20
Alcatel-Lucent GSM IO 105 - BSS Ciphering Change BSS Document Customization Procedure 3DF 00300 0105 UAZZA Ed.09

Cipher B11

  • Upload
    tiepbk

  • View
    62

  • Download
    5

Embed Size (px)

DESCRIPTION

Cipher mode

Citation preview

Page 1: Cipher B11

Alcatel-Lucent GSM

IO 105 - BSS Ciphering Change

BSS Document

Customization Procedure

3DF 00300 0105 UAZZA Ed.09

Page 2: Cipher B11

Status RELEASED

Short title Short Title

All rights reserved. Passing on and copying of this document, useand communication of its contents not permitted without writtenauthorization from Alcatel-Lucent.

BLANK PAGE BREAK

2 / 20 3DF 00300 0105 UAZZA Ed.09

Page 3: Cipher B11

Contents

Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.1 Presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.1.1 Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81.1.2 Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81.1.3 Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.2 Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81.2.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81.2.2 Site Specific Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

1.3 Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.3.1 Human Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.3.2 Duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

1.4 Telecom / Supervision Outage and Operating Impact . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.5 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

1.5.1 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.5.2 Supplies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.5.3 Applicable Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2 Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.1 BSS Software Replacement (C1 and C2 only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122.2 Change BTS Cipher Capabilities for one BTS (C1 and C2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.2.1 At the OMC-R Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132.2.2 C1: BSS software version is B7.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132.2.3 C2: BSS software version is B8, B9 or B10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.3 Change BTS Cipher Capabilities for more BTSs (only for C2) . . . . . . . . . . . . . . . . . . . . . . . . . . 142.3.1 At the OMC-R Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142.3.2 At the NSS Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2.4 Change Cell Cipher Capabilities ( for C3 only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152.4.1 Change the Cipher Capabilities for One Cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152.4.2 Change the Cipher Capabilities for n Cells . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

2.5 Final Checks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192.6 Completion Check List (CCL) for IO 105 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

3DF 00300 0105 UAZZA Ed.09 3 / 20

Page 4: Cipher B11

Contents

4 / 20 3DF 00300 0105 UAZZA Ed.09

Page 5: Cipher B11

Preface

Preface

Purpose The aim is to perform a cipher change on one BSS, from no/ one cipher toanother cipher.

This operation is applicable for B7 BSS ,B8 BSS, B9 BSS , B10 BSS andB11BSS.

What’s New In Edition 09Editorial improvement.

In Edition 08This document contains information about the Support of A5/3 featureinChange Cell Cipher Capabilities ( for C3 only) (Section 2.4).

Audience This document is intended for:

Installers

Site administrators

Project managers

Field service technicians

Supervisors

Occasional users.

Assumed Knowledge You must have a basic understanding of the following:

Alcatel-Lucent BSS equipment

Alcatel-Lucent BSS operations, maintenance and commissioning.

3DF 00300 0105 UAZZA Ed.09 5 / 20

Page 6: Cipher B11

Preface

6 / 20 3DF 00300 0105 UAZZA Ed.09

Page 7: Cipher B11

1 Overview

1 Overview

This Overview gives information needed by project managers and foremen, forpresentation to the customer and for site planning.

3DF 00300 0105 UAZZA Ed.09 7 / 20

Page 8: Cipher B11

1 Overview

1.1 Presentation

1.1.1 Cases

The following cases apply:

C1: BSS software version is B7.2

C2: BSS software version is B8, B9 or B10

C3: BSS software version is B11

1.1.2 Options

None.

1.1.3 Restrictions

None.

1.2 Preparation

1.2.1 Prerequisites

The following prerequisites apply:

OMC-R must be running in the same Release depending on the BSS release

The new SDP package and its installation script are available on CD-ROM

The customized CDE table is available on SDP package CD-ROM or

on diskette

NSS support or assistance

Inform NSS support about the cipher change operation

G2 BTS is not supported starting with B11.

1.2.2 Site Specific Information

None.

8 / 20 3DF 00300 0105 UAZZA Ed.09

Page 9: Cipher B11

1 Overview

1.3 Scheduling

1.3.1 Human Resources

On OMC-R Site 1 operator on OMC-R site

On NSS Site 1 operator on NSS site

1.3.2 Duration

Duration for BSS software replacement: (3h45 min -5h28 min) +15 min per16 BTS group

Duration for change BTS cipher capabilities:

For 9120 BSC: 6 min/BTS

For 9130 BSC Evolution: 4 min/BTS

Duration for change cell cipher capabilities:

For 9120 BSC: (6 min+3.8sec.)*nr. of cells

For 9130 BSC Evolution (TDM and IP mode): (6 min+3.8sec.)*nr. of cells

1.4 Telecom / Supervision Outage and Operating ImpactFor BSS software replacement:

Telecom outage: (3 min -10 min)

GPRS outage: (3 min - 10 min)

Supervision outage: 2 min

For change BTS cipher capabilities:

Telecom outage: 1 min/BTS

GPRS outage: 1 min/BTS

For change cell cipher capabilities there is configuration O&M outage: 1min.20 sec. / cell

The outage occurs during the Programming Transmission.

