Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 29.336
Word version: 18.2.0
1…
5…
5
Diameter-based S6m/S6n Interface
6
Protocol Specification
7
Diameter-based S6t Interface
8
Protocol Specification for S6t
A
Diameter overload control mechanism
B
Diameter overload control node behaviour
C
Diameter message priority mechanism
D
Diameter load control mechanism
$
Change history
5
Diameter-based S6m/S6n Interface
p. 11
5.1
Introduction
p. 11
5.2
Procedure Descriptions
p. 11
5.2.1
Subscriber Information Retrieval
p. 11
5.2.1.1
General
p. 11
5.2.1.2
Detailed Behaviour of the HSS
p. 13
5.2.1.3
Detailed Behaviour of the MTC-IWF
p. 14
5.2.1.4
Detailed Behaviour of the MTC-AAA
p. 14
6
Protocol Specification
p. 15
6.1
Introduction
p. 15
6.1.1
Use of Diameter Base Protocol
p. 15
6.1.2
Securing Diameter Messages
p. 15
6.1.3
Accounting Functionality
p. 15
6.1.4
Use of Sessions
p. 15
6.1.5
Transport Protocol
p. 15
6.1.6
Routing Considerations
p. 15
6.1.7
Advertising Application Support
p. 16
6.1.8
Diameter Application Identifier
p. 16
6.1.9
Use of the Supported-Features AVP
p. 16
6.1.10
User Identity to HSS resolution
p. 16
6.2
Commands
p. 17
6.2.1
Introduction
p. 17
6.2.2
Command-Code values
p. 17
6.2.3
Subscriber-Information-Request (SIR) Command
p. 17
6.2.4
Subscriber-Information-Answer (SIA) Command
p. 18
6.3
Result-Code AVP and Experimental-Result AVP Values
p. 18
6.3.1
General
p. 18
6.3.2
Success
p. 18
6.3.3
Permanent Failures
p. 18
6.3.3.1
DIAMETER_ERROR_USER_UNKNOWN (5001)
p. 18
6.3.3.2
DIAMETER_ERROR_UNAUTHORIZED_REQUESTING_ENTITY (5510)
p. 18
6.3.3.3
DIAMETER_ERROR_UNAUTHORIZED_SERVICE (5511)
p. 19
6.4
AVPs
p. 19
6.4.1
General
p. 19
6.4.2
User-Identifier
p. 20
6.4.3
Service-ID
p. 20
6.4.4
SCS-Identity
p. 20
6.4.5
Service-Parameters
p. 21
6.4.6
T4-Parameters
p. 21
6.4.7
Service-Data
p. 21
6.4.8
T4-Data
p. 21
6.4.9
HSS-Cause
p. 22
6.4.10
SIR-Flags
p. 22
6.4.11
External-Identifier
p. 22
6.4.12
Serving-Node
p. 22
6.4.13
Additional-Serving-Node
p. 23
6.4.14
IP-SM-GW-Number
p. 24
6.4.15
IP-SM-GW-Name
p. 24
6.4.16
OC-Supported-Features
|R12|
p. 24
6.4.17
OC-OLR
|R12|
p. 24
6.4.18
IP-SM-GW-Realm
p. 24
6.4.19
DRMP
|R13|
p. 24
6.4.20
Load
|R14|
p. 24
7
Diameter-based S6t Interface
|R13|
p. 24
7.1
Introduction
p. 24
7.2
Procedure Descriptions
p. 25
7.2.1
Configuration Information on S6t
p. 25
7.2.1.1
General
p. 25
7.2.1.2
Detailed Behaviour of the HSS
p. 28
7.2.1.3
Detailed Behaviour of the SCEF
p. 31
7.2.2
Reporting on S6t
p. 32
7.2.2.1
General
p. 32
7.2.2.2
Detailed Behaviour of the HSS
p. 34
7.2.2.3
Detailed Behaviour of the SCEF
p. 35
7.2.3
NIDD Information on S6t
p. 36
7.2.3.1
General
p. 36
7.2.3.2
Detailed Behaviour of the HSS
p. 38
7.2.3.3
Detailed Behaviour of the SCEF
p. 38
8
Protocol Specification for S6t
|R13|
p. 39
8.1
