external distribution system. This parameter also includes the losses of the coupling system between the low output power base station and the distribution system.
• External_Gain_UL: This is the UL gain of the external distribution system. It comprises all the way from the distribution system remote antenna connector and the low output power base station antenna connector.
The main advantages of this solution are the following:
• It minimises the changes to the specifications.
• There are not backwards compatibility problems with the node B and/or the UE.
From the TSG RAN WG4 point of view, this is a feasible solution for getting low output power, but due to the fact that all the changes that this solution implies affect to RAN specifications under TSG RAN WG3 control, the feasibility of this solution is conditioned to TSG RAN WG3 review.
|
e77d3faff9be1de0a0fd3e5e46ddb1f5
|
25.807
|
5.2 Solution #2
|
Another way of getting low output power would be to introduce these two parameters, as described in Solution #1, DL and UL gain of the distribution system, into the O&M system.
By doing this, the base station would be aware of the presence of this equipment and could therefore adjust its output power, so as to provide the expected power at the antenna port, that is, at the Uu interface.
To provide this information, two possibilities could be foreseen:
a) These two parameters could be stored into the local database of the base station.
b) It could also be possible to include these parameters in the network manager database, though this seems to be indeed more complex, because this information would have to be sent to the base station via the itf-N interface.
Comparing both alternatives, option a) seems to be much simpler than option b), as it would minimise the impact to the specifications. Besides, it would not be needed to involve TSG SA WG5, responsible for the standardisation of the itf-N interface.Therefore, option a) would be the one chosen when referring to Solution #2.
|
e77d3faff9be1de0a0fd3e5e46ddb1f5
|
25.807
|
6 Conclusions
|
TSG RAN WG3 has reviewed solution #1 and concluded that, although this could be a feasible solution, it does not seem to be the optimal one.
Therefore, a second solution, solution #2, was proposed trying to minimize the changes to the current specifications.
As option a) of solution #2 seems to be the simplest solution, TSG RAN WG3 agrees to adopt this alternative to provide low output power.
Annex A:
Description of solution #1 for getting low output power
The first solution that one can think of for getting low output power is to change the Iub signalling information elements, so that the RNC can order the node B to transmit the desired power. So this was the first approach taken to obtain low output power. But this solution leads to several problems:
• The changes in the Iub signalling affect not only to the node B, but to the UE [3]. The CPICH power value sent to the UE by the RNC does not correspond to the CPICH power at the distribution system antenna connector. This can lead to problems with some RNC functionality like admission control or the adjustment of the initial power of the PRACH.
• The changes to the Iub signalling are not backwards compatible. A node B or a UE that is not Release 6 compatible would not understand the changes done to the signalling [3].
Because of this, a more feasible solution has been considered. With this solution, current information elements are not changed. The node B and the RNC are the ones that perform the necessary corrections to obtain the low output power. Figure B.1.1 shows an example of this solution.
In this example, we want a Pmax at the distribution system antenna interface of +30 dBm. The gain of the feeder between the node B and the distribution system, plus the distribution system gain, is 30 dB. Therefore, the node B should be ordered to transmit with a Pmax of 0 dBm. But the RNC orders the node B to transmit 30 dBm, which should be the maximum output power at the distribution system antenna interface. The order is sent by using a non changed Release 99 IE. According to this, the node B should transmit with a Pmax of 30 dBm at its antenna interface. But the RNC sends to the node B a new IE, which tells the node B that there is a distribution system connected to its antenna interface. This new IE contains the UL and DL gain of the distribution system. Then the node B is able to correct its output power, and therefore, it transmits with a Pmax of 0 dBm, so that the Pmax at the remote antenna interface is 30 dBm. In order that the RNC can send to the node B the gain of the external distribution system, it is necessary to add two parameters to the RNC, operator configurable, which contain the UL and DL gain of the external distribution system.
Figure B.1: Solution #1 for getting low output power
On the other hand, the CPICH power value sent to the UE by the RNC is 18 dBm, which is the CPICH transmit power at the distribution system antenna interface. With this solution, the correct CPICH power value is sent to the UE, and there are not backwards compatibility problems with the UE's. The only change to the specifications is the new IE in the NBAP protocol, containing the UL and DL gain of the distribution system. There would be no changes in the RRC protocol, and there would be no backward compatibility problems with the NBAP IE's.
In the previous explanation of the approach, no mention has been made of the possible use of the distribution system UL gain for the node B and/or the RNC. It could be useful for correcting the measurement reports received from the node B, because if these reports are not relative to the distribution system antenna connector (the point at which the CPICH power value is given), it could lead to problems with some RNC functionality.
It should also be pointed out that if the or distribution system connected to the node B has several antenna ends, all of them should be configured to transmit the same output power. If not, it would be impossible for the node B to correct its transmit power so that the correct output power is transmitted at all antenna ends. This comment should be included in the relevant documents, for instance in the WDS technical report.
This solution is not fully closed yet. Subsequent modifications or additions to this solution can be incorporated into this TR by means of TSG RAN WG's contributions.
Annex B:
Use of the downlink and uplink gain
To clarify the use of both parameters, downlink and uplink gain of any distributed antenna system connected after the base station, the following structure is to be considered.
Figure C.1: General topology in case of Low Output Power
First of all, it seems clear that, indisputably, the downlink gain of the distributed antenna system connected at the output of the base station will be a value needed by the base station, in order to be able to adjust its output power accordingly. By doing this, the Primary CPICH power at the antenna connector can be correct, as indicated on the BCH.
On the other hand, the purpose of the uplink gain could be less obvious, although it is also important, for this parameter will be used to compensate any dissymmetry between both, uplink and downlink, so as to receive an exact - as accurate as possible - initial power for the PRACH preambles. To clarify this point, it would be useful to analyse in detail how the calculation of this power is performed by the UE.
The formula the UE uses to estimate the power of the initial preamble for the PRACH, Preamble_Initial_Power, is given in 3GPP TS 25.331 as follows:
Preamble_Initial_Power = Primary CPICH TX power IE - CPICH_RSCP
+ UL Interference IE
+ Constant Value IE
Where:
- The Primary CPICH TX power IE is the transmitted Primary CPICH power sent to the UE on the Uu interface. This IE is indicated on the BCH in the System Information Block, SIB, type 6 (or SIB 5, if SIB 6 is not being broadcasted).
- The CPICH_RSCP is measured by the UE as the received value of the Primary CPICH.
- The UL Interference IE is the estimated uplink interference already existing in the cell. This IE is present on the BCH in SIB7.
- The Constant Value IE is a constant chosen by the RNC. This IE is radiated to the UE on the BCH in SIB 6 (or SIB 5, if SIB 6 is not being broadcasted).
In fact, the first two terms represent the estimation of the downlink path loss. Of course, it can only be correct if the Primary CPICH power at the antenna connector is equal to the Primary CPICH TX power IE. So, this is obviously the reason why the base station needs to be aware of the presence of the external element connected at its output before the antenna itself, adjusting its output power in accordance.
Additionally, a constant value is chosen so as to enable RRC connection establishment without delay and without creating too much uplink interference.
Finally, in order to take into account the presence of other UEs in the cell, the UL interference IE is included. This estimation will only be correct if the base station is aware of the UL gain of the external element connected.
As it could be noticed, this formula does not explicitly contain uplink and downlink path losses, but on the contrary, symmetry between both links is implied. This means that the UE assumes that uplink and downlink path losses are almost the same. This hypothesis is usually valid at the antenna connector reference point, that is, immediately after (or before) any external element connected at the output (input) of the base station on the downlink (on the uplink). It is important to maintain this symmetry up to the base station itself, so that the initial power of the preambles would be correct enough.
If either uplink or downlink is not compensated correctly, then the Preamble_Initial_Power may not be accurate enough:
- Being too low, the RRC connection establishment might be delayed or even impossible.
- Being too high, too much uplink interference will be created in the cell.
Annex C:
Change history
Change history
Date
TSG #
TSG Doc.
CR
Rev
Subject/Comment
Old
New
03/2004
23
RP-040076
-
-
Approved at TSG RAN #23 and placed under Change Control
1.0.0
6.0.0
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
1 Scope
|
The present document specifies the Remote Electrical Tilting Application Part (RETAP) between the implementation specific O&M transport function and the RET Antenna Control unit function of the Node B. It defines the Iuant interface and its associated signaling procedures.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
2 References
|
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
• References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
• For a specific reference, subsequent revisions do not apply.
• For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TS 25.460: "UTRAN Iuant Interface: General Aspects and Principles".
[2] ISO/IEC 13239 (2nd Edition, March 2000): "Information Technology – Telecommunications and information exchange between systems – High-level data link control (HDLC) procedures".
[3] 3GPP TS 25.462: "UTRAN Iuant Interface: Signalling Transport".
[4] 3GPP TS 25.461: ”UTRAN Iuant Interface: Layer 1”.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
3 Definitions and abbreviations
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
3.1 Definitions
|
For the purposes of the present document, the following terms and definitions apply.
Active alarm: An alarm which has an alarm state that has been raised, but not cleared
Alarm: Persistent indication of a fault
Alarm code: A code that identifies a specific alarm. The alarm code set is a subset of the return code set. The alarm codes are listed in annex A of this TS
Alarm state: A condition or state in the existence of an alarm. Alarm states are raised and cleared
ASCII character: A character forming part of the International Reference Version of the 7-bit character set defined in ISO/IEC 646:1991
Calibrate: Exercise the antenna drive unit over its entire range of travel to ensure fault-free operation and synchronise the measured and actual beam tilt of the antenna
Configuration data: A stored table or function defining the relationship between the physical position of the drive and electrical beam tilt
Data type: A definition determining the value range and interpretation of a series of octets. The following specified data types are used in this TS:
Name:
Definition:
AlarmCode
1 octet unsigned enumerated code
All AlarmCode values are listed in annex A of this TS
FieldNumber
1 octet unsigned enumerated code
All field number values are listed in annex B of this TS
ProcedureCode
1 octet unsigned enumerated code
ReturnCode
1 octet unsigned enumerated code
All ReturnCode values are listed in annex A of this TS
TextString
Octets with integer values in the range of 32 to 126 to be interpreted as ASCII characters
Elementary procedure: The RETAP protocol consists of elementary procedures (EPs). An elementary procedure is a unit of interaction between the primary device (Node B) and the secondary devices (RET devices)
An EP consists of an initiating message and possibly a response message.
Two kinds of EPs are used:
- Class 1: Elementary procedures with response (success or failure).
- Class 2: Elementary procedures without response.
For Class 1 EPs, the types of responses can be as follows:
Successful
- A signalling message explicitly indicates that the elementary procedure has been successfully completed with the receipt of the response.
Unsuccessful
- A signalling message explicitly indicates that the EP failed.
Class 2 EPs are considered always successful.
Error: Deviation of a system from normal operation
Fault: Lasting error condition
Little endian: The order of transmission in which the least-significant octets of a multi-octet representation of a number are transmitted first. Little endian only applies to binary integer representations
MaxDataReceiveLength: SecondaryPayloadReceiveLength minus 3 octets (see subclause 4.8.1 in [3])
MaxDataTransmitLength: SecondaryPayloadTransmitLength minus 3 octets (see subclause 4.8.1 in [3])
Procedure code: A code identifying an elementary procedure
Reset: A process by which the device is put in the state it reaches after a completed power-up
Return code: A code which defines information about the outcome of an elementary procedure execution
Tilt (also downtilt, tilt angle, beamtilt): The elevation angle between the direction orthogonal to the antenna element axis and the maximum of its main beam in the elevation plane. A positive electrical tilt angle means that the antenna beam is directed below the direction orthogonal to the antenna axis. An antenna has separate values for electrical and mechanical tilt. The mechanical tilt is fixed by the geometry of the installation. In this TS the tilt referred to is always the electrical tilt unless otherwise stated
Tilt value: A signed integer used in elementary procedures to define the electrical tilt setting of the antenna. The tilt value is 10 times the antenna electrical tilt angle in degrees.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
3.2 Abbreviations
|
For the purposes of the present document, the following abbreviations apply:
EP Elementary Procedure
HDLC High-Level Data Link Control
RET Remote Electrical Tilting
RETAP Remote Electrical Tilting Application Part
TCP Time-Consuming Procedure
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
4 General
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
4.1 Procedure specification principles
|
The principle for specifying the procedure logic is to specify the functional behaviour of the RET antenna control unit exactly and completely. The Node B functional behaviour is left unspecified.
The following specification principles have been applied for the procedure text in clause 6:
- The procedure text discriminates between:
1) Functionality which "shall" be executed
The procedure text indicates that the receiving node "shall" perform a certain function Y under a certain condition. If the receiving node supports procedure X but cannot perform functionality Y requested in the REQUEST message of a Class 1 EP, the receiving node shall respond with the message used to report unsuccessful outcome for this procedure, containing an appropriate cause value.
2) Functionality which "shall, if supported" be executed
The procedure text indicates that the receiving node "shall, if supported," perform a certain function Y under a certain condition. If the receiving node supports procedure X, but does not support functionality Y, the receiving node shall proceed with the execution of the EP, possibly informing the requesting node about the not supported functionality.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
4.2 Forwards and backwards compatibility
|
The forwards and backwards compatibility of all versions of the protocol shall be assured by a mechanism in which all current and further messages will not be changed in the future. These parts can always be decoded regardless of the standard version.
New functionalities are added into the specification by introducing new procedures and thus the existing messages are not changed in the future.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
4.3 Multi-antenna units
|
The RETAP elementary procedures are split into a single-antenna oriented part, a multi-antenna oriented part and a common part for both device types in order to support RET units controlling single- or multi-antenna devices. The RET unit responds, upon request, the number of antennas it controls. All multi-antenna oriented elementary procedures include a parameter stating which antenna the elementary procedure addresses. Antennas are numbered 1 and upwards.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
4.4 Integer representation
|
Multi-octet integer values are transmitted in little endian order. Signed integers are represented as 2-complement values.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
5 Services expected from signalling transport
|
RETAP requires an assured in-sequence delivery service from the signalling transport and notification if the assured in-sequence delivery service is no longer available.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
5.1 Elementary procedure format
|
Layer 2 provides a full-duplex link for the transmission of RETAP messages.
There are two types of RETAP elementary procedures:
Class 1: Initiating messages are sent either from the primary to a secondary device, or from a secondary to the primary device, in order to initiate some action within the receiving device. The other device sends a response message completing the procedure.
Class 2: Initiating messages are sent either from the primary to a secondary device, or from a secondary to the primary device. No response message is expected.
All RETAP messages use the same basic format:
Table 5.1.1: Basic format for all RETAP messages
Elementary procedure
Number of data octets
Data
1 octet
2 octets
MaxDataReceiveLength or MaxDataTransmitLength.
NOTE: Response messages have the same basic format as initiating messages. The elementary procedure code shall be the same in the response message as in the associated initiating message.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
5.1.1 Initiating message
|
The data part of an initiating message may contain parameters as specified in clause 6 of this TS.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
5.1.2 Response message
|
Elementary procedures shall, unless otherwise specified, provide a response message within 1 second. The response time is measured from the time the message frame was received by the transport layer to the time the response message is ready for transfer by the transport layer.
If the class1 elementary procedure requested by the initiating message was successfully executed, the response message data part from a single-antenna device shall contain return code <OK>. Additional information may follow in the data part. The response message data part from a multi-antenna device starts with the antenna number followed by return code <OK> and optional additional information.
