Professional Documents
Culture Documents
Bts Single Ran Pdi 20b
Bts Single Ran Pdi 20b
Bts Single Ran Pdi 20b
SRAN 20B,
Operating Documentation,
Issue 06
This document includes Nokia proprietary and confidential information, which may not be distributed or disclosed to
any third parties without the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/ “Your”) in connection with a product purchased or
licensed from any company within Nokia Group of Companies. Use this document as agreed. You agree to notify
Nokia of any errors you may find in this document; however, should you elect to use this document for any
purpose(s) for which it is not intended, You understand and warrant that any determinations You may make or
actions You may take will be based upon Your independent judgment and analysis of the content of this document.
Nokia reserves the right to make changes to this document without notice. At all times, the controlling version is the
one available on Nokia’s site.
NO WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY OF AVAILABILITY, ACCURACY, RELIABILITY, TITLE, NON-INFRINGEMENT, MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE, IS MADE IN RELATION TO THE CONTENT OF THIS
DOCUMENT. IN NO EVENT WILL NOKIA BE LIABLE FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO
SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT
LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS INTERRUPTION, BUSINESS OPPORTUNITY OR DATA
THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE INFORMATION IN IT, EVEN IN THE CASE OF
ERRORS IN OR OMISSIONS FROM THIS DOCUMENT OR ITS CONTENT.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product names mentioned in
this document may be trademarks of their respective owners.
© 2021 Nokia.
distributed or disclosed to
h a product purchased or
eed. You agree to notify
document for any
ons You may make or
content of this document.
OT LIMITED TO ANY
NT, MERCHANTABILITY
ENT OF THIS
G BUT NOT LIMITED TO
SUCH AS BUT NOT
OPPORTUNITY OR DATA
T, EVEN IN THE CASE OF
3 Data subject AS signaling (RRC) and transport signaling data It is the signaling flow that carries
personal information such as phone
number, service request, IMSI and IMEI.
4 IMSI (for paging coordination) The IMSI is used to identify the mobile
subcriber.
5 IMSI (for subscriber tracing) The IMSI is used to identify the mobile
subcriber.
6 IMEI (for equipment tracing) The IMEI is used to identify the mobile
equipment.
7 Cell Trace with IMSI (for cell tracing) The IMSI is used to identify the mobile
subscriber.
12 User data (Radio Layer 2, RLC-AM) User data (IP data ISO OSI Layer 7)
stored in case of RLC-AM
(Acknowledged Mode) inside the SBTS.
13 User data (Radio Layer 2, PDCPu) User data (IP data, ISO OSI Layer 7)
stored by PDCP inside the SBTS.
14 IMSI can be read from BTS traffic. The IMSI is used to identify the mobile
subscriber.
15 Voice data can be caught from BTS transport traffic Voice data of mobile subscribers
16 Data connection can be caught from BTS transport traffic. User data of mobile subscribers
Collection
Purpose Classification
Collecting the data serves for R&D Possibly Identifiable Yes, it can be collected for
tasks. troubleshooting from the service
terminal.
Collecting the data serves for R&D Possibly Identifiable Yes, it can be collected for
tasks. troubleshooting from the service
terminal.
Collecting the data serves for R&D Possibly Identifiable Yes, it is received from the UE.
tasks.
Yes, it is required to provide the Possibly Identifiable Yes, it is received from the Core.
related services.
3GPP specified functionality Possibly Identifiable Trace Collection Entity (TCE): Yes, it
is received from the Core if tracing
has been requested for this one
subscriber.
3GPP specified functionality Possibly Identifiable Trace Collection Entity (TCE): Yes, it
is received from the Core if tracing
has been requested for this one
equipment.
3GPP specified functionality Possibly Identifiable Trace Collection Entity (TCE): Yes, it
is received from the MME if tracing
has been requested for equipment or
subscribers served by the radio cell
for which tracing has been activated.
Support for location services Possibly Identifiable Yes. The location server is forwarded.
Support terminating calls to a UE, Possibly Identifiable Yes, the network is aware of the
paging, mobility speed estimation, movements of the UE.
and so on.
3GPP specified functionality Possibly Identifiable Yes, storage location inside the
SBTS (TUPu).