Introduction
p. 39
8.1.1
Use of Diameter Base Protocol
p. 39
8.1.2
Securing Diameter Messages
p. 39
8.1.3
Accounting Functionality
p. 39
8.1.4
Use of Sessions
p. 39
8.1.5
Transport Protocol
p. 39
8.1.6
Routing Considerations
p. 39
8.1.7
Advertising Application Support
p. 40
8.1.8
Diameter Application Identifier
p. 40
8.1.9
Use of the Supported-Features AVP
p. 40
8.1.10
User Identity to HSS resolution
p. 40
8.2
Commands
p. 41
8.2.1
Introduction
p. 41
8.2.2
Command-Code values
p. 41
8.2.3
Configuration Information Request (CIR) Command
p. 41
8.2.4
Configuration-Information-Answer (CIA) Command
p. 42
8.2.5
Reporting-Information-Request (RIR) Command
p. 42
8.2.6
Reporting-Information-Answer (RIA) Command
p. 43
8.2.7
NIDD Information Request (NIR) Command
p. 43
8.2.8
NIDD-Information-Answer (NIA) Command
p. 43
8.3
Result-Code AVP and Experimental-Result AVP Values
p. 44
8.3.1
General
p. 44
8.3.2
Success
p. 44
8.3.3
Permanent Failures
p. 44
8.3.3.1
DIAMETER_ERROR_USER_UNKNOWN (5001)
p. 44
8.3.3.2
DIAMETER_ERROR_UNAUTHORIZED_REQUESTING_ENTITY (5510)
p. 44
8.3.3.3
DIAMETER_ERROR_UNAUTHORIZED_SERVICE (5511)
p. 44
8.3.3.4
DIAMETER_ERROR_REQUESTED_RANGE_IS_NOT ALLOWED (5512)
p. 44
8.3.3.5
DIAMETER_ERROR_CONFIGURATION_EVENT_STORAGE_NOT_ SUCCESSFUL (5513)
p. 45
8.3.3.6
DIAMETER_ERROR_CONFIGURATION_EVENT_NON_EXISTANT (5514)
p. 45
8.3.3.7
DIAMETER_ERROR_USER_NO_APN_SUBSCRIPTION (5451)
p. 45
8.3.3.8
DIAMETER_ERROR_UNAUTHORIZED_MTC_PROVIDER (5516)
|R16|
p. 45
8.4
AVPs
p. 45
8.4.1
General
p. 45
8.4.2
Monitoring-Event-Configuration
p. 49
8.4.3
Monitoring-Event-Report
p. 50
8.4.4
SCEF-Reference-ID
p. 51
8.4.5
SCEF-ID
p. 51
8.4.6
SCEF-Reference-ID-for-Deletion
p. 51
8.4.7
Monitoring-Type
p. 51
8.4.8
Maximum-Number-of-Reports
p. 51
8.4.9
UE-Reachability-Configuration
p. 52
8.4.10
Monitoring-Duration
p. 52
8.4.11
Maximum-Detection-Time
p. 52
8.4.12
Reachability-Type
p. 52
8.4.13
Maximum-Latency
p. 52
8.4.14
Maximum-Response-Time
p. 52
8.4.15
Location-Information-Configuration
p. 53
8.4.16
MONTE-Location-Type
p. 53
8.4.17
Accuracy
p. 53
8.4.18
Association-Type
p. 53
8.4.19
Roaming-Information
p. 53
8.4.20
Reachability-Information
p. 54
8.4.21
EPS-Location-Information
p. 54
8.4.22
IMEI-Change
p. 54
8.4.23
Feature-List AVP
p. 54
8.4.23.1
Feature-List AVP for the S6t application
p. 54
8.4.24
Monitoring-Event-Config-Status
p. 56
8.4.25
AESE-Communication-Pattern
p. 56
8.4.26
Communication-Pattern-Set
p. 57
8.4.27
Periodic-Communication-Indicator
p. 57
8.4.28
Communication-duration-time
p. 58
8.4.29
Periodic-time
p. 58
8.4.30
Scheduled-communication-time
p. 58
8.4.31
Stationary indication
p. 58
8.4.32
AESE-Communication-Pattern-Config-Status
p. 58
8.4.33
AESE-Error-Report
p. 59
8.4.34
MME-Location-Information
p. 59
8.4.35
SGSN-Location-Information
p. 59