If the elementary procedure requested by the initiating message was not successfully executed, the response message data part from a single-antenna device shall contain return code <FAIL>.
The following octet shall contain a second return code which describes why the execution of the requested procedure failed. The response message data part from a multi-antenna device starts with the antenna number followed by return code <FAIL> and a second return code which describes why the execution of the requested procedure failed.
In some situations an initiating message can cause a change of operating conditions, for instance a SetTilt procedure might cause a RET device to discover that an adjuster is jammed or that a previously jammed adjuster works normally again. In these cases an alarm procedure reporting the change of operating conditions shall be used in addition to the regular <OK> or <FAIL> return codes in response message.
A complete annotated table of all return codes with their corresponding hexadecimal numbers is provided in annex A of this TS.
Return codes marked with an X in the Alarm column of annex A in this TS are used to report operating conditions in alarm procedures (see subclauses 6.6.5 and 6.7.6 for details).
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6 Control elementary procedures
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.1 State model
|
The state model describing the RET device is shown in figure 6.1 with procedures written in italic.
The relation to the connection state model for layer 2 can be found in [3].
Figure 6.1: State model for the RET device
If an application software is not missing the RET device enters the state OperatingMode.
If an application software is missing, the RET device enters the state DownloadMode. In this state only software download functionality is supported in order to restore the application software.
The primary device will be notified that the RET device has entered the state DownloadMode when a procedure which only is supported in the state OperatingMode fails with the return code WorkingSoftwareMissing.
If no software download functionality is supported, then only the state OperatingMode for the RET device is supported.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.2 General procedure handling
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.2.1 Alarms
|
When a fault is detected, the corresponding alarm state shall be changed to state raised by the secondary device. When the fault no longer exists, the corresponding alarm state shall be changed to state cleared by the secondary device. Alarm changes are reported through the AlarmIndication or AntennaAlarmIndication elementary procedures. Whenever an AlarmIndication or AntennaAlarmIndication elementary procedure message is transmitted, it shall contain all the alarm states changed that have not yet been reported as described in subclauses 6.6.5 and 6.7.6.
All alarm states shall be cleared by any type of reset.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.2.2 Procedure message interpretation
|
The following message interpretation rules shall apply to a secondary device in the order mentioned:
- Any message shorter than 3 octets shall be disregarded. In case of Multi-Antenna-Procedures any messages shorter than 4 octets shall be disregarded.;
- If a message has a length inconsistent with its “Number of data octets” field value it shall be responded with a failure message stating “FormatError” as the cause of failure. The response message shall be to the initiating message identified by the procedure code;
- If a secondary device in the OperatingMode state receives a procedure message which is undefined for this device type, it shall respond with "Unknown Procedure";
- If a secondary device in the OperatingMode state is receiving a procedure message of an optional procedure not supported, it shall respond with a failure message stating “UnsupportedProcedure” as the cause of failure;
- If a secondary device receives a procedure message, part of the software download procedure sequence described in Annex C, without having received the previous procedure messages in that sequence it shall respond with a failure message stating “InvalidProcedureSequence” as the cause of failure;
- If a secondary device in the DownloadMode state is receiving a procedure message not supported in that state it shall respond with a failure message stating “WorkingSoftwareMissing” as the cause of failure;
- If a message has a length inconsistent with the defined message length in the procedure definition it shall be responded with a failure message stating “FormatError” as the cause of failure. The response message shall be to the initiating message identified by the procedure code;
- If a secondary device in the OperatingMode state is receiving a procedure message which addressed device subunit does not exist “FormatError” shall be returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.2.3 Parallel procedure handling
|
The secondary device shall support parallel execution of in maximum one additional EP only in parallel to one of the Time-Consuming Procedures defined in table 6.2.3.1:
Table 6.2.3.1: Definition of TCPs and the execution of procedures in parallel to a TCP
Elementary Procedure
TCP
Execution in parallel to a TCP
Common Procedure Set
(Reserved)
Reset Software
no
mandatory
Get Alarm Status
no
mandatory
Get Information
no
mandatory
Clear Active Alarms
no
disallowed
Read User Data
no
optional
Write User Data
no
optional
Alarm Subscribe
no
optional
Self Test
yes
disallowed
Download Start
no
disallowed
Download Application
no
disallowed
Download End
no
disallowed
Vendor specific procedure
vendor specific
optional
Single-Antenna Procedure Set
Set Device Data
no
optional
Get Device Data
no
optional
Calibrate
yes
disallowed
Send Configuration Data
no
disallowed
Set Tilt
yes
disallowed
Get Tilt
no
optional
Alarm Indication
no
optional
Multi-Antenna Procedure Set
Antenna Calibrate
yes
optional
Antenna Send Configuration Data
no
disallowed
Antenna Set Tilt
yes
optional
Antenna Get Tilt
no
optional
Antenna Set Device Data
no
optional
Antenna Get Device Data
no
optional
Antenna Alarm Indication
no
optional
Antenna Clear Active Alarms
no
disallowed
Antenna Get Alarm Status
no
mandatory
Antenna Get Number of Antennas
no
mandatory
“yes” in the "TCP" column indicates that the procedure is a TCP, “no“ in the "TCP" column indicates that the procedure is not a TCP. “mandatory” in the "Execution in parallel to a TCP" column indicates that the procedure shall be executed in parallel to an ongoing TCP. “optional” in this column indicates, that the support of the execution of the procedure in parallel to an ongoing TCP is optional and “disallowed” indicates that the procedure shall not be executed in parallel to a TCP.
If a secondary device receives an initiating message for an EP which cannot be executed due to the ongoing execution of other EPs, the secondary device shall respond with a failure message stating “Busy” as the cause of failure.
Parallel execution of one TCP marked “optional” in the "Execution in parallel to a TCP" column in table 6.2.3.1 may be supported for each antenna by the secondary device. The EPs AntennaSetTilt and AntennaCalibrate shall be executed in parallel only for different antenna numbers. If more than one TCP is executed, ResetSoftware shall be executed anyway and never be responded with “Busy”.
If the EPs Get Tilt and Antenna GetTilt are executed in parallel with a TCP, their response message shall deliver a tilt value sampled during their execution.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.3 Overview of elementary procedures
|
The set of elementary procedures for RET antenna control provides procedure-oriented instructions. An overview of the procedures is given in annex D. Table 6.3.1 lists all common elementary procedures described in subclause 6.5. Table 6.3.2 lists all elementary procedures specific for single-antenna device types described in subclause 6.6. Table 6.3.3 lists all elementary procedures specific for multi-antenna device types described in subclause 6.7. subclause 6.4 describes how to interpret the elementary procedure definitions in subclauses 6.5 to 6.7.
Some elementary procedures shall be performed in sequence as described in Annex C for the software download.
Table 6.3.1: Common elementary procedure set for all device types
Elementary procedure
Requirement
Comment
Reset Software
mandatory
Get Alarm Status
mandatory
Get Information
mandatory
Clear Active Alarms
mandatory
Alarm Subscribe
mandatory
Read User Data
mandatory
Write User Data
mandatory
Self Test
mandatory
Download Start
optional
This procedure is mandatory if the software download feature is supported
Download Application
optional
This procedure is mandatory if the software download feature is supported
Download End
optional
This procedure is mandatory if the software download feature is supported
Vendor specific procedure
optional
Table 6.3.2: Elementary procedure set for single-antenna device type
Elementary procedure
Requirement
Comment
Calibrate
mandatory
Send Configuration Data
mandatory
Set Tilt
mandatory
Get Tilt
mandatory
Alarm Indication
mandatory
Set Device Data
mandatory
Get Device Data
mandatory
Table 6.3.3: Elementary procedure set for multi-antenna device type
Elementary procedure
Requirement
Comment
Antenna Calibrate
mandatory
Antenna Send Configuration Data
mandatory
Antenna Set Tilt
mandatory
Antenna Get Tilt
mandatory
Antenna Set Device Data
mandatory
Antenna Get Device Data
mandatory
Antenna Alarm Indication
mandatory
Antenna Clear Active Alarms
mandatory
Antenna Get Alarm Status
mandatory
Antenna Get Number Of Antennas
mandatory
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.4 Description of elementary procedures
|
Table 6.4.1: Description of elementary procedures
Name:
The name used to refer to the elementary procedure
Code:
The code is defined here. All other code references are informative
Issued by:
Primary device or secondary device
Procedure class:
Class 1 or Class 2
DownloadMode state:
Defines whether the procedure shall be supported in the DownloadMode state.
Power mode:
Defines the secondary device power consumption as described in [4] during the execution of the elementary procedure.
Table 6.4.2: Initiating and response message parameters and format
Number
Length
Type
Description
The enumerated order in which the parameter occurs in the data field of the message. The first number is 1.
The length of the parameter, in number of octets, if defined.
The data type used in the parameter.
Description of the parameter.
Table 6.4.3: Response message parameters and format for common class 1
elementary procedures upon error
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code FAIL
2
1 octet
ReturnCode
Reason for failure
Table 6.4.4: Response message parameters and format for single-antenna class 1 elementary procedures upon error
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code FAIL
2
1 octet
ReturnCode
Reason for failure
Table 6.4.5: Response message parameters and format for multi-antenna class 1 elementary procedures upon error
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code FAIL
3
1 octet
ReturnCode
Reason for failure
NOTE: The response message in the elementary procedure AntennaGetAntennaNumber, has the format given in table 6.4.4, although it is defined as a multi-antenna class 1 elementary procedure.
Description:
Describes the purpose of the elementary procedure.
Table 6.4.6: Return codes
OK
FAIL
Comment
All return codes applicable in a response message to a successful procedure, except “OK”, are listed here. The return codes are listed by name as defined in annex A.
All return codes applicable in a response message to a failing procedure, except “FAIL” are listed here. The return codes are listed by name as defined in annex A.
Any comment needed for clarification.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5 Common elementary procedures
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.1 Reset Software
|
Table 6.5.1.1: Elementary procedure Reset Software
Name:
ResetSoftware
Code:
0x03
Issued by:
Primary device
Procedure class:
1
DownloadMode state.
Yes
Power mode:
Low
Table 6.5.1.2: Initiating message parameters and format for Reset Software
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.1.3: Response message parameters and format for Reset Software
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On the receipt of the initiating message the secondary device shall reset the application. All alarm states shall be cleared.
If the initiating message is received in the OperatingMode state, the transport layer shall remain unaffected.
If the initiating message is received in the DownloadMode state, the ResetSoftware procedure shall reset the entire device without activating any new application software downloaded since entering the DownloadMode state.
The device shall not execute the reset procedure before transport layer acknowledgement through sequence number update is received for the response.
Table 6.5.1.4: Return codes for Reset Software
OK
FAIL
Comment
FormatError
In case of format error, the procedure code validity is not secured.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.2 Get Alarm Status
|
Table 6.5.2.1: Elementary procedure Get Alarm Status
Name:
GetAlarmStatus
Code:
0x04
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.2.2: Initiating message parameters and format for Get Alarm Status
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.2.3: Response message parameters and format for Get Alarm Status
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
i + 1
1 octet
AlarmCode
Active alarm number i
i = 1 … N
Description:
On receipt of the initiating message the secondary device reports the alarm codes of the active alarms.
Table 6.5.2.4: Return codes for Get Alarm Status
OK
FAIL
Comment
All return codes marked as used for alarms in Annex A.
FormatError
WorkingSoftwareMissing
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.3 Get Information
|
Table 6.5.3.1: Elementary procedure Get Information
Name:
GetInformation
Code:
0x05
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.3.2: Initiating message parameters and format for Get Information
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.3.3: Response message parameters and format for Get Information
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
1 octet
Unsigned integer
Length of parameter 3 in number of octets
3
TextString
Product number
4
1 octet
Unsigned integer
Length of parameter 5 in number of octets
5
TextString
Serial number
6
1 octet
Unsigned integer
Length of parameter 7 in number of octets
7
TextString
Hardware Version
8
1 octet
Unsigned integer
Length of parameter 9 in number of octets
9
TextString
Software Version
Description:
On receipt of the initiating message the secondary device shall return the product number ProdNr and the serial number SerNr of the secondary device. If known, also the hardware version and the software version may be returned. The software version should indicate the version number of the currently executed software.
The parameters HWVersion and SWVersion in the response message refer to the version designators of the hardware and installed software of the secondary device. If the application is missing or no HW or SW version number is found, then an empty string shall be returned as the HW or SW version number. The empty string is represented as a length field equals 0 and no octets in the TextString field.
The response message length shall be less than or equal to the minimum SecondaryPayloadTransmitLength as given in subclause 4.8.1 in [3].
Table 6.5.3.4: Return codes for Get Information
OK
FAIL
Comment
FormatError
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.4 Clear Active Alarms
|
Table 6.5.4.1: Elementary procedure Clear Active Alarms
Name:
ClearActiveAlarms
Code:
0x06
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.4.2: Initiating message parameters and format for Clear Active Alarms
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.4.3: Response message parameters and format for Clear Active Alarms
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall first clear all stored alarm information and then return a procedure response message.
Table 6.5.4.4: Return codes for Clear Active Alarms
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.5 Alarm Subscribe
|
Table 6.5.5.1: Elementary procedure Alarm Subscribe
Name:
AlarmSubscribe
Code:
0x12
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.5.2: Initiating message parameters and format for Alarm Subscribe
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.5.3: Response message parameters and format for Alarm Subscribe
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall start reporting alarms to the primary device.
Table 6.5.5.4: Return codes for Alarm Subscribe
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.6 Self Test
|
Table 6.5.6.1: Elementary procedure Self Test
Name:
SelfTest
Code:
0x0A
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.5.6.2: Initiating message parameters and format for Self Test
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.6.3: Response message parameters and format for Self Test
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
i + 1
1 octet
AlarmCode
Alarm code for alarm i detected during self test.
i = 1 … N
Description:
On receipt of the initiating message the secondary device shall execute a test procedure which may include a check of physical and processor functions. The specific tests to be performed are implementation specific, and may include the movement of the adjuster, which shall not exceed +-5% of total available tilting range starting from the current adjuster position.
The response message of the secondary device on the procedure provides information on detected faults or, if no fault is detected, with confidence that the operation of the device is normal in all respects.
During the test the operational parameters of the device shall not change beyond operationally acceptable limits and on completion all parameters shall be returned to their initial values.
In the normal response message, after the self test was executed successfully, the return codes are set to report possible detected faults during the self test. If no faults are detected, this shall be signalled by no return codes following the return code <OK>.
In the case of a failure response message, the self test could not be executed successfully and the reported return code relates to the inability of the device to perform the requested self-test operation.
Table 6.5.6.4: Return codes for Self Test
OK
FAIL
Comment
All return codes marked as alarms in annex A.
FormatError
Busy
WorkingSoftwareMissing
NotCalibrated
NotScaled
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.7 Void
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.8 Void
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.9 Read User Data
|
Table 6.5.9.1: Elementary procedure Read User Data
Name:
ReadUserData
Code:
0x10
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.9.2: Initiating message parameters and format for Read User Data
Number
Length
Type
Description
1
2 octets
Unsigned integer
Memory offset
2
1 octet
Unsigned integer
Number of octets to read
NOTE: Number of octets to read shall be less than, or equal toMaxDataTransmit Length minus 1.
Table 6.5.9.3: Response message parameters and format for Read User Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
Number of octets given by parameter 2 of the initiating message
User specific
User data
Description:
On receipt of the initiating message the secondary device shall send back user specific data stored in a user data area to the primary device.
