Читать книгу Mobile Communications Systems Development - Rajib Taid - Страница 127
5.5 Usages of Network Identities
ОглавлениеAn ongoing end‐to‐end call for a UE/MS involves resource allocations by the different network elements of a communication network. In this regard, each network element assigns its respective network identities, having local or end‐to‐end significance, which is used to keep track of the various resources allocated by them. When an ongoing call is completed, the network elements release the allocated resources as identified by the respective network identities.
At times, the end‐to‐end troubleshooting of an issue may be confusing using the different network identities. The corresponding identities are used during the analysis of the different call processing events, both signaling and user data, to isolate the source of the issue, i.e. network elements. Once a network element is isolated from the probable root cause, the same events may be tracked further on the peer network element using the corresponding identities that are used in that network element.
Note that the network identities are assigned by the different network elements or different protocols layers of a network element. For example, LTE RNTIs are assigned by its Layer 2 MAC layer. Knowing the network identity and its corresponding protocol layer is particularly important during the end‐to‐end troubleshooting of an issue using protocol analysis tools.