Loss of supervision only during the BSS Software Replacement operation.

3DF 00300 0105 UAZZA Ed.09 9 / 20

Page 10: Cipher B11

1 Overview

1.5 Resources

1.5.1 Tools

Software CD-ROM with Generic SDP package including all ciphers andits installation script

CDE table corresponding to the new SDP package (onCD-ROM or on a diskette)

1.5.2 Supplies

None.

1.5.3 Applicable Documents

You must have the following documents or have electronic access to thefollowing documents:

B7.2/B7.2 BSS Software Replacement3BK 17416 0561 RJZZA (last edition)

B8/B8 BSS Software Replacement3BK 17421 0561 RJZZA (last edition)

B9/B9 BSS Software Replacement3BK 17422 0561 RJZZA (last edition)

B9/B9 9130 BSC Evolution Software Replacement3BK 17422 0564 RJZZA (last edition)

B10/B10 9120 BSC Software Replacement3BK 174300561 RJZZA (last edition)

B10/B10 9130 BSC Evolution Software Replacement3BK 174300564 RJZZA (last edition).

B11/B11 MFS/TC/BSS Software Replacement3BK 17438 0560 RJZZA (last edition).

10 / 20 3DF 00300 0105 UAZZA Ed.09

Page 11: Cipher B11

2 Scenario

2 Scenario

This Scenario presents all checks needed before beginning the scenario, andall detailed tasks to be performed on each site.

3DF 00300 0105 UAZZA Ed.09 11 / 20

Page 12: Cipher B11

2 Scenario

2.1 BSS Software Replacement (C1 and C2 only)At the OMC-R site:

Using the corresponding BSS Software Replacement method, perform softwarereplacement on the impacted BSS with the generic SDP package required inthe Prerequisites (Section 1.2.1).

During the BSS software replacement once the activation is finished in theSoftware information window check in the "new Software directory" thepresence of the following additionally BTS master file:

BTS Type A5.0 A 5.1 A 5.3**

G2 BTS* BD0SAXYY.ZZZ BD1SAXYY.ZZZ -

9100 BTS (B10)

9110/9110-EMicro BTS (B10)

BM0SAXYY.ZZZ BM1SAXYY.ZZZ -

* : G2 BTS is not supported starting with B11 release

** : A5/3 ciphering algorithm is used starting with B11.BSS Software Replacement isnot necessary to change the ciphering algorithm in B11 release.

: The ciphering algorithm is changed at cell level in B11 release. For details seesection Change Cell Cipher Capabilities ( for C3 only) (Section 2.4)

Where:

YY.ZZZ represent the new BSS version

X corresponds with the BSS software release:

X="T" for B7.2 version

X="V" for B8 version

X="W" for B9 version

X="X" for B10 version

X=”Z” for B11 version

12 / 20 3DF 00300 0105 UAZZA Ed.09

Page 13: Cipher B11

2 Scenario

2.2 Change BTS Cipher Capabilities for one BTS (C1 and C2)Choose the appropriate case if needed.

2.2.1 At the OMC-R Site

To change the BTS cipher capabilities perform the following steps for each BTS:

1. From ’BSSUSM Main View’ window select the impacted BTS

2. Right-click on the selected BTS and from the pop-up menu select Navigateto Abis View

3. ’Abis topology view’ window opens, with the selected BTS marked

2.2.2 C1: BSS software version is B7.2

1. Right-click on the marked BTS and from the pop-up menu select Modify BTS.

2. In the "Modify BTS Hardware Capabilities " window select [ Advanced ]tab and change the ciphering parameter from the current value to theneeded one.

3. Apply the modification using the [ Apply ] button.

4. In the "BSSUSM : Follow up" window the messageModifyBtsHardwareCapabilities appears.

RESTRICTION3BK20FBR149768

During the Modify BTS Hardware Capabilities a false failure could besporadically reported by the BSC due to expiring of BSC’s confirmationtimer for BTS acknowledge, with the following message: "...A messagewith JobUnssuccesful has been received from the BSS: FM Errornfo:34-fc-lower-cnf-tme-exp.A time out message received for a dependantobject for the action sbl_init.bssim-4559".