The user data area is intended for storage of user defined data, e.g. inventory information.
Table 6.5.9.4: Return codes for Read User Data
OK
FAIL
Comment
FormatError
WorkingSoftwareMissing
OutOfRange
The return code OutOfRange is used, if the given memory address range is outside the valid address space.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.10 Write User Data
|
Table 6.5.10.1: Elementary procedure Write User Data
Name:
WriteUserData
Code:
0x11
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.5.10.2: Initiating message parameters and format for Write User Data
Number
Length
Type
Description
1
2 octets
Unsigned integer
Memory offset
2
1 octet
Unsigned integer
Number of octets to write
3
Message specific, given by parameter 2
User specific
Data to write
NOTE: Number of octets to write shall be less than, or equal to MaxDataReceiveLength minus 3.
Table 6.5.10.3: Response message parameters and format for Write User Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall store user data in non-volatile memory. The user data is stored in the user data area using the relative memory address offset given in the initiating message and starting with zero.
The user data area is intended for storage of user defined data, e.g. inventory information.
Table 6.5.10.4: Return codes for Write User Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
HardwareError
OutOfRange
The return code OutOfRange is used if the given memory address range is outside the valid address space.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.11 Download Start
|
Table 6.5.11.1: Elementary procedure Download Start
Name:
DownloadStart
Code:
0x40
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.11.2: Initiating message parameters and format for Download Start
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.11.3: Response message parameters and format for Download Start
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of this initiating message the software download process shall be initiated. Following transition to the DownloadMode state, the secondary device sends return code <OK>. Previous subscription of alarms by use of the AlarmSubscribe procedure is cancelled.
Table 6.5.11.4: Return codes for Download Start
OK
FAIL
Comment
FormatError
Busy
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.12 Download Application
|
Table 6.5.12.1: Elementary procedure Download Application
Name:
DownloadApplication
Code:
0x41
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.12.2: Initiating message parameters and format for Download Application
Number
Length
Type
Description
1
Less than, or equal to MaxDataReceiveLength
Vendor specific
Software data
Table 6.5.12.3: Response message parameters and format for Download Application
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
This elementary procedure is used once or several times to transfer software data from the primary device to the secondary device.
Table 6.5.12.4: Return codes for Download Application
OK
FAIL
Comment
FormatError
Busy
HardwareError
InvalidFileContent
InvalidProcedureSequence
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.13 Download End
|
Table 6.5.13.1: Elementary procedure Download End
Name:
DownloadEnd
Code:
0x42
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
Yes
Power mode:
Low
Table 6.5.13.2: Initiating message parameters and format for Download End
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.5.13.3: Response message parameters and format for Download End
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
This elementary procedure signals the end of a multi-message data transfer to the secondary device. The secondary device shall respond after verifying the received data. The secondary device shall reset autonomously after completion of the layer 2 response and activate the new application software.
Table 6.5.13.4: Return codes for Download End
OK
FAIL
Comment
FormatError
Busy
HardwareError
ChecksumError
InvalidFileContent
InvalidProcedureSequence
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.5.14 Vendor specific procedure
|
Table 6.5.14.1: Elementary procedure Vendor Specific Procedure
Name:
VendorSpecificProcedure
Code:
0x90
Issued by:
Vendor specific
Procedure class:
Vendor specific
DownloadMode state:
Vendor specific
Power mode:
Vendor specific
Table 6.5.14.2: Initiating message parameters and format for Vendor Specific Procedure
Number
Length
Type
Description
1
2 octets
ASCII
Vendor code
1 + i
Vendor specific
Vendor specific
i = 1 … N
Table 6.5.14.3: Response message parameters and format for Vendor Specific Procedure
Number
Length
Type
Description
i
Vendor specific
Vendor specific
Vendor specific
i = 1 … N
Description:
The vendor specific procedure is intended for vendor specific purposes like e.g. testing.
Table 6.5.14.4: Return codes for vendor specific procedure
OK
FAIL
Comment
FormatError
UnsupportedProcedure
If the Vendor code in the initiating message does not match that of the RET device, UnsupportedProcedure shall be returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6 Single-antenna elementary procedures
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.1 Calibrate
|
Table 6.6.1.1: Elementary procedure Calibrate
Name:
Calibrate
Code:
0x31
Issued by:
Primary Device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.6.1.2: Initiating message parameters and format for Calibrate
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.6.1.3: Response message parameters and format for Calibrate
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall perform a calibration of the RET antenna where the actuator is driven through its whole tilt range.
The response time to this Calibrate procedure shall be less than 4 minutes.
Table 6.6.1.4: Return codes for Calibrate
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.2 Send Configuration Data
|
Table 6.6.2.1: Elementary procedure Send Configuration Data
Name:
SendConfigurationData
Code:
0x32
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.2.2: Initiating message parameters and format for Send Configuration Data
Number
Length
Type
Description
1
Less than, or equal to MaxDataReceiveLength
Vendor specific
Configuration data
Table 6.6.2.3: Response message parameters and format for Send Configuration Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall store the provided vendor and antenna specific configuration data for the relationship between the movement of the drive system and the beam tilt position of the antenna.
If the configuration data exceeds MaxDataReceiveLength, the data shall be split into a number of MaxDataReceiveLength segments and one final segment with whatever is left. The primary device transmits the segments in order. The layer 2 sequence numbers guarantee that no segment will be lost or received out of order.
Table 6.6.2.4: Return codes for Send Configuration Data
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
ChecksumError
InvalidFileContent
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.3 Set Tilt
|
Table 6.6.3.1: Elementary procedure Set Tilt
Name:
SetTilt
Code:
0x33
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.6.3.2: Initiating message parameters and format for Set Tilt
Number
Length
Type
Description
1
2 octets
Signed integer
Tilt value
Table 6.6.3.3: Response message parameters and format for Set Tilt
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall set the electrical tilt in increments of 0.1°.
The secondary device shall respond to the initiating message in less than 2 minutes.
The tilt value corresponding to the actual tilt angle shall not go outside of the range between the tilt value corresponding to the current tilt angle and the tilt value corresponding to the requested tilt angle by more than 5 during this operation.
The format of the value of parameter 1 is given in subclause 3.1.
Table 6.6.3.4: Return codes for Set Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
NotCalibrated
OutOfRange
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.4 Get Tilt
|
Table 6.6.4.1: Elementary procedure Get Tilt
Name:
GetTilt
Code:
0x34
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.4.2: Initiating message parameters and format for Get Tilt
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.6.4.3: Response message parameters and format for Get Tilt
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
2 octets
Signed integer
Tilt value
Description:
On receipt of the initiating message the secondary device shall return the current tilt value.
The returned tilt value is given in the format specified in subclause 3.1.
Table 6.6.4.4: Return codes for Get Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
NotCalibrated
NotConfigured
UnsupportedProcedure
HardwareError shall only be used, if error is detected in tilt detector.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.5 Alarm Indication
|
Table 6.6.5.1: Elementary procedure Alarm Indication
Name:
AlarmIndication
Code:
0x07
Issued by:
Secondary device
Procedure class:
2
DownloadMode state:
No
Power mode:
Low
Table 6.6.5.2: Initiating message parameters and format for Alarm Indication
Number
Length
Type
Description
2 i – 1
1 octet
Unsigned integer
Return code i; see annex A
2 i
1 octet
Unsigned integer
State flag i
i = 1 … N
Description:
The secondary device uses this procedure to report alarm state changes to the primary device. This procedure shall only be performed if the secondary has performed an AlarmSubscribe procedure since its latest reset.
For each alarm, the current alarm state and alarm code shall be reported if and only if any change in its state has occurred during the period of time since the last reported state. An AlarmIndication procedure shall be performed if at least one alarm shall be reported. The first AlarmIndication procedure after the AlarmSubscribe procedure shall report the active alarms.
Alarm state changes are considered as reported at the time the message is passed to the transport layer.
State flag = 0 represents alarm state cleared.
State flag = 1 represents alarm state raised.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.6 Set Device Data
|
Table 6.6.6.1: Elementary procedure Set Device Data
Name:
SetDeviceData
Code:
0x0E
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.6.2: Initiating message parameters and format for Set Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Field number, see annex B
2
See annex B
See annex B
Data to write
Table 6.6.6.3: Response message parameters and format for Set Device Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall write the data given in the parameters of the initiating message into the fields optionally provided for configuration data and listed in annex B of this TS. If an attempt is made to write to fields which are designated as read only, the return code ReadOnly is returned and the data for those fields is ignored. If an attempt is made to write to fields which are not supported by the device the return code UnknownParameter is returned and the data for those fields is ignored.
Table 6.6.6.4: Return codes for Set Device Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
HardwareError
ReadOnly
UnknownParameter
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.6.7 Get Device Data
|
Table 6.6.7.1: Elementary procedure Get Device Data
Name:
GetDeviceData
Code:
0x0F
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.6.7.2: Initiating message parameters and format for Get Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Field number; see annex B
Table 6.6.7.3: Response message parameters and format for Get Device Data
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
See annex B
See annex B
Field value
Description:
In this procedure the secondary device shall return the data stored in the field for configuration data specified by the field number in the procedure and listed in annex B of this TS.
Table 6.6.7.4: Return codes for Get Device Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
UnknownParameter
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7 Multi-antenna elementary procedures
| |
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.1 Antenna Calibrate
|
Table 6.7.1.1: Elementary procedure Antenna Calibrate
Name:
AntennaCalibrate
Code:
0x80
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.7.1.2: Initiating message parameters and format for Antenna Calibrate
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
Table 6.7.1.3: Response message parameters and format for Antenna Calibrate
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall perform a calibration of the antenna addressed by the antenna number. During calibration the actuator is driven through the whole tilt range of the antenna.
The response time to this Antenna Calibrate procedure shall be less than 4 minutes.
Table 6.7.1.4: Return codes for Antenna Calibrate
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.2 Antenna Set Tilt
|
Table 6.7.2.1: Elementary procedure Antenna Set Tilt
Name:
AntennaSetTilt
Code:
0x81
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
High
Table 6.7.2.2: Initiating message parameters and format for Antenna Set Tilt
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
2 octets
Signed integer
Tilt value
Table 6.7.2.3: Response message parameters and format for Antenna Set Tilt
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall set the electrical tilt of the antenna addressed by the antenna number in increments of 0.1°.
The secondary device shall respond to the initiating message in less than 2 minutes.
The tilt value corresponding to the actual tilt angle shall not go outside of the range between the tilt value corresponding to the current tilt angle and the tilt value corresponding to the requested tilt angle by more than 5 during this operation.
The format of the value of parameter 2 is given in subclause 3.1.
Table 6.7.2.4: Return codes for Antenna Set Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
MotorJam
ActuatorJam
NotConfigured
NotCalibrated
OutOfRange
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.3 Antenna Get Tilt
|
Table 6.7.3.1: Elementary procedure Antenna Get Tilt
Name:
AntennaGetTilt
Code:
0x82
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.3.2: Initiating message parameters and format for Antenna Get Tilt
Number
Length
Type
Description
1
1 octet
Unsigned interger
Antenna number
Table 6.7.3.3: Response message parameters and format for Antenna Get Tilt
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
3
2 octets
Signed integer
Tilt value
Description:
On receipt of the initiating message the secondary device shall return the current tilt value of the antenna addressed by the antenna number.
The returned tilt value is in the format specified in subclause 3.1.
Table 6.7.3.4: Return codes for Antenna Get Tilt
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
NotConfigured
NotCalibrated
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
HardwareError shall only be used, if an error is detected in tilt detector.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.4 Antenna Set Device Data
|
Table 6.7.4.1: Elementary procedure Antenna Set Device Data
Name:
AntennaSetDeviceData
Code:
0x83
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.4.2: Initiating message parameters and format for Antenna Set Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
Unsigned integer
Field number; see annex B
3
See annex B
See annex B
Data to write
Table 6.7.4.3: Response message parameters and format for Antenna Set Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall write the provided data for the antenna addressed by the antenna number into the fields optionally provided for configuration data and listed in annex B of this TS. If an attempt is made to write to fields which are designated as read only for the addressed antenna the return code ReadOnly is returned and the data for those fields is ignored. If an attempt is made to write to fields which are not supported for the addressed antenna the return code UnknownParameter is returned and the data for those fields is ignored.
Table 6.7.4.4: Return codes for Antenna Set Device Data
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
ReadOnly
UnknownParameter
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.5 Antenna Get Device Data
|
Table 6.7.5.1: Elementary procedure Antenna Get Device Data
Name:
AntennaGetDeviceData
Code:
0x84
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.5.2: Initiating message parameters and format for Antenna Get Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
Unsigned integer
Field number to read; see annex B
Table 6.7.5.3: Response message parameters and format for Antenna Get Device Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
3
See annex B
See annex B
Field value
Description:
On receipt of the initiating message the secondary device shall return the data stored for the addressed antenna in the field for configuration data specified by the field number in the initiating message and listed in annex B of this TS.
Table 6.7.5.4: Return codes for Antenna Get Device Data
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
UnsupportedProcedure
UnknownParameter
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.6 Antenna Alarm Indication
|
Table 6.7.6.1: Elementary procedure Antenna Alarm Indication
Name:
AntennaAlarmIndication
Code:
0x85
Issued by:
Secondary device
Procedure class:
2
DownloadMode state:
No
Power mode:
Low
Table 6.7.6.2: Initiating message parameters and format for Antenna Alarm Indication
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2 i
1 octet
Unsigned integer
Return code i; see annex A
2 i +1
1 octet
Unsigned integer
State flag i
i = 1 … N
Description:
The multi-antenna secondary device uses this procedure to report antenna alarm state changes to the primary device. This procedure shall only be performed if the secondary has performed an AlarmSubscribe procedure since its latest reset. Multi-antenna devices shall use this AntennaAlarmIndication procedure only for multi-antenna specific alarms and the AlarmIndication procedure in subclause 6.6.5 for the other alarms.
For each alarm, the current alarm state and alarm code shall be reported if and only if any change in its state has occurred during the period of time since the last reported state. An AntennaAlarmIndication procedure shall be performed if at least one multi-antenna specific alarm shall be reported. The first AntennaAlarmIndication procedure after the AlarmSubscribe procedure shall report the active alarms.
Alarm state changes are considered as reported at the time the message is passed to the transport layer.
State flag = 0 represents alarm state cleared.
State flag = 1 represents alarm state raised.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.7 Antenna Clear Active Alarms
|
Table 6.7.7.1: Elementary procedure Antenna Clear Active Alarms
Name:
AntennaClearActiveAlarms
Code:
0x86
Issued by:
Secondary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.7.2: Initiating message parameters and format for Antenna Clear Active Alarms
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
Table 6.7.7.3: Response message parameters and format for Antenna Clear Active Alarms
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall first clear all stored alarm information for the addressed antenna and then return a procedure response message.
Table 6.7.7.4: Return codes for Antenna Clear Active Alarms
OK
FAIL
Comment
FormatError
Busy
WorkingSoftwareMissing
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.8 Antenna Get Alarm Status
|
Table 6.7.8.1: Elementary procedure Antenna Get Alarm Status
Name:
AntennaGetAlarmStatus
Code:
0x87
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.8.2: Initiating message parameters and format for Antenna Get Alarm Status
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
Table 6.7.8.3: Response message parameters and format for Antenna Get Alarm Status
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
i + 2
1 octet
AlarmCode
Active alarm number i
i = 1 ... N
Description:
On receipt of the initiating message the secondary device shall report the alarm codes of the active alarms for the addressed antenna.
