°²È«Ä£Ê½¿ØÖƹý³Ì(SMC)ÊÇ3G±ê×¼ÖÐÓ¦ÓõÄÒ»ÖÖ¿ÕÖнӿڰ²È«¿ØÖƹý³Ì¡£ËûÖ÷ÒªÓÃÀ´ÔÚÒƶ¯Í¨ÐÅÍøÂçÖб£Ö¤Êý¾ÝµÄ°²È«ÐÔºÍÍêÕûÐÔ£¬ºËÐÄÍø(CN)ÓÃÕâ¸ö¹ý³Ì֪ͨÎÞÏßÍøÂç¿ØÖÆÆ÷(RNC)Ó¦¸Ã²ÉÓõļÓÃÜģʽºÍÍêÕûÐÔ±£»¤Ä£Ê½¡£SMC¹ý³ÌÖ÷Òª°üÀ¨Á½ÖÖ£ºÒ»ÖÖÊÇÐÅÁîµÄÍêÕûÐÔ±£»¤£¬ÁíÍâÒ»ÖÖÊÇÓû§Êý¾ÝµÄ¼ÓÃÜ¡£ÏÂÃæ×ÅÖؽéÉÜÓû§Êý¾ÝµÄ¼ÓÃܹý³Ì¡£
1 Öض¨Î»Óû§Êý¾Ý¼ÓÃܹ¦ÄÜÃèÊö
1£®1 Ô¼¶¨
Öض¨Î»Ê±¼ÓÃܹ¦ÄÜÃèÊöµÄÊÇ·þÎñRNC(SRNC)½øÐмÓÃÜ£¬°éËæ×ÅSRNCÖض¨Î»µÄÓ²Çл»£ºÓû§É豸(UE)µÄ²âÁ¿±¨¸æ±íÃ÷Ó²Çл»µÄÄ¿±êСÇøÊôÓÚÁíÍâÒ»¸öRNC£¬ÕâʱÎÞÏß½ÓÈëÍøÂç(UTRAN)¾ö¶¨Ö´ÐÐÓ²Çл»£¬½øÐÐSRNCÖض¨Î»£¬½«UEÒƽ»¸øÄ¿±êRNC¡£
ÓÉÓÚ²»Ö§³ÖIur½Ó¿Ú£¬ËùÒÔ²ÉÓÃUE involvedµÄÖض¨Î»£¬Í¨¹ýIu½Ó¿ÚRANAPÐÅÁîºÍUu½Ó¿ÚRRCÐÅÁîÀ´ÊµÏÖ¡£
»ùÓÚÏÈ¿¼ÂǼòµ¥µÄ»ù±¾¹ý³Ì£¬ÔÙÖð²½ÍêÉƸ÷ÖÖ¸´ÔÓÇé¿öµÄ˼·£¬Ô¼¶¨ÈçÏ£º
Ôݲ»¿¼ÂÇ×éºÏÓòÖض¨Î»Ê±µÄ¼ÓÃÜʵÏÖ£¬¶ÔÓÚ×éºÏÓòÖض¨Î»Ê±¼ÓÃÜ£¬ÊÓΪÖض¨Î»Ê§°Ü¡£
ÔÚÖض¨Î»Ç°£¬Ô´RNCÒѾÅäÖüÓÃÜ£¬Èç¹ûÖض¨Î»Ê±ÉÐδÅäÖüÓÃÜÐÅÏ¢£¬ÊÓΪ²»ÐèÒª½øÐмÓÃÜ¡£
Ô´RNCÔÚÖض¨Î»·¢Æðºó£¬ºöÂÔCN·¢À´µÄSecurity Mode CommandÏûÏ¢¡£
Ä¿±êRNCÓ¦¸Ã½ÓÊÜÔ´RNCÖ¸¶¨µÄ¼ÓÃÜÅäÖÃÐÅÏ¢£¬²»Ó¦¸ÃÔÚ·¢ÍùÔ´RNCµÄContainnerÖÐÖ¸¶¨ÐµļÓÃÜÅäÖá£Èç¹ûÄ¿±êRNC²»Ö§³ÖÔ´RNC²à¼ÓÃÜÅäÖã¬ÊÓΪÖض¨Î»Ê§°Ü¡£
1£®2 Ô´RNCµÄ´¦Àí²ßÂÔ
Öض¨Î»µÄʱºò£¬UTRANµÄÍøÂç½ÚµãÖ®¼ä´«µÝRRCÐÅÏ¢µÄµäÐÍ·½Ê½ÊÇRRCÐÅÏ¢ÈÝÆ÷(RRC information container)¡£Relocation RequiredÏûÏ¢ÖÐIE'Source RNC to Target RNC Transparent Container'ÄÚÈÝ°üÀ¨UEµ±Ç°ÔÚ¿ÕÖнӿÚÉϵÄËùÓÐÏà¹ØÐÅÏ¢¡£ÏòÄ¿±êRNC´«µÝÕâЩÐÅϢĿµÄÊÇ×÷ΪĿ±êRNC·ÖÅä×ÊÔ´µÄ²Î¿¼¡£
Ô´RNC²àSMCÄ£¿éµÄÖ÷ÒªÈÎÎñÊÇÕýÈ·ÌîдContainnerÖкÍÍêÕûÐÔ±£»¤¡¢¼ÓÃÜÏà¹ØµÄÐÅÏ¢¡£Öض¨Î»Ê±¼ÓÃܹ¦ÄÜÖ÷Òª¿¼ÂÇ´ËÈÝÆ÷ÖеÄCiphering related informationIE£¬ÒÔ¼°Integrity protection related information IE¡£Ciphering related information˵Ã÷¼û±í1¡£
