9.9.3 EPS Mobility Management (EMM) information elements
24.3013GPPNon-Access-Stratum (NAS) protocol for Evolved Packet System (EPS)Release 18Stage 3TS
9.9.3.0A Additional update result
The purpose of the Additional update result information element is to provide additional information about the result of a combined attach procedure or a combined tracking area updating procedure.
The Additional update result information element is coded as shown in figure 9.9.3.0A.1 and table 9.9.3.0A.1.
The Additional update result is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Additional update result IEI |
0 Spare |
0 Spare |
Additional update result value |
Octet 1 |
Figure 9.9.3.0A.1: Additional update result information element
Table 9.9.3.0A.1: Additional update result information element
Additional update result value (octet 1) |
||
Bits |
||
2 |
1 |
|
0 |
0 |
no additional information |
0 |
1 |
CS Fallback not preferred |
1 |
0 |
SMS only |
1 |
1 |
reserved |
Bits 4 and 3 of octet 1 are spare and shall all be coded as zero. |
||
NOTE: Bits 4 and 3 of octet 1 were used in earlier versions of this release of this specification. |
9.9.3.0B Additional update type
The purpose of the Additional update type information element is to provide additional information about the type of request for an attach or a tracking area updating procedure.
The Additional update type information element is coded as shown in figure 9.9.3.0B.1 and table 9.9.3.0B.1.
The Additional update type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|||
Additional update type IEI |
PNB-CIoT |
SAF |
AUTV |
octet 1 |
Figure 9.9.3.0B.1: Additional update type information element
Table 9.9.3.0B.1: Additional update type information element
Additional update type value (AUTV) (octet 1) |
||
Bit |
||
1 |
||
0 |
no additional information. If received it shall be interpreted as request for combined attach or combined tracking area updating. |
|
1 |
SMS only |
|
"Signalling active" flag (SAF) (octet 1) |
||
Bit |
||
2 |
||
0 |
keeping the NAS signalling connection is not required after the completion of the tracking area updating procedure |
|
1 |
keeping the NAS signalling connection is required after the completion of the tracking area updating procedure |
|
Preferred CIoT network behaviour (PNB-CIoT) (octet 1) |
||
Bit |
||
4 |
3 |
|
0 |
0 |
no additional information |
0 |
1 |
control plane CIoT EPS optimization |
1 |
0 |
user plane CIoT EPS optimization |
1 |
1 |
reserved |
9.9.3.1 Authentication failure parameter
See clause 10.5.3.2.2 in 3GPP TS 24.008 [13].
9.9.3.2 Authentication parameter AUTN
See clause 10.5.3.1.1 in 3GPP TS 24.008 [13].
9.9.3.3 Authentication parameter RAND
See clause 10.5.3.1 in 3GPP TS 24.008 [13].
9.9.3.4 Authentication response parameter
The purpose of the Authentication response parameter information element is to provide the network with the authentication response calculated in the USIM.
The Authentication response parameter information element is coded as shown in figure 9.9.3.4.1 and table 9.9.3.4.1.
The Authentication response parameter is a type 4 information element with a minimum length of 6 octets and a maximum length of 18 octets.
In an EPS authentication challenge, the response calculated in the USIM (RES) is minimum 4 octets and may be up to 16 octets in length.
In a 5G AKA authentication challenge, the response calculated in the ME (RES*) is 16 octets in length.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Authentication response parameter IEI |
octet 1 |
|||||||
Length of Authentication response parameter contents |
octet 2 |
|||||||
RES or RES* |
octet 3 |
|||||||
octet 18 |
Figure 9.9.3.4.1: Authentication response parameter information element
Table 9.9.3.4.1: Authentication response parameter information element
RES value (octet 3 to 18) This contains the RES or RES*. |
9.9.3.4A Ciphering key sequence number
See clause 10.5.1.2 in 3GPP TS 24.008 [13].
9.9.3.4B SMS services status
The purpose of the SMS services status information element is to indicate the status of availability for SMS services requested by the UE during the normal attach procedure or tracking area updating procedure.
The SMS services status information element is coded as shown in figure 9.9.3.4B.1 and table 9.9.3.4B.1.
The SMS services status is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
SMS services status IEI |
0 Spare |
SMS services status value |
octet 1 |
Figure 9.9.3.4B.1: SMS services status information element
Table 9.9.3.4B.1: SMS services status information element
SMS services status value (octet 1, bit 1 to 3) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
SMS services not available |
|
0 |
0 |
1 |
SMS services not available in this PLMN |
|
0 |
1 |
0 |
Network failure |
|
0 |
1 |
1 |
Congestion |
|
All other values are unused and shall be treated as abnormal case, if received by the UE. |
||||
Bit 4 of octet 1 is spare and shall be coded as zero. |
9.9.3.5 CSFB response
The purpose of the CSFB response information element is to indicate whether the UE accepts or rejects a paging for CS fallback.
The CSFB response information element is coded as shown in figure 9.9.3.5.1 and table 9.9.3.5.1.
The CSFB response is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
CSFB response IEI |
0 spare |
CSFB response value |
octet 1 |
Figure 9.9.3.5.1: CSFB response information element
Table 9.9.3.5.1: CSFB response information element
CSFB response value (octet 1) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
CS fallback rejected by the UE |
|
0 |
0 |
1 |
CS fallback accepted by the UE |
|
All other values are reserved. |
||||
9.9.3.6 Daylight saving time
See clause 10.5.3.12 in 3GPP TS 24.008 [13].
9.9.3.7 Detach type
The purpose of the Detach type information element is to indicate the type of detach.
The Detach type information element is coded as shown in figure 9.9.3.7.1 and table 9.9.3.7.1.
The Detach type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|||
Detach type IEI |
Switch off |
Type of detach |
octet 1 |
Figure 9.9.3.7.1: Detach type information element
Table 9.9.3.7.1: Detach type information element
Type of detach (octet 1) |
||||
In the UE to network direction: |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
1 |
EPS detach |
|
0 |
1 |
0 |
IMSI detach |
|
0 |
1 |
1 |
combined EPS/IMSI detach |
|
1 |
1 |
0 |
reserved |
|
1 |
1 |
1 |
reserved |
|
All other values are interpreted as "combined EPS/IMSI detach" in this version of the protocol. |
||||
In the network to UE direction: |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
1 |
re-attach required |
|
0 |
1 |
0 |
re-attach not required |
|
0 |
1 |
1 |
IMSI detach |
|
1 |
1 |
0 |
reserved |
|
1 |
1 |
1 |
reserved |
|
All other values are interpreted as "re-attach not required" in this version of the protocol. |
||||
Switch off (octet 1) |
||||
In the UE to network direction: |
||||
Bit |
||||
4 |
||||
0 |
normal detach |
|||
1 |
switch off |
|||
In the network to UE direction bit 4 is spare. The network shall set this bit to zero. |
9.9.3.8 DRX parameter
See clause 10.5.5.6 in 3GPP TS 24.008 [13].
9.9.3.9 EMM cause
The purpose of the EMM cause information element is to indicate the reason why an EMM request from the UE is rejected by the network.
The EMM cause information element is coded as shown in figure 9.9.3.9.1 and table 9.9.3.9.1.
The EMM cause is a type 3 information element with 2 octets length.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EMM cause IEI |
octet 1 |
|||||||
Cause value |
octet 2 |
Figure 9.9.3.9.1: EMM cause information element
Table 9.9.3.9.1: EMM cause information element
Cause value (octet 2) |
|||||||||||||||||||
Bits |
|||||||||||||||||||
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||||||||||
0 |
0 |
0 |
0 |
0 |
0 |
1 |
0 |
IMSI unknown in HSS |
|||||||||||
0 |
0 |
0 |
0 |
0 |
0 |
1 |
1 |
Illegal UE |
|||||||||||
0 |
0 |
0 |
0 |
0 |
1 |
0 |
1 |
IMEI not accepted |
|||||||||||
0 |
0 |
0 |
0 |
0 |
1 |
1 |
0 |
Illegal ME |
|||||||||||
0 |
0 |
0 |
0 |
0 |
1 |
1 |
1 |
EPS services not allowed |
|||||||||||
0 |
0 |
0 |
0 |
1 |
0 |
0 |
0 |
EPS services and non-EPS services not allowed |
|||||||||||
0 |
0 |
0 |
0 |
1 |
0 |
0 |
1 |
UE identity cannot be derived by the network |
|||||||||||
0 |
0 |
0 |
0 |
1 |
0 |
1 |
0 |
Implicitly detached |
|||||||||||
0 |
0 |
0 |
0 |
1 |
0 |
1 |
1 |
PLMN not allowed |
|||||||||||
0 |
0 |
0 |
0 |
1 |
1 |
0 |
0 |
Tracking Area not allowed |
|||||||||||
0 |
0 |
0 |
0 |
1 |
1 |
0 |
1 |
Roaming not allowed in this tracking area |
|||||||||||
0 |
0 |
0 |
0 |
1 |
1 |
1 |
0 |
EPS services not allowed in this PLMN |
|||||||||||
0 |
0 |
0 |
0 |
1 |
1 |
1 |
1 |
No Suitable Cells In tracking area |
|||||||||||
0 |
0 |
0 |
1 |
0 |
0 |
0 |
0 |
MSC temporarily not reachable |
|||||||||||
0 |
0 |
0 |
1 |
0 |
0 |
0 |
1 |
Network failure |
|||||||||||
0 |
0 |
0 |
1 |
0 |
0 |
1 |
0 |
CS domain not available |
|||||||||||
0 |
0 |
0 |
1 |
0 |
0 |
1 |
1 |
ESM failure |
|||||||||||
0 |
0 |
0 |
1 |
0 |
1 |
0 |
0 |
MAC failure |
|||||||||||
0 |
0 |
0 |
1 |
0 |
1 |
0 |
1 |
Synch failure |
|||||||||||
0 |
0 |
0 |
1 |
0 |
1 |
1 |
0 |
Congestion |
|||||||||||
0 |
0 |
0 |
1 |
0 |
1 |
1 |
1 |
UE security capabilities mismatch |
|||||||||||
0 |
0 |
0 |
1 |
1 |
0 |
0 |
0 |
Security mode rejected, unspecified |
|||||||||||
0 |
0 |
0 |
1 |
1 |
0 |
0 |
1 |
Not authorized for this CSG |
|||||||||||
0 |
0 |
0 |
1 |
1 |
0 |
1 |
0 |
Non-EPS authentication unacceptable |
|||||||||||
0 |
0 |
0 |
1 |
1 |
1 |
1 |
1 |
Redirection to 5GCN required |
|||||||||||
0 |
0 |
1 |
0 |
0 |
0 |
1 |
1 |
Requested service option not authorized in this PLMN |
|||||||||||
0 |
0 |
1 |
0 |
0 |
1 |
1 |
1 |
CS service temporarily not available |
|||||||||||
0 |
0 |
1 |
0 |
1 |
0 |
0 |
0 |
No EPS bearer context activated |
|||||||||||
0 |
0 |
1 |
0 |
1 |
0 |
1 |
0 |
Severe network failure |
|||||||||||
0 |
1 |
0 |
0 |
1 |
1 |
1 |
0 |
PLMN not allowed to operate at the present UE location |
|||||||||||
0 |
1 |
0 |
1 |
1 |
1 |
1 |
1 |
Semantically incorrect message |
|||||||||||
0 |
1 |
1 |
0 |
0 |
0 |
0 |
0 |
Invalid mandatory information |
|||||||||||
0 |
1 |
1 |
0 |
0 |
0 |
0 |
1 |
Message type non-existent or not implemented |
|||||||||||
0 |
1 |
1 |
0 |
0 |
0 |
1 |
0 |
Message type not compatible with the protocol state |
|||||||||||
0 |
1 |
1 |
0 |
0 |
0 |
1 |
1 |
Information element non-existent or not implemented |
|||||||||||
0 |
1 |
1 |
0 |
0 |
1 |
0 |
0 |
Conditional IE error |
|||||||||||
0 |
1 |
1 |
0 |
0 |
1 |
0 |
1 |
Message not compatible with the protocol state |
|||||||||||
0 |
1 |
1 |
0 |
1 |
1 |
1 |
1 |
Protocol error, unspecified |
|||||||||||
Any other value received by the mobile station shall be treated as 0110 1111, "protocol error, unspecified". Any other value received by the network shall be treated as 0110 1111, "protocol error, unspecified". |
|||||||||||||||||||
9.9.3.10 EPS attach result
The purpose of the EPS attach result information element is to specify the result of an attach procedure.
The EPS attach result information element is coded as shown in figure 9.9.3.10.1 and table 9.9.3.10.1.
The EPS attach result is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS attach result IEI |
0 Spare |
EPS attach result value |
octet 1 |
Figure 9.9.3.10.1: EPS attach result information element
Table 9.9.3.10.1: EPS attach result information element
EPS attach result value (octet 1) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
1 |
EPS only |
|
0 |
1 |
0 |
combined EPS/IMSI attach |
|
All other values are reserved. |
||||
Bit 4 of octet 1 is spare and shall be coded as zero. |
||||
9.9.3.11 EPS attach type
The purpose of the EPS attach type information element is to indicate the type of the requested attach.
The EPS attach type information element is coded as shown in figure 9.9.3.11.1 and table 9.9.3.11.1.
The EPS attach type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS attach type IEI |
0 Spare |
EPS attach type value |
octet 1 |
Figure 9.9.3.11.1: EPS attach type information element
Table 9.9.3.11.1: EPS attach type information element
EPS attach type value (octet 1) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
1 |
EPS attach |
|
0 |
1 |
0 |
combined EPS/IMSI attach |
|
0 |
1 |
1 |
EPS RLOS attach (NOTE) |
|
1 |
1 |
0 |
EPS emergency attach |
|
1 |
1 |
1 |
reserved |
|
All other values are unused and shall be interpreted as "EPS attach", if received by the network. |
||||
Bit 4 of octet 1 is spare and shall be coded as zero. |
||||
NOTE: "EPS RLOS attach" shall be interpreted as "EPS attach" by a network not supporting attach for access to RLOS. |
9.9.3.12 EPS mobile identity
The purpose of the EPS mobile identity information element is to provide either the IMSI, the GUTI or the IMEI.
The EPS mobile identity information element is coded as shown in figures 9.9.3.12.1 and 9.9.3.12.2 and table 9.9.3.12.1.
The EPS mobile identity is a type 4 information element with a minimum length of 3 octets and a maximum length of 13 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS mobile identity IEI |
octet 1 |
|||||||
Length of EPS mobile identity contents |
octet 2 |
|||||||
1 |
1 |
1 |
1 |
odd/ even indic |
Type of identity |
octet 3 |
||
MCC digit 2 |
MCC digit 1 |
octet 4 |
||||||
MNC digit 3 |
MCC digit 3 |
octet 5 |
||||||
MNC digit 2 |
MNC digit 1 |
octet 6 |
||||||
MME Group ID |
octet 7 |
|||||||
MME Group ID (continued) |
octet 8 |
|||||||
MME Code |
octet 9 |
|||||||
M-TMSI |
octet 10 |
|||||||
M-TMSI (continued) |
octet 11 |
|||||||
M-TMSI (continued) |
octet 12 |
|||||||
M-TMSI (continued) |
octet 13 |
Figure 9.9.3.12.1: EPS mobile identity information element for type of identity "GUTI"
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS mobile identity IEI |
octet 1 |
|||||||
Length of EPS mobile identity contents |
octet 2 |
|||||||
Identity digit 1 |
odd/ even indic |
Type of identity |
octet 3 |
|||||
Identity digit p+1 |
Identity digit p |
octet 4* |
Figure 9.9.3.12.2: EPS mobile identity information element for type of identity "IMSI" or "IMEI"
Table 9.9.3.12.1: EPS mobile identity information element
Type of identity (octet 3) Bits |
|||
3 |
2 |
1 |
|
0 |
0 |
1 |
IMSI |
1 |
1 |
0 |
GUTI |
0 |
1 |
1 |
IMEI |
All other values are reserved. |
|||
Odd/even indication (octet 3) Bit |
|||
4 |
|||
0 |
even number of identity digits and also when the GUTI is used |
||
1 |
odd number of identity digits |
||
Identity digits (octet 4 etc) For the IMSI, this field is coded using BCD coding. If the number of identity digits is even then bits 5 to 8 of the last octet shall be filled with an end mark coded as "1111". |
|||
For the GUTI, then bits 5 to 8 of octet 3 are coded as "1111", octet 4 through 6 contain the MCC and MNC values as specified below, and bit 8 of octet 7 is the most significant bit and bit 1 of the last octet the least significant bit for the subsequent fields. The required fields for the GUTI are as defined in 3GPP TS 23.003 [2]. |
|||
MCC, Mobile country code (octet 4, octet 5 bits 1 to 4) The MCC field is coded as in ITU-T Recommendation E.212 [30], annex A. |
|||
MNC, Mobile network code (octet 5 bits 5 to 8, octet 6) The coding of this field is the responsibility of each administration but BCD coding shall be used. The MNC shall consist of 2 or 3 digits. If a network operator decides to use only two digits in the MNC, bits 5 to 8 of octet 5 shall be coded as "1111". The MCC and MNC digits are coded as octets 6 to 8 of the Temporary Mobile Group Identity IE in figure 10.5.154 of 3GPP TS 24.008 [13]. |
|||
For the IMEI, this field is coded using BCD coding. The format of the IMEI is described in 3GPP TS 23.003 [2]. |
|||
9.9.3.12A EPS network feature support
The purpose of the EPS network feature support information element is to indicate whether certain features are supported by the network.