Table 6.7.8.4: Return codes for Antenna Get Alarm Status
OK
FAIL
Comment
All return codes marked as used for alarms in Annex A
FormatError
WorkingSoftwareMissing
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.9 Antenna Get Number Of Antennas
|
Table 6.7.9.1: Elementary procedure Antenna Get Number Of Antennas
Name:
AntennaGetNumberOfAntennas
Code:
0x88
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.9.2: Initiating message parameters and format for Antenna Get Number Of Antennas
Number
Length
Type
Description
None
0 octets
None
No data carried
Table 6.7.9.3: Response message parameters and format for Antenna Get Number Of Antennas
Number
Length
Type
Description
1
1 octet
ReturnCode
Return code OK
2
1 octet
Unsigned integer
Number of antennas
Description:
On receipt of the initiating message the secondary device shall return the number of antennas it controls.
Table 6.7.9.4: Return codes for Antenna Get Number Of Antennas
OK
FAIL
Comment
FormatError
WorkingSoftwareMissing
UnsupportedProcedure
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
6.7.10 Antenna Send Configuration Data
|
Table 6.7.10.1: Elementary procedure Antenna Send Configuration Data
Name:
AntennaSendConfigurationData
Code:
0x89
Issued by:
Primary device
Procedure class:
1
DownloadMode state:
No
Power mode:
Low
Table 6.7.10.2: Initiating message parameters and format for Antenna Send Configuration Data
Number
Length
Type
Description
1
1 octet
Unsigned Integer
Antenna number
2
Less than, or equal to MaxDataReceiveLength minus 1
Vendor specific
Configuration data
Table 6.7.10.3: Response message parameters and format for Antenna Send Configuration Data
Number
Length
Type
Description
1
1 octet
Unsigned integer
Antenna number
2
1 octet
ReturnCode
Return code OK
Description:
On receipt of the initiating message the secondary device shall store the provided vendor and antenna specific configuration data for the relationship between the movement of the drive system and the beam tilt position of the addressed antenna.
If the configuration data exceeds MaxDataReceiveLength minus 1, the data shall be split into a number of MaxDataReceiveLength minus 1 segments and one final segment with whatever is left. The primary device transmits the segments in order. The layer 2 sequence numbers guarantee that no segment will be lost or received out of order.
Table 6.7.10.4: Return codes for Antenna Send Configuration Data
OK
FAIL
Comment
FormatError
Busy
HardwareError
WorkingSoftwareMissing
ChecksumError
InvalidFileContent
UnsupportedProcedure
If the addressed antenna is not existing, FormatError is returned.
|
1de16545e4a78484b5596a06529f4503
|
25.463
|
7 Unknown elementary procedures
|
Void.
Annex A (normative):
Return codes for secondary devices
Table A.1: Return Codes for Secondary Devices
Code
Meaning
Alarm
DownloadMode state
0x00
OK
Normal response
X
0x02
Motor Jam
Motor cannot move
X
0x03
ActuatorJam
Actuator jam has been detected. No movement of the actuator, but movement of the motor was detected
X
0x05
Busy
The device is busy and cannot respond until an ongoing activity is completed
0x06
ChecksumError
Checksum incorrect for otherwise valid data..
0x0B
FAIL
Abnormal response. Indicates that a procedure has not been executed successfully
X
0x0E
NotCalibrated
The device has not completed a calibration operation, or calibration has been lost
X
0x0F
NotConfigured
Actuator configuration data is missing
X
0x11
HardwareError
Any hardware error which cannot be classified. May not be reported as an alarm until the fault is likely to be persistent
X
X
0x13
OutOfRange
A parameter given by an operator (e.g. tilt value or memory offset) is out of range
0x19
UnknownProcedure
Received procedure code is not defined
X
0x1D
ReadOnly
Invalid device data parameter usage
X
0x1E
UnknownParameter
Specified parameter is not supported for the used procedure
X
0x21
WorkingSoftwareMissing
The unit is inDownloadMode state. Returned upon unsupported procedure when in DownloadMode state
X
0x22
InvalidFileContent
The data being downloaded is detected to be of wrong format or size
X
0x24
FormatError
Procedure message is inconsistent or if an addressed field or antenna is invalid or the data parameter field length is inconsistent with the corresponding field length parameter
X
0x25
UnsupportedProcedure
The procedure is optional and not supported or the procedure does not apply to this device type
0x26
InvalidProcedureSequence
Procedure sequence as described in annex C is expected but not experienced by the secondary device
0x27
ActuatorInterference
An actuator movement outside the control of the RET unit has been detected. Probable cause is manual interference
X
Annex B (normative):
Assigned fields for additional data
The following standard fields have no operational impact and are used by the procedures SetDeviceData, GetDeviceData, AntennaSetDeviceData and AntennaGetDeviceData. Little endian order is used for storage of multiple-octet numbers. Where ASCII variables are shorter than the assigned field lengths the characters are right aligned and leading blanks are filled with null characters (0x00).
Table B.1: Assigned fields for additional data
Field No.
Length (octets)
Format
Description
0x01
15
ASCII
Antenna model number
0x02
17
ASCII
Antenna serial number
0x03
2
16-bit unsigned
Antenna operating band(s): see below
0x04
8
4 x 16-bit unsigned
Beamwidth for each operating band in band order (deg), beginning with lowest band. The lowest band is transmitted within the first 16-bit value. (unused values are assigned to 0x0000)
(example: width for band I, width for band III)
0x05
4
4 x 8-bit unsigned
Gain [dBi] for each operating band in band order , expressed in gain value times 10 , beginning with the lowest band. The lowest band is transmitted within the first 8-bit value. (unused values are assigned to 0x00)
(example: gain for band I, gain for band III)
0x06
2
16-bit signed
Maximum supported electrical tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1
0x07
2
16-bit signed
Minimum supported electrical tilt tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1
0x21
6
ASCII
Installation date
0x22
5
ASCII
Installer's ID
0x23
32
ASCII
Base station ID
0x24
32
ASCII
Sector ID
0x25
2
16-bit unsigned
Antenna bearing [degree], in the range of 0 – 359,9 degree, expressed as bearing value times 10
0x26
2
16-bit signed
Installed mechanical tilt [degree], expressed in tilt value times 10 , format as in subclause 3.1
Table B.2: Coding for operating bands in field 0x03
Bit no
15…10
9
8
7
6
5
4
3
2
1
0
Operating band
Spare
X
IX
VIII
VII
I
II
III
IV
V
VI
The operating bands are defined in subclause 4.3.7 in [4].
Bits are numbered from 0 to 15, bit no 0 set=1 represents the value 0x0001.
Bit set=1 represents operating band is supported.
Bit set=0 represents operating band is not supported.
Spare bits shall be set=0.
Unused Beamwidth and Gain octets shall be set to 0x0000.
Examples of operating bands: 0000 0000 0001 0000 = Operating band II
0000 0000 0011 1000 = Operating band I, II and III
Annex C (normative):
Procedure sequence for download of software to a secondary device
Figure C.1: Procedure sequence for Software Download
The erasure of the secondary device application software shall not be done before the reception of the Download Application message. The data content of the Download Application message is implementation specific but it is recommended to support an application software validity feature that shall minimise the risk of downloading faulty or invalid application software.
Annex D (informative):
Overview of elementary procedures
Table D.1: Elementary Procedures and Procedure Codes
Elementary Procedure
Procedure Code
Issued by
DownloadMode state
Common Procedure Set
(Reserved)
0x01
Reset Software
0x03
primary device
yes
Get Alarm Status
0x04
primary device
no
Get Information
0x05
primary device
yes
Clear Active Alarms
0x06
primary device
no
Read User Data
0x10
primary device
no
Write User Data
0x11
primary device
no
Alarm Subscribe
0x12
primary device
no
Self Test
0x0A
primary device
no
Download Start
0x40
primary device
yes
Download Application
0x41
primary device
yes
Download End
0x42
primary device
yes
Vendor Specific Procedure
0x90
primary device
Vendor specific
Single-Antenna Procedure Set
Set Device Data
0x0E
primary device
no
Get Device Data
0x0F
primary device
no
Calibrate
0x31
primary device
no
Send Configuration Data
0x32
primary device
no
Set Tilt
0x33
primary device
no
Get Tilt
0x34
primary device
no
Alarm Indication
0x07
secondary device
no
Multi-Antenna Procedure Set
Antenna Calibrate
0x80
primary device
no
Antenna Send Configuration Data
0x89
primary device
no
Antenna Set Tilt
0x81
primary device
no
Antenna Get Tilt
0x82
primary device
no
Antenna Set Device Data
0x83
primary device
no
Antenna Get Device Data
0x84
primary device
no
Antenna Alarm Indication
0x85
secondary device
no
Antenna Clear Active Alarms
0x86
primary device
no
Antenna Get Alarm Status
0x87
primary device
no
Antenna Get Number of Antennas
0x88
primary device
no
NOTE: The notion "yes" in the DownloadMode state column indicates that the listed procedures are mandatory if the DownloadMode state can be entered by the secondary device.
Annex E (informative):
Change history
Change history
Date
TSG #
TSG Doc.
CR
Rev
Subject/Comment
Old
New
September 2004
TSG-RAN#25
RP-040346
_
_
presentation to TSG-RAN for information
_
1.0.0
September 2004
TSG-RAN#25
RP-040346
_
_
approved at TSG-RAN#25 and placed under change control
1.0.0
6.0.0
12/2004
26
RP-040445
1
2
Reduction of risk of accidentional erasure of Ret application SW
6.0.0
6.1.0
12/2004
26
RP-040445
2
-
Clarification of allowed tilt operation during self test
6.0.0
6.1.0
12/2004
26
RP-040445
3
-
State Model for RET device
6.0.0
6.1.0
12/2004
26
RP-040445
4
-
Corrections and editorial changes to 25.463 according to RAN3#44
6.0.0
6.1.0
12/2004
26
RP-040445
5
1
Antenna Send Configuration Data procedure missing
6.0.0
6.1.0
12/2004
26
RP-040445
7
1
Introduction of Software Download State model
6.0.0
6.1.0
12/2004
26
RP-040445
8
3
Alarm handling clarification
6.0.0
6.1.0
12/2004
26
RP-040445
9
2
RET DC power consumption clarification
6.0.0
6.1.0
12/2004
26
RP-040445
10
2
Response message format clarification
6.0.0
6.1.0
12/2004
26
RP-040445
12
2
Return code clean-up and clarification
6.0.0
6.1.0
12/2004
26
RP-040445
15
2
Clarification on the intention of the elementary procedures ReadUserData and WriteUserData
6.0.0
6.1.0
12/2004
26
RP-040445
16
2
Maximum data payload size in elementary procedures
6.0.0
6.1.0
12/2004
26
RP-040445
17
-
Definition of response time in the appication layer
6.0.0
6.1.0
12/2004
26
RP-040445
18
2
Redefinition of the Elementary Procedures GetDeviceData and SetDeviceData
6.0.0
6.1.0
03/2005
27
RP-050061
20
Wrong numbering in table 6.7.6.2
6.1.0
6.2.0
03/2005
27
RP-050061
23
1
Editorial Corrections to 25.463 after RAN3#45
6.1.0
6.2.0
03/2005
27
RP-050061
24
Minor Corrections to 25.463 after RAN3#45
6.1.0
6.2.0
03/2005
27
RP-050061
25
2
Clarification on antenna movement during Set Tilt
6.1.0
6.2.0
03/2005
27
RP-050061
26
1
Redefinition or the Software Reset procedure
6.1.0
6.2.0
06/2005
28
RP-050237
31
Antenna Set Device Data
6.2.0
6.3.0
06/2005
28
RP-050237
32
Editorial Corrections to 25.463
6.2.0
6.3.0
06/2005
28
RP-050237
35
Clarification of Tilt
6.2.0
6.3.0
06/2005
28
RP-050237
36
Definition of "empty string"
6.2.0
6.3.0
06/2005
28
RP-050237
37
Improvement of Annex B
6.2.0
6.3.0
06/2005
28
RP-050237
38
Vendor specific procedure
6.2.0
6.3.0
06/2005
28
RP-050237
39
2
Set Tilt Correction
6.2.0
6.3.0
06/2005
28
RP-050237
43
3
Parallel procedure handling
6.2.0
6.3.0
06/2005
28
RP-050237
48
Forward and backward compatibility clarification
6.2.0
6.3.0
06/2005
28
RP-050226
34
Introduction of UMTS 2.6 GHz frequency band definition
6.3.0
7.0.0
09/2005
29
RP-050439
54
Missing definitions for Vendor Specific EP
7.0.0
7.1.0
12/2005
30
RP-050703
55
Introduction of UMTS 900
7.1.0
7.2.0
12/2005
30
RP-050704
56
Introduction of UMTS 1700
7.1.0
7.2.0
06/2006
32
RP-060286
58
1
Return codes in response message
7.2.0
7.3.0
12/2006
34
RP-060704
59
Introduction of Band X (Extended UMTS 1.7/2.1 GHz) in 25.463
7.3.0
7.4.0
03/2007
35
RP-070055
61
1
Disregarded message length (paragraph 6.2.2)
7.4.0
7.5.0
03/2007
35
RP-070055
63
1
Correction of MaxDataReceiveLength
7.4.0
7.5.0
03/2007
35
RP-070055
65
3
Correction of procedure message interpretation
7.4.0
7.5.0
03/2007
35
RP-070055
67
1
Correction of additional data resolution description (Annex B)
7.4.0
7.5.0
03/2007
35
RP-070055
69
1
Definition of antenna bearing resolution (Annex B)
7.4.0
7.5.0
03/2007
35
RP-070055
71
1
Clarification of additional data beamwidth description
7.4.0
7.5.0
NOTE: Contents of the present TS is transferred to 3GPP TS 25.466, and 25.463 was closed at RAN#35. No further maintenance will be performed on the present document.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
1 Scope
|
Editor's note: clean up the scope in each part.
The present document is one of a multi-part TS, and contains objectives, requirements and test cases that are specific to the Lawful Interception elements of a 3GPP network: Administration Function (ADMF), Point of Interception (POI), Triggering Function (TF), Location Acquisition Requesting Function (LARF), Mediation and Delivery Function (MDF).
It refers to the TS 33.117 Catalogue of general security assurance requirements [2] and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique to the Lawful Interception system.
The present document covers SCAS tests for NF-embedded LI functions.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
2 References
|
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
- References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
- For a specific reference, subsequent revisions do not apply.
- For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications".
[2] 3GPP TS 33.117: "Catalogue of general security assurance requirements".
[3] 3GPP TS 33.916: "Security Assurance Methodology (SECAM) for 3GPP network products".
[4] 3GPP TS 33.926: "Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes".
[5] 3GPP TS 33.126: "Lawful Interception Requirements".
[6] 3GPP TS 33.127: "Lawful Interception (LI) architecture and functions".
[7] 3GPP TS 33.128: "Protocol and procedures for Lawful Interception (LI); Stage 3".
[8] Editor's Note: TODO: NESAS "How to"
[X] Editor's Note: TODO: Add TS 103-221-1
…
[x] <doctype> <#>[ ([up to and including]{yyyy[-mm]|V<a[.b[.c]]>}[onwards])]: "<Title>".