¼ÓÃÜʹÓÃIntegrity protection related information IEÖеÄbinstring(Implementation specific parameters)À´Ð¯´øÔ´²àÓë¼ÓÃÜÏà¹ØµÄÐÅÏ¢¡£
Implementation specific parameters¹²5 1 2 b£¬ÍêÕûÐÔ±£»¤Õ¼ÓÃ216 b£¬¼ÓÃÜ´Ó217 b¿ªÊ¼¹æ»®£¬¾ßÌåÈçͼ1Ëùʾ¡£
¼ÓÃÜËã·¨²ÉÓÃ16 b´æ·Å(UEA0¡«UEAl5)£¬Ã¿´ÎÓÐÇÒ½öÓÐÒ»¸öËã·¨ÆôÓ㬸ÃËã·¨ÆäÏàӦλÖÃ1£¬ÆäÓàËã·¨ÏàӦλ¶¼ÖÃ0¡£¼ÓÃÜÕ¼ÓÃ178 b£¬ÄÇôBitstrm¡£gÕ¼ÓÃ395 b¡£
ÓÉÓÚÔ´RNCÉÏSRB2»¹Òª·¢ËÍRadio Bearer ReconfigurationÏûÏ¢£¬¶ÔÓÚÔ´²àSRB2µÄÏÂÐÐHFNÔÚÌî³ä͸Ã÷ÈÝÆ÷ʱ½øÐб£»¤£¬ÅжÏSN+1ÊÇ·ñ·¢Éú·×ª£¬Èç¹û·¢Éú·×ª£¬Ôò½«SRB2µÄÏÂÐÐHFN+1ÌîÈë͸Ã÷ÈÝÆ÷ÖС£
1£®3 Ä¿±êRNCµÄ´¦Àí²ßÂÔ
¶ÔÓÚ¼ÓÃܹ¦ÄÜÄ¿±êRNCµÄ´¦Àí£¬Ö÷ÒªÍê³ÉÈçÏÂÁ½²½£º
(1)½ÓÊÕContainer
Relocation RequestÏûÏ¢ÖÐIE Source RNC to Target RNC Transparent Container´ø¸øÄ¿±êRNC UEµÄRRCÐÅÏ¢¡£
ÔÚϵͳÄÚÖض¨Î»µÄÇé¿öÏ£¬Èç¹ûSource RNC-to-Target RNC transparent container IEÀïÃæÌṩÁËCiphering Key IE£¬Ä¿±êRNC»áÑ¡ÔñʹÓÃÒ»ÖÖ¼ÓÃÜËã·¨£¬²¢ÀûÓô˼ÓÃÜÃÜÔ¿È¥¼ÓÃÜÐÅÁîÊý¾Ý(ÎÞÂÛÑ¡ÔñÁËÄÄÒ»ÖÖËã·¨)¡£¶ø´ËʱRelocation RequestÏûÏ¢ÖÐEncryption InformationIEÀïÃæµÄEncryption Key IE½«Ò»Ö±²»»á±»ÊÓΪ¼ÓÃÜÐÅÁîÊý¾ÝÖ®Óá£
ºöÂÔRelocation RequestÏûÏ¢ÖÐEncryption Information IEºÍIntegrity Protection Information IEÐÅÏ¢µÄÅäÖá£
Èç¹ûÔ´RNC²àûÓÐÆôÓüÓÃÜ£¬ÔòSource RNC to Target RNC Transparent Container IEÖв»»á°üº¬Ciphering related informationÐÅÏ¢£¬Ä¿±êRNC½«²»»áÆô¶¯¼ÓÃܲÙ×÷¡£Èç¹ûÔ´RNC²àÆôÓüÓÃÜ£¬ÔÚIE Source RNC to Target RNC Transparent ContainerÖл¹ÐèÒª°üº¬Integrity protection related informationÐÅÏ¢¡£