8.4.36
User-Identifier
p. 60
8.4.37
Service-Result
p. 60
8.4.38
Service-Result-Code
p. 60
8.4.39
CIR-Flags
p. 60
8.4.40
Supported-Services
p. 61
8.4.41
Supported-Monitoring-Events
p. 61
8.4.42
Reference-ID-Validity-Time
p. 62
8.4.43
Event-Handling
p. 62
8.4.44
NIDD-Authorization-Request
p. 62
8.4.45
NIDD-Authorization-Response
p. 63
8.4.46
DRMP
p. 63
8.4.47
Service-Report
p. 63
8.4.48
Node-Type
p. 63
8.4.49
Service-Selection
p. 63
8.4.50
S6t-HSS-Cause
p. 64
8.4.51
Enhanced-Coverage-Restriction
|R14|
p. 64
8.4.52
Enhanced-Coverage-Restriction-Data
|R14|
p. 64
8.4.53
Restricted-PLMN-List
|R14|
p. 64
8.4.54
Allowed-PLMN-List
|R14|
p. 65
8.4.55
Requested-Validity-Time
|R14|
p. 65
8.4.56
Granted-Validity-Time
|R14|
p. 65
8.4.57
NIDD-Authorization-Update
|R14|
p. 65
8.4.58
Loss-Of-Connectivity-Reason
|R14|
p. 65
8.4.59
Group-Reporting-Guard-Timer
|R14|
p. 66
8.4.60
CIA-Flags
|R14|
p. 66
8.4.61
Group-Report
|R14|
p. 66
8.4.62
Group-Report-Item
|R14|
p. 66
8.4.63
RIR-Flags
|R14|
p. 67
8.4.64
Type-Of-External-Identifier
|R14|
p. 67
8.4.65
APN-Validity-Time
|R14|
p. 68
8.4.66
Suggested-Network-Configuration
|R15|
p. 68
8.4.67
Monitoring-Event-Report-Status
|R15|
p. 69
8.4.68
PLMN-ID-Requested
|R15|
p. 69
8.4.69
AdditionalIdentifiers
|R15|
p. 69
8.4.70
NIR-Flags
|R15|
p. 69
8.4.71
Reporting-Time-Stamp
|R15|
p. 70
8.4.72
NIA-Flags
|R15|
p. 70
8.4.73
Group-User-Identifier
|R15|
p. 70
8.4.74
MTC-Provider-Info
|R15|
p. 70
8.4.75
MTC-Provider-ID
|R15|
p. 71
8.4.76
PDN-Connectivity-Status-Configuration
|R16|
p. 71
8.4.77
PDN-Connectivity-Status-Report
|R16|
p. 71
8.4.78
PDN-Connectivity-Status-Type
|R16|
p. 72
8.4.79
Traffic-Profile
|R16|
p. 72
8.4.80
Updated-Network-Configuration
|R16|
p. 72
8.4.81
Battery-Indicator
|R16|
p. 73
8.4.82
SCEF-Reference-ID-Ext
|R16|
p. 73
8.4.83
SCEF-Reference-ID-for-Deletion-Ext
|R16|
p. 73
8.4.84
Exclude-Identifiers
|R17|
p. 74
8.4.85
Include-Identifiers
|R17|
p. 74
A
(Normative) Diameter overload control mechanism
|R12|
p. 74
A.1
General
p. 74
A.2
S6m interface
p. 74
A.2.1
General
p. 74
A.2.2
HSS behaviour
p. 74
A.2.3
MTC-IWF behaviour
p. 75
A.3
S6t interface
|R13|
p. 75
A.3.1
General
p. 75
A.3.2
HSS behaviour
p. 75
A.3.3
SCEF behaviour
p. 75
B
Diameter overload control node behaviour
|R12|
p. 75
B.1
Introduction
p. 75
B.2
Message prioritisation over S6m
p. 76
B.3
Message prioritisation over S6t
|R13|
p. 76
C
(Normative) Diameter message priority mechanism
|R13|
p. 77
C.1
General
p. 77
C.2
S6m, S6n, S6t interfaces
p. 77
D
(Normative) Diameter load control mechanism
|R14|
p. 78
D.1
General
p. 78
D.2
S6m interface
p. 78
D.2.1
General
p. 78
D.2.2
HSS behaviour
p. 78
D.2.3
MTC-IWF behaviour
p. 78
D.3
S6t interface
p. 78
D.3.1
General
p. 78
D.3.2
HSS behaviour
p. 78
D.3.3
SCEF behaviour
p. 79
$
Change history
p. 80