It is preferred that the reference to TR 21.905 be the first in the list.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
3 Definitions of terms, symbols and abbreviations
|
This clause and its three (sub) clauses are mandatory. The contents shall be shown as "void" if the TS/TR does not define any terms, symbols, or abbreviations.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
3.1 Terms
|
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1].
Definition format (Normal)
<defined term>: <definition>.
example: text used to clarify abstract rules by applying them literally.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
3.2 Symbols
|
For the purposes of the present document, the following symbols apply:
Symbol format (EW)
<symbol> <Explanation>
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
3.3 Abbreviations
|
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1].
Abbreviation format (EW)
<ABBREVIATION> <Expansion>
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
4 Overview
|
4.1 Approach
This TS was developed based on the guidance and methodology described in 3GPP TR 33.916 "Security Assurance Methodology (SECAM) for 3GPP network products" [3]. 3GPP has organized SCAS documents by publishing one TS per architectural network element. In contrast, we take a different approach in the LI space and collect all LI SCAS in the present TS.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
5 Prerequisites
|
5.1 Network administration
There are multiple privilege levels in the network. At a minimum, there are at least two:
• Lawful Interception privileged
• Non-LI privileged
Editor's Note: here are at least three categories at least: "root," "day-to-day operations," LI
Deployments in the field may split access more granularly, but this is the minimum required to perform tests in the present specification.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
6 NF-Embedded-LI SCAS
|
6.1 Introduction
The present clause contains requirements and test cases that pertain to NF-Embedded LI elements, such as POIs, TFs.
6.2 Requirements
The following TS 33.126 requirements are tested in the present document:
TS 33.126 R6.6-30: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
Editor's Note: This section will contain a full listing of requirements covered in this document.
6.3 Test cases
6.3.1 Baseline
6.3.1.1 Unauthorized detection of target under LI, log leak method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-LOG-01
Test case:
Test Name: TC_LI_EMBEDDED_LOG_LEAK
Purpose:
Ensure that general privileged administrators cannot detect whether an a-priori chosen subscriber is under LI.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared an account with sufficient privileges to access logs.
Execution Steps
Execute the following steps:
1. The tester notes the start time of the test, to be used later to pull the log that corresponds to the test period.
2. The tester starts a communication session from any user account and records any identifiers pertaining to this account.
3. The tester stops the communication session.
4. The tester pulls the logs from the NF for the period of the communication session.
5. The tester sets this log aside for later comparison with another.
6. The tester logs into the LI privileged account on the ADMF and sets up the same user account used in step 2 as an LI target.
7. The tester performs the same previous steps (1 through 5) from the LI target account.
8. The tester diffs the two logs.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester submits a human-readable diff and a plain-language conclusion whether the general privileged admin can use this log leak method to ascertain that LI is occurring.
6.3.1.2 Unauthorized detection of target under LI, configuration file method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-CONFIG-02
Test case:
Test Name: TC_LI_EMBEDDED_CONFIG_DIFF_ANALYSIS
Purpose:
Ensure that general privileged administrators (e.g., config reviewers, system auditors) cannot detect that interception is taking place by analysing configuration files before and after LI provisioning.
Editor's note: configuration aspects other than configuration files are not covered by this test case.
Procedure and execution steps:
Pre-Condition:
1. The tester has administrative access to a network element that contains a POI that supports configuration snapshots.
2. An LI system is available in the network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. The configuration mechanism is file-based or produces structured output (e.g., XML, YAML, JSON).
5. The system supports exporting these configurations.
Execution Steps
Execute the following steps:
1. The tester logs in using the general privileged account and exports a complete configuration snapshot.
2. The snapshot is timestamped and saved securely for later comparison.
3. The tester logs in using the LI privileged account and provisions an interception target.
4. The tester repeats the configuration export from the general privileged account.
5. The tester performs a diff on the two snapshots.
6. The tester inspects the diff for any structural or content-level indication that LI has been configured, including:
a. new service entries
b. altered service entries
c. any difference that could indicate LI activity
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester submits a human-readable diff and a plain language conclusion on whether any observed changes in config can be used to infer the presence of an LI target.
6.3.1.3 Unauthorized detection of LI, CPU utilization side-channel attack method one
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-RES-CPU-03
Test case:
Test Name: TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_CPU_METHOD_ONE
Purpose:
Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared appropriate CPU utilization monitoring tools. The availability of these depends on the platform. The following are offered as non-exhaustive examples: top, htop, mpstat, vmstat, iostat -c for physical hosts, or top, virsh domstats / virt-top, cgroups/systemd-cgtop, docker stats for virtual deployments.
Execution Steps
Execute the following steps:
1. The tester measures the CPU utilization on the host, notes the baseline.
2. The tester starts a new communication session as a regular network user, using any network user account.
3. The tester takes a new measurement of the CPU utilization, records the measurement, and calculates the delta between the baseline from step 1 and this new value. It is essential that these two measurements be as close in time as possible. An automated (scripted) process should be used to take multiple samples.
4. The tester inserts a new target into the LI stack, provisioning the interception for full content.
5. The tester repeats the above measurements steps.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
6.3.1.4 Unauthorized detection of LI, CPU utilization side-channel attack method two
|
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-RES-CPU-04
Test case:
Test Name: LI_EMBEDDED_UNAUTHORISED_INTERCEPTION_DETECTION_CPU_METHOD_TWO
Purpose:
Ensure that non-LI authorized network administrators cannot detect whether the LI function in an NF is performing interception.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a voice communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared appropriate CPU utilization monitoring tools. The availability of these depends on the platform. The following are offered as non-exhaustive examples: top, htop, mpstat, vmstat, iostat -c for physical hosts, or top, virsh domstats / virt-top, cgroups/systemd-cgtop, docker stats for virtual deployments.
Execution Steps
Execute the following steps:
1. The tester logs into the system from both the non-LI-authorized account and the LI-authorized account.
2. The tester measures the CPU utilization on the host, notes the baseline.
3. The tester conducts a call using a test device configured as a regular network user, and:
a. Continuously monitors the CPU utilization
b. Records the raw CPU utilization measurements at the following steps of the call:
i. STEP 1 (Initial INVITE is seen at the NF)
ii. STEP 2 (call is answered)
iii. STEP 3 (BYE is seen at the NF)
iv. STEP 4 (Session is closed)
4. For each measurement in step 3b, the tester calculates the delta between the baseline and the measured CPU utilization.
5. The tester repeats steps 2-4 five times and calculates the average CPU usage at each step.
6. The tester (in LI-authorized mode) activates a new task to intercept the test device including both IRI and CC with no service scoping.
7. The tester (in non-LI-authorized mode) repeats steps 2-5.
8. The tester compares the average calculated in step 5 with the average calculated in step 7.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively, along with a plain-language conclusion whether the non-LI-authorised admin can use the CPU utilization side channel to detect LI.
6.3.1.5 Unauthorized detection of target under LI, bandwidth utilization side-channel attack method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01
Attacker reference: AT-INTERNAL-01
Threat reference: T-RES-NET-05
Test case:
Test Name: TC_LI_EMBEDDED_NON_AUTHORISED_TARGET_DETECTION_BANDWIDTH_METHOD
Purpose:
Ensure that general privileged network administrators cannot detect whether an a-priori chosen target is under LI.
Procedure and execution steps:
Pre-Condition:
1. A minimal network and two user agents are available, sufficient to start a voice communication session between two parties.
2. An LI system is available in the above network, sufficient to provision a target for LI.
3. On the LI system, the tester has an account prepared from which a target can be provisioned.
4. On an NF that contains a POI or a TF, the tester has prepared appropriate network bandwidth probes on all the network interfaces on the NF. The availability of these depends on the platform. The following are offered as non-exhaustive examples: iftop, nload, ip -s link, bmon, etc. in physical hosts, or ethtool -S <iface>, ovs-vsctl or ovs-ofctl for Open vSwitch, libvirt / virsh domifstat for KVM/QEMU VMs, cAdvisor / Prometheus and Grafana for Docker/Kubernetes virtual deployments
Execution Steps
Execute the following steps:
1. The tester measures the network interface utilization on the host, notes the baseline.
2. The tester starts a new communication session as a regular network user, using any network user account.
3. The tester takes a new measurement of the network interface utilization, records the measurement, and calculates the delta between the baseline from step 1 and this new value. It is essential that these two measurements be as close in time as possible. An automated (scripted) process should be used to take five samples.
4. The tester inserts a new target into the LI stack, provisioning the interception for full content.
5. The tester repeats the above measurements steps.
Expected Results:
The expectation is that there is nothing in the result of the test that can be used to determine that the a priori chosen target is under LI.
Expected format of evidence:
The tester will provide the two raw measurements, and the delta in tabular form, both for the non-target and target calls respectively along with a plain-language conclusion whether the test can detect LI activity.
6.3.1.6 Detection of LI via Timing Anomalies
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-TIMING-06
Test case:
Test Name: TC_LI_EMBEDDED _TIMING_SIGNATURE_LEAK
Purpose:
Ensure that LI activity cannot be detected by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic.
Procedure and execution steps:
Pre-Condition:
1. The tester has access to all network interfaces on the network function that contains the POI.
2. The tester has LI privileges and can activate LI on the same network function.
3. The tester has access to traffic timing statistics or packet captures from the POI-to-MDF interface and can also stimulate LI traffic.
4. An LI system is ready to provision IRI and CC.
Execution Steps
Execute the following steps:
1. Tester provisions a high-content communication session (e.g., 60 seconds of voice or data) between two non-LI involved endpoints, one of which is on the same network function as the POI.
2. The tester captures packet timing and burst intervals over a 5-minute window under no LI activity as a baseline.
3. The tester provisions an interception target on the POI in the NF under test.
4. The tester starts a communication session between the target and another party, that will cause the POI to capture and deliver LI product.
5. The tester repeats the measurements under LI-active conditions.
6. The tester applies statistical analysis (e.g., inter-packet arrival histograms, burst length variability) to both captures.
Expected Results:
It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active.
Expected format of evidence:
A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies.
Editor's Note: The group has discussed tests up to here (specifically, 7, 8, 9 haven't been discussed - but 10 and further have.)
6.3.1.7 Detection of MDF to LEMF LI Product Flow via Timing Anomalies
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-TIMING-07
Test case:
Test Name: TC_LI_EMBEDDED_MDF_LEMF_LI_PRODUCT_TIMING_SIGNATURE_LEAK
Purpose:
Ensure that internal administrators with access to MDF/LEMF transport segments cannot detect the presence of LI activity by observing timing patterns (e.g., bursts, jitter, periodicity) in non-LI network traffic.
Procedure and execution steps:
Pre-Condition:
1. The MDF and LEMF are logically separate components on the network.
2. The LI product transport between MDF and LEMF is observable at a transport layer (e.g., netflow, mirrored span port).
3. The tester has access to traffic timing statistics or packet captures from the MDF-to-LEMF interface.
4. An LI system is ready to provision IRI and CC.
Execution Steps
Execute the following steps:
1. The tester captures packet timing and burst intervals between MDF and LEMF over a 5-minute window under no LI activity.
2. The tester provisions a new target for full IRI and CC.
3. The tester repeats the traffic capture under LI-active conditions.
4. The tester applies statistical analysis (e.g., inter-packet arrival histograms, burst length variability) to both captures.
Expected Results:
It is expected that there is no statistically distinguishable pattern (e.g., a burst every X seconds, or sudden jitter) that would indicate when LI is active.
Expected format of evidence:
A statistical plot or summary (e.g., variance, kurtosis of inter-arrival times) and a plain-language conclusion indicating whether LI presence could be inferred from timing anomalies.
6.3.1.8 Interruption of POI-MDF Link
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-INTERRUPTION-07
Test case:
Test Name: TC_LI_EMBEDDED_POI-MDF_LINK_FAULT_CONDITIONS
Purpose:
To ensure that the LI system does not exhibit differential behaviour during delivery path faults between POI and MDF, such that an internal administrator without LI privilege cannot distinguish whether LI is active based on service degradation patterns.
Procedure and execution steps:
Pre-Condition:
1. A test call generator and an LI system are available to initiate full CC/IRI on a test UE.
2. The network segment between POI and MDF is under controlled lab conditions, capable of simulating link failure (e.g., disabling an interface, simulating packet drop via tc or iptables).
3. Logging mechanisms on POI/MDF are available for correlation.
Execution Steps
Execute the following steps:
1. Tester provisions a high-content communication session (e.g., 60 seconds of voice or data) between two non-LI involved endpoints, one of which is on the same network function as the POI.
2. At second 30 of the call, tester introduces an artificial failure on the LI product delivery path (e.g., disables interface, blocks TCP/UDP port).
3. Tester restores the path at second 45.
4. Tester monitors the communication from step 1 for:
a. Gaps
b. Jitter or misaligned timestamps
c. Recovery mechanisms triggered (e.g., buffering, retransmit)
d. Log entries on the NF
5. Tester provisions interception of a high-content session (e.g., 60 seconds, voice or data) on a separate target (not the same as the endpoint in step 1) on the same logical node.
6. Tester performs the same procedure from steps 2-4.
7. Tester compares the behaviour of the function between the two cases.
Expected Results:
The NF is expected to behave in the same way in both cases (LI active and not active).
Expected format of evidence:
Packet trace timestamps, POI/MDF log excerpts, and human-readable summary of whether the system degraded gracefully or failed differently in the two cases.
6.3.1.9 Unauthorized detection of target under LI, TLS session count method
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-LI-PRODUCT-06
Attacker reference: AT-INTERNAL-01
Threat reference: T-SESSION-COUNT-09
Test case:
Test Name: TC_LI_EMBEDDED_SESSION_COUNT_ANALYSIS
Purpose:
Ensure that lawful interception provisioning does not create observable differences in TLS session counts or handshake patterns that could be used to infer LI activity.
Procedure and execution steps:
Pre-Condition:
1. The network or function uses TLS for control or media transport.
2. TLS session logs, counters, or telemetry are accessible to general privileged roles.
3. LI infrastructure is in place and uses secure links.
Execution Steps
Execute the following steps:
1. The tester initiates standard traffic sessions and records the number of TLS sessions/handshakes initiated per session from the general privileged account.
2. The tester provisions an LI target and repeats the session.
3. The tester compares the TLS session metrics between the surveilled and non-surveilled flows.
4. The tester analyses whether additional TLS handshakes (e.g., toward MDF) correlate with the surveilled session.
5. The tester checks whether handshake timing, mutual TLS behaviour, or cert exchange patterns leak interception status.
Expected Results:
It is expected that the TLS metrics are be indistinguishable between surveilled and non-surveilled flows. LI MDF must not be visible as secondary TLS endpoints or cause measurable handshake side effects.
Expected format of evidence:
The tester supplies a TLS session count comparison and an interpretation of whether a general privileged observer could detect LI activity from the metrics.
Editor's note: for the next message (TLS) cast a wider net:
1. reverse direction
2. X2/3
3. send X1 commands on an X2/3 (or other SBI) interface
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
6.3.1.10 LI_X1 HTTP connection is disallowed
|
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01,
Attacker reference: AT-INTERNAL-01,
Threat reference: T-CONFIG-02, T-INTERFACE-SEC-10
Test case:
Test Name: TC_LI_EMBEDDED_X1_HTTP_DISALLOWED
Purpose:
To verify that non secured X1 connection attempts fail.
Procedure and execution steps:
Pre-Condition:
Execution Steps
Execute the following steps:
1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP.