The EPS network feature support information element is coded as shown in figure 9.9.3.12A.1 and table 9.9.3.12A.1.
The EPS network feature support is a type 4 information element with a minimum length of 3 octets and a maximum length of 5 octets.
If the network does not include octet 4 or octet 5 as defined below in the present version of the protocol, then the UE shall interpret this as a receipt of an information element with all bits of octet 4 and 5 coded as zero.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||||||||
EPS network feature support IEI |
octet 1 |
||||||||||||||||
Length of EPS network feature support contents |
octet 2 |
||||||||||||||||
CP CIoT |
ERw/oPDN |
ESR |
CS-LCS |
EPC-LCS |
EMC BS |
IMS VoPS |
octet 3 |
||||||||||
15 bearers |
IWKN26 |
RestrictDCNR |
RestrictEC |
ePCO |
HC-CP CIoT |
S1-U data |
UP CIoT |
octet 4* |
|||||||||
0 Spare |
0 Spare |
0 Spare |
PTCC |
PR |
RPR |
PIV |
NCR |
octet 5* |
Figure 9.9.3.12A.1: EPS network feature support information element
Table 9.9.3.12A.1: EPS network feature support information element
IMS voice over PS session indicator (IMS VoPS) (octet 3, bit 1) |
||||
Bit |
||||
1 |
||||
0 |
IMS voice over PS session in S1 mode not supported |
|||
1 |
IMS voice over PS session in S1 mode supported |
|||
Emergency bearer services indicator (EMC BS) (octet 3, bit 2) |
||||
Bit |
||||
2 |
||||
0 |
emergency bearer services in S1 mode not supported |
|||
1 |
emergency bearer services in S1 mode supported |
|||
Location services indicator in EPC (EPC-LCS) (octet 3, bit 3) |
||||
Bit |
||||
3 |
||||
0 |
location services via EPC not supported |
|||
1 |
location services via EPC supported |
|||
Location services indicator in CS (CS-LCS) (octet 3, bit 4 to 5) |
||||
Bit |
||||
5 |
4 |
|||
0 |
0 |
no information about support of location services via CS domain is available |
||
0 |
1 |
location services via CS domain supported |
||
1 |
0 |
location services via CS domain not supported |
||
1 |
1 |
reserved |
||
Support of EXTENDED SERVICE REQUEST for packet services (ESRPS) (octet 3, bit 6) |
||||
Bit |
||||
6 |
||||
0 |
network does not support use of EXTENDED SERVICE REQUEST to request for packet services |
|||
1 |
network supports use of EXTENDED SERVICE REQUEST to request for packet services |
|||
EMM REGISTERED without PDN connectivity (ERw/oPDN) (octet 3, bit 7) |
||||
This bit indicates the capability for EMM-REGISTERED without PDN connection |
||||
Bit |
||||
7 |
||||
0 |
EMM-REGISTERED without PDN connection not supported |
|||
1 |
EMM-REGISTERED without PDN connection supported |
|||
Control plane CIoT EPS optimization (CP CIoT) (octet 3, bit 8) |
||||
This bit indicates the capability for control plane CIoT EPS optimization |
||||
Bit |
||||
8 |
||||
0 |
Control plane CIoT EPS optimization not supported |
|||
1 |
Control plane CIoT EPS optimization supported |
|||
User plane CIoT EPS optimization (UP CIoT) (octet 4, bit 1) |
||||
This bit indicates the capability for user plane CIoT EPS optimization |
||||
Bit |
||||
1 |
||||
0 |
User plane CIoT EPS optimization not supported |
|||
1 |
User plane CIoT EPS optimization supported |
|||
S1-u data transfer (S1-U data) (octet 4, bit 2) |
||||
This bit indicates the capability for S1-u data transfer. This bit shall be considered only if the Control plane CIoT EPS optimization (CP CIoT) bit (octet 3, bit 8) is set to 1. If the Control plane CIoT EPS optimization (CP CIoT) bit (octet 3, bit 8) is set to 0, the UE shall assume S1-u data transfer is supported. |
||||
Bit |
||||
2 |
||||
0 |
S1-u data transfer not supported |
|||
1 |
S1-u data transfer supported |
|||
Header compression for control plane CIoT EPS optimization (HC-CP CIoT) (octet 4, bit 3) |
||||
This bit indicates the capability for header compression for control plane CIoT EPS optimization |
||||
Bit |
||||
3 |
||||
0 |
Header compression for control plane CIoT EPS optimization not supported |
|||
1 |
Header compression for control plane CIoT EPS optimization supported |
|||
Extended protocol configuration options (ePCO) (octet 4, bit 4) This bit indicates the support of the extended protocol configuration options IE. |
||||
Bit |
||||
4 |
||||
0 |
Extended protocol configuration options IE not supported |
|||
1 |
Extended protocol configuration options IE supported |
|||
Restriction on enhanced coverage (RestrictEC) (octet 4, bit 5) This bit indicates if the use of enhanced coverage is restricted or not. |
||||
Bit |
||||
5 |
||||
0 |
Use of enhanced coverage is not restricted |
|||
1 |
Use of enhanced coverage is restricted |
|||
Restriction on the use of dual connectivity with NR (RestrictDCNR) (octet 4, bit 6) This bit indicates if the use of dual connectivity with NR is restricted or not. |
||||
Bit |
||||
6 |
||||
0 |
Use of dual connectivity with NR is not restricted |
|||
1 |
Use of dual connectivity with NR is restricted |
|||
Interworking without N26 interface indicator (IWK N26) (octet 4, bit 7) This bit indicates whether interworking without N26 interface is supported. |
||||
Bit |
||||
7 |
||||
0 |
Interworking without N26 interface not supported |
|||
1 |
Interworking without N26 interface supported |
|||
Signalling for a maximum number of 15 EPS bearer contexts (15 bearers) (octet 4, bit 8) This bit indicates the support of signalling for a maximum number of 15 EPS bearer contexts. |
||||
Bit |
||||
8 |
||||
0 |
Signalling for a maximum number of 15 EPS bearer contexts not supported |
|||
1 |
Signalling for a maximum number of 15 EPS bearer contexts supported |
|||
NAS signalling connection release (NCR) (octet 5, bit 1) |
||||
This bit indicates the support of NAS signalling connection release. |
||||
Bit |
||||
1 |
||||
0 |
NAS signalling connection release not supported |
|||
1 |
NAS signalling connection release supported |
|||
Paging indication for voice services (PIV) (octet 5, bit 2) |
||||
This bit indicates the support of paging indication for voice services. |
||||
Bit |
||||
2 |
||||
0 |
paging indication for voice services not supported |
|||
1 |
paging indication for voice services supported |
|||
Reject paging request (RPR) (octet 5, bit 3) |
||||
This bit indicates the support of reject paging request. |
||||
Bit |
||||
3 |
||||
0 |
reject paging request not supported |
|||
1 |
reject paging request supported |
|||
Paging restriction (PR) (octet 5, bit 4) |
||||
This bit indicates the support of paging restriction. |
||||
Bit |
||||
4 |
||||
0 |
paging restriction not supported |
|||
1 |
paging restriction supported |
|||
Paging timing collision control (PTCC) (octet 5, bit 5) |
||||
This bit indicates the support of paging timing collision control. |
||||
Bit |
||||
5 |
||||
0 |
paging timing collision control not supported |
|||
1 |
paging timing collision control supported |
|||
Bits 6 to 8 in octet 5 are spare and shall be coded as zero if included. |
||||
9.9.3.13 EPS update result
The purpose of the EPS update result information element is to specify the result of the associated updating procedure.
The EPS update result information element is coded as shown in figure 9.9.3.13.1 and table 9.9.3.13.1.
The EPS update result is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS update result IEI |
0 Spare |
EPS update result value |
octet 1 |
Figure 9.9.3.13.1: EPS update result information element
Table 9.9.3.13.1: EPS update result information element
EPS update result value (octet 1, bit 1 to 3) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
TA updated |
|
0 |
0 |
1 |
combined TA/LA updated |
|
1 |
0 |
0 |
TA updated and ISR activated (NOTE) |
|
1 |
0 |
1 |
combined TA/LA updated and ISR activated (NOTE) |
|
All other values are reserved. |
||||
Bit 4 of octet 1 is spare and shall be coded as zero. |
||||
NOTE: Values "TA updated and ISR activated" and "combined TA/LA updated and ISR activated" are used only for a UE supporting also A/Gb or Iu mode. |
9.9.3.14 EPS update type
The purpose of the EPS update type information element is to specify the area the updating procedure is associated with.
The EPS update type information element is coded as shown in figure 9.9.3.14.1 and table 9.9.3.14.1.
The EPS update type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS update type IEI |
"Active" flag |
EPS update type Value |
octet 1 |
Figure 9.9.3.14.1: EPS update type information element
Table 9.9.3.14.1: EPS update type information element
EPS update type value (octet 1, bit 1 to 3) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
TA updating |
|
0 |
0 |
1 |
combined TA/LA updating |
|
0 |
1 |
0 |
combined TA/LA updating with IMSI attach |
|
0 |
1 |
1 |
periodic updating |
|
1 |
0 |
0 |
unused; shall be interpreted as "TA updating", if received by the network. |
|
1 |
0 |
1 |
unused; shall be interpreted as "TA updating", if received by the network. |
|
All other values are reserved. |
||||
"Active" flag (octet 1, bit 4) |
||||
Bit |
||||
4 |
||||
0 |
No bearer establishment requested |
|||
1 |
Bearer establishment requested |
|||
9.9.3.15 ESM message container
The purpose of the ESM message container information element is to enable piggybacked transfer of a single ESM message within an EMM message. The ESM message included in this IE shall be coded as specified in clause 8.3, i.e. without NAS security header.
The ESM message container information element is coded as shown in figure 9.9.3.15.1 and table 9.9.3.15.1.
The ESM message container is a type 6 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
ESM message container IEI |
octet 1 |
|||||||
Length of ESM message container contents |
octet 2 |
|||||||
octet 3 |
||||||||
octet 4 |
||||||||
ESM message container contents |
||||||||
octet n |
Figure 9.9.3.15.1: ESM message container information element
Table 9.9.3.15.1: ESM message container information element
ESM message container contents (octet 4 to octet n); Max value of 65535 octets |
This IE can contain any ESM PDU as defined in clause 8.3. |
9.9.3.16 GPRS timer
See clause 10.5.7.3 in 3GPP TS 24.008 [13].
9.9.3.16A GPRS timer 2
See clause 10.5.7.4 in 3GPP TS 24.008 [13].
9.9.3.16B GPRS timer 3
See clause 10.5.7.4a in 3GPP TS 24.008 [13].
9.9.3.17 Identity type 2
See clause 10.5.5.9 in 3GPP TS 24.008 [13].
9.9.3.18 IMEISV request
See clause 10.5.5.10 in 3GPP TS 24.008 [13].
9.9.3.19 KSI and sequence number
The purpose of the KSI and sequence number information element is to provide the network with the key set identifier (KSI) value of the current EPS security context and the 5 least significant bits of the NAS COUNT value applicable for the message including this information element.
The KSI and sequence number information element is coded as shown in figure 9.9.3.19.1 and table 9.9.3.19.1.
The KSI and sequence number is a type 3 information element with a length of 2 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||
KSI and sequence number IEI |
octet 1 |
||||||||
KSI |
Sequence number (short) |
octet 2 |
Figure 9.9.3.19.1: KSI and sequence number information element
Table 9.9.3.19.1: KSI and sequence number information element
Sequence number (short) (octet 2, bit 1 to 5) |
This field contains the 5 least significant bits of the NAS COUNT value applicable when this message is sent. |
KSI (octet 2, bit 6 to 8) |
This field contains the key set identifier value, as specified in bit 1 to 3 of octet 1 of the NAS key set identifier information element. (see clause 9.9.3.21.) |
9.9.3.20 MS network capability
See clause 10.5.5.12 in 3GPP TS 24.008 [13].
9.9.3.20A MS network feature support
See clause 10.5.1.15 in 3GPP TS 24.008 [13].
9.9.3.21 NAS key set identifier
The NAS key set identifier is allocated by the network.
The NAS key set identifier information element is coded as shown in figure 9.9.3.21.1 and table 9.9.3.21.1.
The NAS key set identifier is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
NAS key set identifier IEI |
TSC |
NAS key set identifier |
octet 1 |
Figure 9.9.3.21.1: NAS key set identifier information element
Table 9.9.3.21.1: NAS key set identifier information element
Type of security context flag (TSC) (octet 1) |
|||
Bit |
|||
4 |
|||
0 |
native security context (for KSIASME or KSIAMF) |
||
1 |
mapped security context (for KSISGSN or KSIAMF) |
||
TSC does not apply for NAS key set identifier value "111". |
|||
NAS key set identifier (octet 1) |
|||
Bits |
|||
3 |
2 |
1 |
|
0 |
0 |
0 |
|
through |
possible values for the NAS key set identifier |
||
1 |
1 |
0 |
|
1 |
1 |
1 |
no key is available (UE to network); |
reserved (network to UE) |
9.9.3.22 NAS message container
This information element is used to encapsulate the SMS messages transferred between the UE and the network. The NAS message container information element is coded as shown in figure 9.9.3.22.1 and table 9.9.3.22.1.
The NAS message container is a type 4 information element with a minimum length of 4 octets and a maximum length of 253 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
NAS message container IEI |
octet 1 |
|||||||
Length of NAS message container contents |
octet 2 |
|||||||
octet 3 |
||||||||
NAS message container contents |
||||||||
octet n |
Figure 9.9.3.22.1: NAS message container information element
Table 9.9.3.22.1: NAS message container information element
NAS message container contents (octet 3 to octet n) |
This IE can contain an SMS message (i.e. CP-DATA, CP-ACK or CP-ERROR) as defined in clause 7.2 in 3GPP TS 24.011 [13A]. |
9.9.3.23 NAS security algorithms
The purpose of the NAS security algorithms information element is to indicate the algorithms to be used for ciphering and integrity protection.
The NAS security algorithms information element is coded as shown in figure 9.9.3.23.1 and table 9.9.3.23.1.
The NAS security algorithms is a type 3 information element with a length of 2 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
NAS security algorithms IEI |
octet 1 |
|||||||
0 spare |
Type of ciphering algorithm |
0 spare |
Type of integrity protection algorithm |
octet 2 |
Figure 9.9.3.23.1: NAS security algorithms information element
Table 9.9.3.23.1: NAS security algorithms information element
Type of integrity protection algorithm (octet 2, bit 1 to 3) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
EPS integrity algorithm EIA0 (null integrity protection algorithm) |
|
0 |
0 |
1 |
EPS integrity algorithm 128-EIA1 |
|
0 |
1 |
0 |
EPS integrity algorithm 128-EIA2 |
|
0 |
1 |
1 |
EPS integrity algorithm 128-EIA3 |
|
1 |
0 |
0 |
EPS integrity algorithm EIA4 |
|
1 |
0 |
1 |
EPS integrity algorithm EIA5 |
|
1 |
1 |
0 |
EPS integrity algorithm EIA6 |
|
1 |
1 |
1 |
EPS integrity algorithm EIA7 |
|
Type of ciphering algorithm (octet 2, bit 5 to 7) |
||||
Bits |
||||
7 |
6 |
5 |
||
0 |
0 |
0 |
EPS encryption algorithm EEA0 (null ciphering algorithm) |
|
0 |
0 |
1 |
EPS encryption algorithm 128-EEA1 |
|
0 |
1 |
0 |
EPS encryption algorithm 128-EEA2 |
|
0 |
1 |
1 |
EPS encryption algorithm 128-EEA3 |
|
1 |
0 |
0 |
EPS encryption algorithm EEA4 |
|
1 |
0 |
1 |
EPS encryption algorithm EEA5 |
|
1 |
1 |
0 |
EPS encryption algorithm EEA6 |
|
1 |
1 |
1 |
EPS encryption algorithm EEA7 |
|
Bit 4 and 8 of octet 2 are spare and shall be coded as zero. |
||||
9.9.3.24 Network name
See clause 10.5.3.5a in 3GPP TS 24.008 [13].