Ä¿±êRNC¸ºÔ𽫽ÓÊÕµ½µÄContainerÖкͼÓÃÜÏà¹ØÐÅÏ¢±£´æµ½±¾µØµÄSMC_CTXÖУ¬²¢·¢ËÍÏûÏ¢½«Ô´²à¼ÓÃÜÏà¹ØÐÅÏ¢´ø¸øTPSS¡£Èç¹ûÄ¿±êRNC²»Ö§³Ö¸ÃÅäÖã¬ÔòÖض¨Î»×ÊÔ´·ÖÅäʧ°Ü¡£
(2)·¢ËÍContainerµ½SRNC
Relocation RequestÏûÏ¢ÖеÄSource RNC to Target RNC Transparent Container IE¸øÄ¿±êRNC´øÀ´ÁËUEµÄRRCÐÅÏ¢£¬»ùÓÚÕâЩÐÅÏ¢£¬Ä¿±êRNC»á×¼±¸Ó²Çл»ÏûÏ¢(ÈçRadio Bearer Reconfiguration)¡£È»ºó£¬Ä¿±êRNC»á°Ñ×¼±¸ºÃµÄÓ²Çл»ÏûÏ¢´«»ØÔ´RNC£¬ÓÉÔ´RNCÏòUE·¢ËÍ¡£ÕâÌõÓ²Çл»ÏûÏ¢½«±»ÌîÈËRelocation Request AcknowledgeÏûÏ¢ÖеÄTarget RNC to Source RNC Transparent Container IEÖС£
Ä¿±êRNCʹÓÃContainerÖеÄÐÅÏ¢×éRadio Bearer ReconfigurationÏûÏ¢£¬È»ºó·¢ÍùÔ´RNC£¬Ô´RNCÔÚÊÕµ½ÕâÌõÏûÏ¢ºó£¬²»×ö´¦Àí£¬²¢¶ÔRadio Bearer ReconfigurationÏûÏ¢½øÐмÓÃÜ£¬Ö±½Ó͸´«¸øUE¡£
ÔÚûÓÐÍê³ÉÖض¨Î»Ç°£¬Èç¹ûÔ´RNC²à»òÕßÄ¿±êRNC²à³öÏÖÈκÎÒì³££¬¶¼»áµ¼ÖÂÖض¨Î»Ê§°Ü£¬Ö±½Ó·¢ÆðRRCÁ¬½ÓÊͷŹý³Ì¡£
1£®4Öض¨Î»¼ÓÃܹý³Ì
Öض¨Î»¹ý³ÌÖеÄÓû§Êý¾Ý¼ÓÃܹý³ÌÈçͼ2Ëùʾ¡£
Öض¨Î»¼ÓÃܹý³Ì´¦Àí²½ÖèÈçÏ£º
(1)Ô´²àRNC¸ù¾Ý²âÁ¿±¨¸æ£¬·¢ÆðÖض¨Î»¹ý³Ì£»
(2)Ô´²àMMÄ£¿éµ÷ÓÃSMCÄ£¿éÌṩº¯Êý£¬·¢ËÍCountC_ ReqÏûÏ¢£¬ÏòTPSS²éѯAM£¯UM£¯TM Countc£¬²¢Æô¶¨Ê±Æ÷¡£
Èç¹û²»ÐèÒª½øÐмÓÃÜ£¬Ôò·¢ËÍÒ»ÌõRLC COUNTCREQÏûÏ¢¸øDSDU¡£Èç¹ûCSÓò¼ÓÃÜ£¬Ôò·¢ËÍÒ»ÌõRLCCOUNTC_REQÏûÏ¢£¬Ò»ÌõMAC_COUNTC_REQÏûÏ¢¸øDSDU¡£Èç¹ûPSÓò¼ÓÃÜ£¬Ôò·¢ËÍÒ»ÌõRLC COUNTCREQÏûÏ¢¸øDSDU£¬Ò»ÌõRLC_COUNTC_REQÏûÏ¢¸ø
PSDU¡£Èç¹û¶¨Ê±Æ÷³¬Ê±£¬ÔòÊÓΪÖض¨Î»Ê§°Ü£¬µ÷ÓÃMMÄ£
¿éº¯Êý·µ»ØRELOCATION FAILURE¡£