Expected Results:
The HTTP transaction fails.
Expected format of evidence:
Any suitable evidence (e.g. output of netcat or packet capture), or plain language description of the failure.
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
6.3.1.11 LI_X1 is protected by TLS
|
Editor's Note: Is there a way to verify the layer 3/4 handshake only, without using any meaningful application layer message as a first step - using a simple testing harness/simulator, that doesn't necessarily have any layer 7/app layer knowledge.
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01,
Attacker reference: AT-INTERNAL-01,
Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers)
Editor's Note: Mutually authenticated TLS
Threat reference: T-CONFIG-02 Editor's Note: this test is relevant whether this is configurable or hard-coded - T-INTERFACE-SEC-10
Test case:
Test Name: TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS
Purpose:
To verify that TLS is used to protect LI_X1.
Procedure and execution steps:
Pre-Condition:
1. The POI under test shall expose an ETSI TS 103 221-1 LI_X1 interface
2. The tester shall have the capability to connect to LI_X1 over HTTPS (including relevant certificates).
Execution Steps
Execute the following steps:
1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTPS and supplying valid credentials.
2. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP.
Expected Results:
The HTTPS transaction from execution step 1 succeeds.
The HTTP transaction from execution step 2 does not succeed (fails at the transport layer).
Expected format of evidence:
Any suitable evidence (e.g. output of netcat or packet capture).
|
80bd8af9e1bdc5bd7ba4dda70412c370
|
33.129-2
|
6.3.1.12 LI_X1 is protected by TLS - failure for other reasons
|
Editor's Note: Is there a way to verify the layer 3/4 handshake only, without using any meaningful application layer message as a first step - using a simple testing harness/simulator, that doesn't necessarily have any layer 7/app layer knowledge.
Requirement Name: Undetectability by Non-Authorized Parties.
Requirement Reference: TS 33.126 R6.6-30.
Requirement Description: The CSP shall ensure that non-authorized personnel or processes (including automated or Artificial Intelligence based systems) that are part of the service cannot detect that interception is taking place.
References:
Asset reference: AS-TARGET-01,
Attacker reference: AT-INTERNAL-01,
Editor's Note: Write a separate test that verifies that the POIs are not visible from the Internet at large (external attackers)
Editor's Note: Mutually authenticated TLS
Threat reference: T-CONFIG-02 Editor's Note: this test is relevant whether this is configurable or hard-coded - T-INTERFACE-SEC-10
Test case:
Test Name: TC_LI_EMBEDDED_X1_PROTECTED_BY_TLS
Purpose:
The tester shall prove that using anything else but a valid certificate will fail.
Editor's Note: write separate tests for the following:
e.g.:
1. expired certs
2. revoked certs
3. cert IDs don’t match the LI_X1 IDs
4. LI_X1 ID (or other parameters) missing altogether
5. NEID in LI_X1 doesn't match the NEID of the POI under test
6. valid cert that hangs under the wrong root of trust
7. partial vs full cert chain verification by the POI (root of trust is valid, but the sub-CA is wrong)
Procedure and execution steps:
Pre-Condition:
1.
2.
3. The POI under test shall expose an ETSI TS 103 221-1 LI_X1 interface
4. The tester shall have the capability to connect to LI_X1 over HTTPS (including relevant certificates).
Execution Steps
Execute the following steps:
1. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTPS and supplying valid credentials.
2. The tester issues a GetAllDetails command over LI_X1 interface towards the POI under test using HTTP.
Expected Results:
The HTTPS transaction from execution step 1 succeeds.
The HTTP transaction from execution step 2 does not succeed (fails at the transport layer).
Expected format of evidence:
Any suitable evidence (e.g. output of netcat or packet capture).
Editor's note: Write MOAT: The tester shall verify that ALL interfaces are not vulnerable to the top (20?) common OWASP vulnerabilities / CBEs
6.3.2 Additional Tests
Editor's Note: This clause will contain tests that are not directly traceable to TS 33.126 requirements
6.3.2.1 COMMON New Requirement Test Name
Annex <A> (normative):
<Normative annex for a Technical Specification>
Start each annex on a new page.
Annexes are labelled A, B, C, etc. and designated either "normative" or "informative" depending on their content.
Normative annexes only to appear in Technical Specifications. Use style "Heading 8".
Annex <B> (informative):
<Informative annex for a Technical Specification>
Informative annexes may appear in both Technical Specifications and Technical Reports. Use style "Heading 8" for use in TSs.
Informative annexes shall not contain requirements for the implementation of the Technical Specification.
B.1 Heading levels in an annex
Heading levels within an annex are used as in the main document, but for Heading level selection, the "A.", "B.", etc. are ignored. e.g. B.1.2 is formatted using Heading 2 style.
Annex <C>:
<Informative annex title for a Technical Report>
Informative annexes in Technical Reports do not use "(informative") in the title, since all annexes in TRs are informative. Use style "Heading 9" in TRs.
Annex <D> (informative):
Bibliography
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
The Bibliography is optional. If it exists, it shall follow the last technical annex in the document.
The following material, though not specifically referenced in the body of the present document (or not publicly available), gives supporting information.
Bibliography format
<Publication>: "<Title>".
Annex <E> (informative):
Index
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
The Index is optional. If it exists, it shall immediately precede the Changes history annex.
Generate the index using MS Word's index field feature.
Annex <F> (informative):
Change history
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
This is the last annex for TS/TSs which details the change history using the following table.
This table is to be used for recording progress during the WG drafting process till TSG approval of this TS/TR.
For TRs under change control, use one line per approved Change Request
Date: use format YYYY-MM
CR: four digits, leading zeros as necessary
Rev: blank, or number (max two digits)
Cat: use one of the letters A, B, C, D, F
Subject/Comment: for TSs under change control, include full text of the subject field of the Change Request cover
New vers: use format [n]n.[n]n.[n]n
Change history
Date
Meeting
TDoc
CR
Rev
Cat
Subject/Comment
New version
2025-07
SA3#98-LI
s3i250358
-
-
-
First introduction of baseline to the group.
0.0.10
Change history of this template:
2001-07
Copyright date changed to 2001; space character added before TTC in copyright notification; space character before first reference deleted.
1.3.3
2002-01
Copyright date changed to 2002.
1.3.4
2002-07
Extra Releases added to title area.
1.3.5
2002-12
"TM" added to 3GPP logo.
1.3.6
2003-02
Copyright date changed to 2003.
1.3.7
2003-12
Copyright date changed to 2004. Chinese OP changed from CWTS to CCSA
14.0
2004-04
North American OP changed from T1 to ATIS
1.5.0
2005-11
Stock text of clause 3 includes reference to 21.905.
1.6.0
2005-11
Caters for new TSG structure. Minor corrections.
1.6.1
2006-01
Revision marks removed.
1.6.2
2008-11
LTE logo line added, © date changed to 2008, guidance on keywords modified; acknowledgement of trade marks; sundry editorial corrections and cosmetic improvements
1.7.0
2010-02
3GPP logo changed for cleaner version, with tag line;
LTE-Advanced logo line added;
© date changed to 2010;
editorial change to cover page footnote text;
trade marks acknowledgement text modified;
additional Releases added on cover page;
proforma copyright release text block modified
1.8.0
2010-02
Smaller 3GPP logo file used.
1.8.1
2010-07
Guidance note concerning use of LTE-Advanced logo added.
1.8.2
2011-04-01
Guidance of use of logos on cover page modified; copyright year modified.
1.8.3
2013-05-15
Changed File Properties to MCC macro default.
Removed R99, added Rel-12/13.
Modified Copyright year.
Guidance on annex X Change history.
1.8.4
2014-10-27
Updated Release selection on cover. In clause 3, added "3GPP" to TR 21.905.
1.8.5
2015-01-06
New Organizational Partner TSDSI added to copyright block.
Old Releases removed.
1.9.0
2015-12-03
Provision for LTE Advanced Pro logo
Update copyright year to 2016
1.10.0
2016-03-08
Standarization of the layout of the Change History table in the last annex.(Unreleased)
1.11.0
2016-06-15
Minor adjustment to Change History table heading
1.11.1
2017-03-13
Adds option for 5G logo on cover
1.12.0
2017-05-03
Smaller 5G logo to reduce file size
1.12.1
2019-02-25
Replacement of frames on cover pages by in-line text.
Clarification of help text on when to use 5G logo.
Removal of defunct keywords frame on page 2.
Add Rel-16, Rel-17 options, eliminated earlier, frozen, Releases (cover page, below title)
Corrections to some guidance text, addition of guidance text concerning automatic page headers under Word 2016 ff.
Use of modal auxiliary verbs added to Foreword.
More explicit guidance on Bibliography and Index annexes.
Converted to .docx format.
1.13.0
2019-09-12
Cover page table outline shown dotted for ease of logo selection. (Author to hide outline after logo selection.) User now needs to delete whole table rows instead of individual cells, which proved to be tricky.
Change of style for "notes" in the Foreword to normal paragraphs.
Insertion of new bookmarks, correction of location of existing bookmarks. (To improve navigation.)
Improvements to guidance text.
1.13.1
2021-06-18
Provision for 5G Advanced logo
Update copyright year to 2021
Additional guidance on the use of Heading 8/9 in annexes C, D and X.
1.14.0
2022-04-01
Correction of table formatting
Update copyright year to 2022
1.15.0
2023-03-14
Updated copyright year to 2023
Updated URLs from HTTP to HTTPS
Updated FTP link to HTTP counterpart
Fixed numbering of annexes
1.16.0
2024-03-19
Updated copyright year to 2024
1.17.0
2024-09-06
Adds option for 6G logo on the cover page
1.18.0
2024-10-15
Correction of table formatting to ease outline hiding after logo selection.
1.18.1
2024-10-18
Addition/removal of spaces in Release indications and update of Release in the example within the body.
Unlock "update field" for ToC
1.19.0
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
1 Scope
|
The present document contains objectives, requirements and test cases that are specific to the Lawful Interception elements of a 3GPP network: Administration Function (ADMF), Point of Interception (POI), Triggering Function (TF), Location Acquisition Requesting Function (LARF), Mediation and Delivery Function (MDF).
It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique to the Lawful Interception system.
The present document covers common ...
Editor's note (April 7th):
Also, consider breaking down along this line: elements that have provisioning ability and elements that don't. The idea is that compromising an element that does have provisioning ability into other elements can be more damaging, while taking control of an element that does not have provisioning ability keeps the damage localized.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
2 References
|
Editor's Note: 1) English vs American spelling (e.g., "artefacts" vs "artifacts"), 2) full stops in lists.
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
- References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
- For a specific reference, subsequent revisions do not apply.
- For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TR 21.905: "Vocabulary for 3GPP Specifications".
[2] 3GPP TS 33.117: "Catalogue of general security assurance requirements".
[3] 3GPP TS 33.916: "Security Assurance Methodology (SECAM) for 3GPP network products".
[4] 3GPP TS 33.926: "Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes".
[5] 3GPP TS 33.126: "Lawful Interception Requirements".
[6] 3GPP TS 33.127: "Lawful Interception (LI) architecture and functions".
[7] 3GPP TS 33.128: "Protocol and procedures for Lawful Interception (LI); Stage 3".
[8] GSMA FS.50: "Network Equipment Security Assurance Scheme - Requirements for Security Assurance Specification Development".
[9] GSMA FS.62: "Network Security Assurance Scheme - Adoption Procedure for Security Assurance Specifications".
[10]
…
[x] <doctype> <#>[ ([up to and including]{yyyy[-mm]|V<a[.b[.c]]>}[onwards])]: "<Title>".
It is preferred that the reference to TR 21.905 be the first in the list.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
3 Definitions of terms, symbols and abbreviations
|
This clause and its three (sub) clauses are mandatory. The contents shall be shown as "void" if the TS/TR does not define any terms, symbols, or abbreviations.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
3.1 Terms
|
For the purposes of the present document, the terms given in TR 21.905 [1] and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905 [1].
Definition format (Normal)
<defined term>: <definition>.
example: text used to clarify abstract rules by applying them literally.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
3.2 Symbols
|
For the purposes of the present document, the following symbols apply:
Symbol format (EW)
<symbol> <Explanation>
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
3.3 Abbreviations
|
For the purposes of the present document, the abbreviations given in TR 21.905 [1] and the following apply. An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905 [1].
Abbreviation format (EW)
<ABBREVIATION> <Expansion>
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
4 Overview
|
4.1 Approach
This TS was developed based on the guidance and methodology described in 3GPP TR 33.916 "Security Assurance Methodology (SECAM) for 3GPP network products" [3]. 3GPP has organized SCAS documents by publishing one TS per architectural network element. In contrast, we take a different approach in the LI space and collect all LI SCAS in the present TS.
Within each clause, TS 33.126 "Lawful Interception Requirements" [5] is used to derive LI element specific requirements and tests. Requirement numbering from TS 33.126 is referenced herein to enable compliance tracking.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
4.2 Document Part Organization
|
Editor's Note: The part structure of 33.129 should be re-visited when the maturity of the project warrants it, and likely not settle to its final form until the project is ~80%+ along.
• Part 1 - Common
Part 1 of TS 33.129 contains the general framework of LI SCAS. This part contains descriptions of threats and attacks, but not any tests.
• Part 2 - NF-Embedded LI functions
Part 2 of TS 33.129 contains SCAS tests for LI functions that are embedded in network functions - i.e., their lifecycle is inexorably tied to a network function. Inevitably, a tension exists because access control to the network function and access control to the embedded LI function have to be separated. Most tests in this part exercise the implementation of this separation.
• Part 3 - Non-NF-Embedded LI functions
Part 3 of TS 33.129 contains SCAS tests for LI functions that are stand-alone - i.e., not associated with any network functions. This separation tends to reduce security considerations when compared to embedded functions. The figure below reflects examples of stand-alone LI functions.
• Part 4 - Mediation and Delivery Function (MDF)
Part 4 of TS 33.129 contains SCAS tests that apply to the Mediation and Delivery Function (MDF).
• Part 5 - Administration Function (ADMF)
Part 5 of TS 33.129 contains SCAS tests that apply to the LI Administration Function (ADMF).
Figure 4.2-1: TS 33.129 parts coverage
The LEMF is outside the scope of the present document series, but attributes of the LEMF (such as delivery paths in the MDF) are.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5 Security Elements
| |
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.1 Assets
|
5.1.1 Assets Overview
Assets are categorized more granularly than functional blocks. These are the specific elements that, if exposed or influenced, could compromise LI.
Table 5.1.1-1: Asset definitions
Code
Name
Description
1
AS-TARGET-01
Target Identifier(s)
E.g., IMSI, MSISDN, IP address, used to define or tag a target in the system.
2
AS-LI-CREDS-02
LI Access Credentials
Tokens, passwords, certificates used to authenticate LI operations.
3
AS-NF-03
Network Function
Over and above SA3 general assumptions, e.g., log states, memory artifacts, ephemeral labels.
4
AS-NETWORK-SERVICE-04
Network Service
Normal functioning of a network service.
5
AS-LI-FUNCTION-05
LI Function
LI function internal state and artifacts - e.g., job queues, service status, inter-process calls.
6
AS-LI-PRODUCT-06
LI Product Delivery Link
Continuity (interruptions), quality (jitter, timing anomalies) of the delivery of LI product, between POIs and MDF, or MDF and LEMF.
7
AS-LEMF-07
LEMF Attributes
LEMF attributes, such as IP address, domain names, paths, etc.