9.9.3.24A Network resource identifier container
See clause 10.5.5.31 in 3GPP TS 24.008 [13].
9.9.3.25 Nonce
The purpose of the Nonce information element is to transfer a 32-bit nonce value to support deriving a new mapped EPS security context.
The Nonce information element is coded as shown in figure 9.9.3.25.1 and table 9.9.3.25.1.
The Nonce is a type 3 information element with a length of 5 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Nonce IEI |
octet 1 |
|||||||
Nonce value |
octet 2 octet 5 |
Figure 9.9.3.25.1: Nonce information element
Table 9.9.3.25.1: Nonce information element
Nonce value (octet 2 to 5) |
This field contains the binary representation of the nonce. Bit 8 of octet 2 represents the most significant bit of the nonce and bit 1 of octet 5 the least significant bit. |
9.9.3.25A Paging identity
The purpose of the Paging identity information element is to indicate the identity used for paging for non-EPS services.
The Paging identity information element is coded as shown in figure 9.9.3.25A.1 and table 9.9.3.25A.1.
The Paging identity is a type 3 information element with 2 octets length.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Paging identity IEI |
octet 1 |
|||||||
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Paging identity value |
octet 2 |
spare |
Figure 9.9.3.25A.1: Paging identity information element
Table 9.9.3.25A.1: Paging identity information element
Paging identity value (octet 2) |
Bit |
1 |
0 IMSI |
1 TMSI |
9.9.3.26 P-TMSI signature
See clause 10.5.5.8 in 3GPP TS 24.008 [13].
9.9.3.26A Extended EMM cause
The purpose of the extended EMM cause information element is to indicate additional information associated with the EMM cause.
The Extended EMM cause information element is coded as shown in figure 9.9.3.26A.1 and table 9.9.3.26A.1.
The Extended EMM cause is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Extended EMM cause IEI |
0 Spare |
NB-IoT allowed |
EPS optimization info |
E-UTRAN allowed |
Octet 1 |
Figure 9.9.3.26A.1: Extended EMM cause information element
Table 9.9.3.26A.1: Extended EMM cause information element
E-UTRAN allowed value (octet 1, bit 1) |
||
Bit |
||
1 |
||
0 |
E-UTRAN allowed |
|
1 |
E-UTRAN not allowed |
|
EPS optimization info (octet 1, bit 2) |
||
Bit |
||
0 |
No EPS optimization information |
|
1 |
requested EPS optimization not supported |
|
NB-IoT allowed value (octet 1, bit 3) |
||
Bit |
||
0 |
NB-IoT allowed |
|
1 |
NB-IoT not allowed |
|
Bit 4 of octet 1 is spare and shall be coded as zero. |
||
9.9.3.27 Service type
The purpose of the Service type information element is to specify the purpose of the service request procedure.
The Service type information element is coded as shown in figure 9.9.3.27.1 and table 9.9.3.27.1.
The Service type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Service type IEI |
Service type value |
octet 1 |
Figure 9.9.3.27.1: Service type information element
Table 9.9.3.27.1: Service type information element
Service type value (octet 1) |
||||
Service type value |
||||
Bits |
||||
4 |
3 |
2 |
1 |
|
0 |
0 |
0 |
0 |
mobile originating CS fallback or 1xCS fallback |
0 |
0 |
0 |
1 |
mobile terminating CS fallback or 1xCS fallback |
0 |
0 |
1 |
0 |
mobile originating CS fallback emergency call or 1xCS fallback emergency call |
0 |
0 |
1 |
1 |
unused; shall be interpreted as "mobile originating CS fallback or 1xCS fallback", if received by the network |
0 |
1 |
0 |
0 |
unused; shall be interpreted as "mobile originating CS fallback or 1xCS fallback", if received by the network |
1 |
0 |
0 |
0 |
packet services via S1 |
1 |
0 |
0 |
1 |
unused; shall be interpreted as "packet services via S1", if received by the network |
1 |
0 |
1 |
0 |
unused; shall be interpreted as "packet services via S1", if received by the network |
1 |
0 |
1 |
1 |
unused; shall be interpreted as "packet services via S1", if received by the network |
All other values are reserved. |
||||
9.9.3.28 Short MAC
The purpose of the Short MAC information element is to protect the integrity of a SERVICE REQUEST message.
The integrity protection shall include octet 1 and 2 of the SERVICE REQUEST message. For the used algorithm and other input parameters to the algorithm see clause 9.5. Only the 2 least significant octets of the resulting message authentication code are included in the information element.
The Short MAC information element is coded as shown in figure 9.9.3.28.1 and table 9.9.3.28.1.
The Short MAC is a type 3 information element with a length of 3 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Short MAC IEI |
octet 1 |
|||||||
Short MAC value |
octet 2 |
|||||||
Short MAC value (continued) |
octet 3 |
Figure 9.9.3.28.1: Short MAC information element
Table 9.9.3.28.1: Short MAC information element
Short MAC value (octet 2 and 3) |
This field contains the 2 least significant octets of the message authentication code calculated for the SERVICE REQUEST message. Bit 1 of octet 3 contains the least significant bit, and bit 8 of octet 2 the most significant bit of these 2 octets. |
9.9.3.29 Time zone
See clause 10.5.3.8 in 3GPP TS 24.008 [13].
9.9.3.30 Time zone and time
See clause 10.5.3.9 in 3GPP TS 24.008 [13].
9.9.3.31 TMSI status
See clause 10.5.5.4 in 3GPP TS 24.008 [13].
9.9.3.32 Tracking area identity
The purpose of the Tracking area identity information element is to provide an unambiguous identification of tracking areas within the area covered by the 3GPP system.
The Tracking area identity information element is coded as shown in figure 9.9.3.32.1 and table 9.9.3.32.1.
The Tracking area identity is a type 3 information element with a length of 6 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Tracking area identity IEI |
octet 1 |
|||||||
MCC digit 2 |
MCC digit 1 |
octet 2 |
||||||
MNC digit 3 |
MCC digit 3 |
octet 3 |
||||||
MNC digit 2 |
MNC digit 1 |
octet 4 |
||||||
TAC |
octet 5 |
|||||||
TAC (continued) |
octet 6 |
Figure 9.9.3.32.1: Tracking area identity information element
Table 9.9.3.32.1: Tracking area identity information element
MCC, Mobile country code (octet 2 and 3) The MCC field is coded as in ITU-T Rec. E212 [30], annex A. If the TAI is deleted the MCC and MNC shall take the value from the deleted TAI. In abnormal cases, the MCC stored in the UE can contain elements not in the set {0, 1 … 9}. In such cases the UE should transmit the stored values using full hexadecimal encoding. When receiving such an MCC, the network shall treat the TAI as deleted. MNC, Mobile network code (octet 3 bits 5 to 8, octet 4) The coding of this field is the responsibility of each administration, but BCD coding shall be used. The MNC shall consist of 2 or 3 digits. For PCS 1900 for NA, Federal regulation mandates that a 3-digit MNC shall be used. However a network operator may decide to use only two digits in the MNC in the TAI over the radio interface. In this case, bits 5 to 8 of octet 3 shall be coded as "1111". Mobile equipment shall accept a TAI coded in such a way. In abnormal cases, the MNC stored in the UE can have: – digit 1 or 2 not in the set {0, 1 … 9}, or – digit 3 not in the set {0, 1 … 9, F} hex. In such cases the UE shall transmit the stored values using full hexadecimal encoding. When receiving such an MNC, the network shall treat the TAI as deleted. The same handling shall apply for the network, if a 3-digit MNC is sent by the UE to a network using only a 2-digit MNC. TAC, Tracking area code (octet 5 and 6) In the TAC field bit 8 of octet 5 is the most significant bit and bit 1 of octet 6 the least significant bit. The coding of the tracking area code is the responsibility of each administration except that two values are used to mark the TAC, and hence the TAI, as deleted. Coding using full hexadecimal representation may be used. The tracking area code consists of 2 octets. If a TAI has to be deleted then all bits of the tracking area code shall be set to one with the exception of the least significant bit which shall be set to zero. If a USIM is inserted in a mobile equipment with the tracking area code containing all zeros, then the mobile equipment shall recognise this TAC as part of a deleted TAI. |
9.9.3.33 Tracking area identity list
The purpose of the Tracking area identity list information element is to transfer a list of tracking areas from the network to the UE.
The coding of the information element allows combining different types of lists. The lists of type "00" and "01" allow a more compact encoding, when the different TAIs are sharing the PLMN identity.
The Tracking area identity list information element is coded as shown in figure 9.9.3.33.1, figure 9.9.3.33.2, figure 9.9.3.33.3, figure 9.9.3.33.4 and table 9.9.3.33.1.
The Tracking area identity list is a type 4 information element, with a minimum length of 8 octets and a maximum length of 98 octets. The list can contain a maximum of 16 different tracking area identities.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Tracking area identity list IEI |
octet 1 |
|||||||
Length of tracking area identity list contents |
octet 2 |
|||||||
Partial tracking area identity list 1 |
octet 3 octet i |
|||||||
Partial tracking area identity list 2 |
octet i+1* octet l* |
|||||||
… |
octet l+1* octet m* |
|||||||
Partial tracking area identity list p |
octet m+1* octet n* |
Figure 9.9.3.33.1: Tracking area identity list information element
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
0 Spare |
Type of list |
Number of elements |
octet 1 |
|||||
MCC digit 2 |
MCC digit 1 |
octet 2 |
||||||
MNC digit 3 |
MCC digit 3 |
octet 3 |
||||||
MNC digit 2 |
MNC digit 1 |
octet 4 |
||||||
TAC 1 |
octet 5 |
|||||||
TAC 1 (continued) |
octet 6 |
|||||||
… |
… |
|||||||
… |
… |
|||||||
TAC k |
octet 2k+3* |
|||||||
TAC k (continued) |
octet 2k+4* |
Figure 9.9.3.33.2: Partial tracking area identity list – type of list = "00"
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
0 Spare |
Type of list |
Number of elements |
octet 1 |
|||||
MCC digit 2 |
MCC digit 1 |
octet 2 |
||||||
MNC digit 3 |
MCC digit 3 |
octet 3 |
||||||
MNC digit 2 |
MNC digit 1 |
octet 4 |
||||||
TAC 1 |
octet 5 |
|||||||
TAC 1 (continued) |
octet 6 |
Figure 9.9.3.33.3: Partial tracking area identity list – type of list = "01"
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
0 Spare |
Type of list |
Number of elements |
octet 1 |
|||||
MCC digit 2 |
MCC digit 1 |
octet 2 |
||||||
MNC digit 3 |
MCC digit 3 |
octet 3 |
||||||
MNC digit 2 |
MNC digit 1 |
octet 4 |
||||||
TAC 1 |
octet 5 |
|||||||
TAC 1 (continued) |
octet 6 |
|||||||
MCC digit 2 |
MCC digit 1 |
octet 7* |
||||||
MNC digit 3 |
MCC digit 3 |
octet 8* |
||||||
MNC digit 2 |
MNC digit 1 |
octet 9* |
||||||
TAC 2 |
octet 10* |
|||||||
TAC 2 (continued) |
octet 11* |
|||||||
… |
||||||||
… |
||||||||
MCC digit 2 |
MCC digit 1 |
octet 5k-3* |
||||||
MNC digit 3 |
MCC digit 3 |
octet 5k-2* |
||||||
MNC digit 2 |
MNC digit 1 |
octet 5k-1* |
||||||
TAC k |
octet 5k* |
|||||||
TAC k (continued) |
octet 5k+1* |
Figure 9.9.3.33.4: Partial tracking area identity list – type of list = "10"
Table 9.9.3.33.1: Tracking area identity list information element
Value part of the Tracking area identity list information element (octet 3 to n) |
|||||
The value part of the Tracking area identity list information element consists of one or several partial tracking area identity lists. The length of each partial tracking area identity list can be determined from the ‘type of list’ field and the ‘number of elements’ field in the first octet of the partial tracking area identity list. |
|||||
The UE shall store the complete list received. If more than 16 TAIs are included in this information element, the UE shall store the first 16 TAIs and ignore the remaining octets of the information element. |
|||||
Partial tracking area identity list: |
|||||
Type of list (octet 1) |
|||||
Bits |
|||||
7 |
6 |
||||
0 |
0 |
list of TACs belonging to one PLMN, with non-consecutive TAC values |
|||
0 |
1 |
list of TACs belonging to one PLMN, with consecutive TAC values |
|||
1 |
0 |
list of TAIs belonging to different PLMNs (see NOTE) |
|||
All other values are reserved. |
|||||
Number of elements (octet 1) |
|||||
Bits |
|||||
5 |
4 |
3 |
2 |
1 |
|
0 |
0 |
0 |
0 |
0 |
1 element |
0 |
0 |
0 |
0 |
1 |
2 elements |
0 |
0 |
0 |
1 |
0 |
3 elements |
… |
|||||
0 |
1 |
1 |
0 |
1 |
14 elements |
0 |
1 |
1 |
1 |
0 |
15 elements |
0 |
1 |
1 |
1 |
1 |
16 elements |
All other values are unused and shall be interpreted as 16, if received by the UE. |
|||||
Bit 8 of octet 1 is spare and shall be coded as zero. |
|||||
For type of list = "00" and number of elements = k: |
|||||
octet 2 to 4 contain the MCC+MNC, and |
|||||
for j = 1, k: |
|||||
octet 2j+3 and 2j+4 contain the TAC of the j-th TAI belonging to the partial list, |
|||||
For type of list = "01" and number of elements = k: |
|||||
octet 2 to 4 contain the MCC+MNC, and |
|||||
octet 5 and 6 contain the TAC of the first TAI belonging to the partial list. |
|||||
The TAC values of the other k-1 TAIs are TAC+1, TAC+2, …, TAC+k-1. |
|||||
For type of list = "10" and number of elements = k: |
|||||
for j = 1, k. |
|||||
octet 5j-3 to 5j-1 contain the MCC+MNC, and |
|||||
octet 5j and 5j+1 contain the TAC of the j-th TAI belonging to the partial list. |
|||||
MCC, Mobile country code |
|||||
The MCC field is coded as in ITU-T Recommendation E.212 [30], annex A. |
|||||
MNC, Mobile network code |
|||||
The coding of this field is the responsibility of each administration but BCD coding shall be used. The MNC shall consist of 2 or 3 digits. If a network operator decides to use only two digits in the MNC, MNC digit 3 shall be coded as "1111". |
|||||
TAC, Tracking area code |
|||||
In the TAC field bit 8 of the first octet is the most significant bit and bit 1 of second octet the least significant bit. |
|||||
The coding of the tracking area code is the responsibility of each administration. Coding using full hexadecimal representation may be used. The tracking area code consists of 2 octets. |
|||||
NOTE: If the "list of TAIs belonging to different PLMNs" is used, the PLMNs included in the list need to be present in the list of "equivalent PLMNs". |
9.9.3.34 UE network capability
The purpose of the UE network capability information element is to provide the network with information concerning aspects of the UE related to EPS or interworking with GPRS and 5GS. The contents might affect the manner in which the network handles the operation of the UE. The UE network capability information indicates general UE characteristics and it shall therefore, except for fields explicitly indicated, be independent of the frequency band of the channel it is sent on.
The UE network capability information element is coded as shown in figure 9.9.3.34.1 and table 9.9.3.34.1.
The UE network capability is a type 4 information element with a minimum length of 4 octets and a maximum length of 15 octets.
NOTE: The requirements for the support of UMTS security algorithms in the UE are specified in 3GPP TS 33.102 [18], and the requirements for the support of EPS security algorithms in 3GPP TS 33.401 [19].