If the BTS O&M will look failed in BSSUSM window, the status can be correctedby launching a BTS HW audit for affected BTS.

2.2.3 C2: BSS software version is B8, B9 or B10

1. Right-click on the marked BTS and from the pop-up menu select ModifyBTS HW Capabilities. In the "Modify BTS HW Capabilities" window select[ Ciphering ] tab and change the ciphering parameter from the currentvalue to the needed one.

2. Apply the modification using the [ Apply ] button.

3. In the "BSSUSM : Follow up" window, the messageModifyBtsHardwareCapabilities appears.

3DF 00300 0105 UAZZA Ed.09 13 / 20

Page 14: Cipher B11

2 Scenario

2.3 Change BTS Cipher Capabilities for more BTSs (only for C2)

2.3.1 At the OMC-R Site

To change the BTS cipher capabilities for more BTSs perform the followingsteps:

1. From "BSSUSM Main View", in ’Functional Alarm Synthesis’ frame clickon [ Abis ] icon

"Abis topology view" window opens

2. For 9120 BSC select the impacted TSU

3. For 9130 BSC Evolution select multiple BTSs

4. Right-click on the marked TSU/BTSs and from the pop-up menu selectModify BTS HW Capabilities

5. In the "Modify BTS HW Capabilities" window click on the tab related to theBTS which requires a ciphering change

6. In the ’Ciphering’ field change the ciphering parameter from the currentvalue to the needed one

7. When the ciphering parameter has been changed for all impacted BTSs,click on [ Apply ] to take the modifications into account

8. In the "BSSUSM : Follow up" window, the messageModifyBtsHardwareCapabilities appears.

RESTRICTION3BK20FBR172288

After the cipher for the BTS was successfully changed (visible in Follow-up), ifthe [ RESET ] button becomes red this can be corrected by pressing [ RESET ]button.

Wait for the cipher modification to end before starting a new operation onany other BTS.

2.3.2 At the NSS Site

After all BTS cipher capabilities were changed at the OMC-R site, the cipheringmode must be changed in MSC according with the new cipher value.

14 / 20 3DF 00300 0105 UAZZA Ed.09

Page 15: Cipher B11

2 Scenario

2.4 Change Cell Cipher Capabilities ( for C3 only)The A5/3 ciphering algorithm introduces the parameter CELL_CIPH_SET, atcell level, which defines which chipering algorithms are enabled. It is possibleto enable A5/0 (no chipering), A5/0 + A5/1 or A5/0 + A5/1 + A5/3. The BTS(TDM or IP) support A5/3 only for G4 /G5 TREs.

The A5/3 ciphering algorithm only concerns the Circuit Switched domain.

The A5/3 is an optional feature sold according to a number of TRX.

For a call, A5/3 is used if:

MS supports A5/3, as indicated in Class mark 2

TRX supports A5/3

The operator has enabled A5/3 support for the cell

NSS allows the use of A5/3

DTM is not enabled in the cell or DTM is enabled and the Ciphering Mode

Setting Capability of the MS bit is enabled.

2.4.1 Change the Cipher Capabilities for One Cell

To change the cipher capability for one cell perform the following steps:

1. From’RNUSM’: SC main window, select the required cell

2. Right click, and select Edit from the popup menu

3. In the ’CELL_CIPH_SET’ panel select ’A5/0 + A5/1 + A5/3’

4. Click on[ Apply ] and then click on [ Close ].

2.4.2 Change the Cipher Capabilities for n Cells

This task allows you choose a group of cells (’n’ ), modify certainsystem-displayed parameters, and apply the modifications to the entire group.

This task can only be performed in a PRC.

To change the cipher capability for n cells perform the following steps:

2.4.2.1 Copy the OMC Cells to PRCTo copy the required OMC Cells to PRC:

1. In the "RNUSM: PRC or SC" main window, select Configuration -> OpenPRC.

The "Open PRC..." window opens.

2. Select the required PRC and click on [ Open ].

The PRC opens.

3. Select Population -> Copy From Configuration...The "Copy From" window opens.

4. Select SupervisedConfiguration to work with equipment from the runningconfiguration (recommended). Select another PRC if necessary. Click on[ Copy ].

The "Copy From: SupervisedConfiguration " window opens.

5. Click on the OMC Cells tab.

3DF 00300 0105 UAZZA Ed.09 15 / 20

Page 16: Cipher B11

2 Scenario

The "Copy From OMC Cells" view opens.