8
AS-USER-PATTERN-08
Network User Behavior Attributes
Application or flow-level characteristics that may affect network user attributes (e.g., privacy).
9
AS-CRYPTO-STORE-09
Crypto Store
System-trusted certificate lists, keystores, or chains.
10
AS-API-CONF-10
API or Configuration State
Network API configuration artifacts.
11
AS-LI-PRODUCT-11
LI Product
LI content or metadata.
5.1.2 Detailed Asset Descriptions
5.1.2.1 Target Identifiers
Asset Code: AS-TARGET-01
Asset Name: Target Identifiers
Asset Description:
These are the identifiers used to tag or define interception subjects within the network, such as IMSI, MSISDN, IP addresses, MAC addresses, or session tokens. They represent the direct linkage between a legal warrant and its technical enforcement. Exposure of these identifiers may allow unauthorized parties to determine the existence or identity of surveillance targets. Even indirect inference, such as recognizing frequent lookups of a particular subscriber's IMSI, could compromise the confidentiality of an LI operation. As such, these identifiers must be protected across all stages of LI provisioning and delivery.
5.1.2.2 LI Access Credentials
Asset Code: AS-LI-CREDS-02
Asset Name: LI Access Credentials
Asset Description:
These are the authentication elements used to authorize and secure LI operations. They may include passwords, API tokens, client certificates, SSH keys, or internal authorization grants. If compromised, they could allow an attacker to impersonate an authorized LI system or operator, potentially activating or modifying interceptions, disabling audit trails, or extracting sensitive data. The scope of access these credentials enable makes them high-risk, warranting isolation, short rotation intervals, and hardware-based protection where possible (e.g., HSM-backed keystores).
5.1.2.3 Network Function
Asset Code: AS-NF-03
Asset Name: Network Function
Asset Description:
A network function (NF) encompasses any virtualized or physical function that plays a role in packet handling, control signaling, or service delivery. Beyond SA3’s baseline assumptions, this asset includes ephemeral internal states, such as memory artifacts, temporary routing rules, and runtime labels, that may be visible to co-located workloads or side-channel analysis. An attacker compromising an NF could potentially observe or disrupt LI-related actions indirectly, especially in service-based architectures where functions communicate over open or loosely controlled interfaces.
5.1.2.4 Network Service
Asset Code: AS-NETWORK-SERVICE-04
Asset Name: Network Service
Asset Description:
This can be thought of simplistically as a chain of network functions. However, this category includes the end-to-end behavior of services delivered by the network, including latency, throughput, jitter, and session continuity. Deviations in these metrics, if correlated with LI activity, could enable detection of interception events, particularly by observant external agents or passive observers. An LI system that degrades network services in a distinguishable way may inadvertently disclose its presence. Ensuring uniform service behavior, whether or not interception is active, is critical to undetectability requirements.
5.1.2.5 LI Function
Asset Code: AS-LI-FUNCTION-05
Asset Name: LI Function
Asset Description:
This asset represents the internal mechanisms and runtime state of the LI function itself. It includes service status flags, job queues, inter-process communication, service mesh labels, and other operational artifacts. Exposure of this state, even in logs, metrics, or crash dumps, could reveal active or planned LI operations, or offer an attacker insights into provisioning timing and volume. The integrity of this component is essential to ensure lawful provisioning, reliable delivery, and resistance to insider threats.
5.1.2.6 LI Product Delivery
Asset Code: AS-LI-PRODUCT-06
Asset Name: LI Product Delivery
Asset Description:
This refers to the delivery chain that carries LI content and Intercept Related Information (IRI) from network function Points of Interception (POIs) to the mediation function (MDF), and from there to the Law Enforcement Monitoring Facility (LEMF). Attributes of this path, such as timing consistency, jitter, delays, retransmissions, or packet loss, can serve as side-channel indicators. Disruptions in delivery may undermine undetectability or signal to adversaries that surveillance is occurring. High availability, quality-of-service masking, and traffic normalization are essential to protect this asset.
5.1.2.7 LEMF Attributes
Asset Code: AS-LEMF-07
Asset Name: LEMF Attributes
Asset Description:
This includes the IP address, domain name, or network path of the LEMF endpoint. If the LEMF is statically assigned or its routing patterns are predictable, adversaries may correlate traffic to or from the LEMF to active surveillance. This can compromise the confidentiality of LI recipients and potentially enable network mapping of enforcement infrastructure. Protection of this asset includes obfuscation, dynamic addressing, and encrypted transport.
5.1.2.8 Network User Behavior
Asset Code: AS-USER-PATTERN-08
Asset Name: Network User Behavior Attributes
Asset Description:
These are behavioral signatures or application-layer patterns associated with end users. They may include traffic types, flow durations, usage spikes, or session frequency. If LI functions inadvertently introduce changes to these patterns, such as additional latency, altered timing, or injected traffic, it may be possible to detect surveillance through behavioral analysis. Conversely, behavioral data may also be used to infer target identities if not adequately decoupled. Safeguards should include behavior-preserving interception, noise injection, and usage anonymization.
5.1.2.9 Crypto Store
Asset Code: AS-CRYPTO-STORE-09
Asset Name: Crypto Store
Asset Description:
This includes keystores, certificate chains, and lists of trusted Certificate Authorities (CAs) used within LI systems or the broader network. A compromised certificate store could allow an attacker to issue fraudulent credentials, intercept or forge LI traffic, or break TLS-protected communication. Certificate stores must be tightly controlled, auditable, and isolated from other runtime environments. Particular care should be taken when sharing trust anchors between LI and non-LI systems.
5.1.2.10 API or Configuration State
Asset Code: AS-API-CONF-10
Asset Name: API or Configuration State
Asset Description:
This encompasses the current state and metadata of network APIs, configuration templates, or orchestrator settings used in service delivery. Improper exposure may include target-specific parameters, interception flags, or routing modifications indicative of active LI sessions. Even passive reads of this state can reveal the operational context of LI functions. Configuration drift, race conditions, or excessive verbosity in status endpoints must be mitigated to avoid exposing this asset.
5.1.2.11 LI Product
Asset Code: AS-LI-PRODUCT-11
Asset Name: LI Product
Asset Description:
The LI product comprises content (e.g., voice, SMS, data) and metadata (e.g., call records, IP flow info) delivered as IRI to the LEMF. This is among the highest-value assets in the system and the direct object of the lawful interception operation. Any compromise, whether through leakage, misdelivery, or tampering, can breach both confidentiality and chain-of-custody requirements. It must be protected in transit and at rest using strong cryptographic measures, secure transport channels, and rigorous access logging.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.2 Attackers
|
5.2.1 Attackers Overview
Attackers can be human or automated. The following table lists the attackers considered in the present multi-part document.
Table 5.2-1: Attacker definitions
Code
Name
Description
1
AT-INTERNAL-01
Internal administrator
Has privileged access to network functions or management interfaces but no LI authorization. May be, for example:
◦ A log auditor
◦ A config manager
◦ A general platform admin
◦ A network analytics observer
◦ A data center operator
Editor's Note : consider expanding this in sub-categories
2
AT-EXTERNAL-02
External agent
Has no legitimate access to any internal network interface (although may have access to an external interface such as an end user). May exploit e.g., exposed APIs, timing, network resources.
3
AT-AUTO-AI-03
Automated or AI Agent
Operates at higher scales, capable of fast deep analysis and pattern detection or timing inference.
4
AT-PASSIVE-04
Passive Observer
Non-real-time observer with access to historical data, can compare pre and post provisioning states, correlate metrics across tenants/users.
5
AT-COMPROMISED_NF-05
Compromised NF
An attacker has taken control of an NF and uses it as a pivot point to attack other NFs in the same "perimeter".
Editor's Note: Do not limit attacker to "casual" level
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.2.2 Detailed Attacker Descriptions
|
5.2.2.1 Internal Administrator
Attacker Code: AT-INTERNAL-01
Attacker Name: Internal Administrator
Attacker Description:
An internal administrator refers to a human actor with privileged access to core network systems, but without explicit authorization to access or manage Lawful Interception (LI) functions. This attacker may hold legitimate operational roles, such as log auditor, configuration manager, infrastructure administrator, or analytics engineer, and typically has routine access to sensitive systems, including logging platforms, telemetry pipelines, or network orchestration tools. Due to proximity and privilege level, this attacker is capable of indirect inference or misuse of general-purpose tools to extract sensitive LI-related insights. These threats are particularly insidious because they originate from trusted roles within the perimeter. Editor's Note: Sub-categorization may be warranted to reflect functional boundaries and privilege tiers.
5.2.2.2 Internal Administrator Granular Breakdown
5.2.2.2.1 Internal Log Auditor
Attacker Code: AT-INTERNAL-LOG-01
Attacker Name: Internal Log Auditor
Attacker Description:
This attacker has legitimate access to system and application logs for operational, compliance, or troubleshooting purposes. While not authorized for LI access, they may infer surveillance activity by observing timing correlations, unusual service requests, or log entries tied to specific identifiers. Because log data often spans multiple services and timestamps, the log auditor can piece together patterns across different layers, particularly when logs are insufficiently redacted or when metadata about LI functions is leaked due to poor segregation. The risk is elevated in environments where centralized observability tools are broadly accessible. Importantly, such individuals may not always be direct employees of the CSP; they may include contractors, outsourced service providers, or regulatory agency auditors. The presence of third parties with log visibility adds further complexity to managing access boundaries and ensuring strict compartmentalization of LI-related activity.
5.2.2.2.2 Internal Configuration Manager
Attacker Code: AT-INTERNAL-CONFIG-02
Attacker Name: Internal Configuration Manager
Attacker Description:
This internal actor has control over or visibility into network and service configuration interfaces, such as provisioning databases, orchestration tools, or infrastructure-as-code systems. While they may not intentionally target LI systems, their access could expose sensitive artifacts like target identifiers, service activation records, or routing behaviors that indirectly reveal LI activity. A misconfiguration, audit bypass, or direct misuse of privilege could lead to the exposure or tampering of LI-related parameters. This attacker is especially dangerous when configuration changes are not subject to strict role-based access control and change logging.
5.2.2.2.3 Internal Infrastructure/Platform Administrator
Attacker Code: AT-INTERNAL-INFRA-03
Attacker Name: Internal Infrastructure/Platform Administrator
Attacker Description:
An infrastructure administrator manages underlying compute, storage, and networking resources. They typically have root-level access to virtual machines, containers, or Kubernetes clusters where LI functions may reside. While this actor may not understand the semantics of LI operations, their access allows for memory inspection, storage snapshotting, or inter-process observation that could compromise confidentiality. Their role sits beneath LI in the stack, creating a high-privilege threat vector. This risk is heightened in cloud-native environments with shared platforms or insufficient tenant isolation.
5.2.2.2.4 Internal Analytics or Monitoring Observer
Attacker Code: AT-INTERNAL-OBSERVE-04
Attacker Name: Internal Analytics or Monitoring Observer
Attacker Description:
This attacker uses monitoring dashboards, telemetry pipelines, or data visualization tools to analyze network performance and user behavior. Although not involved in LI, they may observe outliers, such as sudden QoS changes, endpoint redirection, or anomalous traffic patterns, that align with surveillance activities. Their access is typically read-only, but because they work across many users and services, they can form inferences at scale. If monitoring tools lack data masking or correlation protections, this actor could indirectly deanonymize LI operations.
5.2.2.2.5 Internal Facilities or Data Center Operator
Attacker Code: AT-INTERNAL-DATACENTER-05
Attacker Name: Internal Facilities or Data Center Operator
Attacker Description:
This role includes physical or environmental access, such as rack technicians, cabling engineers, or maintenance personnel. Though easily overlooked, data center operators may intercept or observe physical indications of LI provisioning (e.g., device identifiers, port activation, or localized power usage). If surveillance workloads are not obfuscated within broader platform operations, these actors could observe installation patterns or hardware identifiers tied to LI. This threat is particularly relevant in private or hybrid data centers where physical separation is minimal and operator duties cross tenant boundaries.
5.2.2.3 External Agent
Attacker Code: AT-EXTERNAL-02
Attacker Name: External Agent
Attacker Description:
An external agent is a threat actor entirely outside the administrative domain of the Communication Service Provider (CSP). This entity lacks any legitimate access to internal network functions or LI systems, but may attempt to exploit publicly exposed services, such as user-facing APIs, mobile access interfaces, or Internet-exposed network resources. Attacks may include techniques such as timing analysis, metadata harvesting, endpoint compromise, or denial-of-service strategies. While the external agent has the least direct access, the increasing attack surface from 5G cloud-native and multi-access edge architectures can make this attacker class surprisingly effective, especially when combined with reconnaissance automation.
5.2.2.4 Automated or AI Agent
Attacker Code: AT-AUTO-AI-03
Attacker Name: Automated or AI Agent
Attacker Description:
An automated or AI-driven attacker is a non-human agent capable of processing vast quantities of data in real time or near-real time. These agents leverage machine learning, pattern recognition, or inference engines to discover anomalies, detect provisioning patterns, or identify LI-related events across large data streams. Whether deployed internally or externally, this attacker type can operate continuously, scaling beyond human capacity, and is particularly effective in identifying subtle timing correlations, job queue patterns, or service quality variations. Such agents may be adversarially trained and can pose a significant risk in hybrid environments where observability is distributed.
5.2.2.5 Passive Observer
Attacker Code: AT-PASSIVE-04
Attacker Name: Passive Observer
Attacker Description:
A passive observer is an attacker who does not interfere with live operations but gains access to historical data, telemetry, or pre/post-state snapshots. This actor may compare logs, traces, or service states before and after suspected LI provisioning to infer the presence of surveillance activities. Passive observers may exist within the CSP’s environment or in adjacent systems such as logging infrastructure or analytics data lakes. While they do not actively engage in attacks, their ability to correlate changes over time, particularly across multi-tenant environments, makes them a notable threat, especially when data retention and separation controls are weak.
5.2.2.6 Compromised Network Function
Attacker Code: AT-COMPROMISED_NF-05
Attacker Name: Compromised Network Function (NF)
Attacker Description:
This attacker class represents a network function that has been overtaken, either fully or partially, by an adversary. The compromised NF operates under the control of the attacker and can serve as a pivot point to reach LI systems, intercept provisioning messages, or disrupt internal communications. It may impersonate trusted roles, inject misleading telemetry, or undermine confidentiality by leaking sensitive artifacts. Compromised NFs are especially dangerous in service-mesh architectures where trust boundaries are often implicit. Lateral movement across internal APIs or through shared memory spaces between co-located functions increases the threat radius substantially.
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3 Threats
| |
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.1 Threats Overview
|
The following table contains named threat types. Each SCAS test can point to one or more.
Table 5.3.1-1: Threat definitions
Code
Name
Description
1
T-LOG-01
Log leak
LI activity generates logging artifacts observable by non-LI authorized parties.
2
T-CONFIG-02
Config leak
LI activity is inferred by analysing config files extracted before and after LI provisioning.
3
T-RES-CPU-03
LI leak via CPU side channel 1
LI activity is inferred by analysing CPU utilization levels, method 1.
4
T-RES-CPU-04
LI leak via CPU side channel 2
LI activity is inferred by analysing CPU utilization levels, method 2.
5
T-RES-NET-05
LI leak via network flow side channel
LI activity is inferred by analysing network bandwidth utilization levels.
