kamy
2010-10-21, 09:58 PM
1 Initial Network Access 7
1.1 Introduction 7
1.2 Analysis of the Initial Network Access Flow 7
1.2.1 Scanning Synchronization Downlink Channels 9
1.2.2 Obtaining Uplink and Downlink Channel Parameters 10
1.2.3 Initial Ranging 10
1.2.4 Negotiating Basic Capabilities 14
1.2.5 Registration 15
1.2.6 Setting up Service Connection 16
2 Authentication 21
2.1 Initial Authentication (Including Three-Way SA Handshakes) 21
2.1.1 Introduction 21
2.1.2 Analysis of the Initial Authentication Flow 21
2.2 Re-authentication 25
2.2.1 Introduction 25
2.2.2 Analysis of Re-authentication Flow 26
3 Scanning 26
3.1 Introduction 26
3.2 Scanning Flow Analysis 27
4 Handover 28
4.1 Introduction 28
4.2 Handover Flow Analysis 28
5 Network Re-access 32
5.1 Introduction 32
5.2 Analysis of Network Re-access Flow 33
5.2.1 Network Re-access Without Authentication 33
5.2.2 Network Re-access with Authentication 35
5.3 Notes on Network Re-access 37
6 Network Exit 37
6.1 Introduction 37
6.2 Network Exit Flow Analysis 37
6.2.1 Network Exit Initiated by the MS 37
6.2.2 Network Exit Initiated by the ASN-GW 38
6.2.3 Network Exit Initiated by the BS 39
7 Troubleshooting 40
7.1 The MS Cannot Be Synchronized 40
7.2 The MS Restarts Repeatedly Before Sending the RNG_REQ Message 41
7.3 The MS Restarts After Sending the SBC_REQ Message 41
7.4 The MS Restarts After Sending the REG_REQ Message 42
7.5 The MS Cannot Obtain the IP Address 43
8 Attachments 44
8.1 Signaling of the Network Access Flow of the BTS LMT R1 (Authentication) 44
8.2 Signaling of the Network Access Flow of the BTS LMT R6 (Authentication) 44
8.3 Signaling of the Network Access Flow of the WASN LMT USER TRACE (Authentication) 45
1.1 Introduction 7
1.2 Analysis of the Initial Network Access Flow 7
1.2.1 Scanning Synchronization Downlink Channels 9
1.2.2 Obtaining Uplink and Downlink Channel Parameters 10
1.2.3 Initial Ranging 10
1.2.4 Negotiating Basic Capabilities 14
1.2.5 Registration 15
1.2.6 Setting up Service Connection 16
2 Authentication 21
2.1 Initial Authentication (Including Three-Way SA Handshakes) 21
2.1.1 Introduction 21
2.1.2 Analysis of the Initial Authentication Flow 21
2.2 Re-authentication 25
2.2.1 Introduction 25
2.2.2 Analysis of Re-authentication Flow 26
3 Scanning 26
3.1 Introduction 26
3.2 Scanning Flow Analysis 27
4 Handover 28
4.1 Introduction 28
4.2 Handover Flow Analysis 28
5 Network Re-access 32
5.1 Introduction 32
5.2 Analysis of Network Re-access Flow 33
5.2.1 Network Re-access Without Authentication 33
5.2.2 Network Re-access with Authentication 35
5.3 Notes on Network Re-access 37
6 Network Exit 37
6.1 Introduction 37
6.2 Network Exit Flow Analysis 37
6.2.1 Network Exit Initiated by the MS 37
6.2.2 Network Exit Initiated by the ASN-GW 38
6.2.3 Network Exit Initiated by the BS 39
7 Troubleshooting 40
7.1 The MS Cannot Be Synchronized 40
7.2 The MS Restarts Repeatedly Before Sending the RNG_REQ Message 41
7.3 The MS Restarts After Sending the SBC_REQ Message 41
7.4 The MS Restarts After Sending the REG_REQ Message 42
7.5 The MS Cannot Obtain the IP Address 43
8 Attachments 44
8.1 Signaling of the Network Access Flow of the BTS LMT R1 (Authentication) 44
8.2 Signaling of the Network Access Flow of the BTS LMT R6 (Authentication) 44
8.3 Signaling of the Network Access Flow of the WASN LMT USER TRACE (Authentication) 45