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|||||||||||||||||||
UE network capability IEI |
octet 1 |
|||||||||||||||||||||||||
Length of UE network capability contents |
octet 2 |
|||||||||||||||||||||||||
EEA0 |
128- EEA1 |
128- EEA2 |
128- EEA3 |
EEA4 |
EEA5 |
EEA6 |
EEA7 |
octet 3 |
||||||||||||||||||
EIA0 |
128- EIA1 |
128- EIA2 |
128- EIA3 |
EIA4 |
EIA5 |
EIA6 |
EPS-UPIP |
octet 4 |
||||||||||||||||||
UEA0 |
UEA1 |
UEA2 |
UEA3 |
UEA4 |
UEA5 |
UEA6 |
UEA7 |
octet 5* |
||||||||||||||||||
UCS2 |
UIA1 |
UIA2 |
UIA3 |
UIA4 |
UIA5 |
UIA6 |
UIA7 |
octet 6* |
||||||||||||||||||
ProSe-dd |
ProSe |
H.245-ASH |
ACC-CSFB |
LPP |
LCS |
1xSR VCC |
NF |
octet 7* |
||||||||||||||||||
ePCO |
HC-CP CIoT |
ERw/oPDN |
S1-U data |
UP CIoT |
CP CIoT |
Prose-relay |
ProSe-dc |
octet 8* |
||||||||||||||||||
15 bearers |
SGC |
N1mode |
DCNR |
CP backoff |
RestrictEC |
V2X PC5 |
multipleDRB |
octet 9* |
||||||||||||||||||
RPR |
PIV |
NCR |
V2X NR-PC5 |
UP-MT-EDT |
CP-MT-EDT |
WUSA |
RACS |
octet 10* |
||||||||||||||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
PTCC |
PR |
octet 11* |
||||||||||||||||||
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
octet 12* -15* |
||||||||||||||||||
Spare |
Figure 9.9.3.34.1: UE network capability information element
Table 9.9.3.34.1: UE network capability information element
EPS encryption algorithms supported (octet 3) |
|||||||||||||||
EPS encryption algorithm EEA0 supported (octet 3, bit 8) |
|||||||||||||||
0 |
EPS encryption algorithm EEA0 not supported |
||||||||||||||
1 |
EPS encryption algorithm EEA0 supported |
||||||||||||||
EPS encryption algorithm 128-EEA1 supported (octet 3, bit 7) |
|||||||||||||||
0 |
EPS encryption algorithm 128-EEA1 not supported |
||||||||||||||
1 |
EPS encryption algorithm 128-EEA1 supported |
||||||||||||||
EPS encryption algorithm 128-EEA2 supported (octet 3, bit 6) |
|||||||||||||||
0 |
EPS encryption algorithm 128-EEA2 not supported |
||||||||||||||
1 |
EPS encryption algorithm 128-EEA2 supported |
||||||||||||||
EPS encryption algorithm 128-EEA3 supported (octet 3, bit 5) |
|||||||||||||||
0 |
EPS encryption algorithm 128-EEA3 not supported |
||||||||||||||
1 |
EPS encryption algorithm 128-EEA3 supported |
||||||||||||||
EPS encryption algorithm EEA4 supported (octet 3, bit 4) |
|||||||||||||||
0 |
EPS encryption algorithm EEA4 not supported |
||||||||||||||
1 |
EPS encryption algorithm EEA4 supported |
||||||||||||||
EPS encryption algorithm EEA5 supported (octet 3, bit 3) |
|||||||||||||||
0 |
EPS encryption algorithm EEA5 not supported |
||||||||||||||
1 |
EPS encryption algorithm EEA5 supported |
||||||||||||||
EPS encryption algorithm EEA6 supported (octet 3, bit 2) |
|||||||||||||||
0 |
EPS encryption algorithm EEA6 not supported |
||||||||||||||
1 |
EPS encryption algorithm EEA6 supported |
||||||||||||||
EPS encryption algorithm EEA7 supported (octet 3, bit 1) |
|||||||||||||||
0 |
EPS encryption algorithm EEA7 not supported |
||||||||||||||
1 |
EPS encryption algorithm EEA7 supported |
||||||||||||||
EPS integrity algorithms supported (octet 4) |
|||||||||||||||
EPS integrity algorithm EIA0 supported (octet 4, bit 8) |
|||||||||||||||
0 |
EPS integrity algorithm EIA0 not supported |
||||||||||||||
1 |
EPS integrity algorithm EIA0 supported |
||||||||||||||
EPS integrity algorithm 128-EIA1 supported (octet 4, bit 7) |
|||||||||||||||
0 |
EPS integrity algorithm 128-EIA1 not supported |
||||||||||||||
1 |
EPS integrity algorithm 128-EIA1 supported |
||||||||||||||
EPS integrity algorithm 128-EIA2 supported (octet 4, bit 6) |
|||||||||||||||
0 |
EPS integrity algorithm 128-EIA2 not supported |
||||||||||||||
1 |
EPS integrity algorithm 128-EIA2 supported |
||||||||||||||
EPS integrity algorithm 128-EIA3 supported (octet 4, bit 5) |
|||||||||||||||
0 |
EPS integrity algorithm 128-EIA3 not supported |
||||||||||||||
1 |
EPS integrity algorithm 128-EIA3 supported |
||||||||||||||
EPS integrity algorithm EIA4 supported (octet 4, bit 4) |
|||||||||||||||
0 |
EPS integrity algorithm EIA4 not supported |
||||||||||||||
1 |
EPS integrity algorithm EIA4 supported |
||||||||||||||
EPS integrity algorithm EIA5 supported (octet 4, bit 3) |
|||||||||||||||
0 |
EPS integrity algorithm EIA5 not supported |
||||||||||||||
1 |
EPS integrity algorithm EIA5 supported |
||||||||||||||
EPS integrity algorithm EIA6 supported (octet 4, bit 2) |
|||||||||||||||
0 |
EPS integrity algorithm EIA6 not supported |
||||||||||||||
1 |
EPS integrity algorithm EIA6 supported |
||||||||||||||
EPS-UPIP supported (octet 4, bit 1) |
|||||||||||||||
0 |
EPS-UPIP not supported |
||||||||||||||
1 |
EPS-UPIP supported |
||||||||||||||
UMTS encryption algorithms supported (octet 5) |
|||||||||||||||
UMTS encryption algorithm UEA0 supported (octet 5, bit 8) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA0 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA0 supported |
||||||||||||||
UMTS encryption algorithm UEA1 supported (octet 5, bit 7) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA1 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA1 supported |
||||||||||||||
UMTS encryption algorithm UEA2 supported (octet 5, bit 6) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA2 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA2 supported |
||||||||||||||
UMTS encryption algorithm UEA3 supported (octet 5, bit 5) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA3 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA3 supported |
||||||||||||||
UMTS encryption algorithm UEA4 supported (octet 5, bit 4) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA4 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA4 supported |
||||||||||||||
UMTS encryption algorithm UEA5 supported (octet 5, bit 3) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA5 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA5 supported |
||||||||||||||
UMTS encryption algorithm UEA6 supported (octet 5, bit 2) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA6 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA6 supported |
||||||||||||||
UMTS encryption algorithm UEA7 supported (octet 5, bit 1) |
|||||||||||||||
0 |
UMTS encryption algorithm UEA7 not supported |
||||||||||||||
1 |
UMTS encryption algorithm UEA7 supported |
||||||||||||||
UCS2 support (UCS2) (octet 6, bit 8) |
|||||||||||||||
This information field indicates the likely treatment of UCS2 encoded character strings by the UE. |
|||||||||||||||
0 |
The UE has a preference for the default alphabet (defined in |
||||||||||||||
3GPP TS 23.038 [3]) over UCS2 (see ISO/IEC 10646 [29]). |
|||||||||||||||
1 |
The UE has no preference between the use of the default alphabet and |
||||||||||||||
the use of UCS2. |
|||||||||||||||
UMTS integrity algorithms supported (octet 6) |
|||||||||||||||
UMTS integrity algorithm UIA1 supported (octet 6, bit 7) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA1 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA1 supported |
||||||||||||||
UMTS integrity algorithm UIA2 supported (octet 6, bit 6) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA2 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA2 supported |
||||||||||||||
UMTS integrity algorithm UIA3 supported (octet 6, bit 5) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA3 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA3 supported |
||||||||||||||
UMTS integrity algorithm UIA4 supported (octet 6, bit 4) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA4 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA4 supported |
||||||||||||||
UMTS integrity algorithm UIA5 supported (octet 6, bit 3) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA5 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA5 supported |
||||||||||||||
UMTS integrity algorithm UIA6 supported (octet 6, bit 2) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA6 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA6 supported |
||||||||||||||
UMTS integrity algorithm UIA7 supported (octet 6, bit 1) |
|||||||||||||||
0 |
UMTS integrity algorithm UIA7 not supported |
||||||||||||||
1 |
UMTS integrity algorithm UIA7 supported |
||||||||||||||
NF capability (octet 7, bit 1) |
|||||||||||||||
0 |
notification procedure not supported |
||||||||||||||
1 |
notification procedure supported |
||||||||||||||
1xSRVCC capability (octet 7, bit 2) |
|||||||||||||||
0 |
SRVCC from E-UTRAN to cdma2000® 1x CS not supported |
||||||||||||||
1 |
SRVCC from E-UTRAN to cdma2000® 1x CS supported |
||||||||||||||
(see 3GPP TS 23.216 [8]) |
|||||||||||||||
Location services (LCS) notification mechanisms capability (octet 7, bit 3) |
|||||||||||||||
0 |
LCS notification mechanisms not supported |
||||||||||||||
1 |
LCS notification mechanisms supported (see 3GPP TS 24.171 [13C]) |
||||||||||||||
LTE Positioning Protocol (LPP) capability (octet 7, bit 4) |
|||||||||||||||
0 |
LPP not supported |
||||||||||||||
1 |
LPP supported (see 3GPP TS 36.355 [22A]) |
||||||||||||||
Access class control for CSFB (ACC-CSFB) capability (octet 7, bit 5) |
|||||||||||||||
0 |
eNodeB-based access class control for CSFB not supported |
||||||||||||||
1 |
eNodeB-based access class control for CSFB supported (see 3GPP TS 22.011 [1A]) |
||||||||||||||
H.245 After SRVCC Handover capability (H.245-ASH) (octet 7, bit 6) This bit indicates the capability for H.245 with support and use of pre-defined codecs, and if needed, H.245 codec negotiation after SRVCC handover. |
|||||||||||||||
0 |
H.245 after SRVCC handover capability not supported |
||||||||||||||
1 |
H.245 after SRVCC handover capability supported (see 3GPP TS 23.216 [8]) |
||||||||||||||
ProSe (octet 7, bit 7) This bit indicates the capability for ProSe. |
|||||||||||||||
0 |
ProSe not supported |
||||||||||||||
1 |
ProSe supported |
||||||||||||||
ProSe direct discovery (ProSe-dd) (octet 7, bit 8) This bit indicates the capability for ProSe direct discovery. |
|||||||||||||||
0 |
ProSe direct discovery not supported |
||||||||||||||
1 |
ProSe direct discovery supported |
||||||||||||||
ProSe direct communication (ProSe-dc) (octet 8, bit 1) This bit indicates the capability for ProSe direct communication. |
|||||||||||||||
0 |
ProSe direct communication not supported |
||||||||||||||
1 |
ProSe direct communication supported |
||||||||||||||
ProSe UE-to-network-relay (ProSe-relay) (octet 8, bit 2) This bit indicates the capability to act as a ProSe UE-to-network relay |
|||||||||||||||
0 |
Acting as a ProSe UE-to-network relay not supported |
||||||||||||||
1 |
Acting as a ProSe UE-to-network relay supported |
||||||||||||||
Control plane CIoT EPS optimization (CP CIoT) (octet 8, bit 3) This bit indicates the capability for control plane CIoT EPS optimization. |
|||||||||||||||
0 |
Control plane CIoT EPS optimization not supported |
||||||||||||||
1 |
Control plane CIoT EPS optimization supported |
||||||||||||||
User plane CIoT EPS optimization (UP CIoT) (octet 8, bit 4) This bit indicates the capability for user plane CIoT EPS optimization. |
|||||||||||||||
0 |
User plane CIoT EPS optimization not supported |
||||||||||||||
1 |
User plane CIoT EPS optimization supported |
||||||||||||||
S1-u data transfer (S1-U data) (octet 8, bit 5) This bit indicates the capability for S1-u data transfer. This bit shall be considered only if the Control plane CIoT EPS optimization (CP CIoT) bit (octet 8, bit 3) is set to 1. If the Control plane CIoT EPS optimization (CP CIoT) bit (octet 8, bit 3) is set to 0, the MME shall assume S1-u data transfer is supported by the UE. |
|||||||||||||||
0 |
S1-U data transfer not supported |
||||||||||||||
1 |
S1-U data transfer supported |
||||||||||||||
EMM-REGISTERED without PDN connection (ERw/oPDN) (octet 8, bit 6) This bit indicates the capability for EMM REGISTERED without PDN connectivity. |
|||||||||||||||
0 |
EMM-REGISTERED without PDN connection not supported |
||||||||||||||
1 |
EMM-REGISTERED without PDN connection supported |
||||||||||||||
Header compression for control plane CIoT EPS optimization (HC-CP CIoT) (octet 8, bit 7) This bit indicates the capability for header compression for control plane CIoT EPS optimization. |
|||||||||||||||
0 |
Header compression for control plane CIoT EPS optimization not supported |
||||||||||||||
1 |
Header compression for control plane CIoT EPS optimization supported |
||||||||||||||
Extended protocol configuration options (ePCO) (octet 8, bit 8) This bit indicates the support of the extended protocol configuration options IE. |
|||||||||||||||
0 |
Extended protocol configuration options IE not supported |
||||||||||||||
1 |
Extended protocol configuration options IE supported |
||||||||||||||
Multiple DRB support (multipleDRB) (octet 9, bit 1) This bit indicates the capability to support multiple user plane radio bearers (see 3GPP TS 36.306 [44], 3GPP TS 36.331 [22]) in NB-S1 mode. |
|||||||||||||||
0 |
Multiple DRB not supported |
||||||||||||||
1 |
Multiple DRB supported |
||||||||||||||
V2X communication over PC5 (V2X PC5) (octet 9, bit 2) This bit indicates the capability for V2X communication over E-UTRA-PC5. |
|||||||||||||||
0 |
V2X communication over E-UTRA-PC5 not supported |
||||||||||||||
1 |
V2X communication over E-UTRA-PC5 supported |
||||||||||||||
Restriction on use of enhanced coverage support (RestrictEC) (octet 9, bit 3) This bit indicates the capability to support restriction on use of enhanced coverage. |
|||||||||||||||
0 |
Restriction on use of enhanced coverage not supported |
||||||||||||||
1 |
Restriction on use of enhanced coverage supported |
||||||||||||||
Control plane data backoff support (CP backoff) (octet 9, bit 4) This bit indicates the support of back-off timer for transport of user data via the control plane.. |
|||||||||||||||
0 |
back-off timer for transport of user data via the control plane not supported |
||||||||||||||
1 |
back-off timer for transport of user data via the control plane supported |
||||||||||||||
Dual connectivity with NR (DCNR) (octet 9, bit 5) This bit indicates the capability for dual connectivity with NR. |
|||||||||||||||
0 |
dual connectivity with NR not supported |
||||||||||||||
1 |
dual connectivity with NR supported |
||||||||||||||
N1 mode supported (N1mode) (octet 9, bit 6) This bit indicates the capability for N1 mode for 3GPP access. |
|||||||||||||||
0 |
N1 mode for 3GPP access not supported |
||||||||||||||
1 |
N1 mode for 3GPP access supported |
||||||||||||||
Service gap control (SGC) (octet 9, bit 7) This bit indicates the capability for service gap control |
|||||||||||||||
0 |
service gap control not supported |
||||||||||||||
1 |
service gap control supported |
||||||||||||||
Signalling for a maximum number of 15 EPS bearer contexts (15 bearers) (octet 9, bit 8) This bit indicates the support of signalling for a maximum number of 15 EPS bearer contexts |
|||||||||||||||
0 |
Signalling for a maximum number of 15 EPS bearer contexts not supported |
||||||||||||||
1 |
Signalling for a maximum number of 15 EPS bearer contexts supported |
||||||||||||||
Radio capability signalling optimisation (RACS) capability (octet 10, bit 1) This bit indicates the capability for RACS. |
|||||||||||||||
0 |
RACS not supported |
||||||||||||||
1 |
RACS supported |
||||||||||||||
Wake-up signal (WUS) assistance (octet 10, bit 2) This bit indicates the support of wake-up signal assistance |
|||||||||||||||
0 |
WUS assistance not supported |
||||||||||||||
1 |
WUS assistance supported |
||||||||||||||
Control plane Mobile Terminated-Early Data Transmission (CP-MT-EDT) (octet 10, bit 3) This bit indicates the support of control plane Mobile Terminated-Early Data Transmission |
|||||||||||||||
0 |
Control plane Mobile Terminated-Early Data Transmission not supported |
||||||||||||||
1 |
Control plane Mobile Terminated-Early Data Transmission supported |
||||||||||||||
User plane Mobile Terminated-Early Data Transmission (UP-MT-EDT) (octet 10, bit 4) This bit indicates the support of user plane Mobile Terminated-Early Data Transmission |
|||||||||||||||
0 |
User plane Mobile Terminated-Early Data Transmission not supported |
||||||||||||||
1 |
User plane Mobile Terminated-Early Data Transmission supported |
||||||||||||||
V2X communication over NR-PC5 (V2X NR-PC5) (octet 10, bit 5) This bit indicates the capability for V2X communication over NR-PC5. |
|||||||||||||||
0 |
V2X communication over NR-PC5 not supported |
||||||||||||||
1 |
V2X communication over NR-PC5 supported |
||||||||||||||
NAS signalling connection release (NCR) (octet 10, bit 6) |
|||||||||||||||
This bit indicates the support of NAS signalling connection release. |
|||||||||||||||
0 |
NAS signalling connection release not supported |
||||||||||||||
1 |
NAS signalling connection release supported |
||||||||||||||
Paging indication for voice services (PIV) (octet 10, bit 7) |
|||||||||||||||
This bit indicates the support of paging indication for voice services. |
|||||||||||||||
0 |
paging indication for voice services not supported |
||||||||||||||
1 |
paging indication for voice services supported |
||||||||||||||
Reject paging request (RPR) (octet 10, bit 8) |
|||||||||||||||
This bit indicates the support of reject paging request. |
|||||||||||||||
0 |
reject paging request not supported |
||||||||||||||
1 |
reject paging request supported |
||||||||||||||
Paging restriction (PR) (octet 11, bit 1) |
|||||||||||||||
This bit indicates the support of paging restriction. |
|||||||||||||||
0 |
paging restriction not supported |
||||||||||||||
1 |
paging restriction supported |
||||||||||||||
Paging timing collision control (PTCC) (octet 11, bit 2) |
|||||||||||||||
This bit indicates the support of paging timing collision control. |
|||||||||||||||
0 |
paging timing collision control not supported |
||||||||||||||
1 |
paging timing collision control supported |
||||||||||||||
All other bits in octet 11 to 15 are spare and shall be coded as zero, if the respective octet is included in the information element. |
|||||||||||||||
NOTE 1: For a UE supporting dual connectivity with NR, if the UE supports one of the encryption algorithms for E-UTRAN (bits 8 to 5 of octet 3), it shall support the same algorithm for NR-PDCP as specified in 3GPP TS 33.401 [19]. The NR-PDCP is specified in 3GPP TS 38.323 [53]. NOTE 2: For a UE supporting dual connectivity with NR, if the UE supports one of the integrity algorithms for E-UTRAN (bits 8 to 5 of octet 4), it shall support the same algorithm for NR-PDCP as specified in 3GPP TS 33.401 [19]. NOTE 3: In this release of the specification, the EPS-UPIP supported bit is only applicable for a UE supporting dual connectivity with NR. |
9.9.3.35 UE radio capability information update needed
The purpose of the UE radio capability information update needed information element is to indicate whether the MME shall delete the stored UE radio capability information, if any.