6
T-TIMING-06
LI detection via timing anomalies.
Detection of LI via timing anomalies.
7
T-TIMING-07
MDF-LEMF LI Product Flow Detection
Detection of MDF to LEMF LI product flow via timing anomalies.
8
T-INTERRUPTION-08
POI-MDF Link Failure
Link-level interruption between POI and MDF used to infer presence or behaviour of LI functions.
9
T-SESSION-COUNT-09
Session Count
LI detection by session count analysis.
10
T-INTERFACE-SEC-10
Interface security
Allowance of insecure (non-TLS) connections.
"Simple MISconfiguration"
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2 Detailed Threat Descriptions
| |
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.1 Log Leak
|
Threat Code: T-LOG-01
Threat Name: Log Leak
Threat Category: Information Disclosure
Threat Description: Certain system or network logs may unintentionally record details of Lawful Interception (LI) operations, such as interface initialization, provisioning events, or errors specific to LI services. If such logs are accessible to non-LI-authorized users or monitoring systems, this could result in the detection of LI activity, violating confidentiality and undetectability requirements.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.2 Config Leak
|
Threat Code: T-CONFIG-02
Threat Name: Config Leak
Threat Category: Information Disclosure
Threat Description: Configuration files or system state snapshots taken before and after LI provisioning may reveal changes indicative of interception functionality, such as new interfaces, active LI modules, or altered routing behaviors. If such configurations are accessible to unauthorized administrators or third-party tools, they may be used to infer the existence or target of an LI operation.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.3 LI Leak via CPU Side Channel 1
|
Threat Code: T-RES-CPU-03
Threat Name: LI Leak via CPU Side Channel (Pattern A)
Threat Category: Information Disclosure
Threat Description: LI operations may cause observable variations in CPU utilization due to additional processing, packet duplication, or encryption tasks. If an attacker monitors CPU resource usage patterns over time and correlates spikes or periodicity with specific events, it may be possible to infer the presence of active LI functions or associated targets.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.4 LI Leak via CPU Side Channel 2
|
Threat Code: T-RES-CPU-04
Threat Name: LI Leak via CPU Side Channel (Pattern B)
Threat Category: Information Disclosure
Threat Description: A refined side-channel analysis leveraging advanced statistical or machine learning methods may identify LI-related process signatures at a lower resolution or across virtualized environments. Unlike direct CPU utilization spikes, this method relies on deeper behavioral fingerprinting (e.g., cache usage, execution timing patterns), which may allow even more covert inference of LI presence.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.5 LI Leak via Network Flow Side Channel
|
Threat Code: T-RES-NET-05
Threat Name: LI Leak via Network Flow Side Channel
Threat Category: Information Disclosure
Threat Description: LI systems typically duplicate or redirect traffic to an MDF or mediation device. This may introduce subtle, but detectable changes in bandwidth utilization, jitter, or packet duplication observable from within the network or via flow records (e.g., NetFlow, sFlow). An attacker monitoring network flow metadata may detect patterns associated with interception activity.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.6 LI Detection via Timing Anomalies
|
Threat Code: T-TIMING-06
Threat Name: LI Detection via Timing Anomalies
Threat Category: Information Disclosure
Threat Description: The addition of LI processing steps (e.g., duplication, filtering, routing to MDF) can result in increased latency or jitter during communication sessions. An attacker may detect the presence of LI by statistically analyzing round-trip times or response behaviors that differ from baseline behavior when LI is not active.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.7 MDF–LEMF LI Product Flow Detection
|
Threat Code: T-TIMING-07
Threat Name: MDF–LEMF LI Product Flow Detection via Timing
Threat Category: Information Disclosure
Threat Description: The flow of intercepted traffic (IRI or CC) from the MDF to the LEMF may generate detectable timing patterns, especially if LI sessions are rare or traffic volume fluctuates. Observers with visibility into network patterns or inter-domain timestamps could detect and potentially correlate this flow with LI activities, violating the principle of transparency.
Threatened Asset: AS-TARGET-01 Target Identifiers; AS-LI-PRODUCT-11 LI Product
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.8 POI–MDF Link Failure
|
Threat Code: T-INTERRUPTION-08
Threat Name: POI–MDF Link Failure
Threat Category: Denial of Service
Threat Description: A network or logical interruption between the Point of Interception (POI) and the MDF may unintentionally reveal the existence of LI. If LI sessions degrade differently from normal user sessions under such link failure conditions, an attacker could induce or observe faults to probe for LI presence or behavior.
Threatened Asset: AS-TARGET-01 Target Identifiers; AS-LI-PRODUCT-11 LI Product
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.9 Session Count
|
Threat Code: T-SESSION-COUNT-09
Threat Name: LI Detection via Session Count
Threat Category: Information Disclosure
Threat Description: Provisioning of LI may introduce additional sessions (e.g., replicated flows, internal signaling) that appear in session monitoring tools or access logs. If the session count increases in a predictable manner during LI activation, an unauthorized observer could infer LI activity simply by counting active or historical sessions.
Threatened Asset: AS-TARGET-01 Target Identifiers
|
c786d8cb65ec3d1bfeb582768ec1145f
|
33.129-1
|
5.3.2.10 Interface Security
|
Threat Code: T-INTERFACE-SEC-10
Threat Name: Interface Security Misconfiguration
Threat Category: Tampering / Information Disclosure
Threat Description: If LI-related interfaces (e.g., between POI, MDF and LEMF) are not properly secured using cryptographic protocols such as TLS, an attacker may eavesdrop on or manipulate LI product traffic. This threatens both confidentiality and integrity of intercepted data and may result in exposure of sensitive law enforcement operations.
Threatened Asset: AS-TARGET-01 Target Identifiers
6 Common Tests
Editor's Note: This section is expected to contain tests that are common across the LI architecture, and parts of the 33.129 series of documents.
Annex <A> (normative):
<Normative annex for a Technical Specification>
Start each annex on a new page.
Annexes are labelled A, B, C, etc. and designated either "normative" or "informative" depending on their content.
Normative annexes only to appear in Technical Specifications. Use style "Heading 8".
Annex <B> (informative):
Vulnerability/Compromise Spectrum
B.1 Vulnerability/Compromise Spectrum
Table B.1-1: Vulnerability/Compromise Spectrum
Code
Name
Description
Notes
Test IDs Failed
Criticality
(None,
Low,
Medium,
High,
Critical)
1
LI capability exists
The presence of an installed LI capability was detected.
e.g., on disk, but not running
2
LI capability characterization
Capabilities of the installed LI function were extracted.
e.g., capacity numbers, in terms of targets provisionable or bandwidth available for LI
3
LI running state detection
Detected that LI is currently running on the Target of Evaluation (TOE).
4
LI running instance characterization
Capabilities of the running instance of LI were extracted, such as number of targets provisionable, etc.
e.g., number of current taps
5
LI running state manipulation
LI was either started or stopped against normal procedures.
6
LI topology
Extracted network/physical location of other functions that may (do?) contain LI capability.
e.g., information about other POIs, MDFs, ADMFs, or even LEMFs
7
Target ID extracted
A (any) target ID was extracted.
without a priori choice of target
8
Specific target ID detected
A specific target ID was detected on the TOE.
with a priori choice of target
9
IRI extracted
IRI was extracted pertaining to any current target ID on the TOE.
without a priori choice of target
10
Content extracted
Content was extracted pertaining to any current target ID on the TOE.
without a priori choice of target
11
Specific target IRI extracted
IRI was extracted pertaining to a specific target ID on the TOE.
with a priori choice of target
12
Specific target content extracted
Content was extracted pertaining to a specific target ID on the TOE.
with a priori choice of target
13
One new target was inserted
A new target inserted outside normal procedures.
14
Multiple targets inserted
More than one target inserted outside normal procedures.
pathway to LI DOS
15
Full target list extracted
A complete list of target IDs on the TOE was extracted.
16
IRI of all targets extracted
IRI pertaining to all targets was extracted.
17
Content of all targets extracted
Content pertaining to all targets was extracted.
18
Control of non-LI functionality achieved through LI entry
Control of TOE functionality outside LI was achieved.
Editor's notes (Apr 7 call):
* Add DELETION (targets, IRI, content),
* modify (INSERT/DELETE) delivery endpoints
* insert before 7: access/token compromise/privilege escalation
EDITORS NOTES:
Parking Lot
0. Find a way to publish an implementation/configuration guide to state "the obvious", e.g. 33.128 Annex, or its own document, etc.
1. Think about a test for trust domain crossing. If a (non-LI) network function is required to take some action on behalf of LI and does not have a POI, this creates a security concern.
2. Test that POI code and data are not accessible from outside the enclave.
3. Inter-LEA confidentiality. Is there a way to test it explicitly, or do we rely on inference from a subset of tests.
Annex <C>:
<Informative annex title for a Technical Report>
Informative annexes in Technical Reports do not use "(informative") in the title, since all annexes in TRs are informative. Use style "Heading 9" in TRs.
Annex <D> (informative):
Bibliography
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
The Bibliography is optional. If it exists, it shall follow the last technical annex in the document.
The following material, though not specifically referenced in the body of the present document (or not publicly available), gives supporting information.
Bibliography format
<Publication>: "<Title>".
Annex <E> (informative):
Index
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
The Index is optional. If it exists, it shall immediately precede the Changes history annex.
Generate the index using MS Word's index field feature.
Annex <F> (informative):
Change history
Use style "Heading 8" in TSs and "Heading 9" in TRs. Do not use "informative" in the title in TRs.
This is the last annex for TS/TSs which details the change history using the following table.
This table is to be used for recording progress during the WG drafting process till TSG approval of this TS/TR.
For TRs under change control, use one line per approved Change Request
Date: use format YYYY-MM
CR: four digits, leading zeros as necessary
Rev: blank, or number (max two digits)
Cat: use one of the letters A, B, C, D, F
Subject/Comment: for TSs under change control, include full text of the subject field of the Change Request cover
New vers: use format [n]n.[n]n.[n]n
Change history
Date
Meeting
TDoc
CR
Rev
Cat
Subject/Comment
New version
2025-07
SA3#98-LI
s3i250357
-
-
-
First introduction of the baseline to the group.
0.0.8
Change history of this template:
2001-07
Copyright date changed to 2001; space character added before TTC in copyright notification; space character before first reference deleted.
1.3.3
2002-01
Copyright date changed to 2002.
1.3.4
2002-07
Extra Releases added to title area.
1.3.5
2002-12
"TM" added to 3GPP logo.
1.3.6
2003-02
Copyright date changed to 2003.
1.3.7
2003-12
Copyright date changed to 2004. Chinese OP changed from CWTS to CCSA
14.0
2004-04
North American OP changed from T1 to ATIS
1.5.0
2005-11
Stock text of clause 3 includes reference to 21.905.
1.6.0
2005-11
Caters for new TSG structure. Minor corrections.
1.6.1
2006-01
Revision marks removed.
1.6.2
2008-11
LTE logo line added, © date changed to 2008, guidance on keywords modified; acknowledgement of trade marks; sundry editorial corrections and cosmetic improvements
1.7.0
2010-02
3GPP logo changed for cleaner version, with tag line;
LTE-Advanced logo line added;
© date changed to 2010;
editorial change to cover page footnote text;
trade marks acknowledgement text modified;
additional Releases added on cover page;
proforma copyright release text block modified
1.8.0
2010-02
Smaller 3GPP logo file used.
1.8.1
2010-07
Guidance note concerning use of LTE-Advanced logo added.
1.8.2
2011-04-01
Guidance of use of logos on cover page modified; copyright year modified.
1.8.3
2013-05-15
Changed File Properties to MCC macro default.
Removed R99, added Rel-12/13.
Modified Copyright year.
Guidance on annex X Change history.
1.8.4
2014-10-27
Updated Release selection on cover. In clause 3, added "3GPP" to TR 21.905.
1.8.5
2015-01-06
New Organizational Partner TSDSI added to copyright block.
Old Releases removed.
1.9.0
2015-12-03
Provision for LTE Advanced Pro logo
Update copyright year to 2016
1.10.0
2016-03-08
Standarization of the layout of the Change History table in the last annex.(Unreleased)
1.11.0
2016-06-15
Minor adjustment to Change History table heading
1.11.1
2017-03-13
Adds option for 5G logo on cover
1.12.0
2017-05-03
Smaller 5G logo to reduce file size
1.12.1
2019-02-25
Replacement of frames on cover pages by in-line text.
Clarification of help text on when to use 5G logo.
Removal of defunct keywords frame on page 2.
Add Rel-16, Rel-17 options, eliminated earlier, frozen, Releases (cover page, below title)
Corrections to some guidance text, addition of guidance text concerning automatic page headers under Word 2016 ff.
Use of modal auxiliary verbs added to Foreword.
More explicit guidance on Bibliography and Index annexes.
Converted to .docx format.
1.13.0
2019-09-12
Cover page table outline shown dotted for ease of logo selection. (Author to hide outline after logo selection.) User now needs to delete whole table rows instead of individual cells, which proved to be tricky.
Change of style for "notes" in the Foreword to normal paragraphs.
Insertion of new bookmarks, correction of location of existing bookmarks. (To improve navigation.)
Improvements to guidance text.
1.13.1
2021-06-18
Provision for 5G Advanced logo
Update copyright year to 2021
Additional guidance on the use of Heading 8/9 in annexes C, D and X.
1.14.0
2022-04-01
Correction of table formatting
Update copyright year to 2022
1.15.0
2023-03-14
Updated copyright year to 2023
Updated URLs from HTTP to HTTPS
Updated FTP link to HTTP counterpart
Fixed numbering of annexes
1.16.0
2024-03-19
Updated copyright year to 2024
1.17.0
2024-09-06
Adds option for 6G logo on the cover page
1.18.0
2024-10-15
Correction of table formatting to ease outline hiding after logo selection.
1.18.1
2024-10-18
Addition/removal of spaces in Release indications and update of Release in the example within the body.
Unlock "update field" for ToC
1.19.0
|
6487dfe513b60123776855ad6d67a5a9
|
30.801
|
1 Scope
|
This permanent document describes the principle and the working method of the Inter Group Co-ordination ad-hocs (IGCs), the scope, reference and output of each individual IGC and the overall time plan.
|
6487dfe513b60123776855ad6d67a5a9
|
30.801
|
2 Working method of the technical Inter-Group Co-ordination ad-hocs (IGCs)
|
TSG-SA has a responsibility of technical co-ordination within 3GPP. TSG-S2 has been allocated a task to divide the feature descriptions defined by TSG-S1 to a Building blocks or Work packages based on System architecture and elaborate a project plan.
Therefore Inter Group Co-ordination ad-hocs (IGCs) are created. The outcome of the IGCs should be a draft 3GPP wide project plan for each feature, defining the work that is needed and proposing the responsible WGs/TSGs and a time schedule. These draft project plans will become 3GPP project plans after they have been approved by all relevant WGs/TSGs and finally by TSG-SA. The project plans will be elaborated with all concerned working group of the technical subject, where from each working group a contact person is nominated.
The task of the IGCs is not to perform any technical work of substance on the technical issue (e.g. as architectural work).
The method of working of the IGC meetings shall be mainly by email or tele-conferencing.
For each IGC, a permanent document is maintained comprising
• Work identified to fullfill the requirements
• List of all the deliverables applicable to the subject
Note that a deliverable can be applicable to more than one technical project co-ordination subject
• Time plan
for Release 99 and subsequently for future releases.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.