3GPP specified functionality Possibly Identifiable Yes, storage location inside the
SBTS (TUPu).
Possibly Identifiable
IMSI is collected for tracing purposes.
3GPP specified functionality
Support for voice calls Possibly Identifiable
Can be collected on Wireshark or
NetHack on the backhaul interface.
Storage
Retention Processing
Yes, for paging coordination accross As long as the UE is in connected Yes, for paging coordination accross
domains and IMSI-based handovers. mode. For troubleshooting, see domains and IMSI-based handovers.
location.
Yes, storage location inside TCE. No. Offline analysis
No N/A No
N/A N/A No
Yes. No.
No.
Not stored Only available in RAM for a short Data between BSC and mobile with
period of time. the BTS in between.
Not stored Only available in RAM for a short Data between BSC and mobile with
period of time. the BTS in between.
Service personnel with access to the When using troubleshooting tools, all Access to service terminal is
service terminal the sensitive information is rendered authenticated.
anonymous (IMSI, IMEI, location).
Call data is stored with the air
interface encryption.
When using R&D tools, it is not
rendered anonymous.
The log files that may contain privacy
data are tagged, then the CAPS-RT
privacy application engine/EMIL is
used to scramble this data (render it
anonymous). More information on the
kind of log files and the
anonymization tool used can be
found with the NSA tool.
Service personnel with access to the When using troubleshooting tools, all Access to service terminal is
service terminal the sensitive information is rendered authenticated.
anonymous (IMSI, IMEI, location).
Call data is stored with the air
interface encryption.
When using R&D tools, it is not
rendered anonymous.
The log files that may contain privacy
data are tagged, then the CAPS-RT
privacy application engine/EMIL is
used to scramble this data (render it
anonymous). More information on the
kind of log files and the
anonymization tool used can be
found with the NSA tool.
Service personnel with access to the When using troubleshooting tools, all Access to service terminal is
service terminal. the sensitive information is rendered authenticated.
anonymous (IMSI, IMEI, location).
Call data is stored with the air
interface encryption.
When using R&D tools, it is not
rendered anonymous.
The log files that may contain privacy
data are tagged, then the CAPS-RT
privacy application engine/EMIL is
used to scramble this data (render it
anonymous). More information on the
kind of log files and the
anonymization tool used can be
found with the NSA tool.
No Call data is stored with the air Not applicable as the IMSI is
interface encryption. required.
Not accessible via BTS SM. Call data is stored with the air TS 32.421: When the security key or
interface encryption. keys transported on control signalling
Accessible through a login. IMSI is messages are included in the trace
transferred in cleartext. file, the key values are removed and
replaced with the value “Unavailable”.
Not accessible via BTS SM. Call data is stored with the air TS 32.421: When the security key or
interface encryption. keys transported on control signalling
Accessible through a login. IMSI is messages are included in the trace
transferred in cleartext. file, the key values are removed and
replaced with the value “Unavailable”.
Not accessible via BTS SM. N/A TS 32.421: When the security key or
keys transported on control signalling
Accessible through a login. IMSI is messages are included in the trace
transferred in cleartext. file, the key values are removed and
replaced with the value “Unavailable”.
Service personnel with access to the For troubleshooting, all the sensitive Access to the service terminal is
service terminal information is rendered anonymous authenticated.
(IMSI, IMEI, location). Call data is
stored with the air interface
encryption.
When using R&D tools, it is not
rendered anonymous.
The log files that may contain privacy
data are tagged, then the CAPS-RT
privacy application engine/EMIL is
used to scramble this data (render it
anonymous). More information on the
kind of log files and the
anonymization tool used can be
found with the NSA tool.
No No No
No No No
No No No
Can be accessed outside networks Link to IMSI can be calculated if all U-plane PS is normally encrypted on
using packet collection tools such as traffic can be fetched. air interface, except if A5/0 is used.
Wireshark.
Accuracy Comments
Relevance
Yes Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes
Yes Yes
N/A N/A
N/A N/A
N/A N/A
N/A N/A
N/A N/A
N/A N/A
Data is relevant for the defined Data is accurate for the defined
purpose. purpose.
Data is relevant for the defined Data is accurate for the defined
purpose. purpose.
Data is relevant for the defined Data is accurate for the defined
purpose. purpose.