The UE radio capability information update needed information element is coded as shown in figure 9.9.3.35.1and table 9.9.3.35.1.
The UE radio capability information update needed is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
UE radio capability information update needed IEI |
0 |
0 |
0 |
URC upd |
octet 1 |
|||
spare |
Figure 9.9.3.35.1: UE radio capability information update needed information element
Table 9.9.3.35.1: UE radio capability information update needed information element
UE radio capability information update needed flag (URC upd) (octet 1) |
||||
Bit |
||||
1 |
||||
0 |
UE radio capability information update not needed |
|||
1 |
UE radio capability information update needed |
|||
9.9.3.36 UE security capability
The UE security capability information element is used by the network to indicate which security algorithms are supported by the UE in S1 mode, Iu mode and Gb mode. Security algorithms supported in S1 mode are supported both for NAS and for AS security. If the UE supports S101 mode, then these security algorithms are also supported for NAS security in S101 mode.
The UE security capability information element is coded as shown in figure 9.9.3.36.1 and table 9.9.3.36.1.
The UE security capability is a type 4 information element with a minimum length of 4 octets and a maximum length of 7 octets.
Octets 5, 6, and 7 are optional. If octet 5 is included, then also octet 6 shall be included and octet 7 may be included.
If a UE did not indicate support of any security algorithm for Gb mode, octet 7 shall not be included. If the UE did not indicate support of any security algorithm for Iu mode and Gb mode, octets 5, 6, and 7 shall not be included.
If the UE did not indicate support of any security algorithm for Iu mode but indicated support of a security algorithm for Gb mode, octets 5, 6, and 7 shall be included. In this case octets 5 and 6 are filled with the value of zeroes.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||||||||
UE security capability IEI |
octet 1 |
||||||||||||||||
Length of UE security capability contents |
octet 2 |
||||||||||||||||
EEA0 |
128- EEA1 |
128- EEA2 |
128- EEA3 |
EEA4 |
EEA5 |
EEA6 |
EEA7 |
octet 3 |
|||||||||
EIA0 |
128- EIA1 |
128- EIA2 |
128- EIA3 |
EIA4 |
EIA5 |
EIA6 |
EPS-UPIP |
octet 4 |
|||||||||
UEA0 |
UEA1 |
UEA2 |
UEA3 |
UEA4 |
UEA5 |
UEA6 |
UEA7 |
octet 5* |
|||||||||
0 spare |
UIA1 |
UIA2 |
UIA3 |
UIA4 |
UIA5 |
UIA6 |
UIA7 |
octet 6* |
|||||||||
0 spare |
GEA1 |
GEA2 |
GEA3 |
GEA4 |
GEA5 |
GEA6 |
GEA7 |
octet 7* |
Figure 9.9.3.36.1: UE security capability information element
Table 9.9.3.36.1: UE security capability information element
EPS encryption algorithms supported (octet 3) |
|||||
EPS encryption algorithm EEA0 supported (octet 3, bit 8) |
|||||
0 |
EPS encryption algorithm EEA0 not supported |
||||
1 |
EPS encryption algorithm EEA0 supported |
||||
EPS encryption algorithm 128-EEA1 supported (octet 3, bit 7) |
|||||
0 |
EPS encryption algorithm 128-EEA1 not supported |
||||
1 |
EPS encryption algorithm 128-EEA1 supported |
||||
EPS encryption algorithm 128-EEA2 supported (octet 3, bit 6) |
|||||
0 |
EPS encryption algorithm 128-EEA2 not supported |
||||
1 |
EPS encryption algorithm 128-EEA2 supported |
||||
EPS encryption algorithm 128-EEA3 supported (octet 3, bit 5) |
|||||
0 |
EPS encryption algorithm 128-EEA3 not supported |
||||
1 |
EPS encryption algorithm 128-EEA3 supported |
||||
EPS encryption algorithm EEA4 supported (octet 3, bit 4) |
|||||
0 |
EPS encryption algorithm EEA4 not supported |
||||
1 |
EPS encryption algorithm EEA4 supported |
||||
EPS encryption algorithm EEA5 supported (octet 3, bit 3) |
|||||
0 |
EPS encryption algorithm EEA5 not supported |
||||
1 |
EPS encryption algorithm EEA5 supported |
||||
EPS encryption algorithm EEA6 supported (octet 3, bit 2) |
|||||
0 |
EPS encryption algorithm EEA6 not supported |
||||
1 |
EPS encryption algorithm EEA6 supported |
||||
EPS encryption algorithm EEA7 supported (octet 3, bit 1) |
|||||
0 |
EPS encryption algorithm EEA7 not supported |
||||
1 |
EPS encryption algorithm EEA7 supported |
||||
EPS integrity algorithms supported (octet 4) |
|||||
EPS integrity algorithm EIA0 supported (octet 4, bit 8) |
|||||
0 |
EPS integrity algorithm EIA0 not supported |
||||
1 |
EPS integrity algorithm EIA0 supported |
||||
EPS integrity algorithm 128-EIA1 supported (octet 4, bit 7) |
|||||
0 |
EPS integrity algorithm 128-EIA1 not supported |
||||
1 |
EPS integrity algorithm 128-EIA1 supported |
||||
EPS integrity algorithm 128-EIA2 supported (octet 4, bit 6) |
|||||
0 |
EPS integrity algorithm 128-EIA2 not supported |
||||
1 |
EPS integrity algorithm 128-EIA2 supported |
||||
EPS integrity algorithm 128-EIA3 supported (octet 4, bit 5) |
|||||
0 |
EPS integrity algorithm 128-EIA3 not supported |
||||
1 |
EPS integrity algorithm 128-EIA3 supported |
||||
EPS integrity algorithm EIA4 supported (octet 4, bit 4) |
|||||
0 |
EPS integrity algorithm EIA4 not supported |
||||
1 |
EPS integrity algorithm EIA4 supported |
||||
EPS integrity algorithm EIA5 supported (octet 4, bit 3) |
|||||
0 |
EPS integrity algorithm EIA5 not supported |
||||
1 |
EPS integrity algorithm EIA5 supported |
||||
EPS integrity algorithm EIA6 supported (octet 4, bit 2) |
|||||
0 |
EPS integrity algorithm EIA6 not supported |
||||
1 |
EPS integrity algorithm EIA6 supported |
||||
EPS-UPIP integrity algorithm EIA7 supported (octet 4, bit 1) |
|||||
0 |
EPS-UPIP not supported |
||||
1 |
EPS-UPIP supported |
||||
UMTS encryption algorithms supported (octet 5) |
|||||
UMTS encryption algorithm UEA0 supported (octet 5, bit 8) |
|||||
0 |
UMTS encryption algorithm UEA0 not supported |
||||
1 |
UMTS encryption algorithm UEA0 supported |
||||
UMTS encryption algorithm UEA1 supported (octet 5, bit 7) |
|||||
0 |
UMTS encryption algorithm UEA1 not supported |
||||
1 |
UMTS encryption algorithm UEA1 supported |
||||
UMTS encryption algorithm UEA2 supported (octet 5, bit 6) |
|||||
0 |
UMTS encryption algorithm UEA2 not supported |
||||
1 |
UMTS encryption algorithm UEA2 supported |
||||
UMTS encryption algorithm UEA3 supported (octet 5, bit 5) |
|||||
0 |
UMTS encryption algorithm UEA3 not supported |
||||
1 |
UMTS encryption algorithm UEA3 supported |
||||
UMTS encryption algorithm UEA4 supported (octet 5, bit 4) |
|||||
0 |
UMTS encryption algorithm UEA4 not supported |
||||
1 |
UMTS encryption algorithm UEA4 supported |
||||
UMTS encryption algorithm UEA5 supported (octet 5, bit 3) |
|||||
0 |
UMTS encryption algorithm UEA5 not supported |
||||
1 |
UMTS encryption algorithm UEA5 supported |
||||
UMTS encryption algorithm UEA6 supported (octet 5, bit 2) |
|||||
0 |
UMTS encryption algorithm UEA6 not supported |
||||
1 |
UMTS encryption algorithm UEA6 supported |
||||
UMTS encryption algorithm UEA7 supported (octet 5, bit 1) |
|||||
0 |
UMTS encryption algorithm UEA7 not supported |
||||
1 |
UMTS encryption algorithm UEA7 supported |
||||
UMTS integrity algorithms supported (octet 6) |
|||||
Bit 8 of octet 6 is spare and shall be coded as zero. |
|||||
UMTS integrity algorithm UIA1 supported (octet 6, bit 7) |
|||||
0 |
UMTS integrity algorithm UIA1 not supported |
||||
1 |
UMTS integrity algorithm UIA1 supported |
||||
UMTS integrity algorithm UIA2 supported (octet 6, bit 6) |
|||||
0 |
UMTS integrity algorithm UIA2 not supported |
||||
1 |
UMTS integrity algorithm UIA2 supported |
||||
UMTS integrity algorithm UIA3 supported (octet 6, bit 5) |
|||||
0 |
UMTS integrity algorithm UIA3 not supported |
||||
1 |
UMTS integrity algorithm UIA3 supported |
||||
UMTS integrity algorithm UIA4 supported (octet 6, bit 4) |
|||||
0 |
UMTS integrity algorithm UIA4 not supported |
||||
1 |
UMTS integrity algorithm UIA4 supported |
||||
UMTS integrity algorithm UIA5 supported (octet 6, bit 3) |
|||||
0 |
UMTS integrity algorithm UIA5 not supported |
||||
1 |
UMTS integrity algorithm UIA5 supported |
||||
UMTS integrity algorithm UIA6 supported (octet 6, bit 2) |
|||||
0 |
UMTS integrity algorithm UIA6 not supported |
||||
1 |
UMTS integrity algorithm UIA6 supported |
||||
UMTS integrity algorithm UIA7 supported (octet 6, bit 1) |
|||||
0 |
UMTS integrity algorithm UIA7 not supported |
||||
1 |
UMTS integrity algorithm UIA7 supported |
||||
GPRS encryption algorithms supported (octet 7) |
|||||
Bit 8 of octet 7 is spare and shall be coded as zero. |
|||||
GPRS encryption algorithm GEA1 supported (octet 7, bit 7) |
|||||
0 |
GPRS encryption algorithm GEA1 not supported |
||||
1 |
GPRS encryption algorithm GEA1 supported |
||||
GPRS encryption algorithm GEA2 supported (octet 7, bit 6) |
|||||
0 |
GPRS encryption algorithm GEA2 not supported |
||||
1 |
GPRS encryption algorithm GEA2 supported |
||||
GPRS encryption algorithm GEA3 supported (octet 7, bit 5) |
|||||
0 |
GPRS encryption algorithm GEA3 not supported |
||||
1 |
GPRS encryption algorithm GEA3 supported |
||||
GPRS encryption algorithm GEA4 supported (octet 7, bit 4) |
|||||
0 |
GPRS encryption algorithm GEA4 not supported |
||||
1 |
GPRS encryption algorithm GEA4 supported |
||||
GPRS encryption algorithm GEA5 supported (octet 7, bit 3) |
|||||
0 |
GPRS encryption algorithm GEA5 not supported |
||||
1 |
GPRS encryption algorithm GEA5 supported |
||||
GPRS encryption algorithm GEA6 supported (octet 7, bit 2) |
|||||
0 |
GPRS encryption algorithm GEA6 not supported |
||||
1 |
GPRS encryption algorithm GEA6 supported |
||||
GPRS encryption algorithm GEA7 supported (octet 7, bit 1) |
|||||
0 |
GPRS encryption algorithm GEA7 not supported |
||||
1 |
GPRS encryption algorithm GEA7 supported |
||||
NOTE 1: For a UE supporting dual connectivity with NR, if the UE supports one of the encryption algorithms for E-UTRAN (bits 8 to 5 of octet 3), it shall support the same algorithm for NR-PDCP as specified in 3GPP TS 33.401 [19]. NOTE 2: For a UE supporting dual connectivity with NR, if the UE supports one of the integrity algorithms for E-UTRAN different from EIA0 (bits 7 to 5 of octet 4), it shall support the same algorithm for NR-PDCP as specified in 3GPP TS 33.401 [19]. |
9.9.3.37 Emergency Number List
See clause 10.5.3.13 in 3GPP TS 24.008 [13].
9.9.3.37A Extended emergency number list
The purpose of this information element is to encode one or more local emergency number(s) together with a sub-services field containing zero or more sub-services of the associated emergency service URN and a validity indication. An emergency service URN is a service URN with top level service type of "sos" as specified in IETF RFC 5031 [55].
EXAMPLE 1: If the associated emergency service URN is "urn:service:sos.gas", there is only one sub-service provided in the sub-services field which is "gas".
EXAMPLE 2: If the associated emergency service URN is "urn:service:sos", there is no sub-services provided in the sub-services field and the length of the sub-services field is "0".
NOTE: The associated emergency service URN can be a country-specific emergency service URN as defined in 3GPP TS 24.229 [13D].
The Extended emergency number list information element is coded as shown in figure 9.9.3.37A.1 and table 9.9.3.37A.1.