6. Copy the cells.

To copy... Click on...

an individual cell the cell.

several cells the required cells while holding [ Ctrl ].

all cells [ Select All ].

all cells of a BSS [ Edit Filter ]. The "Edit Filter" window opens. Inthe ’Bsc Name’ field enter the BSS name.

all cells and neighboringcells of a BSS

[ With cells and neighboring cells of BSS ] andenter the BSS name.

cells conforming to filtercriteria

[ Edit Filter ]. The "Edit Filter" window opens,and you can select a filter from the list or createa new one.

7. Click on [ OK ].

8. When the selected OMC cell(s) appear(s) in the "PRC" window, click on[ Close ].

2.4.2.2 Edit n CellsTo Edit n Cells:

1. In the "RNUSM: PRC" main window, select the required cells.

2. Right click and select Edit n Cells from the popup menu.

The "Edit n Cells" window opens.

3. Choose the parameter ’CELL_CIPH_SET’ from the Cell Parameters panel.

The values for each cell appear in the Selected cells panel.

The default value of the specified parameter appears in the Parameterto change panel.

4. Change the value of the parameter ’CELL_CIPH_SET’ in the Parameter tochange panel, and click on [ Apply ]

The parameter is modified for the selected cells.

16 / 20 3DF 00300 0105 UAZZA Ed.09

Page 17: Cipher B11

2 Scenario

2.4.2.3 Activate PRCTo activate the PRC:

1. In the "RNUSM: PRC" main window, select Activation -> Activate PRC.

The "PRC Activation Parameters" window opens.

2.

Activate the PRC in... Select...

queued mode (FIFOqueue)

Queued Activation.

time-triggered mode Time Triggered Activation.

If ’Time Triggered Activation’ is selected, the ’Activation Time’ fields areactivated. Enter an activation date for the PRC, in a yyyy/mm/dd/hh/mm(year/month/day/hour/minute) format. By default the fields yyyy/mm/dd arefilled with the current date.

3.

To... Select...

remove all non-modified(internal / external) cellsfrom the PRC

With cell cleanup.

apply the PRC cells to theSC, with the administrativestate of the PRC

With forcing administrative state.

synchronize the PRC withthe SC

With synchronization.

If the PRC is used as a backup, the PRC activation must be performed ’Withoutcell cleanup’, else all cells will be removed from the PRC!If not already performed, it is recommended that the PRC is synchronizedwith the SC.

4. Optionally, to specify the PRC activation time, set the WTC time asappropriate.

5. Click on [ OK ].

6. A confirmation window opens:The PRC activation will no longer be stopped after

confirmation by the "OK" button.

Click on [ OK ].

If the PRC was activated in time-triggeredmode, a confirmation window opens:The PRC should be closed to perform the time

triggered activation. Do you confirm closure?.

Click on [ OK ].

3DF 00300 0105 UAZZA Ed.09 17 / 20

Page 18: Cipher B11

2 Scenario

7. If the "RNUSM: Invalid PRC Activation" window opens, go to Step 8.

Otherwise, in the "RNUSM: Message" window, optionally, click on [ PRC /SC diff ] to view the PRC / SC differences, then click on [ OK ] to close thewindow.

8. Perform corrections for all errors and warning listed, then re-attempt theactivation from Step 1.

9. Optionally, to view the impacts of the applied PRC on the initial SC, in the"RNUSM: PRC Activation" window, click on [ PRC / SC diff ].

A html browser window opens, displaying the log file with the deltainformation.

18 / 20 3DF 00300 0105 UAZZA Ed.09

Page 19: Cipher B11

2 Scenario

2.5 Final ChecksAt the NSS Site

Check if the on going calls are performed in new ciphering mode.

2.6 Completion Check List (CCL) for IO 105

Operation Site Duration

BSS Software Replacement (C1and C2 only)

Change BTS Cipher Capabilitiesfor one BTS (C1 and C2)

Change BTS Cipher Capabilitiesfor more BTSs (only for C2)

Change Cell Cipher Capabilities(C3 only)

Date, time & total duration of work:

Start End Duration

Responsible: Visa: Date:

Traffic Outage

Start End Comments

Telecomoutage

GPRS Outage

Supervisionoutage

ConfigurationO&M outage(C3)

3DF 00300 0105 UAZZA Ed.09 19 / 20

Page 20: Cipher B11

2 Scenario

BLANK PAGE BREAK

20 / 20 3DF 00300 0105 UAZZA Ed.09