(3)Ô´²àÊÕµ½CountC_RspÏûÏ¢ºó£¬SMCÄ£¿éÏȼì²é´Ë´ÎÖض¨Î»¹ý³Ì¼ÓÃÜÇé¿öÊÇ·ñÖ§³Ö¡£
Èç¹û²»Ö§³Ö¸ÃÇé¿ö£¬ÊÓΪÖض¨Î»Ê§°Ü£¬µ÷ÓÃMMÄ£¿éº¯Êý·µ»ØRELOCATION FAILURE(ʧ°ÜÇé¿ö£º×éºÏÓòÖض¨Î»)¡£·ñÔò£¬Ìî³ä±¾µØSMCÈÝÆ÷ÐÅÏ¢£¬µ÷ÓÃMMÄ£¿éº¯Êý£¬Ìî³ä͸Ã÷ÈÝÆ÷ÐÅÏ¢²¢·¢ËÍRelocation RequiredÏûÏ¢¡£
¶ÔÓÚÔ´²àSRB2µÄÏÂÐÐHFNÔÚÌî³ä͸Ã÷ÈÝÆ÷ʱ½øÐб£j»§£¬ÅжÏSN+1ÊÇ·ñ·¢Éú·×ª£¬Èç¹û·¢Éú·×ª£¬Ôò½«SRB2µÄÏÂÐÐHFN+1ÌîÈë͸Ã÷ÈÝÆ÷ÖС£
(4)Ä¿±ê²àRNCÊÕµ½Relocation RequestÏûÏ¢£¬¼ì²éÄ¿±êRNCÊÇ·ñÖ§³ÖÔ´²àµÄ¼ÓÃÜÅäÖã¬Èç¹û²»Ö§³Ö£¬ÊÓΪÖض¨Î»Ê§°Ü¡£·ñÔò£¬¸üÐÂSMC_CTXÖмÓÃÜ£¯ÍêÕûÐÔ±£»¤Ïà¹ØÐÅÏ¢¡£
Èç¹û½øÐмÓÃÜ£¬ÏòTPSS·¢ËÍCIPHER_INDÏûÏ¢¡£¶ÔÓÚCSÓò£¬·¢ËÍÒ»ÌõRLC_CIPHER_INDÏûÏ¢£¬Ò»ÌõMAC_CIPHER_INDÏûÏ¢¸øDSDU¡£Èç¹ûPSÓò¼ÓÃÜ£¬Ôò·¢ËÍÒ»ÌõRLC_CIPHER_INDÏûÏ¢¸øDSDU£¬Ò»ÌõRLC_CIPHER_INDÏûÏ¢¸øPSDU¡£
Ä¿±ê²à¶ÔÓÚAM£¯UM£¯TMģʽµÄRB£¬¾ùÁ¢¼´ÆôÓüÓÃÜÅäÖá£
¶ÔÓÚÄ¿±ê²àSRB2£¬²ÉÓÃÔ´²àSRB2µÄÉÏÏÂÐÐHF½Ï´óÕß¼Ó1×÷ΪÆäÉÏÏÂÐÐHFN¡£
(5)Ä¿±ê²à·¢ËÍRELOCATION_REQUEST_ACKNOWLEDGEÏûÏ¢¡£(6)Ô´²àÊÕµ½RELOCATION COMMANDÏûÏ¢£¬×éÖ¯RBÖØÅäÖÃÏûÏ¢£¬½øÐмÓÃÜ£¯ÍêÕûÐÔ±£»¤£¬·¢ËÍRBRECONFIGURATIONÏûÏ¢¸øUE¡£
(7)Ä¿±ê²àÊÕµ½RBÖØÅäÖÃÍê³ÉÏûÏ¢£¬·¢ËÍRLCSTART_INDÏûÏ¢¸øTPSS£¬Ê¹ÓÃRB RECONFIGURA_TION COMPLETEÏûϢЯ´øµÄSTARTÖµ¸üÐÂн¨RB
µÄHFN(SRB2³ýÍâ)¡£
(8)Ä¿±ê²à·¢ËÍRELOCATION COMPLETEÏûÏ¢¡£
(9)Ô´²àÊÕµ½Iu_RELEASE_COMMANDÏûÏ¢£¬·¢ÆðÓû§ÊͷŹý³Ì¡£
2 ½á Óï
°²È«Ä£Ê½¿ØÖƹý³Ì(SMC)Ò»°ãÔÚͨ»°¹ý³ÌÖкÍÖض¨Î»ÖгöÏÖ¡£Ä¿Ç°£¬ÔÚͨ»°¹ý³ÌÖеݲȫģʽ¿ØÖƹý³Ì(SMC)ÒѾ±»ÖÆÔ쳧É̹㷺ʹÓò¢Ç÷³ÉÊ죬¶øÖض¨Î»¹ý³ÌÖеݲȫģʽ¿ØÖƹý³Ì(SMC)È´Ò»Ö±´¦ÓÚ̽Ë÷½×¶Î£¬ÕâÒ²Ôì³ÉÁ˲»Í¬³§¼ÒÉ豸֮¼ä»¥Á¬»¥Í¨³öÏÖÎÊÌ⡣ϣÍûͨ¹ýÉÏÃæµÄÌÖÂÛΪ¸Ã¼¼ÊõµÄ×îÖÕ±ê×¼»¯ÊµÏÖÌṩ°ïÖú¡£