The Extended emergency number list IE is a type 6 information element with a minimum length of 7 octets and a maximum length of 65538 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|||||||
Extended emergency number list IEI |
octet 1 |
|||||||||||||
Length of Extended emergency number list IE contents |
octet 2 octet 3 |
|||||||||||||
0 |
0 |
0 |
0 |
0 |
0 |
0 |
EENLV |
octet 4 |
||||||
spare |
||||||||||||||
Length of 1st Emergency Number information (Note 1) |
octet 5 |
|||||||||||||
Number digit 2 |
Number digit 1 |
octet 6 |
||||||||||||
(Note 2) |
||||||||||||||
Number digit 4 |
Number digit 3 |
octet 7* |
||||||||||||
: |
: |
: |
||||||||||||
(Note 3) |
octet j-1* |
|||||||||||||
Length of 1st sub-services field (Note 4) |
octet j |
|||||||||||||
sub-services field |
octet j+1* (Note 5) octet k-1* |
|||||||||||||
Length of 2nd Emergency Number information (Note 1) |
octet k* |
|||||||||||||
Number digit 2 |
Number digit 1 |
octet k+1* |
||||||||||||
(Note 2) |
||||||||||||||
Number digit 4 |
Number digit 3 |
octet k+2* |
||||||||||||
: |
: |
: |
||||||||||||
(Note 3) |
: |
octet l-1* |
||||||||||||
Length of 2nd sub-services field (Note 4) |
octet l* |
|||||||||||||
sub-services field |
octet l+1* (Note 5) octet m-1* |
|||||||||||||
Length of 3rd Emergency Number information (Note 1) |
octet m* |
|||||||||||||
Number digit 2 |
Number digit 1 |
octet m+1* |
||||||||||||
(Note 2) |
||||||||||||||
Number digit 4 |
Number digit 3 |
octet m+2* |
||||||||||||
: |
: |
: |
||||||||||||
(Note 3) |
: |
octet n-1* |
||||||||||||
Length of 3rd sub-services field (Note 4) |
octet n* |
|||||||||||||
sub-services field |
octet n+1* (Note 5) octet o* |
NOTE 1: The length shall contain the number of octets used to encode the number digits.
NOTE 2: The number digit(s) in octet 6 precedes the digit(s) in octet 7 etc. The number digit, which would be entered first, is located in octet 6, bits 1 to 4. The contents of the number digits are coded as shown in table 10.5.118/3GPP TS 24.008 [13].
NOTE 3: If the emergency number contains an odd number of digits, bits 5 to 8 of the last octet of the respective emergency number shall be filled with an end mark coded as "1111".
NOTE 4: The length shall contain the number of octets used to encode the sub-services field.
NOTE 5: The characters of the sub-services of the associated emergency service URN shall be coded in accordance to GSM 7 bit default alphabet and the appropriate padding characters and bit-fill are added to octet boundary as specified in clause 6.1.2.3.1 of 3GPP TS 23.038 [3]and the first character starts in octet j+1, l+1 or n+1.
Figure 9.9.3.37A.1 Extended Emergency Number List IE
EXAMPLE 3: If the associated emergency service URN is "urn:service:sos.police.municipal", the sub-services field contains "police.municipal" and the first character is "p".
Table 9.9.3.37A.1: Extended Emergency Number List Validity information IE
Extended Emergency Number List Validity (EENLV) (octet 4) |
||||
Bit |
||||
1 |
||||
0 |
Extended Local Emergency Numbers List is valid in the country of the PLMN from which this IE is received |
|||
1 |
Extended Local Emergency Numbers List is valid only in the PLMN from which this IE is received |
|||
9.9.3.38 CLI
The purpose of the CLI information element is to convey information about the calling line for a terminated call to a CS fallback capable UE.
The CLI information element is coded as shown in figure 9.9.3.38.1 and table 9.9.3.38.1.
The CLI is a type 4 information element with a minimum length of 3 octets and a maximum length of 14 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
CLI IEI |
octet 1 |
|||||||
Length of CLI |
octet 2 |
|||||||
CLI (value part) |
octet 3 to |
|||||||
octet 14 |
Figure 9.9.3.38.1: CLI information element
Table 9.9.3.38.1: CLI information element
CLI (value part) |
The coding of the CLI value part is the same as for octets 3 to 14 of the Calling party BCD number information element defined in clause 10.5.4.9 of 3GPP TS 24.008 [13]. |
9.9.3.39 SS Code
The purpose of the SS code information element is to convey information related to a network initiated supplementary service request to a CS fallback capable UE.
The SS Code information element is coded as shown in figure 9.9.3.39.1 and table 9.9.3.39.1.
The SS Code is a type 3 information element with 2 octets length.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
SS Code IEI |
octet 1 |
|||||||
SS Code value |
octet 2 |
Figure 9.9.3.39.1: SS Code information element
Table 9.9.3.39.1: SS Code information element
SS Code value |
The coding of the SS Code value is given in clause 17.7.5 of 3GPP TS 29.002 [15C]. |
9.9.3.40 LCS indicator
The purpose of the LCS indicator information element is to indicate that the origin of the message is due to a LCS request and the type of this request to a CS fallback capable UE.
The LCS indicator information element is coded as shown in figure 9.9.3.40.1 and table 9.9.3.40.1.
The LCS indicator is a type 3 information element with 2 octets length.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
LCS indicator IEI |
octet 1 |
|||||||
LCS indicator value |
octet 2 |
Figure 9.9.3.40.1: LCS indicator information element
Table 9.9.3.40.1: LCS indicator information element
LCS indicator value Bits 8 7 6 5 4 3 2 1 0 0 0 0 0 0 0 0 Normal, unspecified in this version of the protocol. 0 0 0 0 0 0 0 1 MT-LR 0 0 0 0 0 0 1 0 to Normal, unspecified in this version of the protocol 1 1 1 1 1 1 1 1 |
9.9.3.41 LCS client identity
The purpose of the LCS client identity information element is to convey information related to the client of a LCS request for a CS fallback capable UE.
The LCS client identity information element is coded as shown in figure 9.9.3.41.1 and table 9.9.3.41.1.
The LCI client identity is a type 4 information element with a minimum length of 3 octets and a maximum length of 257 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
LCS client identity IEI |
octet 1 |
|||||||
Length of LCS client identity |
octet 2 |
|||||||
LCS client identity (value part) |
octet 3 to |
|||||||
octet 257 |
Figure 9.9.3.41.1: LCS client identity information element
Table 9.9.3.41.1: LCS client identity information element
LCS client identity (value part) |
The coding of the value part of the LCS client identity is given in clause 17.7.13 of 3GPP TS 29.002 [15C]. |
9.9.3.42 Generic message container type
The purpose of the generic message container type information element is to specify the type of message contained in the generic message container IE.
The generic message container type information element is coded as shown in table 9.9.3.42.1.
Table 9.9.3.42.1: Generic message container type information element
Bits |
|||||||||
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||
0 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
Reserved |
|
0 |
0 |
0 |
0 |
0 |
0 |
0 |
1 |
LTE Positioning Protocol (LPP) message container (see 3GPP TS 36.355 [22A]) |
|
0 |
0 |
0 |
0 |
0 |
0 |
1 |
0 |
Location services message container (see 3GPP TS 24.171 [13C]) |
|
0 |
0 |
0 |
0 |
0 |
0 |
1 |
1 |
||
to |
Unused |
||||||||
0 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
||
1 |
0 |
0 |
0 |
0 |
0 |
0 |
0 |
||
to |
Reserved |
||||||||
1 |
1 |
1 |
1 |
1 |
1 |
1 |
1 |
||
9.9.3.43 Generic message container
This information element is used to encapsulate the application message transferred between the UE and the network. The generic message container information element is coded as shown in figure 9.9.3.43.1 and table 9.9.3.43.1.
The generic message container is a type 6 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Generic message container IEI |
octet 1 |
|||||||
Length of generic message container contents |
octet 2 |
|||||||
octet 3 |
||||||||
octet 4 |
||||||||
Generic message container contents |
||||||||
octet n |
Figure 9.9.3.43.1: Generic message container information element
Table 9.9.3.43.1: Generic message container information element
Generic message container contents (octet 4 to octet n); Max value of 65535 octets |
The coding of the contents of the generic message container is dependent on the particular application. |
9.9.3.44 Voice domain preference and UE’s usage setting
See clause 10.5.5.28 in 3GPP TS 24.008 [13].
9.9.3.45 GUTI type
The purpose of the GUTI type information element is to indicate whether the GUTI included in the same message in an information element of type EPS mobile identity represents a native GUTI or a mapped GUTI.
The GUTI type information element information element is coded as shown in figure 9.9.3.45.1 and table 9.9.3.45.1.
The GUTI type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
GUTI type IEI |
0 |
0 |
0 |
GUTI type |
octet 1 |
|||
spare |
Figure 9.9.3.45.1: GUTI type information element
Table 9.9.3.45.1: GUTI type information element
GUTI type (octet 1) |
||||
Bit |
||||
1 |
||||
0 |
Native GUTI |
|||
1 |
Mapped GUTI |
|||
Bits 2 to 4 of octet 1 are spare and shall be coded as zero. |
||||
9.9.3.46 Extended DRX parameters
See clause 10.5.5.32 in 3GPP TS 24.008 [13].
9.9.3.47 Control plane service type
The purpose of the Control plane service type information element is to specify the purpose of the CONTROL PLANE SERVICE REQUEST message.
The Control plane service type information element is coded as shown in figure 9.9.3.47.1 and table 9.9.3.47.1.
The Control plane service type is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Control plane service type IEI |
"Active" flag |
Control plane service type value |
octet 1 |
Figure 9.9.3.47.1: Control plane service type information element
Table 9.9.3.47.1: Control plane service type information element
Control plane service type value (octet 1, bit 1 to 3) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
mobile originating request |
|
0 |
0 |
1 |
mobile terminating request |
|
0 |
1 |
0 |
||
to |
unused; shall be interpreted as " mobile originating request", if received |
|||
1 |
1 |
1 |
by the network. |
|
"Active" flag (octet 1, bit 4) |
||||
Bit |
||||
4 |
||||
0 |
No radio bearer establishment requested |
|||
1 |
Radio bearer establishment requested |
|||
9.9.3.48 DCN-ID
See clause 10.5.5.35 in 3GPP TS 24.008 [13].
9.9.3.49 Non-3GPP NW provided policies
See clause 10.5.5.37 in 3GPP TS 24.008 [13].
9.9.3.50 HashMME
The purpose of the HashMME information element is to transfer a 64-bit hash value to the UE so the UE can check the MME calculated value against the value locally calculated by the UE to determine whether the ATTACH REQUEST or TRACKING AREA UPDATE REQUEST message sent by the UE has been modified.
The HashMME information element is coded as shown in figure 9.9.3.50.1 and table 9.9.3.50.1.
The HashMME is a type 4 information element with a length of 10 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
HashMME IEI |
octet 1 |
|||||||
Length of HashMME |
octet 2 |
|||||||
HashMME value |
octet 3 octet 10 |
Figure 9.9.3.50.1: HashMME information element
Table 9.9.3.50.1: HashMME information element
HashMME value (octet 3 to 10) |
This field contains the binary representation of the HashMME. Bit 8 of octet 3 represents the most significant bit of the HashMME and bit 1 of octet 10 the least significant bit. |
9.9.3.51 Replayed NAS message container
The purpose of the Replayed NAS message container IE is to, during an ongoing attach or tracking area updating procedure, re-send the ATTACH REQUEST or TRACKING AREA UPDATE REQUEST message with which the UE had initiated the procedure, if the MME has included a HASHMME in the SECURITY MODE COMMAND message and the HASHMME is different from the hash value locally calculated at the UE as described in 3GPP TS 33.401 [19]. If an ATTACH REQUEST message is included in this IE, the ATTACH REQUEST message shall be coded as specified in clause 8.2.4, i.e. without NAS security header. If a TRACKING AREA UPDATE REQUEST message is included in this IE, the TRACKING AREA UPDATE REQUEST message shall be coded as specified in clause 8.2.29, i.e. without NAS security header
The Replayed NAS message container information element is coded as shown in figure 9.9.3.51.1 and table 9.9.3.51.1.
The Replayed NAS message container is a type 6 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Replayed NAS message container IEI |
octet 1 |
|||||||
Length of Replayed NAS message container contents |
octet 2 |
|||||||
octet 3 |
||||||||
octet 4 |
||||||||
Replayed NAS message container contents |
||||||||
octet n |
Figure 9.9.3.51.1: Replayed NAS message container information element
Table 9.9.3.51.1: Replayed NAS message container information element
Replayed NAS message container contents (octet 4 to octet n); Max value of 65535 octets |
This IE can contain an ATTACH REQUEST message as defined in clause 8.2.4, or a TRACKING AREA UPDATE REQUEST message as defined in clause 8.2.29. |
9.9.3.52 Network policy
The purpose of the Network policy information element is to provide network policy information to the UE during attach or tracking area updating procedure via the ATTACH ACCEPT message or TRACKING AREA UPDATE ACCEPT message.
The Network policy information element is coded as shown in figure 9.9.3.52.1 and table 9.9.3.52.1.
The Network policy is a type 1 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Network policy IEI |
0 spare |
0 spare |
0 spare |
redir- policy |
octet 1 |
Figure 9.9.3.52.1: Network policy information element
Table 9.9.3.52.1: Network policy information element
Network policy value |
|||||
Redirection to GERAN security policy (redir-policy) (octet 1, bit 1) |
|||||
0 |
Unsecured redirection to GERAN allowed |
||||
1 |
Unsecured redirection to GERAN not allowed |
||||
Bits 2 to 4 are spare and shall be set to "0". |
|||||
9.9.3.53 UE additional security capability
The UE additional security capability information element is used by the UE to indicate which additional security algorithms are supported by the UE for S1 mode in dual connectivity with NR or for N1 mode or both.
The UE additional security capability information element is coded as shown in figure 9.9.3.53.1 and table 9.9.3.53.1.
