Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 24.008
Word version: 18.6.0
0…
2…
4…
4.2…
4.3…
4.4…
4.7…
4.7.5…
5…
5.3…
6…
9…
9.3…
9.3.18…
9.4…
9.4.9…
9.5…
9.5.10…
10…
10.5.4
10.5.5…
A…
E…
I…
4.7.5
Routing area updating procedure
4.7.6
P-TMSI reallocation procedure
4.7.7
Authentication and ciphering procedure
4.7.7a
Authentication and ciphering procedure used for UMTS authentication challenge.
4.7.7b
Authentication and ciphering procedure used for GSM authentication challenge
4.7.7c
Change of the ciphering algorithm at PS Handover
4.7.8
Identification procedure
4.7.9
Paging procedure
4.7.10
Receiving a GMM STATUS message by a GMM entity
4.7.12
GMM Information procedure
4.7.13
Service Request procedure (Iu mode only)
4.7.15
GMM eCall inactivity procedure
...
4.7.5
Routing area updating procedure
p. 193
4.7.5.1
Normal and periodic routing area updating procedure
p. 196
4.7.5.1.1
Normal and periodic routing area updating procedure initiation
p. 197
4.7.5.1.2
GMM Common procedure initiation
p. 198
4.7.5.1.3
Normal and periodic routing area updating procedure accepted by the network
p. 199
4.7.5.1.4
Normal and periodic routing area updating procedure not accepted by the network
p. 205
4.7.5.1.4a
Routing area updating procedure for initiating a PDN connection for emergency bearer services not accepted by the network (UTRAN Iu mode only)
|R9|
p. 211
4.7.5.1.5
Abnormal cases in the MS
p. 212
4.7.5.1.6
Abnormal cases on the network side
p. 215
4.7.5.2
Combined routing area updating procedure
p. 217
4.7.5.2.0
General
|R10|
p. 217
4.7.5.2.1
Combined routing area updating procedure initiation
p. 217
4.7.5.2.2
GMM Common procedure initiation
p. 219
4.7.5.2.3
Combined routing area updating procedure accepted by the network
p. 219
4.7.5.2.4
Combined routing area updating not accepted by the network
p. 222
4.7.5.2.5
Abnormal cases in the MS
p. 226
4.7.5.2.6
Abnormal cases on the network side
p. 227
4.7.6
P-TMSI reallocation procedure
p. 228
4.7.6.0
General
|R13|
p. 228
4.7.6.1
P-TMSI reallocation initiation by the network
p. 228
4.7.6.2
P-TMSI reallocation completion by the MS
p. 228
4.7.6.3
P-TMSI reallocation completion by the network
p. 228
4.7.6.3A
Abnormal cases in the MS
|R12|
p. 228
4.7.6.4
Abnormal cases on the network side
p. 229
4.7.7
Authentication and ciphering procedure
p. 230
4.7.7a
Authentication and ciphering procedure used for UMTS authentication challenge.
p. 230
4.7.7b
Authentication and ciphering procedure used for GSM authentication challenge
p. 231
4.7.7c
Change of the ciphering algorithm at PS Handover
|R6|
p. 231
4.7.7.1
Authentication and ciphering initiation by the network
p. 231
4.7.7.2
Authentication and ciphering response by the MS
p. 233
4.7.7.3
Authentication and ciphering completion by the network
p. 235
4.7.7.3a
128-bit packet-switched GSM ciphering key
|R9|
p. 236
4.7.7.3b
128-bit packet-switched GSM integrity key (in A/Gb mode and only if MS supports integrity protection)
|R13|
p. 236
4.7.7.4
GPRS ciphering key sequence number
p. 237
4.7.7.5
Authentication not accepted by the network
p. 238
4.7.7.5.1
Authentication not accepted by the MS
p. 239
4.7.7.6
Abnormal cases
p. 239
4.7.7.6.1
MS behaviour towards a network that has failed the authentication procedure
p. 243
4.7.7.7
Use of established security contexts
p. 244
4.7.7.8
Handling of keys at intersystem change from Iu mode to A/Gb mode
p. 245
4.7.7.9
Handling of keys at intersystem change from A/Gb mode to Iu mode
p. 245
4.7.7.10
Handling of keys at intersystem change from S1 mode to Iu mode or A/Gb mode
|R8|
p. 246
4.7.8
Identification procedure
p. 248
4.7.8.1
Identification initiation by the network
p. 248
4.7.8.2
Identification response by the MS
p. 248
4.7.8.3
Identification completion by the network
p. 248
4.7.8.3a
Abnormal cases in the MS
|R6|
p. 248
4.7.8.4
Abnormal cases on the network side
p. 249
4.7.9
Paging procedure
p. 250
4.7.9.1
Paging for GPRS services
p. 250
4.7.9.1.1
Paging for GPRS services using P-TMSI
p. 250
4.7.9.1.2
Paging for GPRS services using IMSI
p. 251
4.7.9.2
Paging for non-GPRS services
p. 252
4.7.10
Receiving a GMM STATUS message by a GMM entity
p. 252
4.7.11
Void
4.7.12
GMM Information procedure
p. 252
4.7.12.1
GMM information procedure initiation by the network
p. 252
4.7.12.2
GMM information procedure in the mobile station
p. 252
4.7.13
Service Request procedure (Iu mode only)
p. 252
4.7.13.1
Service Request procedure initiation
p. 254
4.7.13.2
GMM common procedure initiation
p. 255
4.7.13.3
Service request procedure accepted by the network
p. 255
4.7.13.4
Service request procedure not accepted by the network
p. 256
4.7.13.4a
Service request procedure for initiating a PDN connection for emergency bearer services not accepted by the network (UTRAN Iu mode only)
|R9|
p. 260
4.7.13.5
Abnormal cases in the MS
p. 261
4.7.13.6
Abnormal cases on the network side
p. 263
4.7.14
Void
4.7.15
GMM eCall inactivity procedure
|R14|
p. 264