The UE additional security capability is a type 4 information element with a length of 6 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||||||||
UE additional security capability IEI |
octet 1 |
||||||||||||||||
Length of UE additional security capability contents |
octet 2 |
||||||||||||||||
5G-EA0 |
128- 5G-EA1 |
128- 5G-EA2 |
128- 5G-EA3 |
5G-EA4 |
5G-EA5 |
5G-EA6 |
5G-EA7 |
octet 3 |
|||||||||
5G-EA8 |
5G-EA9 |
5G-EA10 |
5G-EA11 |
5G-EA12 |
5G-EA13 |
5G-EA14 |
5G-EA15 |
octet 4 |
|||||||||
5G-IA0 |
128- 5G-IA1 |
128- 5G-IA2 |
128- 5G-IA3 |
5G-IA4 |
5G-IA5 |
5G-IA6 |
5G-IA7 |
octet 5 |
|||||||||
5G-IA8 |
5G-IA9 |
5G-IA10 |
5G-IA11 |
5G-IA12 |
5G-IA13 |
5G-IA14 |
5G-IA15 |
octet 6 |
Figure 9.9.3.53.1: UE additional security capability information element
Table 9.9.3.53.1: UE additional security capability information element
5GS encryption algorithms supported (octet 3) (NOTE 1) |
|||||
5GS encryption algorithm 5G-EA0 supported (octet 3, bit 8) |
|||||
0 |
5GS encryption algorithm 5G-EA0 not supported |
||||
1 |
5GS encryption algorithm 5G-EA0 supported |
||||
5GS encryption algorithm 128-5G-EA1 supported (octet 3, bit 7) |
|||||
0 |
5GS encryption algorithm 128-5G-EA1 not supported |
||||
1 |
5GS encryption algorithm 128-5G-EA1 supported |
||||
5GS encryption algorithm 128-5G-EA2 supported (octet 3, bit 6) |
|||||
0 |
5GS encryption algorithm 128-5G-EA2 not supported |
||||
1 |
5GS encryption algorithm 128-5G-EA2 supported |
||||
5GS encryption algorithm 128-5G-EA3 supported (octet 3, bit 5) |
|||||
0 |
5GS encryption algorithm 128-5G-EA3 not supported |
||||
1 |
5GS encryption algorithm 128-5G-EA3 supported |
||||
5GS encryption algorithm 5G-EA4 supported (octet 3, bit 4) |
|||||
0 |
5GS encryption algorithm 5G-EA4 not supported |
||||
1 |
5GS encryption algorithm 5G-EA4 supported |
||||
5GS encryption algorithm 5G-EA5 supported (octet 3, bit 3) |
|||||
0 |
5GS encryption algorithm 5G-EA5 not supported |
||||
1 |
5GS encryption algorithm 5G-EA5 supported |
||||
5GS encryption algorithm 5G-EA6 supported (octet 3, bit 2) |
|||||
0 |
5GS encryption algorithm 5G-EA6 not supported |
||||
1 |
5GS encryption algorithm 5G-EA6 supported |
||||
5GS encryption algorithm 5G-EA7 supported (octet 3, bit 1) |
|||||
0 |
5GS encryption algorithm 5G-EA7 not supported |
||||
1 |
5GS encryption algorithm 5G-EA7 supported |
||||
5GS encryption algorithms supported (octet 4) |
|||||
5GS encryption algorithm 5G-EA8 supported (octet 4, bit 8) |
|||||
0 |
5GS encryption algorithm 5G-EA8 not supported |
||||
1 |
5GS encryption algorithm 5G-EA8 supported |
||||
5GS encryption algorithm 5G-EA9 supported (octet 4, bit 7) |
|||||
0 |
5GS encryption algorithm 5G-EA9 not supported |
||||
1 |
5GS encryption algorithm 5G-EA9 supported |
||||
5GS encryption algorithm 5G-EA10 supported (octet 4, bit 6) |
|||||
0 |
5GS encryption algorithm 5G-EA10 not supported |
||||
1 |
5GS encryption algorithm 5G-EA10 supported |
||||
5GS encryption algorithm 5G-EA11 supported (octet 4, bit 5) |
|||||
0 |
5GS encryption algorithm 5G-EA11 not supported |
||||
1 |
5GS encryption algorithm 5G-EA11 supported |
||||
5GS encryption algorithm 5G-EA12 supported (octet 4, bit 4) |
|||||
0 |
5GS encryption algorithm 5G-EA12 not supported |
||||
1 |
5GS encryption algorithm 5G-EA12 supported |
||||
5GS encryption algorithm 5G-EA13 supported (octet 4, bit 3) |
|||||
0 |
5GS encryption algorithm 5G-EA13 not supported |
||||
1 |
5GS encryption algorithm 5G-EA13 supported |
||||
5GS encryption algorithm 5G-EA14 supported (octet 4, bit 2) |
|||||
0 |
5GS encryption algorithm 5G-EA14 not supported |
||||
1 |
5GS encryption algorithm 5G-EA14 supported |
||||
5GS encryption algorithm 5G-EA15 supported (octet 4, bit 1) |
|||||
0 |
5GS encryption algorithm 5G-EA15 not supported |
||||
1 |
5GS encryption algorithm 5G-EA15 supported |
||||
5GS integrity algorithms supported (octet 5) (NOTE 2) |
|||||
5GS integrity algorithm 5G-IA0 supported (octet 5, bit 8) (NOTE 3) |
|||||
0 |
5GS integrity algorithm 5G-IA0 not supported |
||||
1 |
5GS integrity algorithm 5G-IA0 supported |
||||
5GS integrity algorithm 128-5G-IA1 supported (octet 5, bit 7) |
|||||
0 |
5GS integrity algorithm 128-5G-IA1 not supported |
||||
1 |
5GS integrity algorithm 128-5G-IA1 supported |
||||
5GS integrity algorithm 128-5G-IA2 supported (octet 5, bit 6) |
|||||
0 |
5GS integrity algorithm 128-5G-IA2 not supported |
||||
1 |
5GS integrity algorithm 128-5G-IA2 supported |
||||
5GS integrity algorithm 128-5G-IA3 supported (octet 5, bit 5) |
|||||
0 |
5GS integrity algorithm 128-5G-IA3 not supported |
||||
1 |
5GS integrity algorithm 128-5G-IA3 supported |
||||
5GS integrity algorithm 5G-IA4 supported (octet 5, bit 4) |
|||||
0 |
5GS integrity algorithm 5G-IA4 not supported |
||||
1 |
5GS integrity algorithm 5G-IA4 supported |
||||
5GS integrity algorithm 5G-IA5 supported (octet 5, bit 3) |
|||||
0 |
5GS integrity algorithm 5G-IA5 not supported |
||||
1 |
5GS integrity algorithm 5G-IA5 supported |
||||
5GS integrity algorithm 5G-IA6 supported (octet 5, bit 2) |
|||||
0 |
5GS integrity algorithm 5G-IA6 not supported |
||||
1 |
5GS integrity algorithm 5G-IA6 supported |
||||
5GS integrity algorithm 5G-IA7 supported (octet 5, bit 1) |
|||||
0 |
5GS integrity algorithm 5G-IA7 not supported |
||||
1 |
5GS integrity algorithm 5G-IA7 supported |
||||
5GS integrity algorithms supported (octet 6) |
|||||
5GS integrity algorithm 5G-IA8 supported (octet 6, bit 8) |
|||||
0 |
5GS integrity algorithm 5G-IA8 not supported |
||||
1 |
5GS integrity algorithm 5G-IA8 supported |
||||
5GS integrity algorithm 5G-IA9 supported (octet 6, bit 7) |
|||||
0 |
5GS integrity algorithm 5G-IA9 not supported |
||||
1 |
5GS integrity algorithm 5G-IA9 supported |
||||
5GS integrity algorithm 5G-IA10 supported (octet 6, bit 6) |
|||||
0 |
5GS integrity algorithm 5G-IA10 not supported |
||||
1 |
5GS integrity algorithm 5G-IA10 supported |
||||
5GS integrity algorithm 5G-IA11 supported (octet 6, bit 5) |
|||||
0 |
5GS integrity algorithm 5G-IA11 not supported |
||||
1 |
5GS integrity algorithm 5G-IA11 supported |
||||
5GS integrity algorithm 5G-IA12 supported (octet 6, bit 4) |
|||||
0 |
5GS integrity algorithm 5G-IA12 not supported |
||||
1 |
5GS integrity algorithm 5G-IA12 supported |
||||
5GS integrity algorithm 5G-IA13 supported (octet 6, bit 3) |
|||||
0 |
5GS integrity algorithm 5G-IA13 not supported |
||||
1 |
5GS integrity algorithm 5G-IA13 supported |
||||
5GS integrity algorithm 5G-IA14 supported (octet 6, bit 2) |
|||||
0 |
5GS integrity algorithm 5G-IA14 not supported |
||||
1 |
5GS integrity algorithm 5G-IA14 supported |
||||
5GS integrity algorithm 5G-IA15 supported (octet 6, bit 1) |
|||||
0 |
5GS integrity algorithm 5G-IA15 not supported |
||||
1 |
5GS integrity algorithm 5G-IA15 supported |
||||
NOTE 1: For a UE supporting dual connectivity with NR. if the UE supports one of the encryption algorithms for 5GS in bits 8 to 5 of octet 3, it shall support the same algorithms for E-UTRAN as specified in 3GPP TS 33.401 [19]. |
|||||
NOTE 2: For a UE supporting dual connectivity with NR, if the UE supports one of the integrity protection algorithms for 5GS different from 5G-IA0 (bits 7 to 5 of octet 5), it shall support the same algorithms for E-UTRAN as specified in 3GPP TS 33.401 [19]. NOTE 3: This algorithm is not applicable to dual connectivity with NR. A UE not supporting N1 mode shall set this bit to "0". |
9.9.3.54 UE status
See clause 9.11.3.56 in 3GPP TS 24.501 [54].
9.9.3.55 Additional information requested
The purpose of the Additional information requested information element is to enable the UE to request ciphering keys for deciphering of ciphered broadcast assistance data.
The Additional information requested information element is coded as shown in figure 9.9.3.55.1 and table 9.9.3.55.1.
The Additional information requested is a type 3 information element with a length of 2 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Ciphered broadcast assistance data IEI |
octet 1 |
|||||||
0 |
0 |
0 |
0 |
0 |
0 |
0 |
CipherKey |
octet 2 |
Spare |
Figure 9.9.3.55.1: Additional information requested information element
Table 9.9.3.55.1: Additional information requested information element
Ciphering keys for ciphered broadcast assistance data (CipherKey) (octet 2, bit 1) |
||||
Bit |
||||
1 |
||||
0 |
ciphering keys for ciphered broadcast assistance data not requested |
|||
1 |
ciphering keys for ciphered broadcast assistance data requested |
|||
Bits 8 to 2 of octet 2 are spare and shall be coded as zero. |
||||
9.9.3.56 Ciphering key data
The purpose of the Ciphering key data information element is to transfer a list of ciphering data sets from the network to the UE for deciphering of ciphered assistance data.
The Ciphering key data information element is coded as shown in figure 9.9.3.56.1, figure 9.9.3.56.2 and table 9.9.3.56.1.
The Ciphering key data is a type 6 information element, with a minimum length of 35 octets and a maximum length of 2291 octets. The list can contain a maximum of 16 ciphering data sets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Ciphering key data IEI |
octet 1 |
|||||||
Length of ciphering key data contents |
octet 2 octet 3 |
|||||||
Ciphering data set 1 |
octet 4 octet i |
|||||||
Ciphering data set 2 |
octet i+1* octet l* |
|||||||
… |
octet l+1* octet m* |
|||||||
Ciphering data set p |
octet m+1* octet n* |
Figure 9.9.3.56.1: Ciphering key data information element
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Ciphering set ID |
octet 1 octet 2 |
|||||||
Ciphering key |
octet 3 octet 18 |
|||||||
0 |
0 |
0 |
c0 length |
octet 19 |
||||
Spare |
||||||||
c0 |
octet 20 octet k |
|||||||
PosSIBType1-1 |
PosSIBType1-2 |
PosSIBType1-3 |
PosSIBType1-4 |
PosSIBType1-5 |
PosSIBType1-6 |
PosSIBType1-7 |
PosSIBType2-1 |
octet k+1 octet k+4 |
PosSIBType2-2 |
PosSIBType2-3 |
PosSIBType2-4 |
PosSIBType2-5 |
PosSIBType2-6 |
PosSIBType2-7 |
PosSIBType2-8 |
PosSIBType2-9 |
|
PosSIBType2-10 |
PosSIBType2-11 |
PosSIBType2-12 |
PosSIBType2-13 |
PosSIBType2-14 |
PosSIBType2-15 |
PosSIBType2-16 |
PosSIBType2-17 |
|
PosSIBType2-18 |
PosSIBType2-19 |
PosSIBType3-1 |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
|
Validity start time |
octet k+5 octet k+9 |
|||||||
Validity duration |
octet k+10 octet k+11 |
|||||||
TAIs list |
octet k+12 octet n |
Figure 9.9.3.56.2: Ciphering data set
Table 9.9.3.56.1: Ciphering key data information element
Value part of the Ciphering key data information element (octets 4 to n) |
||||||
The value part of the Ciphering key data information element consists of one or several ciphering data sets. |
||||||
The UE shall store the complete list received. If more than 16 ciphering data sets are included in this information element, the UE shall store the first 16 ciphering data sets and ignore the remaining octets of the information element. |
||||||
Ciphering data set: |
||||||
Ciphering set ID (octets 1 to 2) |
||||||
This field contains the binary encoding of the ID identifying the ciphering set. |
||||||
Ciphering key (octets 3 to octet 18) |
||||||
This field contains the 128 bit ciphering key. |
||||||
c0 length (octet 19, bits 5 to 1) This field contains the binary encoding of the length, in octets, of the c0 counter. The maximum value for the length of the c0 counter is 16 octets. |
||||||
Bits 8 to 6 of octet 19 are spare and shall be coded as zero. |
||||||
c0 (octets 20 to k) |
||||||
This field contains the binary encoding of the c0 counter. |
||||||
Positioning SIB types for which the ciphering data set is applicable (octets k+1 to k+4) |
||||||
Ciphering data set applicable for positioning SIB type 1-1 (octet k+1, bit 8) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-1 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-1 |
|||||
Ciphering data set applicable for positioning SIB type 1-2 (octet k+1, bit 7) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-2 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-2 |
|||||
Ciphering data set applicable for positioning SIB type 1-3 (octet k+1, bit 6) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-3 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-3 |
|||||
Ciphering data set applicable for positioning SIB type 1-4 (octet k+1, bit 5) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-4 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-4 |
|||||
Ciphering data set applicable for positioning SIB type 1-5 (octet k+1, bit 4) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-5 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-5 |
|||||
Ciphering data set applicable for positioning SIB type 1-6 (octet k+1, bit 3) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-6 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-6 |
|||||
Ciphering data set applicable for positioning SIB type 1-7 (octet k+1, bit 2) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 1-7 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 1-7 |
|||||
Ciphering data set applicable for positioning SIB type 2-1 (octet k+1, bit 1) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-1 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-1 |
|||||
Ciphering data set applicable for positioning SIB type 2-2 (octet k+2, bit 8) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-2 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-2 |
|||||
Ciphering data set applicable for positioning SIB type 2-3 (octet k+2, bit 7) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-3 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-3 |
|||||
Ciphering data set applicable for positioning SIB type 2-4 (octet k+2, bit 6) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-4 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-4 |
|||||
Ciphering data set applicable for positioning SIB type 2-5 (octet k+2, bit 5) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-5 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-5 |
|||||
Ciphering data set applicable for positioning SIB type 2-6 (octet k+2, bit 4) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-6 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-6 |
|||||
Ciphering data set applicable for positioning SIB type 2-7 (octet k+2, bit 3) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-7 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-7 |
|||||
Ciphering data set applicable for positioning SIB type 2-8 (octet k+2, bit 2) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-8 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-8 |
|||||
Ciphering data set applicable for positioning SIB type 2-9 (octet k+2, bit 1) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-9 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-9 |
|||||
Ciphering data set applicable for positioning SIB type 2-10 (octet k+3, bit 8) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-10 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-10 |
|||||
Ciphering data set applicable for positioning SIB type 2-11 (octet k+3, bit 7) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-11 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-11 |
|||||
Ciphering data set applicable for positioning SIB type 2-12 (octet k+3, bit 6) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-12 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-12 |
|||||
Ciphering data set applicable for positioning SIB type 2-13 (octet k+3, bit 5) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-13 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-13 |
|||||
Ciphering data set applicable for positioning SIB type 2-14 (octet k+3, bit 4) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-14 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-14 |
|||||
Ciphering data set applicable for positioning SIB type 2-15 (octet k+3, bit 3) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-15 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-15 |
|||||
Ciphering data set applicable for positioning SIB type 2-16 (octet k+3, bit 2) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-16 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-16 |
|||||
Ciphering data set applicable for positioning SIB type 2-17 (octet k+3, bit 1) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-17 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-17 |
|||||
Ciphering data set applicable for positioning SIB type 2-18 (octet k+4, bit 8) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-18 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-18 |
|||||
Ciphering data set applicable for positioning SIB type 2-19 (octet k+4, bit 7) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 2-19 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 2-19 |
|||||
Ciphering data set applicable for positioning SIB type 3-1 (octet k+4, bit 6) |
||||||
0 |
Ciphering data set not applicable to positioning SIB type 3-1 |
|||||
1 |
Ciphering data set applicable to positioning SIB type 3-1 |
|||||
Bits 5 to 1 of octet k+4 are spare and shall be coded as zero. |
||||||
Validity start time (octets k+5 to k+9) |
||||||
This field contains the UTC time when the ciphering data set becomes valid, encoded as octets 2 to 6 of the Time zone and time IE specified in 3GPP TS 24.008 [13]. |
||||||
Validity duration (octets k+10 to k+11) |
||||||
This field contains the duration for which the ciphering data set is valid after the validity start time, in units of minutes. |
||||||
TAIs list (octets k+12 to n) |
||||||
This field contains the list of tracking areas for which the ciphering data set is applicable, encoded as octets 2 to n of the Tracking area identity list IE as specified in clause 9.9.3.33. If the TAIs list is empty (as indicated by a zero length), the ciphering data set is applicable to the entire serving PLMN. |
||||||
9.9.3.57 N1 UE network capability
The purpose of the N1 UE network capability IE is to allow the UE that supports N1 mode, to provide the network with information related to the UE’s capabilities for 5GS.
The N1 UE network capability information element is coded as shown in figure 9.9.3.57.1 and table 9.9.3.57.1.
The N1 UE network capability is a type 4 information element.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||||||||
N1 UE network capability IEI |
octet 1 |
||||||||||||||||
Length of N1 UE network capability contents |
octet 2 |
||||||||||||||||
0 Spare |
5G-EHC-CP CIoT |
5GS-PNB-CIoT |
5G-UP CIoT |
5G-HC-CP CIoT |
N3 data |
5G-CP CIoT |
octet 3 |
Figure 9.9.3.57.1: N1 UE network capability information element
Table 9.9.3.57.1: N1 UE network capability information element
Control plane CIoT 5GS optimization (5G-CP CIoT) (octet 3, bit 1) |
||||||
This bit indicates the capability for control plane CIoT 5GS optimization |
||||||
Bit |
||||||
1 |
||||||
0 |
Control plane CIoT 5GS optimization not supported |
|||||
1 |
Control plane CIoT 5GS optimization supported |
|||||
N3 data transfer (N3 data) (octet 3, bits 2) This bit indicates the capability for N3 data transfer. |
||||||
Bit |
||||||
2 |
||||||
0 |
N3 data transfer supported |
|||||
1 |
N3 data transfer not supported |
|||||
IP header compression for control plane CIoT 5GS optimization (5G-HC-CP CIoT) (octet 3, bit 3) This bit indicates the capability for IP header compression for control plane CIoT 5GS optimization. |
||||||
Bit |
||||||
3 |
||||||
0 |
IP header compression for control plane CIoT 5GS optimization not supported |
|||||
1 |
IP header compression for control plane CIoT 5GS optimization supported |
|||||
User plane CIoT 5GS optimization (5G-UP CIoT) (octet 3, bit 4) |
||||||
This bit indicates the capability for user plane CIoT 5GS optimization |
||||||
Bit |
||||||
4 |
||||||
0 |
User plane CIoT 5GS optimization not supported |
|||||
1 |
User plane CIoT 5GS optimization supported |
|||||
5GS Preferred CIoT network behaviour (5GS-PNB-CIoT) (octet 3, bits 5 and 6) |
||||||
These bits indicate the 5GS CIoT network behaviour the UE prefers to use |
||||||
Bits |
||||||
6 |
5 |
|||||
0 |
0 |
no additional information |
||||
0 |
1 |
control plane CIoT 5GS optimization |
||||
1 |
0 |
user plane CIoT 5GS optimization |
||||
1 |
1 |
reserved |
||||
Ethernet header compression for control plane CIoT 5GS optimization (5G-EHC-CP CIoT) (octet 3, bit 7) This bit indicates the capability for Ethernet header compression for control plane CIoT 5GS optimization. Bit 7 0 Ethernet header compression for control plane CIoT 5GS optimization not supported 1 Ethernet header compression for control plane CIoT 5GS optimization supported |
||||||
All other bits in octet 3 are spare and shall be coded as zero, if the respective octet is included in the information element. |
9.9.3.58 UE radio capability ID availability
The purpose of the UE radio capability ID availability information element is to indicate that the UE has an applicable UE radio capability ID for the current UE radio configuration in the selected PLMN.
The UE radio capability ID availability is a type 4 information element with a length of 3 octets.
The UE radio capability ID availability information element is coded as shown in figure 9.9.3.58.1 and table 9.9.3.58.1.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|||||||||||||||||||
UE radio capability ID availability IEI |
octet 1 |
|||||||||||||||||||||||||
Length of UE radio capability ID availability contents |
octet 2 |
|||||||||||||||||||||||||
0 |
0 |
0 |
0 |
0 |
UE radio capability ID availability value |
|||||||||||||||||||||
Spare |
octet 3 |
|||||||||||||||||||||||||
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
Figure 9.9.3.58.1: UE radio capability ID availability information element
Table 9.9.3.58.1: UE radio capability ID availability information element
UE radio capability ID availability value (bits 3 to 1 of octet 3) |
||||
Bits |
||||
3 |
2 |
1 |
||
0 |
0 |
0 |
UE radio capability ID not available |
|
0 |
0 |
1 |
UE radio capability ID available |
|
All other values are interpreted as UE radio capability ID not available by this version of the protocol. |
||||
Bits 4 to 8 of octet 3 are spare and shall be coded as zero. |
9.9.3.59 UE radio capability ID request
The purpose of the UE radio capability ID request information element is to indicate that the UE radio capability ID shall be included by the UE in the SECURITY MODE COMPLETE message.
The UE radio capability ID request is a type 4 information element with a length of 3 octets.
The UE radio capability ID request information element is coded as shown in figure 9.9.3.59.1 and table 9.9.3.59.1.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||||||||
UE radio capability ID request IEI |
octet 1 |
||||||||||||||||
Length of UE radio capability ID request contents |
octet 2 |
||||||||||||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
URCIDR |
octet 3 |
Figure 9.9.3.59.1: UE radio capability ID request information element
Table 9.9.3.59.1: UE radio capability ID request information element
UE radio capability ID request (URCIDR) (octet 3, bit 1) |
||||
Bit |
||||
1 |
||||
0 |
UE radio capability ID not requested |
|||
1 |
UE radio capability ID requested |
|||
Bits 2 to 8 of octet 3 are spare and shall be coded as zero. |
||||
9.9.3.60 UE radio capability ID
See clause 9.11.3.68 in 3GPP TS 24.501 [54].
9.9.3.61 UE radio capability ID deletion indication
See clause 9.11.3.69 in 3GPP TS 24.501 [54].
9.9.3.62 WUS assistance information
The purpose of the WUS assistance information information element is to transfer the required assistance information to determine the WUS group used when paging the UE.
The coding of the information element allows combining different types of WUS assistance information.
The WUS assistance information information element is coded as shown in figure 9.9.3.62.1, figure 9.9.3.62.2 and table 9.9.3.62.1.
The WUS assistance information is a type 4 information element, with a minimum length of 3 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
WUS assistance information IEI |
octet 1 |
|||||||
Length of WUS assistance information contents |
octet 2 |
|||||||
WUS assistance information type 1 |
octet 3 octet i |
|||||||
WUS assistance information type 2 |
octet i+1* octet l* |
|||||||
… |
octet l+1* octet m* |
|||||||
WUS assistance information type p |
octet m+1* octet n* |
Figure 9.9.3.62.1: WUS assistance information information element
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
||||
Type of information |
UE paging probability information value |
octet 1 |
Figure 9.9.3.62.2: WUS assistance information type –type of information= "000"
Table 9.9.3.62.1: WUS assistance information information element
Value part of the WUS assistance information information element (octets 3 to n) |
||||||||
The value part of the WUS assistance information information element consists of one or several types of WUS assistance information. |
||||||||
WUS assistance information type: |
||||||||
Type of information (octet 1) |
||||||||
Bits |
||||||||
8 |
7 |
6 |
||||||
0 |
0 |
0 |
UE paging probability information |
|||||
All other values are reserved. |
||||||||
UE paging probability information value: |
||||||||
This field contains the value of UE paging probability information requested by the UE or negotiated by the network. It represents the probability of the UE receiving the paging. bit |
||||||||
5 |
4 |
3 |
2 |
1 |
UE paging probability information value |
|||
0 |
0 |
0 |
0 |
0 |
p00 (UE calculated paging probability is 0%) |
|||
0 |
0 |
0 |
0 |
1 |
p05 (UE calculated paging probability > 0% and <= 5%) |
|||
0 |
0 |
0 |
1 |
0 |
p10 (UE calculated paging probability > 5% and <= 10%) |
|||
0 |
0 |
0 |
1 |
1 |
p15 (UE calculated paging probability > 10% and <= 15%) |
|||
0 |
0 |
1 |
0 |
0 |
p20 (UE calculated paging probability > 15% and <= 20%) |
|||
0 |
0 |
1 |
0 |
1 |
p25 (UE calculated paging probability > 20% and <= 25%) |
|||
0 |
0 |
1 |
1 |
0 |
p30 (UE calculated paging probability > 25% and <= 30%) |
|||
0 |
0 |
1 |
1 |
1 |
p35 (UE calculated paging probability > 30% and <= 35%) |
|||
0 |
1 |
0 |
0 |
0 |
p40 (UE calculated paging probability > 35% and <= 40%) |
|||
0 |
1 |
0 |
0 |
1 |
p45 (UE calculated paging probability > 40% and <= 45%) |
|||
0 |
1 |
0 |
1 |
0 |
p50 (UE calculated paging probability > 45% and <= 50%) |
|||
0 |
1 |
0 |
1 |
1 |
p55 (UE calculated paging probability > 50% and <= 55%) |
|||
0 |
1 |
1 |
0 |
0 |
p60 (UE calculated paging probability > 55% and <= 60%) |
|||
0 |
1 |
1 |
0 |
1 |
p65 (UE calculated paging probability > 60% and <= 65%) |
|||
0 |
1 |
1 |
1 |
0 |
p70 (UE calculated paging probability > 65% and <= 70%) |
|||
0 |
1 |
1 |
1 |
1 |
p75 (UE calculated paging probability > 70% and <= 75%) |
|||
1 |
0 |
0 |
0 |
0 |
p80 (UE calculated paging probability > 75% and <= 80%) |
|||
1 |
0 |
0 |
0 |
1 |
p85 (UE calculated paging probability > 80% and <= 85%) |
|||
1 |
0 |
0 |
1 |
0 |
p90 (UE calculated paging probability > 85% and <= 90%) |
|||
1 |
0 |
0 |
1 |
1 |
p95 (UE calculated paging probability > 90% and <= 95%) |
|||
1 |
0 |
1 |
0 |
0 |
p100 (UE calculated paging probability > 95% and <= 100%) |
|||
All other values shall be interpreted as 10100 by this version of the protocol. |
9.9.3.63 NB-S1 DRX parameter
The purpose of the NB-S1 DRX parameter information element is to indicate that the UE intends to use the UE specific DRX parameter in NB-S1 mode and for the network to indicate the negotiated UE specific DRX parameter to be used at paging in NB-S1 mode.
The NB-S1 DRX parameters information element is coded as shown in figure 9.9.3.63.1 and table 9.9.3.63.1.
The NB-S1 DRX parameters is a type 4 information element with a length of 3 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
NB-S1 mode DRX parameters IEI |
octet 1 |
|||||||
Length of NB-S1 mode DRX parameters contents |
octet 2 |
|||||||
0 |
0 |
0 |
0 |
NB-S1 mode DRX value |
||||
Spare |
octet 3 |
Figure 9.9.3.63.1: NB-S1 DRX parameter information element
Table 9.9.3.63.1: NB-S1 DRX parameter information element
NB-S1 mode DRX value (bits 4 to 1 of octet 3) This field represents the DRX cycle parameter ‘T’ as defined in 3GPP TS 36.304 [21]. |
||||
Bits |
||||
4 |
3 |
2 |
1 |
|
0 |
0 |
0 |
0 |
DRX value not specified and use cell specific DRX value |
0 |
0 |
0 |
1 |
DRX cycle parameter T = 32 |
0 |
0 |
1 |
0 |
DRX cycle parameter T = 64 |
0 |
0 |
1 |
1 |
DRX cycle parameter T = 128 |
0 |
1 |
0 |
0 |
DRX cycle parameter T = 256 |
0 |
1 |
0 |
1 |
DRX cycle parameter T = 512 |
0 |
1 |
1 |
0 |
DRX cycle parameter T = 1024 |
All other values shall be interpreted as "DRX value not specified and use cell specific DRX value" by this version of the protocol. |
||||
Bits 5 to 8 of octet 3 are spare and shall be coded as zero. |
9.9.3.64 IMSI offset
The purpose of the IMSI offset information element is to indicate an IMSI offset value that is used for calculating an alternative IMSI value as specified in 3GPP TS 23.401 [10] that is used for deriving the paging occasion as specified in 3GPP TS 36.304 [21].
The IMSI offset information element is coded as shown in figure 9.9.3.64.1 and table 9.9.3.64.1.
The IMSI offset is a type 4 information element with a length of 4 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
IMSI offset IEI |
octet 1 |
|||||||
Length of IMSI offset value |
octet 2 |
|||||||
IMSI offset value |
octet 3 octet 4 |
Figure 9.9.3.64.1: IMSI offset information element
Table 9.9.3.64.1: IMSI offset information element
IMSI offset value (octet 3 to 4) |
This field contains the binary representation of the IMSI offset. Bit 8 of octet 3 represents the most significant bit of the IMSI offset and bit 1 of octet 4 the least significant bit. |
9.9.3.65 UE request type
The purpose of the UE request type information element is to enable a MUSIM UE to request the network to perform specific requests due to activity on another USIM.
The UE request type information element is coded as shown in figure 9.9.3.65.1 and table 9.9.3.65.1.
The UE request type is a type 4 information element with a length of 3 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
UE request type IEI |
octet 1 |
|||||||
Length of UE request type contents |
octet 2 |
|||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
Request type |
octet 3 |
Figure 9.9.3.65.1: UE request type information element
Table 9.9.3.65.1: UE request type information element
Request type (bits 4 to 1 of octet 3) |
||||
Bits |
||||
4 |
3 |
2 |
1 |
|
0 |
0 |
0 |
0 |
reserved |
0 |
0 |
0 |
1 |
NAS signalling connection release |
0 |
0 |
1 |
0 |
Rejection of paging |
All other values are reserved. |
||||
Bits 5 to 8 of octet 3 are spare and shall be coded as zero. |
9.9.3.66 Paging restriction
The purpose of the Paging restriction information element is to request the network to restrict paging.
The Paging restriction information element is coded as shown in figure 9.9.3.66.1, figure 9.9.3.66.2 and table 9.9.3.66.1.
The Paging restriction is a type 4 information element with a minimum length of 3 octets and a maximum length of 5 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Paging restriction IEI |
octet 1 |
|||||||
Length of Paging restriction contents |
octet 2 |
|||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
Paging restriction type |
octet 3 |
Figure 9.9.3.66.1: Paging restriction information element for Paging restriction type = "All paging is restricted" and for Paging restriction type = "All paging is restricted except voice"
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
Paging restriction IEI |
octet 1 |
|||||||
Length of Paging restriction contents |
octet 2 |
|||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
Paging restriction type |
octet 3 |
|||
EBI (7) |
EBI (6) |
EBI (5) |
EBI (4) |
EBI (3) |
EBI (2) |
EBI (1) |
EBI (0) |
octet 4* |
EBI (15) |
EBI (14) |
EBI (13) |
EBI (12) |
EBI (11) |
EBI (10) |
EBI (9) |
EBI (8) |
octet 5* |
Figure 9.9.3.66.2: Paging restriction information element for Paging restriction type = "All paging is restricted except for specified PDN connection(s)" and for Paging restriction type = "All paging is restricted except for voice service and specified PDN connection(s)"
Table 9.9.3.66.1: Paging restriction information element
Paging restriction type (bits 4 to 1 of octet 3) |
||||
Bits |
||||
4 |
3 |
2 |
1 |
|
0 |
0 |
0 |
0 |
reserved |
0 |
0 |
0 |
1 |
All paging is restricted |
0 |
0 |
1 |
0 |
All paging is restricted except for voice service |
0 |
0 |
1 |
1 |
All paging is restricted except for specified PDN connection(s) |
0 |
1 |
0 |
0 |
All paging is restricted except for voice service and specified PDN connection(s) |
All other values are reserved. |
||||
Bits 5 to 8 of octet 3 are spare and shall be coded as zero. EBI(x) (bits 8 to 1 of octet 4 and octet 5): This field indicates the PDN connections associated with the EPS bearer identities for which paging is restricted. EBI(0): (bit 1 of octet 4) Spare and shall be coded as zero. EBI(1) – EBI(15): 0 if the corresponding EPS bearer context is a default EPS bearer context, indicates that paging is restricted for the PDN connection associated with the EPS bearer identity. (see NOTE) 1 if the corresponding EPS bearer context is a default EPS bearer context, indicates that paging is not restricted for the PDN connection associated with the EPS bearer identity. (see NOTE) |
||||
NOTE: If the corresponding EPS bearer context is not a default EPS bearer context, the value is always set to 1. If the corresponding EPS bearer context is not activated, the value is always set to 1. |
9.9.3.67 EPS additional request result
The purpose of the EPS additional request result information element is to inform the UE about the result of additional request.
The EPS additional request result information element is coded as shown in figure 9.9.3.67.1 and table 9.9.3.67.1.
The EPS additional request result is a type 4 information element with a length of 3 octets.
8 |
7 |
6 |
5 |
4 |
3 |
2 |
1 |
|
EPS additional request result IEI |
octet 1 |
|||||||
Length of EPS additional request result contents |
octet 2 |
|||||||
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
0 Spare |
PRD |
octet 3 |
Figure 9.9.3.67.1: EPS additional request result information element
Table 9.9.3.67.1: EPS additional request result information element
Paging restriction decision (PRD) (bits 2 to 1 of octet 3) |
||
Bits |
||
2 |
1 |
|
0 |
0 |
no additional information |
0 |
1 |
paging restriction is accepted |
1 |
0 |
paging restriction is rejected |
All other values are reserved. |
||
Bits 3 to 8 of octet 3 are spare and shall be coded as zero. |